SlideShare una empresa de Scribd logo
1 de 4
White Paper




M86 Security Labs:
Threat Predictions 2011
Introduction

A year makes a big difference when it comes to Web and email security. In 2010, scareware has become more nefarious,
mimicking Microsoft’s Security Essentials, Windows Automatic Updates and even browser-based attack warnings used by Mozilla
Firefox and Google Chrome. Malware such as GootKit and Asprox have been used to compromise websites in mass through
stolen FTP credentials and vulnerabilities in ASP pages. Furthermore, cybercriminals used shortened URLs to obscure malicious
links in spam messages, tweets and Facebook status updates.

As 2011 approaches, we look to the future to determine what’s in store for tomorrow’s threat landscape. Below are eight of the
top trends we expect to see in the next year.

    1.   Malware Will Increasingly Use Stolen Digital Certificates to Bypass Whitelisting and Code
         Signing Requirements

         Though nothing new, this issue gained notoriety following the discovery of the Stuxnet malware, which was
         intended to target a specific set of industrial systems and reprogram them. In analyzing Stuxnet, it was observed
         that the malware was digitally signed (certified) with two legitimate certificates. Soon thereafter, a variant of the
         Zeus Trojan was discovered to be digitally signed using a certificate from antivirus vendor Kaspersky.

         This trend is alarming because Windows Vista, Windows 7 and many other products check the validity of digital
         signatures and warn or deny users when a certain type of software is not digitally signed. When cybercriminals
         use stolen certificates to digitally sign their malware, they bypass this protection with ease.

         We expect this trend to increase in the coming year as cybercriminals continue to experiment with different ways
         to avoid detection and lower victims’ suspicion levels.

    2.   Exploding Smartphone Market and Growing Tablet Demand Lead to More Mobile Malware

         Since the introduction of the iPhone, the smartphone market has grown over the last several years. And the
         introduction of tablet devices such as the Apple iPad, HP Slate and Android-based tablets signals a potential
         shift in which cybercriminals target end users via mobile platforms. As with other platforms, the attackers will go
         where the most users are, and where these users are the least protected.

                 Top Smartphone Platforms                                   Total U.S. Smartphone Subscribers Ages 13+
                 Sep. 2009 to Aug. 2010                                     Source: comScore MobiLens

                                                           Share (%) of Smartphone Subscribers

                                       Sep 2009       Dec 2009         May 2010          Aug 2010         Point Change

                 Total Smartphone
                 Subscribers
                                        100%            100%             100%             100%                N/A

                 RIM                    42.6%          41.6%            41.7%             37.6%               - 5.0
                 Apple                  24.1%          25.3%            24.4%             24.2%               - 0.1

                 Microsoft              19.0%          18.0%            13.2%             10.8%               - 8.2
                 Palm                   8.3%            6.1%             4.8%             4.6%                - 3.7

                 Google                 2.5%            5.2%            13.0%             19.6%               17.1




Threat Predictions 2011                                                                                                          Page 1
A recent discovery found that a new variant of the Zeus malware was released with the intention of targeting
         users of Nokia phones which run the Symbian OS. This malware was used to defeat online banking two-
         factor authentication, monitoring the SMS messages sent by banking institutions to their customers for fraud
         protection.

         Google’s mobile operating system, Android, has increased from a 2.5% market share in September 2009 to
         19.6% in August 2010. The mobile operating system is also slated to be included in numerous tablet devices in
         the coming months.

         Apple’s iOS platform is a closed system, and the application approval process for its Application Store is
         restrictive. Despite this, multiple vulnerabilities have been discovered for the iPhone, including the vulnerability
         that was exploited to “jailbreak” (remove the restriction on which applications can be installed) the iPhone.

         Google’s Android platform is open source, and its application approval process is less restrictive, allowing most
         applications to be submitted and approved. Additionally, users of Android-based phones have a setting that
         allows users to install applications from outside Google’s App Store.

         So far, Android has seen rogue applications such as a “Movie Player,” which secretly sends SMS messages to
         a premium rate number, costing the end user several dollars per message. Other applications have harvested
         information such as a user’s SIM card number and voicemail password, sending it to a server in another country.

         This is just the beginning. As smartphone adoption grows and new devices are released (Windows 7 phones
         and tablet devices), and the focus shifts towards the tablet platform, we anticipate malware targeting all mobile
         platforms to increase in 2011.

    3.   Spam Campaigns Will Increasingly Mimic Legitimate Mail from Popular Websites

         While we have seen messages like these before, we’ve noticed that they now look more legitimate than in
         the past. Examples of this include spammers who targeted Amazon/Flixster/GoDaddy names and a FedEx
         campaign. In the case of LinkedIn spam messages, we observed that the headers and body templates were
         taken from actual LinkedIn messages. Therefore, it’s nearly impossible for the average user to distinguish
         between the legitimate LinkedIn messages and the nefarious ones.




         E-commerce sites like Amazon.com and logistic services companies like FedEx are used by millions of people
         worldwide who are accustomed to receiving receipts and shipping confirmations from them. Therefore, they are
         ideal targets for spammers who want to mimic these types of messages to trick users into downloading malware
         or clicking on a link that leads to a malicious payload.


Threat Predictions 2011                                                                                                         Page 2
Whether it’s Facebook notifications, LinkedIn updates or bank statements, we expect this trend to increase.
         Spammers will continue to perfect the faux spam templates they use to convey a sense of legitimacy when
         targeting end users, making it difficult for users to differentiate between good mail and potentially malicious
         spam.

    4.   Data-stealing Trojans Will Become More Sophisticated

         The name Zeus is synonymous with cybercrime. This data-stealing malware has been used over the last three
         years to perpetrate hundreds of thousands of eBanking fraud cases against consumers. Aided by money mules,
         it has also been used to siphon large amounts of money from businesses and school districts.

         Trojans such as Zeus have become more sophisticated, inserting forms onto legitimate banking websites,
         spoofing bank statements and even moving into man-in-the-browser attacks which take over users’ banking
         sessions after they login. They present users with phony Web pages, showing funds and transactions that look
         normal, while pilfering money behind the scenes.

         Zeus received intense media scrutiny after M86 Security Labs discovered an attack on customers of a major UK
         financial institution, spurring arrest warrants for those who were responsible. As a result, pressure is mounting
         against Zeus, driving the advancement and creation of other Trojans such as Carberp, Bugat and SpyEye, and
         malware authors are finding new ways to evade detection and keep the money flowing. One option is for them
         to move beyond Internet banking and financial institutions—perhaps to take over a user’s Amazon.com account
         and ship goods to drop points via goods mules.

         With the recent news of a SpyEye and Zeus merger, the potential for more sophisticated banking Trojans is even
         higher.

    5.   On Social Networks, More Users and More Integration Lead to More Problems

         It’s no surprise that Facebook recorded its 500 millionth user this year. The service has become the de-facto
         social network used today. Additionally, Twitter, which has seen its popularity soar in the last few years, is on
         pace to reach 200 million users by the end of 2010. When you add these two up, you have a pool of 700 million
         users that cybercriminals can target.

         From recent cross-site scripting (XSS) and cross-site request forgery attacks to the “likejacking” attacks,
         increase in spam and sensationalized headline applications on Facebook, cybercriminals are constantly tooling
         and retooling, finding ways to exploit the social networks. This is because there is more success and payoff in
         assuming the identity of someone a user knows than in pretending to be a Nigerian Prince.

         The major problem is that the users of these services have a more lax approach when it comes to security. The
         networks themselves have made strides to try to combat the threats their users face. However, as the platforms
         grow and integrations happen (Skype and Facebook), cybercriminals continue to find new and interesting ways
         to target the users of these services.

         The reason for the lax security posture is that there is an inherent trust placed in the service. The people that are
         a part of the “social network” are friends — people users trust. When a trusted person posts a link, the people in
         this user’s social network are more likely to click on it.

         We expect this trust to continue to be exploited, as cybercriminals will pursue this huge target among the various
         social networks.

    6.   As a New Standard, HTML5 Will Become the New Target for cybercriminals

         When it comes to new platforms and standards, a phase of experimentation takes place for legitimate use cases.
         HTML5 is a cross-platform standard for Web browsing, and to meet the need of this new standard, support has
         already started shipping for it in newer versions of popular Web browsers such as Internet Explorer 9. Apple has
         already positioned HTML5 in the latest release of its Safari browser, which is used on its Mac devices as well as
         its mobile platform devices like the iPhone, iPod Touch and iPad.

         While developers are experimenting with HTML5 for legitimate purposes, cybercriminals are finding ways to
         exploit the standard for malicious reasons.




Threat Predictions 2011                                                                                                          Page 3
Browser usage is split more than ever before, with Internet Explorer no longer holding its dominant share of the
                          market. Therefore, it would be beneficial for cybercriminals to target HTML5, as its appeal lies in the fact that it
                          will have cross-platform support. HTML5 features support for scripting APIs (application programming interfaces)
                          which could easily be used by cybercriminals.

                          As browser support grows and Web application developers implement HTML5, we expect cybercriminals to find
                          ways to exploit this new technology in the coming year.

                 7.       Malware-as-a-Service (MaaS) Offerings Will Increase as an Alternative to Malware Applications

                          Exploit kits, also known as “attack toolkits,” have become popular with cybercriminals over the last couple of
                          years. Used as “Command Control” for cyber attacks, exploit kits have lowered the entry level to cybercrime and
                          given birth to a new ecosystem with different players and roles.

                          Our research indicates that a shift is occurring whereby exploit kit developers have started to provide services
                          (instead of/in addition to) classical application offerings. For example, the NeoSploit and Phoenix exploit kits offer
                          different malware services to their customers. With the NeoSploit kit, customers can purchase a specific Web
                          server configuration that redirects victims’ requests to a Neosploit back-end server, which is apparently handled
                          by the NeoSploit team.

                          Different “suppliers” can be used to provide active vulnerabilities and the exploits that use them, or to get help
                          in driving traffic past infected websites. In the same way the commercial world is embracing cloud-delivered
                          services, cybercriminals will also become better organized, offering a complete suite of services in one place.

                          While we do not anticipate a decline in the usage of exploit kits, we do believe there will be more service offerings
                          for cybercriminals instead of just application offerings.

                 8.       Botnets Will Thwart Future Takedowns; Smaller Botnets Will Become More Prevalent

                          In 2010, we’ve seen a number of takedown attempts against various botnets. At the beginning of the year, the
                          Lethic spambot was taken down briefly, only to return soon after. In August, attempts were made to takedown
                          the Pushdo botnet. Unfortunately, these efforts were short-lived. Like Lethic, Pushdo returned not long after.
                          Microsoft used legal action to shut down the Waledac botnet, and there was another effort made to bring down
                          the Mariposa botnet. Most recently, the operator of the Bredolab botnet was arrested, and Dutch authorities
                          seized the servers controlling the Bredolab botnet.

                          With these takedowns, a message has been delivered to botnet operators around the globe that efforts are
                          being made by law enforcement and security researchers to bring them down. Therefore, it’s clear that botnet
                          operators will need to reevaluate their operations going forward in order to thwart future takedown attempts. We
                          expect to see the command and control architectures become more and more layered and complex, making it
                          difficult for security researchers and authorities to bring down the entire bot networks.


         In addition to these stories, we’ll discuss the many security issues noted in the second half of 2010 in the upcoming recap report
         from M86 Security Labs.



         ABOUT M86 SECURITY
         M86 Security is the global expert in real-time threat protection and the industry’s leading Secure Web Gateway provider. The
         company’s appliance, software, and Software as a Service (SaaS) solutions for Web and email security protect more than 25,000
         customers and 26 million users worldwide. M86 products use patented real-time code analysis and behavior-based malware
         detection technologies as well as threat intelligence from M86 Security Labs to protect networks against new and advanced
         threats, secure confidential information, and ensure regulatory compliance. The company is based in Orange, California with
         international headquarters in London and development centers in California, Israel, and New Zealand.




TRY BEFORE YOU BUY
M86 Security offers free product trials and evaluations. Simply contact us or visit www.m86security.com/downloads
                                                                Corporate Headquarters                          International Headquarters                       Asia-Pacific
                                                                828 West Taft Avenue                            Renaissance 2200                                 Suite 3, Level 7, 100 Walker St.
                                                                Orange, CA 92865                                Basing View, Basingstoke                         North Sydney NSW 2060
                                                                United States                                   Hampshire RG21 4EQ                               Australia
                                                                Phone: +1 (714) 282-6111                        United Kingdom
                                                                                                                Phone: +44 (0) 1256 848 080                      Phone: +61 (0)2 9466 5800
                                                                Fax: +1 (714) 282-6116
                                                                                                                Fax: +44 (0) 1256 848 060                        Fax: +61 (0)2 9466 5899
                                                                                                                                                                                                                         Version 11/14/10
© Copyright 2010 M86 Security. All rights reserved. M86 Security is a registered trademark of M86 Security. All other product and company names mentioned herein are trademarks or registered trademarks of their respective companies.

Más contenido relacionado

La actualidad más candente

Symantec Website Security Threat Report
Symantec Website Security Threat ReportSymantec Website Security Threat Report
Symantec Website Security Threat Reportcheinyeanlim
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperKen Spencer Brown
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In DangerCopper Mobile, Inc.
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec
 
12 Holiday Tech Shopping Scams
12 Holiday Tech Shopping Scams12 Holiday Tech Shopping Scams
12 Holiday Tech Shopping ScamsJim Evans
 
Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Symantec Italia
 
Strategic management of whatsapp
Strategic management of whatsapp Strategic management of whatsapp
Strategic management of whatsapp hiteshkrohra
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009Symantec
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worriesUltraUploader
 
Social Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageSocial Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageCindy Kim
 
Security Issues in the Mobile Environment
Security Issues in the Mobile EnvironmentSecurity Issues in the Mobile Environment
Security Issues in the Mobile EnvironmentLigia Adam
 
F-Secure Mobile Threat Report Quarter 1 2012
F-Secure Mobile Threat Report Quarter 1 2012F-Secure Mobile Threat Report Quarter 1 2012
F-Secure Mobile Threat Report Quarter 1 2012F-Secure Corporation
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec
 
Whatsapp ( history , fb allience and intresting facts about whatsapp)
Whatsapp ( history , fb allience and intresting facts about whatsapp)Whatsapp ( history , fb allience and intresting facts about whatsapp)
Whatsapp ( history , fb allience and intresting facts about whatsapp)Harish Godiyal
 
domain names management whitepaper
domain names management whitepaperdomain names management whitepaper
domain names management whitepaperVAYTON
 
Raport Symantec Malware 2010
Raport Symantec Malware 2010Raport Symantec Malware 2010
Raport Symantec Malware 2010Transmix Romania
 
A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2ianpoblete13
 

La actualidad más candente (20)

Symantec Website Security Threat Report
Symantec Website Security Threat ReportSymantec Website Security Threat Report
Symantec Website Security Threat Report
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security Software
 
Trojan horseofbyod2
Trojan horseofbyod2Trojan horseofbyod2
Trojan horseofbyod2
 
12 Holiday Tech Shopping Scams
12 Holiday Tech Shopping Scams12 Holiday Tech Shopping Scams
12 Holiday Tech Shopping Scams
 
Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010
 
Strategic management of whatsapp
Strategic management of whatsapp Strategic management of whatsapp
Strategic management of whatsapp
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worries
 
Social Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageSocial Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the Message
 
Security Issues in the Mobile Environment
Security Issues in the Mobile EnvironmentSecurity Issues in the Mobile Environment
Security Issues in the Mobile Environment
 
F-Secure Mobile Threat Report Quarter 1 2012
F-Secure Mobile Threat Report Quarter 1 2012F-Secure Mobile Threat Report Quarter 1 2012
F-Secure Mobile Threat Report Quarter 1 2012
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
Whatsapp ( history , fb allience and intresting facts about whatsapp)
Whatsapp ( history , fb allience and intresting facts about whatsapp)Whatsapp ( history , fb allience and intresting facts about whatsapp)
Whatsapp ( history , fb allience and intresting facts about whatsapp)
 
Whatsapp
WhatsappWhatsapp
Whatsapp
 
domain names management whitepaper
domain names management whitepaperdomain names management whitepaper
domain names management whitepaper
 
whatsapp ppt
whatsapp pptwhatsapp ppt
whatsapp ppt
 
Raport Symantec Malware 2010
Raport Symantec Malware 2010Raport Symantec Malware 2010
Raport Symantec Malware 2010
 
A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2
 

Similar a M86 security predictions 2011

The Current State of Cybercrime 2013
The Current State of Cybercrime 2013The Current State of Cybercrime 2013
The Current State of Cybercrime 2013EMC
 
The Current State of Cybercrime 2014
The Current State of Cybercrime 2014The Current State of Cybercrime 2014
The Current State of Cybercrime 2014EMC
 
14 cyber threats
14 cyber threats14 cyber threats
14 cyber threatsmahesh43211
 
RSA Monthly Online Fraud Report - June 2013
RSA Monthly Online Fraud Report - June 2013RSA Monthly Online Fraud Report - June 2013
RSA Monthly Online Fraud Report - June 2013EMC
 
Panda labs annual report 2012
Panda labs annual report 2012Panda labs annual report 2012
Panda labs annual report 2012Itex Solutions
 
Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Symantec
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-naAndreas Hiller
 
Top mobile security threats
Top mobile security threatsTop mobile security threats
Top mobile security threatsRingtoIndia
 
Internet security threat report 2013
Internet security threat report 2013Internet security threat report 2013
Internet security threat report 2013Karim Shaikh
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shiftsmalvvv
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shiftsmalvvv
 
Security issues vs user awareness in mobile devices a survey
Security issues vs user awareness in mobile devices  a surveySecurity issues vs user awareness in mobile devices  a survey
Security issues vs user awareness in mobile devices a surveyIAEME Publication
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaAnjoum .
 

Similar a M86 security predictions 2011 (20)

The Current State of Cybercrime 2013
The Current State of Cybercrime 2013The Current State of Cybercrime 2013
The Current State of Cybercrime 2013
 
Rp threat-predictions-2013
Rp threat-predictions-2013Rp threat-predictions-2013
Rp threat-predictions-2013
 
The Current State of Cybercrime 2014
The Current State of Cybercrime 2014The Current State of Cybercrime 2014
The Current State of Cybercrime 2014
 
14 cyber threats
14 cyber threats14 cyber threats
14 cyber threats
 
Rpt repeating-history
Rpt repeating-historyRpt repeating-history
Rpt repeating-history
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
RSA Monthly Online Fraud Report - June 2013
RSA Monthly Online Fraud Report - June 2013RSA Monthly Online Fraud Report - June 2013
RSA Monthly Online Fraud Report - June 2013
 
HinDroid
HinDroidHinDroid
HinDroid
 
Panda labs annual report 2012
Panda labs annual report 2012Panda labs annual report 2012
Panda labs annual report 2012
 
Panda labs annual-report-2012
Panda labs annual-report-2012Panda labs annual-report-2012
Panda labs annual-report-2012
 
Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check
 
Cp3201 mobile security final
Cp3201 mobile security finalCp3201 mobile security final
Cp3201 mobile security final
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
 
Top mobile security threats
Top mobile security threatsTop mobile security threats
Top mobile security threats
 
Internet security threat report 2013
Internet security threat report 2013Internet security threat report 2013
Internet security threat report 2013
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Security issues vs user awareness in mobile devices a survey
Security issues vs user awareness in mobile devices  a surveySecurity issues vs user awareness in mobile devices  a survey
Security issues vs user awareness in mobile devices a survey
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
Mobile threat report_q3_2013
Mobile threat report_q3_2013Mobile threat report_q3_2013
Mobile threat report_q3_2013
 

Más de subramanian K

Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...subramanian K
 
Innovation,knowledge management & productivity laxammal college,chennai jan 14
Innovation,knowledge management & productivity   laxammal college,chennai jan 14Innovation,knowledge management & productivity   laxammal college,chennai jan 14
Innovation,knowledge management & productivity laxammal college,chennai jan 14subramanian K
 
Innovations in ict for mitigating environmental challenges
Innovations in ict for mitigating environmental challengesInnovations in ict for mitigating environmental challenges
Innovations in ict for mitigating environmental challengessubramanian K
 
Cyber forensics intro & requirement engineering cit dec 21,2013
Cyber forensics intro & requirement engineering cit dec 21,2013Cyber forensics intro & requirement engineering cit dec 21,2013
Cyber forensics intro & requirement engineering cit dec 21,2013subramanian K
 
security and assurance lecture jan 14
security and assurance lecture jan 14security and assurance lecture jan 14
security and assurance lecture jan 14subramanian K
 
Csi taramani lecture jan 14 quality assurance in education
Csi taramani lecture jan 14  quality assurance in educationCsi taramani lecture jan 14  quality assurance in education
Csi taramani lecture jan 14 quality assurance in educationsubramanian K
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13subramanian K
 
Ieee cs lecture sep 2013 digital economy and new generation workforce
Ieee cs lecture sep 2013 digital economy and new generation workforceIeee cs lecture sep 2013 digital economy and new generation workforce
Ieee cs lecture sep 2013 digital economy and new generation workforcesubramanian K
 
Renaissance of electronic engineering fuelling india’s growth ieee-te event k...
Renaissance of electronic engineering fuelling india’s growth ieee-te event k...Renaissance of electronic engineering fuelling india’s growth ieee-te event k...
Renaissance of electronic engineering fuelling india’s growth ieee-te event k...subramanian K
 
Skim lecture @national conference on technoly, innovation & chnge management ...
Skim lecture @national conference on technoly, innovation & chnge management ...Skim lecture @national conference on technoly, innovation & chnge management ...
Skim lecture @national conference on technoly, innovation & chnge management ...subramanian K
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
Iipa lecture km & good governance jan 12 2011
Iipa lecture  km & good governance  jan 12 2011Iipa lecture  km & good governance  jan 12 2011
Iipa lecture km & good governance jan 12 2011subramanian K
 
Ict4 e india and south asia full report
Ict4 e india and south asia   full reportIct4 e india and south asia   full report
Ict4 e india and south asia full reportsubramanian K
 
Financial inclusion cbt presentation feb 2011
Financial inclusion cbt presentation feb 2011Financial inclusion cbt presentation feb 2011
Financial inclusion cbt presentation feb 2011subramanian K
 
Project Management To Project Governance , Knowledge Management
Project Management To Project Governance , Knowledge ManagementProject Management To Project Governance , Knowledge Management
Project Management To Project Governance , Knowledge Managementsubramanian K
 
Itz Lecture Bi & Web Tech Standards Feb 2009
Itz Lecture Bi & Web Tech Standards Feb 2009Itz Lecture Bi & Web Tech Standards Feb 2009
Itz Lecture Bi & Web Tech Standards Feb 2009subramanian K
 
Empowering The Educators India R & D 2009 Jan 2009
Empowering The Educators India R & D 2009 Jan 2009Empowering The Educators India R & D 2009 Jan 2009
Empowering The Educators India R & D 2009 Jan 2009subramanian K
 
Education ~Skill Development Assocham Conf Feb 2009
Education ~Skill Development  Assocham Conf Feb 2009Education ~Skill Development  Assocham Conf Feb 2009
Education ~Skill Development Assocham Conf Feb 2009subramanian K
 
Architecting E Governance Space Npc Lecture Feb 2009
Architecting E Governance Space Npc Lecture Feb 2009Architecting E Governance Space Npc Lecture Feb 2009
Architecting E Governance Space Npc Lecture Feb 2009subramanian K
 

Más de subramanian K (20)

Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...
 
Innovation,knowledge management & productivity laxammal college,chennai jan 14
Innovation,knowledge management & productivity   laxammal college,chennai jan 14Innovation,knowledge management & productivity   laxammal college,chennai jan 14
Innovation,knowledge management & productivity laxammal college,chennai jan 14
 
Innovations in ict for mitigating environmental challenges
Innovations in ict for mitigating environmental challengesInnovations in ict for mitigating environmental challenges
Innovations in ict for mitigating environmental challenges
 
Cyber forensics intro & requirement engineering cit dec 21,2013
Cyber forensics intro & requirement engineering cit dec 21,2013Cyber forensics intro & requirement engineering cit dec 21,2013
Cyber forensics intro & requirement engineering cit dec 21,2013
 
security and assurance lecture jan 14
security and assurance lecture jan 14security and assurance lecture jan 14
security and assurance lecture jan 14
 
Csi taramani lecture jan 14 quality assurance in education
Csi taramani lecture jan 14  quality assurance in educationCsi taramani lecture jan 14  quality assurance in education
Csi taramani lecture jan 14 quality assurance in education
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13
 
Ieee cs lecture sep 2013 digital economy and new generation workforce
Ieee cs lecture sep 2013 digital economy and new generation workforceIeee cs lecture sep 2013 digital economy and new generation workforce
Ieee cs lecture sep 2013 digital economy and new generation workforce
 
Renaissance of electronic engineering fuelling india’s growth ieee-te event k...
Renaissance of electronic engineering fuelling india’s growth ieee-te event k...Renaissance of electronic engineering fuelling india’s growth ieee-te event k...
Renaissance of electronic engineering fuelling india’s growth ieee-te event k...
 
Skim lecture @national conference on technoly, innovation & chnge management ...
Skim lecture @national conference on technoly, innovation & chnge management ...Skim lecture @national conference on technoly, innovation & chnge management ...
Skim lecture @national conference on technoly, innovation & chnge management ...
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
Its report 050516
Its report 050516Its report 050516
Its report 050516
 
Iipa lecture km & good governance jan 12 2011
Iipa lecture  km & good governance  jan 12 2011Iipa lecture  km & good governance  jan 12 2011
Iipa lecture km & good governance jan 12 2011
 
Ict4 e india and south asia full report
Ict4 e india and south asia   full reportIct4 e india and south asia   full report
Ict4 e india and south asia full report
 
Financial inclusion cbt presentation feb 2011
Financial inclusion cbt presentation feb 2011Financial inclusion cbt presentation feb 2011
Financial inclusion cbt presentation feb 2011
 
Project Management To Project Governance , Knowledge Management
Project Management To Project Governance , Knowledge ManagementProject Management To Project Governance , Knowledge Management
Project Management To Project Governance , Knowledge Management
 
Itz Lecture Bi & Web Tech Standards Feb 2009
Itz Lecture Bi & Web Tech Standards Feb 2009Itz Lecture Bi & Web Tech Standards Feb 2009
Itz Lecture Bi & Web Tech Standards Feb 2009
 
Empowering The Educators India R & D 2009 Jan 2009
Empowering The Educators India R & D 2009 Jan 2009Empowering The Educators India R & D 2009 Jan 2009
Empowering The Educators India R & D 2009 Jan 2009
 
Education ~Skill Development Assocham Conf Feb 2009
Education ~Skill Development  Assocham Conf Feb 2009Education ~Skill Development  Assocham Conf Feb 2009
Education ~Skill Development Assocham Conf Feb 2009
 
Architecting E Governance Space Npc Lecture Feb 2009
Architecting E Governance Space Npc Lecture Feb 2009Architecting E Governance Space Npc Lecture Feb 2009
Architecting E Governance Space Npc Lecture Feb 2009
 

M86 security predictions 2011

  • 1. White Paper M86 Security Labs: Threat Predictions 2011 Introduction A year makes a big difference when it comes to Web and email security. In 2010, scareware has become more nefarious, mimicking Microsoft’s Security Essentials, Windows Automatic Updates and even browser-based attack warnings used by Mozilla Firefox and Google Chrome. Malware such as GootKit and Asprox have been used to compromise websites in mass through stolen FTP credentials and vulnerabilities in ASP pages. Furthermore, cybercriminals used shortened URLs to obscure malicious links in spam messages, tweets and Facebook status updates. As 2011 approaches, we look to the future to determine what’s in store for tomorrow’s threat landscape. Below are eight of the top trends we expect to see in the next year. 1. Malware Will Increasingly Use Stolen Digital Certificates to Bypass Whitelisting and Code Signing Requirements Though nothing new, this issue gained notoriety following the discovery of the Stuxnet malware, which was intended to target a specific set of industrial systems and reprogram them. In analyzing Stuxnet, it was observed that the malware was digitally signed (certified) with two legitimate certificates. Soon thereafter, a variant of the Zeus Trojan was discovered to be digitally signed using a certificate from antivirus vendor Kaspersky. This trend is alarming because Windows Vista, Windows 7 and many other products check the validity of digital signatures and warn or deny users when a certain type of software is not digitally signed. When cybercriminals use stolen certificates to digitally sign their malware, they bypass this protection with ease. We expect this trend to increase in the coming year as cybercriminals continue to experiment with different ways to avoid detection and lower victims’ suspicion levels. 2. Exploding Smartphone Market and Growing Tablet Demand Lead to More Mobile Malware Since the introduction of the iPhone, the smartphone market has grown over the last several years. And the introduction of tablet devices such as the Apple iPad, HP Slate and Android-based tablets signals a potential shift in which cybercriminals target end users via mobile platforms. As with other platforms, the attackers will go where the most users are, and where these users are the least protected. Top Smartphone Platforms Total U.S. Smartphone Subscribers Ages 13+ Sep. 2009 to Aug. 2010 Source: comScore MobiLens Share (%) of Smartphone Subscribers Sep 2009 Dec 2009 May 2010 Aug 2010 Point Change Total Smartphone Subscribers 100% 100% 100% 100% N/A RIM 42.6% 41.6% 41.7% 37.6% - 5.0 Apple 24.1% 25.3% 24.4% 24.2% - 0.1 Microsoft 19.0% 18.0% 13.2% 10.8% - 8.2 Palm 8.3% 6.1% 4.8% 4.6% - 3.7 Google 2.5% 5.2% 13.0% 19.6% 17.1 Threat Predictions 2011 Page 1
  • 2. A recent discovery found that a new variant of the Zeus malware was released with the intention of targeting users of Nokia phones which run the Symbian OS. This malware was used to defeat online banking two- factor authentication, monitoring the SMS messages sent by banking institutions to their customers for fraud protection. Google’s mobile operating system, Android, has increased from a 2.5% market share in September 2009 to 19.6% in August 2010. The mobile operating system is also slated to be included in numerous tablet devices in the coming months. Apple’s iOS platform is a closed system, and the application approval process for its Application Store is restrictive. Despite this, multiple vulnerabilities have been discovered for the iPhone, including the vulnerability that was exploited to “jailbreak” (remove the restriction on which applications can be installed) the iPhone. Google’s Android platform is open source, and its application approval process is less restrictive, allowing most applications to be submitted and approved. Additionally, users of Android-based phones have a setting that allows users to install applications from outside Google’s App Store. So far, Android has seen rogue applications such as a “Movie Player,” which secretly sends SMS messages to a premium rate number, costing the end user several dollars per message. Other applications have harvested information such as a user’s SIM card number and voicemail password, sending it to a server in another country. This is just the beginning. As smartphone adoption grows and new devices are released (Windows 7 phones and tablet devices), and the focus shifts towards the tablet platform, we anticipate malware targeting all mobile platforms to increase in 2011. 3. Spam Campaigns Will Increasingly Mimic Legitimate Mail from Popular Websites While we have seen messages like these before, we’ve noticed that they now look more legitimate than in the past. Examples of this include spammers who targeted Amazon/Flixster/GoDaddy names and a FedEx campaign. In the case of LinkedIn spam messages, we observed that the headers and body templates were taken from actual LinkedIn messages. Therefore, it’s nearly impossible for the average user to distinguish between the legitimate LinkedIn messages and the nefarious ones. E-commerce sites like Amazon.com and logistic services companies like FedEx are used by millions of people worldwide who are accustomed to receiving receipts and shipping confirmations from them. Therefore, they are ideal targets for spammers who want to mimic these types of messages to trick users into downloading malware or clicking on a link that leads to a malicious payload. Threat Predictions 2011 Page 2
  • 3. Whether it’s Facebook notifications, LinkedIn updates or bank statements, we expect this trend to increase. Spammers will continue to perfect the faux spam templates they use to convey a sense of legitimacy when targeting end users, making it difficult for users to differentiate between good mail and potentially malicious spam. 4. Data-stealing Trojans Will Become More Sophisticated The name Zeus is synonymous with cybercrime. This data-stealing malware has been used over the last three years to perpetrate hundreds of thousands of eBanking fraud cases against consumers. Aided by money mules, it has also been used to siphon large amounts of money from businesses and school districts. Trojans such as Zeus have become more sophisticated, inserting forms onto legitimate banking websites, spoofing bank statements and even moving into man-in-the-browser attacks which take over users’ banking sessions after they login. They present users with phony Web pages, showing funds and transactions that look normal, while pilfering money behind the scenes. Zeus received intense media scrutiny after M86 Security Labs discovered an attack on customers of a major UK financial institution, spurring arrest warrants for those who were responsible. As a result, pressure is mounting against Zeus, driving the advancement and creation of other Trojans such as Carberp, Bugat and SpyEye, and malware authors are finding new ways to evade detection and keep the money flowing. One option is for them to move beyond Internet banking and financial institutions—perhaps to take over a user’s Amazon.com account and ship goods to drop points via goods mules. With the recent news of a SpyEye and Zeus merger, the potential for more sophisticated banking Trojans is even higher. 5. On Social Networks, More Users and More Integration Lead to More Problems It’s no surprise that Facebook recorded its 500 millionth user this year. The service has become the de-facto social network used today. Additionally, Twitter, which has seen its popularity soar in the last few years, is on pace to reach 200 million users by the end of 2010. When you add these two up, you have a pool of 700 million users that cybercriminals can target. From recent cross-site scripting (XSS) and cross-site request forgery attacks to the “likejacking” attacks, increase in spam and sensationalized headline applications on Facebook, cybercriminals are constantly tooling and retooling, finding ways to exploit the social networks. This is because there is more success and payoff in assuming the identity of someone a user knows than in pretending to be a Nigerian Prince. The major problem is that the users of these services have a more lax approach when it comes to security. The networks themselves have made strides to try to combat the threats their users face. However, as the platforms grow and integrations happen (Skype and Facebook), cybercriminals continue to find new and interesting ways to target the users of these services. The reason for the lax security posture is that there is an inherent trust placed in the service. The people that are a part of the “social network” are friends — people users trust. When a trusted person posts a link, the people in this user’s social network are more likely to click on it. We expect this trust to continue to be exploited, as cybercriminals will pursue this huge target among the various social networks. 6. As a New Standard, HTML5 Will Become the New Target for cybercriminals When it comes to new platforms and standards, a phase of experimentation takes place for legitimate use cases. HTML5 is a cross-platform standard for Web browsing, and to meet the need of this new standard, support has already started shipping for it in newer versions of popular Web browsers such as Internet Explorer 9. Apple has already positioned HTML5 in the latest release of its Safari browser, which is used on its Mac devices as well as its mobile platform devices like the iPhone, iPod Touch and iPad. While developers are experimenting with HTML5 for legitimate purposes, cybercriminals are finding ways to exploit the standard for malicious reasons. Threat Predictions 2011 Page 3
  • 4. Browser usage is split more than ever before, with Internet Explorer no longer holding its dominant share of the market. Therefore, it would be beneficial for cybercriminals to target HTML5, as its appeal lies in the fact that it will have cross-platform support. HTML5 features support for scripting APIs (application programming interfaces) which could easily be used by cybercriminals. As browser support grows and Web application developers implement HTML5, we expect cybercriminals to find ways to exploit this new technology in the coming year. 7. Malware-as-a-Service (MaaS) Offerings Will Increase as an Alternative to Malware Applications Exploit kits, also known as “attack toolkits,” have become popular with cybercriminals over the last couple of years. Used as “Command Control” for cyber attacks, exploit kits have lowered the entry level to cybercrime and given birth to a new ecosystem with different players and roles. Our research indicates that a shift is occurring whereby exploit kit developers have started to provide services (instead of/in addition to) classical application offerings. For example, the NeoSploit and Phoenix exploit kits offer different malware services to their customers. With the NeoSploit kit, customers can purchase a specific Web server configuration that redirects victims’ requests to a Neosploit back-end server, which is apparently handled by the NeoSploit team. Different “suppliers” can be used to provide active vulnerabilities and the exploits that use them, or to get help in driving traffic past infected websites. In the same way the commercial world is embracing cloud-delivered services, cybercriminals will also become better organized, offering a complete suite of services in one place. While we do not anticipate a decline in the usage of exploit kits, we do believe there will be more service offerings for cybercriminals instead of just application offerings. 8. Botnets Will Thwart Future Takedowns; Smaller Botnets Will Become More Prevalent In 2010, we’ve seen a number of takedown attempts against various botnets. At the beginning of the year, the Lethic spambot was taken down briefly, only to return soon after. In August, attempts were made to takedown the Pushdo botnet. Unfortunately, these efforts were short-lived. Like Lethic, Pushdo returned not long after. Microsoft used legal action to shut down the Waledac botnet, and there was another effort made to bring down the Mariposa botnet. Most recently, the operator of the Bredolab botnet was arrested, and Dutch authorities seized the servers controlling the Bredolab botnet. With these takedowns, a message has been delivered to botnet operators around the globe that efforts are being made by law enforcement and security researchers to bring them down. Therefore, it’s clear that botnet operators will need to reevaluate their operations going forward in order to thwart future takedown attempts. We expect to see the command and control architectures become more and more layered and complex, making it difficult for security researchers and authorities to bring down the entire bot networks. In addition to these stories, we’ll discuss the many security issues noted in the second half of 2010 in the upcoming recap report from M86 Security Labs. ABOUT M86 SECURITY M86 Security is the global expert in real-time threat protection and the industry’s leading Secure Web Gateway provider. The company’s appliance, software, and Software as a Service (SaaS) solutions for Web and email security protect more than 25,000 customers and 26 million users worldwide. M86 products use patented real-time code analysis and behavior-based malware detection technologies as well as threat intelligence from M86 Security Labs to protect networks against new and advanced threats, secure confidential information, and ensure regulatory compliance. The company is based in Orange, California with international headquarters in London and development centers in California, Israel, and New Zealand. TRY BEFORE YOU BUY M86 Security offers free product trials and evaluations. Simply contact us or visit www.m86security.com/downloads Corporate Headquarters International Headquarters Asia-Pacific 828 West Taft Avenue Renaissance 2200 Suite 3, Level 7, 100 Walker St. Orange, CA 92865 Basing View, Basingstoke North Sydney NSW 2060 United States Hampshire RG21 4EQ Australia Phone: +1 (714) 282-6111 United Kingdom Phone: +44 (0) 1256 848 080 Phone: +61 (0)2 9466 5800 Fax: +1 (714) 282-6116 Fax: +44 (0) 1256 848 060 Fax: +61 (0)2 9466 5899 Version 11/14/10 © Copyright 2010 M86 Security. All rights reserved. M86 Security is a registered trademark of M86 Security. All other product and company names mentioned herein are trademarks or registered trademarks of their respective companies.