SlideShare una empresa de Scribd logo
1 de 57
Devise a strategy to mitigate malware

                                                                      Ramsés Gallego
                                                CISM, CGEIT, CISSP, SCPM, ITIL, Six Sigma Black Belt Certified
                                                                     General Manager
                                                             Entel Security & Risk Management
                                                                     rgallego@entel.es




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Agenda

                    • Malware: what is it really?
                    • Different types of malware

                    • We are under attack... but how? And why?
                    • Let me show you

                    • Strategy on how to mitigate those risks




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Malware: what is it really?
                       • Malware is software designed to infiltrate or damage a computer system
                            without the owner's informed consent. The expression is a general term used by
                            computer professionals to mean a variety of forms of hostile, intrusive, or
                            annoying software or program code



                       • Software is considered malware based on the perceived intent of the creator rather
                            than any particular features. Malware includes computer viruses, worms, trojan
                            horses, most rootkits, spyware, dishonest adware, crimeware and other
                            malicious and unwanted software



            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
A bigger problem than we think

                   • Malware is now economically motivated and backed by organized
                   crime and foreign interest

                   • The development of highly critical malware such as targeted attacks is
                   also on the rise

                   • The level of sophistication behind malware makes it extremely difficult
                   for traditional solutions to detect and remove

                   • There are many bot networks to de-fraud business models and
                   consumers through sophisticated social engineering

            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
It’s not for fun... It’s money!




                            • Consumers are now the prime target for ID Theft and other on-line
                            fraud
                            • Traditional signature based anti-virus solutions have become
                            useless to these new sophisticated attacks



            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Understanding the Risk
                                                                         The Market Value of Sensitive Data

                                                        980€-4.900€                                         147€
                                          Trojan to steal account                       Birth certificate
                                          information

                                                                                                            98€
                                                            490€
                                                                                         Social Security card
                                           Credit Card Number
                                           with PIN

                                                                                                       6€-24€
                                                               78-294€
                                                                                         Credit card number
                                            Billing data

                                                                                                              6€
                                                                 147€                  PayPal account
                                            Driver's license                           logon and password



                © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Overview of crimeware families
                Crimeware is broken down into several categories

                            • Banking Trojans
                             Limbo
                             PayRob.A
                             Sinowal
                             Aifone.A
                             Banbra Variants

                            • Keyloggers (Banbra, Cimuz)
                            • Bots (Clickbot.a, Botnet.A, Aifone.A)
                            • Phishing (Barclays, PayPal)
                            • Targeted Trojans

            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
What is spyware?
                 • Spyware is software installed on a computer that gathers information without the user's
                    knowledge and relays that information to advertisers or other 3rd parties


                 • Several subcategories of spyware:
                      –Adware
                            • Advertising-supported software that displays pop-up advertisements whenever the program is running. Often
                              collect personal information and web surfing habits

                      –System monitors
                            • Programs that capture everything you do on your computer, from keystrokes, emails and chat room dialogue, to
                              which sites you visit and which programs you run

                      –Trojan horses
                            • Malicious programs that appear harmless but steal or destroy data or provide unauthorised external access



            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
How spyware infiltrates
                        • People don’t purposefully and knowingly install spyware
                            –Can be included with applications you want to install, such as peer-to-peer clients or
                             desktop utilities
                            –Some silently load when you visit a seemingly-innocent Web page (‘The Ghost in the
                             browser’)


                        • Installed silently in the background – most users never know their
                          computers are infected




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Spyware threats organizations
                 • Wastes computing resources
                       –Sends back information periodically, often daily
                       –Consumes an organisation’s bandwidth

                 • Exposes proprietary information
                       –It could send files to a competitor’s server
                       –It could monitor e-mail and send out the contents

                 • Poses serious security risks
                       –It could send emails on behalf of the user
                       –It could provide a spy or hacker with a backdoor into the systems
                       –It could change documents and specifications on systems to damage research or other
                        projects

                 • May introduce compliance risks

            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
How botnets are used to commit financial fraud

                 • A bot network consists of a “controller” and compromised zombie PCs. There have been
                 cases of bot networks containing up to 1.5 Million zombie PCs like in the Dutch botnet case

                 • The bots that infect systems can perform several actions such as relay spam, launch
                 malware and perform ID theft

                 • Some of the common methods for bot infection is through websites that contain exploits
                 and vulnerabilities that actively transmit malware to the PC visiting the site.

                 • Components can also be downloaded such as ActiveX controls, etc that will then deal with
                 the rest of the infection process

                 • Social engineering techniques also exist to infect systems through spam, phishing and
                 other content. Once a PC has become infected it can receive remote commands from the
                 “bot master” remotely
            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
And they are using new methods

                   • Botnets are beginning to use P2P networks to gain control
                       of more computers

                   • Researchers were previously able to shut down a botnet
                       by targeting its Command & Control center (and IRC
                       channel or website). Hackers are now using P2P networks
                       to connect bots in a more “horizontal,” peer manner, which
                       makes shutting down the botnets much more difficult



            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
The problem of keylogging
                  • Keyloggers are programs that run in the background recording
                    all keystrokes and which may also send those keystrokes
                    (potentially including passwords or confidential information) to
                    an external party

                  • 2 types of Keylogger programs:

                        –Commercial
                        –Viral (included as part of blended threat with Worm, Trojan Horse, BOT, etc..




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Commercial Keylogger - Example




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Commercial Keylogger - Example




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Commercial Keylogger - Example




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Commercial Keylogger - Example




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Commercial Keylogger - Example




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Sophisticated Social Engineering

         • Common social engineering techniques:

               – Spear-Phishing and other highly targeted scams
               – Spam with exploits
               – Phishing emails that direct users to web-sites with hidden Trojans
               – Malware through IM channels




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
No real bank would do this!




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Infection strategies used by hackers

                     • Common infection strategies used by hackers

                            –A web site is physically hacked and seeded with Trojans (i.e.
                             Superbowl website case)
                            –Phishing emails with exploits
                            –Malware through IM channels
                            –Malware attached to freeware and shareware
                            –Malware in the form of video codecs
                            –Infection through botnets


            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Overview of Targeted Attacks

      • Characteristics of Targeted Attacks:
             – Involve “Highly Critical” malware tailored towards attacking a specific target (i.e. Bank Of
               America)
             – Such malware target a specific set of confidential information to capture and send to a 3rd
               party
             – Targeted attacks always involve a hacker hired to design malware to bypass specific defenses
             – Attacks are very localized; therefore, distribution is limited. In most cases AV labs do not
               receive a sample which results in no signature file
             – Current security solutions will not detect the malware because the hacker has prepared
               against commonly used AV programs
             – Hackers are using sophisticated stealth techniques such as rootkits to hide the presence of
               malware




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Information? Ready available!
                     • IT departments know about sites...but so do all the other
                       departments!
                        –Question is…do we know who, when, where and how?
                        –More importantly…do we have the means to stop it?

                     • Information is easy to find! (27,000,000 results returned on
                       Google when the search term ‘How To Hack’ is used)

                     • Hacking tools can be easy to use
                       –Some don’t require any programming skills at all! (Keyloggers
                        can come with nice user interfaces, such as ‘The Perfect
                        Keylogger’) with a ‘Next’, ‘Next’, ‘Next’ install!
            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
…step-by-step guides available!

                 • You no longer need to go underground or to university to learn
                   how to become a successful hacker!




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
…step-by-step guides available!

                 • You no longer need to go underground or to university to learn
                   how to become a successful hacker!




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
© 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Do it yourself! Incredible!




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Example - Denial of Service




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Example - Denial of Service


             • You visit a web site and click
              on a link




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Example - Denial of Service


             • You visit a web site and click
              on a link


             • A few seconds later, many
              applications start to run in the
              computer




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Example - Denial of Service


             • You visit a web site and click
              on a link


             • A few seconds later, many
              applications start to run in the
              computer


             • You can only close the
              program to prevent the attack.
              The machine does not work




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Example - Redirection of sites




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Example - Redirection of sites



           • You connect to online banking to
            see your accounts




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Example - Redirection of sites



           • You connect to online banking to
            see your accounts


           • A hostile applet sends an
            identical page




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Example - Redirection of sites



           • You connect to online banking to
            see your accounts


           • A hostile applet sends an
            identical page


           • You introduce your credentials
            while a hacker is receiving them
            or they are being sent to an
            Internet directory



            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Example - Sending files in background




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Example - Sending files in background



           • A postcard is received by email




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Example - Sending files in background



           • A postcard is received by email



           • An applet executes an animation



           • That applet is copying the last
            Word document and is sending it
            in the background to the Internet




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Example - Harm exectutables




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Example - Harm exectutables

               • There is type of attack
                that seems to be from
                known companies who
                invite to install the last
                security patch or Service
                Pack

               • The executable file is a
                Trojan or malicious code
                that puts our
                environment at risk


            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Example - Phising and scam




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Example - Phising and scam

                                         • Pakistan Earthquake – We found the URL http://
                                           pakistanhelp.com




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Example - Phising and scam

                                         • Pakistan Earthquake – We found the URL http://
                                           pakistanhelp.com
                                         • We analyzed it and we saw that there were signs of
                                           phising




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Example - Phising and scam

                                         • Pakistan Earthquake – We found the URL http://
                                           pakistanhelp.com
                                         • We analyzed it and we saw that there were signs of
                                           phising




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Example - Phising and scam

                                         • Pakistan Earthquake – We found the URL http://
                                           pakistanhelp.com
                                         • We analyzed it and we saw that there were signs of
                                           phising




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Example - Phising and scam

                                         • Pakistan Earthquake – We found the URL http://
                                           pakistanhelp.com
                                         • We analyzed it and we saw that there were signs of
                                           phising
                                                •In this case, the ‘help’ options include the download of an Excel file to
                                                 be sent by fax
                                                  •A real and legal organization would never do this….




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Example - Phising and scam

                                         • Pakistan Earthquake – We found the URL http://
                                           pakistanhelp.com
                                         • We analyzed it and we saw that there were signs of
                                           phising
                                                •In this case, the ‘help’ options include the download of an Excel file to
                                                 be sent by fax
                                                  •A real and legal organization would never do this….




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Strategy: Protect every vector




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Strategy: Protect every vector




           Firewall




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Strategy: Protect every vector




                        Secure Content Manager



           Firewall




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Strategy: Protect every vector

                                                  Antivirus/
                                                 Antispyware




                        Secure Content Manager



           Firewall




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Strategy: Protect every vector

                                                       Antivirus/
                                                      Antispyware




                        Secure Content Manager



           Firewall


                                                VPN


            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Strategy: Protect every vector

                                                       Antivirus/
                                                                                     Data Leak Prevention
                                                      Antispyware




                        Secure Content Manager



           Firewall


                                                VPN


            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Strategy: Consider other approaches

                                                                        Internet

             • Effectiveness vs. Efficiency
             • SaaS approach
             • UTM devices
             • More than one solution will leverage
              your security
             • Education, education, education
             • Centralised management




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Objective: Keep the bad guys out!




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
Objective: Keep the bad guys out!




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009
THANK YOU
                                           Devise a strategy to mitigate malware
                                                                      Ramsés Gallego
                                                CISM, CGEIT, CISSP, SCPM, ITIL, Six Sigma Black Belt Certified
                                                                     General Manager
                                                             Entel Security & Risk Management
                                                                     rgallego@entel.es




            © 2008 ISACA. All rights reserved

Wednesday, March 25, 2009

Más contenido relacionado

La actualidad más candente

Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kitupsettinginfo
 
idBUSINESS Red Flag Rules For Dentists
idBUSINESS Red Flag Rules For DentistsidBUSINESS Red Flag Rules For Dentists
idBUSINESS Red Flag Rules For DentistsSteven Lane
 
Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012The Texas Network, LLC
 
IBM Software Day 2013. Defending against cyber threats with security intellig...
IBM Software Day 2013. Defending against cyber threats with security intellig...IBM Software Day 2013. Defending against cyber threats with security intellig...
IBM Software Day 2013. Defending against cyber threats with security intellig...IBM (Middle East and Africa)
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!topseowebmaster
 
Ce hv8 module 19 cryptography
Ce hv8 module 19 cryptographyCe hv8 module 19 cryptography
Ce hv8 module 19 cryptographyMehrdad Jingoism
 
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared CarstensenCyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensenjaredcarst
 

La actualidad más candente (10)

Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kit
 
idBUSINESS Red Flag Rules For Dentists
idBUSINESS Red Flag Rules For DentistsidBUSINESS Red Flag Rules For Dentists
idBUSINESS Red Flag Rules For Dentists
 
Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012
 
IBM Software Day 2013. Defending against cyber threats with security intellig...
IBM Software Day 2013. Defending against cyber threats with security intellig...IBM Software Day 2013. Defending against cyber threats with security intellig...
IBM Software Day 2013. Defending against cyber threats with security intellig...
 
Apresentação Allen ES
Apresentação Allen ESApresentação Allen ES
Apresentação Allen ES
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!
 
Fraud Monitoring Solution
Fraud Monitoring SolutionFraud Monitoring Solution
Fraud Monitoring Solution
 
Jon ppoint
Jon ppointJon ppoint
Jon ppoint
 
Ce hv8 module 19 cryptography
Ce hv8 module 19 cryptographyCe hv8 module 19 cryptography
Ce hv8 module 19 cryptography
 
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared CarstensenCyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
 

Similar a Malware mitigation

Know Your Enemy
Know Your EnemyKnow Your Enemy
Know Your Enemytlineshill
 
Issa Charlotte 2009 Patching Your Users
Issa Charlotte 2009   Patching Your UsersIssa Charlotte 2009   Patching Your Users
Issa Charlotte 2009 Patching Your UsersMike Murray
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesSeccuris Inc.
 
Crypto trap for social media 9.4.2016
Crypto trap for social media 9.4.2016Crypto trap for social media 9.4.2016
Crypto trap for social media 9.4.2016Michael Zuckerman
 
Issa Seattle 5 09 Social Engineering
Issa Seattle 5 09   Social EngineeringIssa Seattle 5 09   Social Engineering
Issa Seattle 5 09 Social EngineeringMike Murray
 
Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Trend Micro
 
Stefan Savage Cyber Cafe
Stefan Savage Cyber CafeStefan Savage Cyber Cafe
Stefan Savage Cyber CafeAmy Lenzo
 
2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling finalMARIUS EUGEN OPRAN
 
Evolución de la Ciber Seguridad
Evolución de la Ciber SeguridadEvolución de la Ciber Seguridad
Evolución de la Ciber SeguridadCristian Garcia G.
 
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!Identive
 
Information Security - The Missing Elements
Information Security - The Missing ElementsInformation Security - The Missing Elements
Information Security - The Missing Elementsahmed_vr
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceAndris Soroka
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingat MicroFocus Italy ❖✔
 
Business of Hacking
Business of HackingBusiness of Hacking
Business of HackingDaniel Ross
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxRambilashTudu
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Security
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trumpMAXfocus
 
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Netpluz Asia Pte Ltd
 
cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdfw4tgrgdyryfh
 

Similar a Malware mitigation (20)

Know Your Enemy
Know Your EnemyKnow Your Enemy
Know Your Enemy
 
Issa Charlotte 2009 Patching Your Users
Issa Charlotte 2009   Patching Your UsersIssa Charlotte 2009   Patching Your Users
Issa Charlotte 2009 Patching Your Users
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Crypto trap for social media 9.4.2016
Crypto trap for social media 9.4.2016Crypto trap for social media 9.4.2016
Crypto trap for social media 9.4.2016
 
Issa Seattle 5 09 Social Engineering
Issa Seattle 5 09   Social EngineeringIssa Seattle 5 09   Social Engineering
Issa Seattle 5 09 Social Engineering
 
Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009
 
Stefan Savage Cyber Cafe
Stefan Savage Cyber CafeStefan Savage Cyber Cafe
Stefan Savage Cyber Cafe
 
2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final
 
Evolución de la Ciber Seguridad
Evolución de la Ciber SeguridadEvolución de la Ciber Seguridad
Evolución de la Ciber Seguridad
 
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!
 
Information Security - The Missing Elements
Information Security - The Missing ElementsInformation Security - The Missing Elements
Information Security - The Missing Elements
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hacking
 
Business of Hacking
Business of HackingBusiness of Hacking
Business of Hacking
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™
 
cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdf
 

Más de Ramsés Gallego

IT Controls Cloud Webinar - ISACA
IT Controls Cloud Webinar - ISACAIT Controls Cloud Webinar - ISACA
IT Controls Cloud Webinar - ISACARamsés Gallego
 
ISACA Barcelona Chapter Congress - July 2011
ISACA Barcelona Chapter Congress - July 2011ISACA Barcelona Chapter Congress - July 2011
ISACA Barcelona Chapter Congress - July 2011Ramsés Gallego
 
Culture structure strategy_for_a_grc_program
Culture structure strategy_for_a_grc_programCulture structure strategy_for_a_grc_program
Culture structure strategy_for_a_grc_programRamsés Gallego
 
Strategic governance performance_management_systems
Strategic governance performance_management_systemsStrategic governance performance_management_systems
Strategic governance performance_management_systemsRamsés Gallego
 
Modern cyber threats_and_how_to_combat_them_panel
Modern cyber threats_and_how_to_combat_them_panelModern cyber threats_and_how_to_combat_them_panel
Modern cyber threats_and_how_to_combat_them_panelRamsés Gallego
 
From technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontierFrom technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontierRamsés Gallego
 
Entel Service Management
Entel Service ManagementEntel Service Management
Entel Service ManagementRamsés Gallego
 
Metrics, measures & Myths
Metrics, measures & MythsMetrics, measures & Myths
Metrics, measures & MythsRamsés Gallego
 
DLP - Network Security Conference_ Ramsés Gallego
DLP - Network Security Conference_ Ramsés GallegoDLP - Network Security Conference_ Ramsés Gallego
DLP - Network Security Conference_ Ramsés GallegoRamsés Gallego
 
e-Symposium_ISACA_Ramsés_Gallego
e-Symposium_ISACA_Ramsés_Gallegoe-Symposium_ISACA_Ramsés_Gallego
e-Symposium_ISACA_Ramsés_GallegoRamsés Gallego
 

Más de Ramsés Gallego (14)

IT Controls Cloud Webinar - ISACA
IT Controls Cloud Webinar - ISACAIT Controls Cloud Webinar - ISACA
IT Controls Cloud Webinar - ISACA
 
The Perfect Storm
The Perfect StormThe Perfect Storm
The Perfect Storm
 
ISACA Barcelona Chapter Congress - July 2011
ISACA Barcelona Chapter Congress - July 2011ISACA Barcelona Chapter Congress - July 2011
ISACA Barcelona Chapter Congress - July 2011
 
Culture structure strategy_for_a_grc_program
Culture structure strategy_for_a_grc_programCulture structure strategy_for_a_grc_program
Culture structure strategy_for_a_grc_program
 
Strategic governance performance_management_systems
Strategic governance performance_management_systemsStrategic governance performance_management_systems
Strategic governance performance_management_systems
 
Modern cyber threats_and_how_to_combat_them_panel
Modern cyber threats_and_how_to_combat_them_panelModern cyber threats_and_how_to_combat_them_panel
Modern cyber threats_and_how_to_combat_them_panel
 
From technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontierFrom technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontier
 
Entel Service Management
Entel Service ManagementEntel Service Management
Entel Service Management
 
Metrics, measures & Myths
Metrics, measures & MythsMetrics, measures & Myths
Metrics, measures & Myths
 
DLP - Network Security Conference_ Ramsés Gallego
DLP - Network Security Conference_ Ramsés GallegoDLP - Network Security Conference_ Ramsés Gallego
DLP - Network Security Conference_ Ramsés Gallego
 
e-Symposium_ISACA_Ramsés_Gallego
e-Symposium_ISACA_Ramsés_Gallegoe-Symposium_ISACA_Ramsés_Gallego
e-Symposium_ISACA_Ramsés_Gallego
 
Entel SSO
Entel SSOEntel SSO
Entel SSO
 
Entel DLP
Entel DLPEntel DLP
Entel DLP
 
Entel S&RM
Entel S&RMEntel S&RM
Entel S&RM
 

Último

Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 

Último (20)

Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 

Malware mitigation

  • 1. Devise a strategy to mitigate malware Ramsés Gallego CISM, CGEIT, CISSP, SCPM, ITIL, Six Sigma Black Belt Certified General Manager Entel Security & Risk Management rgallego@entel.es © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 2. Agenda • Malware: what is it really? • Different types of malware • We are under attack... but how? And why? • Let me show you • Strategy on how to mitigate those risks © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 3. Malware: what is it really? • Malware is software designed to infiltrate or damage a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code • Software is considered malware based on the perceived intent of the creator rather than any particular features. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware and other malicious and unwanted software © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 4. A bigger problem than we think • Malware is now economically motivated and backed by organized crime and foreign interest • The development of highly critical malware such as targeted attacks is also on the rise • The level of sophistication behind malware makes it extremely difficult for traditional solutions to detect and remove • There are many bot networks to de-fraud business models and consumers through sophisticated social engineering © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 5. It’s not for fun... It’s money! • Consumers are now the prime target for ID Theft and other on-line fraud • Traditional signature based anti-virus solutions have become useless to these new sophisticated attacks © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 6. Understanding the Risk The Market Value of Sensitive Data 980€-4.900€ 147€ Trojan to steal account Birth certificate information 98€ 490€ Social Security card Credit Card Number with PIN 6€-24€ 78-294€ Credit card number Billing data 6€ 147€ PayPal account Driver's license logon and password © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 7. Overview of crimeware families Crimeware is broken down into several categories • Banking Trojans Limbo PayRob.A Sinowal Aifone.A Banbra Variants • Keyloggers (Banbra, Cimuz) • Bots (Clickbot.a, Botnet.A, Aifone.A) • Phishing (Barclays, PayPal) • Targeted Trojans © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 8. What is spyware? • Spyware is software installed on a computer that gathers information without the user's knowledge and relays that information to advertisers or other 3rd parties • Several subcategories of spyware: –Adware • Advertising-supported software that displays pop-up advertisements whenever the program is running. Often collect personal information and web surfing habits –System monitors • Programs that capture everything you do on your computer, from keystrokes, emails and chat room dialogue, to which sites you visit and which programs you run –Trojan horses • Malicious programs that appear harmless but steal or destroy data or provide unauthorised external access © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 9. How spyware infiltrates • People don’t purposefully and knowingly install spyware –Can be included with applications you want to install, such as peer-to-peer clients or desktop utilities –Some silently load when you visit a seemingly-innocent Web page (‘The Ghost in the browser’) • Installed silently in the background – most users never know their computers are infected © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 10. Spyware threats organizations • Wastes computing resources –Sends back information periodically, often daily –Consumes an organisation’s bandwidth • Exposes proprietary information –It could send files to a competitor’s server –It could monitor e-mail and send out the contents • Poses serious security risks –It could send emails on behalf of the user –It could provide a spy or hacker with a backdoor into the systems –It could change documents and specifications on systems to damage research or other projects • May introduce compliance risks © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 11. How botnets are used to commit financial fraud • A bot network consists of a “controller” and compromised zombie PCs. There have been cases of bot networks containing up to 1.5 Million zombie PCs like in the Dutch botnet case • The bots that infect systems can perform several actions such as relay spam, launch malware and perform ID theft • Some of the common methods for bot infection is through websites that contain exploits and vulnerabilities that actively transmit malware to the PC visiting the site. • Components can also be downloaded such as ActiveX controls, etc that will then deal with the rest of the infection process • Social engineering techniques also exist to infect systems through spam, phishing and other content. Once a PC has become infected it can receive remote commands from the “bot master” remotely © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 12. And they are using new methods • Botnets are beginning to use P2P networks to gain control of more computers • Researchers were previously able to shut down a botnet by targeting its Command & Control center (and IRC channel or website). Hackers are now using P2P networks to connect bots in a more “horizontal,” peer manner, which makes shutting down the botnets much more difficult © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 13. The problem of keylogging • Keyloggers are programs that run in the background recording all keystrokes and which may also send those keystrokes (potentially including passwords or confidential information) to an external party • 2 types of Keylogger programs: –Commercial –Viral (included as part of blended threat with Worm, Trojan Horse, BOT, etc.. © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 14. Commercial Keylogger - Example © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 15. Commercial Keylogger - Example © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 16. Commercial Keylogger - Example © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 17. Commercial Keylogger - Example © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 18. Commercial Keylogger - Example © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 19. Sophisticated Social Engineering • Common social engineering techniques: – Spear-Phishing and other highly targeted scams – Spam with exploits – Phishing emails that direct users to web-sites with hidden Trojans – Malware through IM channels © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 20. No real bank would do this! © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 21. Infection strategies used by hackers • Common infection strategies used by hackers –A web site is physically hacked and seeded with Trojans (i.e. Superbowl website case) –Phishing emails with exploits –Malware through IM channels –Malware attached to freeware and shareware –Malware in the form of video codecs –Infection through botnets © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 22. Overview of Targeted Attacks • Characteristics of Targeted Attacks: – Involve “Highly Critical” malware tailored towards attacking a specific target (i.e. Bank Of America) – Such malware target a specific set of confidential information to capture and send to a 3rd party – Targeted attacks always involve a hacker hired to design malware to bypass specific defenses – Attacks are very localized; therefore, distribution is limited. In most cases AV labs do not receive a sample which results in no signature file – Current security solutions will not detect the malware because the hacker has prepared against commonly used AV programs – Hackers are using sophisticated stealth techniques such as rootkits to hide the presence of malware © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 23. Information? Ready available! • IT departments know about sites...but so do all the other departments! –Question is…do we know who, when, where and how? –More importantly…do we have the means to stop it? • Information is easy to find! (27,000,000 results returned on Google when the search term ‘How To Hack’ is used) • Hacking tools can be easy to use –Some don’t require any programming skills at all! (Keyloggers can come with nice user interfaces, such as ‘The Perfect Keylogger’) with a ‘Next’, ‘Next’, ‘Next’ install! © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 24. …step-by-step guides available! • You no longer need to go underground or to university to learn how to become a successful hacker! © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 25. …step-by-step guides available! • You no longer need to go underground or to university to learn how to become a successful hacker! © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 26. © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 27. Do it yourself! Incredible! © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 28. Example - Denial of Service © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 29. Example - Denial of Service • You visit a web site and click on a link © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 30. Example - Denial of Service • You visit a web site and click on a link • A few seconds later, many applications start to run in the computer © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 31. Example - Denial of Service • You visit a web site and click on a link • A few seconds later, many applications start to run in the computer • You can only close the program to prevent the attack. The machine does not work © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 32. Example - Redirection of sites © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 33. Example - Redirection of sites • You connect to online banking to see your accounts © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 34. Example - Redirection of sites • You connect to online banking to see your accounts • A hostile applet sends an identical page © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 35. Example - Redirection of sites • You connect to online banking to see your accounts • A hostile applet sends an identical page • You introduce your credentials while a hacker is receiving them or they are being sent to an Internet directory © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 36. Example - Sending files in background © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 37. Example - Sending files in background • A postcard is received by email © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 38. Example - Sending files in background • A postcard is received by email • An applet executes an animation • That applet is copying the last Word document and is sending it in the background to the Internet © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 39. Example - Harm exectutables © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 40. Example - Harm exectutables • There is type of attack that seems to be from known companies who invite to install the last security patch or Service Pack • The executable file is a Trojan or malicious code that puts our environment at risk © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 41. Example - Phising and scam © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 42. Example - Phising and scam • Pakistan Earthquake – We found the URL http:// pakistanhelp.com © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 43. Example - Phising and scam • Pakistan Earthquake – We found the URL http:// pakistanhelp.com • We analyzed it and we saw that there were signs of phising © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 44. Example - Phising and scam • Pakistan Earthquake – We found the URL http:// pakistanhelp.com • We analyzed it and we saw that there were signs of phising © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 45. Example - Phising and scam • Pakistan Earthquake – We found the URL http:// pakistanhelp.com • We analyzed it and we saw that there were signs of phising © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 46. Example - Phising and scam • Pakistan Earthquake – We found the URL http:// pakistanhelp.com • We analyzed it and we saw that there were signs of phising •In this case, the ‘help’ options include the download of an Excel file to be sent by fax •A real and legal organization would never do this…. © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 47. Example - Phising and scam • Pakistan Earthquake – We found the URL http:// pakistanhelp.com • We analyzed it and we saw that there were signs of phising •In this case, the ‘help’ options include the download of an Excel file to be sent by fax •A real and legal organization would never do this…. © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 48. Strategy: Protect every vector © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 49. Strategy: Protect every vector Firewall © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 50. Strategy: Protect every vector Secure Content Manager Firewall © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 51. Strategy: Protect every vector Antivirus/ Antispyware Secure Content Manager Firewall © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 52. Strategy: Protect every vector Antivirus/ Antispyware Secure Content Manager Firewall VPN © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 53. Strategy: Protect every vector Antivirus/ Data Leak Prevention Antispyware Secure Content Manager Firewall VPN © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 54. Strategy: Consider other approaches Internet • Effectiveness vs. Efficiency • SaaS approach • UTM devices • More than one solution will leverage your security • Education, education, education • Centralised management © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 55. Objective: Keep the bad guys out! © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 56. Objective: Keep the bad guys out! © 2008 ISACA. All rights reserved Wednesday, March 25, 2009
  • 57. THANK YOU Devise a strategy to mitigate malware Ramsés Gallego CISM, CGEIT, CISSP, SCPM, ITIL, Six Sigma Black Belt Certified General Manager Entel Security & Risk Management rgallego@entel.es © 2008 ISACA. All rights reserved Wednesday, March 25, 2009

Notas del editor

  1. For another way to look at the growing problem of data loss, consider the black market value for various forms of stolen identities… $980-$4,900 Trojan program to steal online account information $490 Credit Card Number with PIN $78-$294 Billing data, including account number, address, Social Security number, home address, and birthdate $147 Driver's license $147 Birth certificate $98 Social Security card $6-$24 Credit card number with security code and expiration date $6 PayPal account logon and password *****www.informationweek.com***** Extra data points $40 standard credit card number $120 signature card (one step beyond platinum and corporate) Or 100 in mixed batch for $30 each
  2. R
  3. R
  4. R
  5. R