Cyber-crimes are alive and well on the global stage and will only continue to be pervasive as long as organizations prolong taking the necessary defense measures to stop threats from slipping through the cracks. In this session, we’ll present the most common attacks Dell SonicWALL observed since 2014 and the ways we expect emergent threats to affect small and medium businesses, as well as large enterprises moving forward. This session is perfect for anybody who is interested in learning more about the state of the union in security.
3. Global Response Intelligent Defense (GRID) Network
• Threat research team
• Active participant in leading
research organizations
• World-wide monitoring
• Advanced tracking and
detection (i.e. Honeypots and
Sandboxing)
• Continuous real-time counter-
threat intelligence
• Industry leading responsiveness
4. 4.7 billion | intrusions blocked
daily by Dell firewalls
17. Punkey
(April 2015)
NewPosThings.C
(April 2015)
PoSeidon
(March 2015)
POS.UCC: a new multi-
component POS malware
(February 2015)
What does this new POS malware do?
•Searches system registry for VNC
passwords
•Scraping the memory of current
processes for credit card information
periodically
•Transfer credit card data in Base64
format to the command and control
(C&C) server
2015 has been busy
19. Many of your users’ web sessions are encrypted with HTTPS
20. Encrypted web traffic growth
315%
66%
470%
Source: http://bit.ly/1MHk70k
SSL comprises 1/3 of typical
enterprise traffic
SSL traffic is growing 20%
per year
50% of all attacks are
predicted to use SSL by 2017
23. By Jeremy Kirk, IDG News Service, Jul 27, 2015
You can’t protect what you can’t see — attacks unseen
by most firewalls
“…redirection code planted
in the malicious
advertisements uses
SSL/TLS (Secure Sockets
Layer/Transport Layer,…”
30. What the background
services do?
Captures sensitive user information such
as Phone number, OS and MAC address
Collects SMS related data on the device
and sends it to the server
Collects call related information on the
device and sends it to the server
Monitors and sends status of the device
screen while its active or in standby
31. Two Bitcoin exchanges
forced to close due to
losses from 2014 attacks:
1. Mt. Gox
2. Flexcoin
Poloniex was hacked
for 12.3% of its
reserve
32. Digital currencies including
Bitcoin will continue to be
targets of mining attacks
By the end of 2015:
• Bitcoin wallets estimated
to reach 12 million
• Number of vendors
accepting Bitcoin is
expected to be more
than 140,000
5
Source: State of Bitcoin 2015: Ecosystem Grows Despite Price Decline,”
CoinDesk, January 7, 2015,
33. Key Takeaways
• Choose a security framework to establish security baselines
• Conduct annual security training for everyone
• Establish multiple layers of network security including wireless
• Keep security services active and up-to-date
• Make your endpoints secured as they can be
34. Protect Comply Enable
Better security for better business.
User – Identity and Access Management
Endpoint
(Datacenter – Edge)
Network
(Perimeter and beyond)
Data and Application
(On-premises – Cloud)
Managed Security Services Security Intelligence and Response
Strategically connect solutions to enable better outcomes