SlideShare una empresa de Scribd logo
1 de 42
MALWARE 2.0
     Shane Ochotny
TYPES OF MALWARE
 Worms                                     Exploits

                    Trojans
                                  Adware
          Spyware
                                                Keyloggers
                              Viruses

Dialers
                                                      Rootkits
                          Rogue
STATISTICS
                TREND MICRO UNIQUE THREAT GROWTH




20,000,000


15,000,000


10,000,000


 5,000,000


        0
         2005           2006              2007     2008
STATISTICS
                TREND MICRO UNIQUE THREAT GROWTH




20,000,000


15,000,000


10,000,000


 5,000,000


        0
         2005           2006              2007     2008
MALWARE 1.0
BORED KIDS
   80’s - 90’s
INFECTION VECTORS
      File Replication
MALWARE 2.0
ORGANIZED CRIME

Groups Discovering and Selling Exploits
         Developing and Selling Malware
         Hosting Exploits and Malware
         Selling the Stolen Data
         Using the Stolen Data
ORGANIZED CRIME

        Discovering and Selling Exploits
Groups Developing and Selling Malware
        Hosting Exploits and Malware
        Selling the Stolen Data
        Using the Stolen Data
ORGANIZED CRIME

        Discovering and Selling Exploits
        Developing and Selling Malware
Groups Hosting Exploits and Malware
        Selling the Stolen Data
        Using the Stolen Data
ORGANIZED CRIME

         Discovering and Selling Exploits
         Developing and Selling Malware
         Hosting Exploits and Malware
Groups Selling the Stolen Data
         Using the Stolen Data
ORGANIZED CRIME

        Discovering and Selling Exploits
        Developing and Selling Malware
        Hosting Exploits and Malware
        Selling the Stolen Data
Groups Using the Stolen Data
MONETARY GAIN
MONEY HOW?
                                        Bank Accounts
      Authentication Credentials


Credit Card Numbers        Send Spam           Emails


   DDoS                Address Book Contacts


        Social Security Numbers            Screenshots


                                       Recent Websites
  Keystrokes          DNS Redirect
INFECTION VECTORS



         Exploits


    Social Engineering
REACHING THE USERS
IFRAMES
MALVERTIZEMENTS
REDIRECTION



MySpace        IFrame        Bad Website

MySpace     Malvertizement   Bad Website
REDIRECTION



MySpace        IFrame        Bad Website

MySpace     Malvertizement   Bad Website
REDIRECTION



MySpace        IFrame        Bad Website

MySpace     Malvertizement   Bad Website
REDIRECTION



MySpace        IFrame        Bad Website

MySpace     Malvertizement   Bad Website
REDIRECTION



MySpace        IFrame        Bad Website

MySpace     Malvertizement   Bad Website
REDIRECTION



MySpace        IFrame        Bad Website

MySpace     Malvertizement   Bad Website
HIGH PROFILE WEBSITES
EXPLOITS
TAKE ADVANTAGE OF SOFTWARE VULNERABILITIES




   No User Interaction
   No Downloading Accidentally
   No User Knowledge
SOCIAL ENGINEERING
  TAKES ADVANTAGE OF USER VULNERABILITIES
SOCIAL ENGINEERING
  TAKES ADVANTAGE OF USER VULNERABILITIES
SOCIAL ENGINEERING
  TAKES ADVANTAGE OF USER VULNERABILITIES
SOCIAL ENGINEERING
  TAKES ADVANTAGE OF USER VULNERABILITIES
MALWARE SOURCES
                     THREATEXPERT.COM


Canada               United Kingdom       Russia
 0.67%                    6.17%           22.29%



     United States
         6.42%                              China
                                            32.07%

                                 Africa
                                 0.17%

            Brazil
            6.92%
WHY BARCAMP?
SOCIAL THREATS
    Facebook


    MySpace


    YouTube


    Twitter


    Instant Messaging
FACEBOOK
MYSPACE
  JULY 2006
YOUTUBE
TWITTER
INSTANT MESSAGING
Network Anti-Malware
Passive on the Network
No Client Software
MALWARE SOURCES
                     THREATEXPERT.COM


Canada               United Kingdom       Russia
 0.67%                    6.17%           22.29%



     United States
         6.42%                              China
                                            32.07%

                                 Africa
                                 0.17%

            Brazil
            6.92%
MALWARE 2.0
     Shane Ochotny

Más contenido relacionado

Similar a Malware 2.0

Owasp e crime-london-2012-final
Owasp e crime-london-2012-finalOwasp e crime-london-2012-final
Owasp e crime-london-2012-final
Marco Morana
 
Black Hat Protection and Q&A - Andre Alpar, Dominik Wojcik and Ralph Tegtmeier
Black Hat Protection and Q&A - Andre Alpar, Dominik Wojcik and Ralph TegtmeierBlack Hat Protection and Q&A - Andre Alpar, Dominik Wojcik and Ralph Tegtmeier
Black Hat Protection and Q&A - Andre Alpar, Dominik Wojcik and Ralph Tegtmeier
auexpo Conference
 
Social networks security risks
Social networks security risksSocial networks security risks
Social networks security risks
osuhaibany
 
TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasTRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , Texas
Aditya K Sood
 

Similar a Malware 2.0 (20)

Today's malware aint what you think
Today's malware aint what you thinkToday's malware aint what you think
Today's malware aint what you think
 
Owasp e crime-london-2012-final
Owasp e crime-london-2012-finalOwasp e crime-london-2012-final
Owasp e crime-london-2012-final
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?
 
Botnets used for ad fraud spam ddos attacks
Botnets used for ad fraud spam ddos attacksBotnets used for ad fraud spam ddos attacks
Botnets used for ad fraud spam ddos attacks
 
Black Hat Protection and Q&A - Andre Alpar, Dominik Wojcik and Ralph Tegtmeier
Black Hat Protection and Q&A - Andre Alpar, Dominik Wojcik and Ralph TegtmeierBlack Hat Protection and Q&A - Andre Alpar, Dominik Wojcik and Ralph Tegtmeier
Black Hat Protection and Q&A - Andre Alpar, Dominik Wojcik and Ralph Tegtmeier
 
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ratzan2
Ratzan2Ratzan2
Ratzan2
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
quick-heal-threat-report-q2-2023.pdf
quick-heal-threat-report-q2-2023.pdfquick-heal-threat-report-q2-2023.pdf
quick-heal-threat-report-q2-2023.pdf
 
quick-heal-threat-report-q2-2023.pdf
quick-heal-threat-report-q2-2023.pdfquick-heal-threat-report-q2-2023.pdf
quick-heal-threat-report-q2-2023.pdf
 
Social networks security risks
Social networks security risksSocial networks security risks
Social networks security risks
 
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionScaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware Infection
 
TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasTRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , Texas
 
Metascan Multi-scanning Technology
Metascan Multi-scanning TechnologyMetascan Multi-scanning Technology
Metascan Multi-scanning Technology
 
Why do THEY want your digital devices?
Why do THEY want your digital devices?Why do THEY want your digital devices?
Why do THEY want your digital devices?
 
Ratzan2
Ratzan2Ratzan2
Ratzan2
 
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Best & Worst of Cybersecurity
Best & Worst of CybersecurityBest & Worst of Cybersecurity
Best & Worst of Cybersecurity
 

Último

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 

Último (20)

Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 

Malware 2.0