21st Century Malware Threatscape: 15 Years of Evolution

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

21st Century Malware

Threatscape
15 Years of Evolution
Andy Hayter
Anti-Malcode Program Manager
ICSA Labs
Introduction
• Andy Hayter – Anti-Malcode Program
Manager – ICSA Labs
– Anti-Virus, Anti-Spyware, PC Firewall, HIPS
– 25 years experience
• Anti-Virus Product Marketing & Product Manager
• Security Vendors
• End-User
• Anti-Malware Testing Programs
ICSA Labs Overview
Who We Are Independent Third Party
+ Validation
Global leader and
Neutral and
defacto standard in
+ Testing
the private sector for
security product / Vendor
Agnostic
services / solutions
Research
assurance through
&
testing and
Analysis
certification.
Current Product Certification Programs

• Anti-SPAM • Network IPS


• Anti-Spyware • PC Firewall
• Anti-Virus • SSL VPN
• Cryptography • Web Application FW
• Firewall • Wireless LAN
• IDS • Custom Services
• IPSec VPN
Nature of Evolving Threats
Rewind the Clock
• 1997 – Unfamiliar, but not complex

• 2009 – Complex – obfuscated, packed,


encrypted, multiple vectors
Varieties of Malware
• Virus
• Worm
• Bot
• Trojan
• Rootkit
• Spyware
• Spam
Vectors of Infection
Yesterday Today
• Sneaker Net • E-mail Attachments
• Boot Disks • Drive-by Downloads
• Pre-packaged • XSS
Software • Social Engineering
• Home à Work • Botnets
Effects of Infection
Yesterday Today
• Corrupted Hard Drive Ransomware
• Political Message Keylogger
• P.O.C
Password Stealer
• Fun
Crimeware
€£ P $
Is it In-The-Wild?
Targeted Attacks
• Regional
• Industry
• Company
• Government
Analysis
2009
• 1997 – 10,000 known
viruses

• 2009 - >10,000 new


per day
1997

Traditional Analysis cannot keep up with rate at which new


malware appears.
What can you do about it?
• EDUCATION à (ISC)2
• Policy – Develop, Test and Enforce
• End-User Education
• Patch, Patch, Patch
• Outside, 3rd Party, Independent External
Assessment of Security Solutions
Testing and Certification
• Security Products
– Tested
– Certified
by a Credible Laboratory such as
Data Breaches and Malware
Perfect Together
• Greater than One-Third of Data Breaches
Involved Malware

Source: 2008 Data Breach Investigations Report


Verizon Business
www.verizonbusiness.com/resources/security/databreachreport.pdf
Investigative Analysis
• ICSA Labs – conducted
major portion of
malware analysis

• à What was the


malware looking for
• à What is/or could have
been the impact
Questions?
Click on the questions tab on your screen, type in your question, name
and e-mail address; then hit submit.

You might also like