Professional Documents
Culture Documents
malware
David Emm
Global Research and Analysis Team
@emm_david
THE SCALE OF THE THREAT
2
THE NATURE OF THE THREAT
0.1% Cyber-weapons
Traditional
90% cybercrime
3
HOW MALWARE SPREADS
Exploit Social
kits networks
E-mail USB
4
WEB-BASED THREATS
1,850 30 attacks
attacks per second
per minute
5
6
BANKING TROJANS
7
HOW BANKING TROJANS WORK
• Capture keystrokes
• Take screen-shots
• e.g. to capture mouse clicks
• Modify the hosts file
• Redirect the browser to a fake web site
• Inject code into the browser
• Intercept connection to bank site
• Modify content on the page
• e.g. to request additional data
• Install malicious app on smartphone
• Capture one-time passcodes sent via SMS
8
BANKING TROJANS
Number of banking Trojan attacks blocked, 2018-19
140 000
120 000
100 000
80 000
60 000
40 000
20 000
9
RANSOMWARE
10
TYPES OF RANSOMWARE
• Lock-screen ransomware
• Crypto-ransomware
• MBR ransomware
• Ransomware targeting web servers
• Ransomware targeting mobile devices
11
LOCK-SCREEN RANSOMWARE
12
CRYPTO-RANSOMWARE
13
14
15
16
17
CRYPTO-RANSOMWARE
Number of crypto-ransomware attacks blocked, 2018-19
140 000
120 000
100 000
80 000
60 000
40 000
20 000
18
19
MALICIOUS CRYPTO-CURRENCY MINERS
20
MALICIOUS CRYPTO-CURRENCY MINERS
Number of malicious crypto-currency miner attacks blocked, 2018-19
500 000
450 000
400 000
350 000
300 000
250 000
200 000
150 000
100 000
50 000
0
21
2,259,038
755,485
766,728
22
THE RISING TIDE OF MOBILE THREATS
23
MOBILE COMPUTING RISKS
24
25
5 000 000
10 000 000
15 000 000
20 000 000
25 000 000
30 000 000
35 000 000
40 000 000
45 000 000
0
MOBILE MALWARE
янв.15
апр.15
июл.15
окт.15
янв.16
апр.16
июл.16
окт.16
янв.17
апр.17
июл.17
окт.17
янв.18
апр.18
июл.18
окт.18
янв.19
апр.19
июл.19
окт.19
APT THREAT LANDSCAPE
Top APTs and targets in 2019
26 apt.securelist.com
STAYING SAFE
27
P PROTECT
U UPDATE
28
B BACKUP
Thank you
David Emm
Global Research and Analysis Team
@emm_david