2. Sources:
ADMA Digital Marketing Yearbook 2011
Pando Network's Global Internet Speed Study (Aug 2011)
Classification 03/28/13 Copyright 2011 Trend Micro Inc. 2
3. The fact that we are wired is the very reason
we have threats
Source: Trend Micro
Classification 03/28/13 Copyright 2011 Trend Micro Inc. 3
4. The technological landscape of Asia can
influence the types of threats
Classification 03/28/13 Copyright 2011 Trend Micro Inc. 4
5. What about Hong Kong?
• 4th country in Asia that has the most number blocked
attempts to access bad URLs hosted in that country
– Bad sites in Hong Kong are usually classified as disease vectors
(malware-related)
• 14th country that has the most bad URL victims in Asia
• Top 5 malware threats:
– WORM_DOWNAD.AD
• aka Conficker, this 3-year old worm exploits unpatched
Windows systems to spread
– CRCK_KEYGEN and HKTL_KEYGEN
• KEYGEN or serial key generators are typically used to crack
licensed software
– ADW_TENCENT
• This is usually related to ads related to a popular IM
application
– WORM_AUTORUN.SMW
• Autorun worms spread via removable drives
Classification 03/28/13 Copyright 2011 Trend Micro Inc. 5
6. Human interests and emotions are still
ripe for picking when it comes to
cybercrime
Classification 03/28/13 Copyright 2011 Trend Micro Inc. 6
7. Steve Jobs is dead!
Now who wants a free iPad?
Classification 03/28/13 Copyright 2011 Trend Micro Inc. 7
8. Data breaches are simpler than one
thinks
Classification 03/28/13 Copyright 2011 Trend Micro Inc. 8
10. Data Breaches on the Rise: Epsilon
• Data breaches are not
new
• Data breaches can
affect any industry
• Hacking is the most
common cause of data
breaches
Copyright 2011 Trend Micro Inc. 10
11. Anatomy of a Malicious Data Breach Diagram
Source: Trend Micro
Classification 03/28/13 Copyright 2011 Trend Micro Inc. 11
12. Everyone is going mobile.
So are the bad guys.
Classification 03/28/13 Copyright 2011 Trend Micro Inc. 12
13. Android Landscape
• 1st android phone (October
2008)
• 51.9 million Android-based
smartphones
• 250,000 apps and still
growing
• 6 billion downloaded apps
• 43% market share
Classification 03/28/13 Copyright 2011 Trend Micro Inc. 13
15. DroidDreamLight
• Discovered in May 2011
• Steals and sends info from
user’s phone to
cybercriminals
• Displays fake notifications
Classification 03/28/13 Copyright 2011 Trend Micro Inc. 15
16. DroidDreamLight in Action
Device model
Device language setting
Country
IMEI number
IMSI number
List of installed apps
Classification 03/28/13 Copyright 2011 Trend Micro Inc. 16
17. USERS CANNOT BE PASSIVE ABOUT
TECHNOLOGY
EMBRACING THE DIGITAL LIFESTYLE MEANS
CHANGING THE WAY TECHNOLOGY AND
SECURITY IS VIEWED
LOOK FOR SECURITY SOLUTIONS THAT
ADDRESS THE CONSTANT EVOLUTIONS IN
THE THREAT LANDSCAPE
Classification 03/28/13 Copyright 2011 Trend Micro Inc. 17