INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014

  • 3,419 views
Uploaded on

A summary of the top 5 most dangerous malware trends of 2014.

A summary of the top 5 most dangerous malware trends of 2014.

More in: Internet , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
3,419
On Slideshare
0
From Embeds
0
Number of Embeds
17

Actions

Shares
Downloads
26
Comments
0
Likes
5

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. sms sms sms sms sms ? ? ? ? ? 20142014 MOST DANGEROUS The release of the Carberp source code in June 2013 provides cybercriminals with yet another set of building blocks to create new malware variants. We saw the same development after the release of the Zeus 2.0.8.9 source code in May 2011 leading to Ice IX and Citadel malware. New malware variants contain new characteristics, signatures, evasive capabilities, and other modules never seen before. This makes it next to impossible for standard anti virus/anti-malware platforms to identify the malware. SOURCE CODE LEAKS WILL ACCELERATE MALWARE RELEASE CYCLES MOBILE SMS-FORWARDING MALWARE WILL BECOME UBIQUITOUS The capability to forward mobile SMS messages will be a standard feature in virtually all major malware families, with stand-alone SMS forwarding malware readily available. Mobile SMS verification is rendered all but useless as an out-of-band authentication method. Furthermore, enterprises must be wary of the real potential for SMS communication compromise with the increasing popularity of BYOD. MALWARE TRENDS OF As security products become available to detect new cybercrime techniques, malware authors revert back to more manual and time consuming approaches that can bypass many of these advanced detection and mitigation solutions. Anomaly detection and device ID solutions can now be easily circumvented by very basic cybercrime techniques. For example, we found several malware variants that prevent the user from interacting with the genuine site, thereby rendering some on-site fraud prevention approaches less effective. Instead of the fraudster using his own machine to perpetrate account takeover attacks, he accesses the account via the victim’s machine using various remote access technologies. This approach bypasses many device-fingerprinting technologies because the fraudster uses the (genuine) victim’s device. Device fingerprinting is used to ascertain whether the account access is taking place from the client’s known device or a different device. When access comes from the client’s device, it appears to device-fingerprinting solutions that the legitimate customer is accessing his account. Modern malware use a variety of techniques to avoid endpoint and network-based security software detection platforms. Now, however, we’re increasingly seeing malware that use a variety of techniques (including advanced encryption, and virtual machine and debug software evasion) to avoid analysis by malware researchers. Researcher evasion will become a standard component of most malware offerings. Security solutions are updated with counter measures based on malware research. If malware cannot be researched, counter measures cannot be developed. Taking the fight to an even earlier stage – malware authors are heavily investing in making sure researchers cannot scrutinize their software. WHY IT’S DANGEROUS WHY IT’S DANGEROUS OLD SCHOOL MALWARE TECHNIQUES WILL MAKE A COMEBACK WHY IT’S DANGEROUS ACCOUNT TAKEOVER WILL MOVE TO THE VICTIM’S DEVICE WHY IT’S DANGEROUS MALWARE RESEARCHER EVASION WILL BECOME MORE POPULAR WHY IT’S DANGEROUS 1 12 11 10 9 8 7 6 54 3 2 1 2 3 4 5