0
<ul><li>Cyberthreat Landscape 2009:  Outcomes, Trends and Forecasts </li></ul>Click to edit Master title style <ul><li>Cli...
Cyberthreat Landscape in 2009 Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>...
2009 – Main Trend Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second level...
2009 – Malware Numbers in Review Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><...
Reasons for the Stable Growth  Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li...
Outcomes in 2009 Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second level ...
S ophisticated  M alware Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Secon...
Global  Outbreaks Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second level...
Kido - Conficker Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second level ...
Gumblar – a Self-Spreading Website Botnet <ul><li>Significant outbreak - hit  tens of thousands of web </li></ul><ul><li>r...
Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second level </li></ul><ul><li...
Internet based fraud  - SMS Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Se...
Internet Based Fraud  – Fake AV Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><l...
Alternative Platforms – Mac OS Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li...
Alternative Platforms - Mobile <ul><li>First malicious programs  for iPhone </li></ul><ul><li>(Ike worms) </li></ul><ul><l...
Alternative Platforms –   ATMs Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li...
Forecasts for 2010 Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second leve...
Change in Attack Vector Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second...
Growing complexity Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second leve...
Attacks  on  Google Wave Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Secon...
Alternative Platforms - Mobile Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li...
AV industry trends Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second leve...
In-the-Cloud Security Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”,...
International Collaboration <ul><ul><li>AV + educators, law enforcement,  </li></ul></ul><ul><ul><li>ISP & so on </li></ul...
Summary: Forecasts for 2010 <ul><ul><li>Kido remaining an active global epidemic </li></ul></ul><ul><ul><li>Significant in...
<ul><li>Director, Global Research and Analysis Team </li></ul>Thank you! Questions? Click to edit Master title style <ul><...
Upcoming SlideShare
Loading in...5
×

Click to edit Master title style

667

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
667
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
15
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  •  
  • Transcript of "Click to edit Master title style"

    1. 1. <ul><li>Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts </li></ul>Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second level </li></ul><ul><li>Third level </li></ul><ul><li>Fourth level </li></ul><ul><li>Fifth level </li></ul>June 10 th , 2009 Event details (title, place) Alexander Gostev Director, Global Research and Analysis Team Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010
    2. 2. Cyberthreat Landscape in 2009 Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second level </li></ul><ul><li>Third level </li></ul><ul><li>Fourth level </li></ul><ul><li>Fifth level </li></ul>June 10 th , 2009 Event details (title, place)
    3. 3. 2009 – Main Trend Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second level </li></ul><ul><li>Third level </li></ul><ul><li>Fourth level </li></ul><ul><li>Fifth level </li></ul>June 10 th , 2009 Event details (title, place) The number of new malware samples, detected year over year Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010 Source: Kaspersky Lab Relative stability replaces massive increases in the amount of new malware
    4. 4. 2009 – Malware Numbers in Review Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second level </li></ul><ul><li>Third level </li></ul><ul><li>Fourth level </li></ul><ul><li>Fifth level </li></ul>June 10 th , 2009 Event details (title, place) <ul><ul><li>1992 – 2007 > detected about 2 mln </li></ul></ul><ul><ul><li>unique malware programs </li></ul></ul><ul><ul><li>But in 2008 alone – 15 mln </li></ul></ul><ul><ul><li>In 2009 - about 33,9 mln unique </li></ul></ul><ul><ul><li>malicious files in the Kaspersky Lab </li></ul></ul><ul><ul><li>collection </li></ul></ul><ul><ul><li>2009: 15 mln new files again (same as 2008 – flat growth rate) </li></ul></ul>Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010
    5. 5. Reasons for the Stable Growth Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second level </li></ul><ul><li>Third level </li></ul><ul><li>Fourth level </li></ul><ul><li>Fifth level </li></ul>June 10 th , 2009 Event details (title, place) <ul><li>The pace of malware development slowed significantly </li></ul><ul><li>Increased competition in the malware market </li></ul><ul><ul><li>a big decline in gaming Trojans </li></ul></ul><ul><li>The successful work of: </li></ul><ul><ul><li>law enforcement </li></ul></ul><ul><ul><li>regulatory structures </li></ul></ul><ul><ul><li>and the antivirus industry </li></ul></ul>Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010
    6. 6. Outcomes in 2009 Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second level </li></ul><ul><li>Third level </li></ul><ul><li>Fourth level </li></ul><ul><li>Fifth level </li></ul>June 10 th , 2009 Event details (title, place)
    7. 7. S ophisticated M alware Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second level </li></ul><ul><li>Third level </li></ul><ul><li>Fourth level </li></ul><ul><li>Fifth level </li></ul>June 10 th , 2009 Event details (title, place) <ul><li>An increase in sophisticated malicious programs </li></ul><ul><ul><li>Sinowal </li></ul></ul><ul><ul><li>TDSS </li></ul></ul><ul><ul><li>Clampi </li></ul></ul>Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010
    8. 8. Global Outbreaks Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second level </li></ul><ul><li>Third level </li></ul><ul><li>Fourth level </li></ul><ul><li>Fifth level </li></ul>June 10 th , 2009 Event details (title, place) <ul><li>T he following malicious programs affected more than 1 million computers in 2009: </li></ul><ul><li>Kido (worm) </li></ul><ul><li>Sality (virus) </li></ul><ul><li>Brontok (worm) </li></ul><ul><li>Mabezat (worm) </li></ul><ul><li>Parite.b (virus) </li></ul><ul><li>Virut.ce (virus-bot) </li></ul><ul><li>Sohanad (worm) </li></ul><ul><li>TDSS.z (rootkit) </li></ul>Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010
    9. 9. Kido - Conficker Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second level </li></ul><ul><li>Third level </li></ul><ul><li>Fourth level </li></ul><ul><li>Fifth level </li></ul>June 10 th , 2009 Event details (title, place) <ul><ul><li>Kido epidemic – all of 2009 </li></ul></ul><ul><ul><li>November 2009 – over 7 mln infected systems </li></ul></ul><ul><ul><li>Conficker Working Group - the first example of broad </li></ul></ul><ul><ul><li>international cooperation </li></ul></ul>Source: www.shadowserver.org Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010
    10. 10. Gumblar – a Self-Spreading Website Botnet <ul><li>Significant outbreak - hit tens of thousands of web </li></ul><ul><li>resources </li></ul><ul><li>Came in waves </li></ul>Gumblar tiers Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010
    11. 11. Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second level </li></ul><ul><li>Third level </li></ul><ul><li>Fourth level </li></ul><ul><li>Fifth level </li></ul>June 10 th , 2009 Event details (title, place) <ul><li>Evolution: </li></ul><ul><li>Visitors to legal websites re-directed to infected illegal malicious servers. </li></ul><ul><li>Users re-directed from legal websites to infected, but legal websites. </li></ul>Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010 Gumblar – a fully automated system
    12. 12. Internet based fraud - SMS Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second level </li></ul><ul><li>Third level </li></ul><ul><li>Fourth level </li></ul><ul><li>Fifth level </li></ul>June 10 th , 2009 Event details (title, place) <ul><ul><li>Websites offering services: </li></ul></ul><ul><ul><ul><ul><li>Locate people via GSM </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Read private messages in social networks </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Collect data, and more </li></ul></ul></ul></ul><ul><ul><li>SMS can cost up to $10 </li></ul></ul>Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010
    13. 13. Internet Based Fraud – Fake AV Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second level </li></ul><ul><li>Third level </li></ul><ul><li>Fourth level </li></ul><ul><li>Fifth level </li></ul>June 10 th , 2009 Event details (title, place) Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010 <ul><li>Fake AV boom – spread via: </li></ul><ul><ul><li>Internet ads </li></ul></ul><ul><ul><li>Malware such </li></ul></ul><ul><ul><li>as Kido </li></ul></ul><ul><li>Fake AV revenues in 2009 - 150 mln. USD* </li></ul>*Source: Internet Crime Complaint Center
    14. 14. Alternative Platforms – Mac OS Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second level </li></ul><ul><li>Third level </li></ul><ul><li>Fourth level </li></ul><ul><li>Fifth level </li></ul>June 10 th , 2009 Event details (title, place) <ul><li>The first Trojan - OSX.RSPlug.A (Trojan-Downloader.OSX. Jahlav) </li></ul><ul><li>The first rogue AV solution - Imunizator </li></ul>Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010
    15. 15. Alternative Platforms - Mobile <ul><li>First malicious programs for iPhone </li></ul><ul><li>(Ike worms) </li></ul><ul><li>First piece of spyware for Android (Mobile spy) </li></ul><ul><li>First crypto-signed malware for Symbian </li></ul>Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010 2008 2009 30 new families 39 new families 143 new variants 257 new variants
    16. 16. Alternative Platforms – ATMs Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second level </li></ul><ul><li>Third level </li></ul><ul><li>Fourth level </li></ul><ul><li>Fifth level </li></ul>June 10 th , 2009 Event details (title, place) <ul><li>The first B ackdoor for ATM – Backdoor.Win32.Skimer </li></ul><ul><ul><li>Stole money </li></ul></ul><ul><ul><li>Stole credit card data </li></ul></ul>Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010
    17. 17. Forecasts for 2010 Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second level </li></ul><ul><li>Third level </li></ul><ul><li>Fourth level </li></ul><ul><li>Fifth level </li></ul>June 10 th , 2009 Event details (title, place)
    18. 18. Change in Attack Vector Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second level </li></ul><ul><li>Third level </li></ul><ul><li>Fourth level </li></ul><ul><li>Fifth level </li></ul>June 10 th , 2009 Event details (title, place) <ul><li>Attacks via email; </li></ul><ul><li>Internet/network attacks; </li></ul><ul><li>Attacks via websites (including social networks) </li></ul>2010 - a significant increase of attacks via file-sharing networks - P2P and torrents Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010
    19. 19. Growing complexity Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second level </li></ul><ul><li>Third level </li></ul><ul><li>Fourth level </li></ul><ul><li>Fifth level </li></ul>June 10 th , 2009 Event details (title, place) <ul><ul><ul><ul><li>Malware will become much more sophisticated </li></ul></ul></ul></ul><ul><ul><ul><ul><li>IT security companies develop even more complex protection tools </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Immune malware </li></ul></ul></ul></ul>Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010
    20. 20. Attacks on Google Wave Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second level </li></ul><ul><li>Third level </li></ul><ul><li>Fourth level </li></ul><ul><li>Fifth level </li></ul>June 10 th , 2009 Event details (title, place) Usual pattern Sending spam Phishing attacks Exploiting vulnerabilities and Spreading malware Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010
    21. 21. Alternative Platforms - Mobile Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second level </li></ul><ul><li>Third level </li></ul><ul><li>Fourth level </li></ul><ul><li>Fifth level </li></ul>June 10 th , 2009 Event details (title, place) <ul><li>Rise in mobile threats for iPhone and Android </li></ul><ul><li>Android - no effective checks in place to ensure third-party software applications are secure </li></ul>Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010
    22. 22. AV industry trends Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second level </li></ul><ul><li>Third level </li></ul><ul><li>Fourth level </li></ul><ul><li>Fifth level </li></ul>June 10 th , 2009 Event details (title, place)
    23. 23. In-the-Cloud Security Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010 <ul><ul><li>Technological advance </li></ul></ul><ul><ul><li>Protects users </li></ul></ul><ul><ul><li>BUT </li></ul></ul><ul><ul><li>Potential IP abuse </li></ul></ul><ul><ul><li>Will be attacked </li></ul></ul>
    24. 24. International Collaboration <ul><ul><li>AV + educators, law enforcement, </li></ul></ul><ul><ul><li>ISP & so on </li></ul></ul><ul><ul><li>AV vendors educate about security </li></ul></ul><ul><ul><li>AV vendors help solve cybercrime </li></ul></ul><ul><li>Results: </li></ul><ul><ul><li>IT security awareness </li></ul></ul><ul><ul><li>Conficker Working Group </li></ul></ul>Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010
    25. 25. Summary: Forecasts for 2010 <ul><ul><li>Kido remaining an active global epidemic </li></ul></ul><ul><ul><li>Significant increase of attacks through P2P networks </li></ul></ul><ul><ul><li>Emergence of more &quot;grey&quot; schemes in the botnet services market </li></ul></ul><ul><ul><li>Attacks via Google Wave </li></ul></ul><ul><ul><li>Rise in mobile threats for iPhone and Android </li></ul></ul>Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010
    26. 26. <ul><li>Director, Global Research and Analysis Team </li></ul>Thank you! Questions? Click to edit Master title style <ul><li>Click to edit Master text styles </li></ul><ul><li>Second level </li></ul><ul><li>Third level </li></ul><ul><li>Fourth level </li></ul><ul><li>Fifth level </li></ul>June 10 th , 2009 Event details (title, place) Alexander Gostev Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×