The Cyber Espionage Blueprint by RSA Security

661 views

Published on

Read more via http://blogs.rsa.com/the-cyber-espionage-blueprint/?fb_source=pubv1

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
661
On SlideShare
0
From Embeds
0
Number of Embeds
9
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

The Cyber Espionage Blueprint by RSA Security

  1. 1. The Current State of Cyber Threats • 2397 01 Number of cyber espionage malware samples analyzed for the “Blueprint” report Finding • 60 02 Approx. # of Trojan families used in Cyber Espionage campaigns Finding 54% Percent of cyber espionage malware samples with random or nonsensical filenames 68% Percent of cyber espionage malware samples using standard ports to communicate • 05 Finding 03 • Finding 04 • Finding 67% Percent of cyber espionage malware samples installed in the user profile directory Findings listed above come from the report, “The Cyber Espionage Blueprint” EMC2, EMC, RSA, the RSA logo, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. © Copyright 2013 EMC Corporation. All rights reserved.

×