SlideShare a Scribd company logo
1 of 26
© Copyright Fortinet Inc. All rights reserved.
FortiGuard Labs Threat Landscape Highlights
MNSEC 2018
© Copyright Fortinet Inc. All rights reserved.
2018 Threat Landscape Predictions
FortiGuard Labs
3
4
5
6
© Copyright Fortinet Inc. All rights reserved.
FortiGuard Labs Threat Telemetry
Global and Mongolia – 2018 (Thus Far)
8
0 10,000 20,000 30,000 40,000 50,000 60,000 70,000 80,000
APACHE.STRUTS.2.JAKARTA.MULTIPART.PARSER.CODE.EXECUTION
GENERIC.JAVASCRIPT.CRYPTOCURRENCY.MINING.SCRIPT
ORACLE.WEBLOGIC.SERVER.WLS-WSAT.COMPONENT.CODE.INJECTION
MS.IIS.WEBDAV.PROPFIND.SCSTORAGEPATHFROMURL.BUFFER.OVERFLOW
PHP.CGI.ARGUMENT.INJECTION
PREVALENCE
Top 5 Prevalent Attacks – Global
9
0 5,000 10,000 15,000 20,000 25,000 30,000 35,000
ADWARE/AGENT
VBA/AGENT.3E09!TR.DLDR
RISKWARE/AGENT
VBA/TROJANDOWNLOADER.JAC!TR
MSOFFICE/CVE_2017_11882.B!EXPLOIT
PREVALENCE
Top 5 Prevalent Malware – Global
10
0 5,000 10,000 15,000 20,000 25,000 30,000 35,000 40,000
GH0ST.RAT
PUSHDO
ANDROMEDA
SALITY
ZEROACCESS
PREVALENCE
Top 5 Prevalent Botnets – Global
11
Top 5 Prevalent Attacks – Mongolia
0 5 10 15 20 25 30
GENERIC.JAVASCRIPT.CRYPTOCURRENCY.MINING.SCRIPT
BACKDOOR.DOUBLEPULSAR
PHP.CGI.ARGUMENT.INJECTION
MS.SMB.SERVER.TRANS.PEEKING.DATA.INFORMATION.DISCLOSURE
ORACLE.WEBLOGIC.SERVER.WLS-WSAT.COMPONENT.CODE.INJECTION
PREVALENCE
12
Top 5 Prevalent Malware – Mongolia
0 2 4 6 8 10 12 14
RISKWARE/DRIVERPACK
ANDROID/HIDDAD.HY!TR
ADWARE/AIRPUSH!ANDROID
RISKWARE/COINHIVE
W32/KRYPTIK.GGXM!TR
PREVALENCE
13
Top 5 Prevalent Botnets – Mongolia
0 2 4 6 8 10 12 14 16 18
GH0ST.RAT
SALITY
ANDROMEDA
H-WORM
GOZI
PREVALENCE
© Copyright Fortinet Inc. All rights reserved.
Quarterly Threat Landscape Report
Q2 2018
15
CVE-2017-5638 – Apache Struts 2 RCE
17
18
19
20
INTERNET
Public
Cloud
Web Honeypot
VM
Drupal CMS
Drupal CMS deployed on a Linux Instance
FortiGate NGFW in Monitoring Mode
FortiGate
NGFW
FortiAnalyzer
FortiAnalyzer for Centralized Reporting
21
CVE-2018-7600 - Drupal RCE
22
Server Side Cryptojacking
23
Client Side Browser Based Cryptojacking
24
FortiGuard Labs @ fortiguard.com
25
NSS Labs 3rd-Party Testing
9
Recommendations
out of 9!
Independent Testing
WAFBDS
NGIPS
BPS
DCSGDCIPS
AEP
NGFW
SD-WAN
© Copyright Fortinet Inc. All rights reserved.
баярлалаа

More Related Content

Similar to Fortinet Quarterly Threat Landscape Report Highlights Mongolia and Global Trends

DevNexus 2019: MicroProfile and Jakarta EE - What's Next?
DevNexus 2019:  MicroProfile and Jakarta EE - What's Next?DevNexus 2019:  MicroProfile and Jakarta EE - What's Next?
DevNexus 2019: MicroProfile and Jakarta EE - What's Next?Kevin Sutter
 
Meraki Virtual Hackathon: app for Splunk Phantom
Meraki Virtual Hackathon: app for Splunk PhantomMeraki Virtual Hackathon: app for Splunk Phantom
Meraki Virtual Hackathon: app for Splunk PhantomJoel W. King
 
XSS filter on Server side
XSS filter on Server sideXSS filter on Server side
XSS filter on Server sidecuteboysmith
 
Cloud Crowd - Mandhir Gidda Razorfish " Building a Public / Private Hybrid Cl...
Cloud Crowd - Mandhir Gidda Razorfish " Building a Public / Private Hybrid Cl...Cloud Crowd - Mandhir Gidda Razorfish " Building a Public / Private Hybrid Cl...
Cloud Crowd - Mandhir Gidda Razorfish " Building a Public / Private Hybrid Cl...jimliddle
 
CloudCrowd - RazorFish Presentation on Building Hybrid Public/Private Cloud
CloudCrowd - RazorFish Presentation on Building Hybrid Public/Private CloudCloudCrowd - RazorFish Presentation on Building Hybrid Public/Private Cloud
CloudCrowd - RazorFish Presentation on Building Hybrid Public/Private CloudNati Shalom
 
How to Make Istio Work with Your App
How to Make Istio Work with Your AppHow to Make Istio Work with Your App
How to Make Istio Work with Your AppKarenBruner
 
How to Make Istio Work with Your App
How to Make Istio Work with Your AppHow to Make Istio Work with Your App
How to Make Istio Work with Your AppStackRox
 
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...Marina Krotofil
 
2011 App Failures - Year in Review CAST
2011 App Failures  - Year in Review CAST2011 App Failures  - Year in Review CAST
2011 App Failures - Year in Review CASTCAST
 
100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасностиАльбина Минуллина
 
Firepower ngfw internet
Firepower ngfw internetFirepower ngfw internet
Firepower ngfw internetRony Melo
 
Choose Your Own Adventure with JHipster & Kubernetes - Utah JUG 2020
Choose Your Own Adventure with JHipster & Kubernetes - Utah JUG 2020Choose Your Own Adventure with JHipster & Kubernetes - Utah JUG 2020
Choose Your Own Adventure with JHipster & Kubernetes - Utah JUG 2020Matt Raible
 
TechEvent Eclipse Microprofile
TechEvent Eclipse MicroprofileTechEvent Eclipse Microprofile
TechEvent Eclipse MicroprofileTrivadis
 
Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01RoutecoMarketing
 
IRJET- Web Application Firewall: Artificial Intelligence ARC
IRJET-  	  Web Application Firewall: Artificial Intelligence ARCIRJET-  	  Web Application Firewall: Artificial Intelligence ARC
IRJET- Web Application Firewall: Artificial Intelligence ARCIRJET Journal
 
Highly dependable automotive software
Highly dependable automotive softwareHighly dependable automotive software
Highly dependable automotive softwareAlan Tatourian
 
OGCE TeraGrid 2010 ASTA Support
OGCE TeraGrid 2010 ASTA SupportOGCE TeraGrid 2010 ASTA Support
OGCE TeraGrid 2010 ASTA Supportmarpierc
 
Fortinet Mikulov 2020 -Jen chránit síť nestačí.ppsx
Fortinet Mikulov 2020 -Jen chránit síť nestačí.ppsxFortinet Mikulov 2020 -Jen chránit síť nestačí.ppsx
Fortinet Mikulov 2020 -Jen chránit síť nestačí.ppsxAlejandro Daricz
 

Similar to Fortinet Quarterly Threat Landscape Report Highlights Mongolia and Global Trends (20)

DevNexus 2019: MicroProfile and Jakarta EE - What's Next?
DevNexus 2019:  MicroProfile and Jakarta EE - What's Next?DevNexus 2019:  MicroProfile and Jakarta EE - What's Next?
DevNexus 2019: MicroProfile and Jakarta EE - What's Next?
 
Fortinet Broşür
Fortinet BroşürFortinet Broşür
Fortinet Broşür
 
Fortinet k
Fortinet kFortinet k
Fortinet k
 
Meraki Virtual Hackathon: app for Splunk Phantom
Meraki Virtual Hackathon: app for Splunk PhantomMeraki Virtual Hackathon: app for Splunk Phantom
Meraki Virtual Hackathon: app for Splunk Phantom
 
XSS filter on Server side
XSS filter on Server sideXSS filter on Server side
XSS filter on Server side
 
Cloud Crowd - Mandhir Gidda Razorfish " Building a Public / Private Hybrid Cl...
Cloud Crowd - Mandhir Gidda Razorfish " Building a Public / Private Hybrid Cl...Cloud Crowd - Mandhir Gidda Razorfish " Building a Public / Private Hybrid Cl...
Cloud Crowd - Mandhir Gidda Razorfish " Building a Public / Private Hybrid Cl...
 
CloudCrowd - RazorFish Presentation on Building Hybrid Public/Private Cloud
CloudCrowd - RazorFish Presentation on Building Hybrid Public/Private CloudCloudCrowd - RazorFish Presentation on Building Hybrid Public/Private Cloud
CloudCrowd - RazorFish Presentation on Building Hybrid Public/Private Cloud
 
How to Make Istio Work with Your App
How to Make Istio Work with Your AppHow to Make Istio Work with Your App
How to Make Istio Work with Your App
 
How to Make Istio Work with Your App
How to Make Istio Work with Your AppHow to Make Istio Work with Your App
How to Make Istio Work with Your App
 
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...
 
2011 App Failures - Year in Review CAST
2011 App Failures  - Year in Review CAST2011 App Failures  - Year in Review CAST
2011 App Failures - Year in Review CAST
 
100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности
 
Firepower ngfw internet
Firepower ngfw internetFirepower ngfw internet
Firepower ngfw internet
 
Choose Your Own Adventure with JHipster & Kubernetes - Utah JUG 2020
Choose Your Own Adventure with JHipster & Kubernetes - Utah JUG 2020Choose Your Own Adventure with JHipster & Kubernetes - Utah JUG 2020
Choose Your Own Adventure with JHipster & Kubernetes - Utah JUG 2020
 
TechEvent Eclipse Microprofile
TechEvent Eclipse MicroprofileTechEvent Eclipse Microprofile
TechEvent Eclipse Microprofile
 
Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01
 
IRJET- Web Application Firewall: Artificial Intelligence ARC
IRJET-  	  Web Application Firewall: Artificial Intelligence ARCIRJET-  	  Web Application Firewall: Artificial Intelligence ARC
IRJET- Web Application Firewall: Artificial Intelligence ARC
 
Highly dependable automotive software
Highly dependable automotive softwareHighly dependable automotive software
Highly dependable automotive software
 
OGCE TeraGrid 2010 ASTA Support
OGCE TeraGrid 2010 ASTA SupportOGCE TeraGrid 2010 ASTA Support
OGCE TeraGrid 2010 ASTA Support
 
Fortinet Mikulov 2020 -Jen chránit síť nestačí.ppsx
Fortinet Mikulov 2020 -Jen chránit síť nestačí.ppsxFortinet Mikulov 2020 -Jen chránit síť nestačí.ppsx
Fortinet Mikulov 2020 -Jen chránit síť nestačí.ppsx
 

More from MNCERT

MNSEC 2018 - Threat Intel Sharing from a CSIRT Standpoint
MNSEC 2018 - Threat Intel Sharing from a CSIRT StandpointMNSEC 2018 - Threat Intel Sharing from a CSIRT Standpoint
MNSEC 2018 - Threat Intel Sharing from a CSIRT StandpointMNCERT
 
MNSEC 2018 - Observations from the APNIC Community Honeynet Project
MNSEC 2018 -  Observations from the APNIC Community Honeynet Project MNSEC 2018 -  Observations from the APNIC Community Honeynet Project
MNSEC 2018 - Observations from the APNIC Community Honeynet Project MNCERT
 
MNSEC 2018 - Active Directory - how not to
MNSEC 2018 - Active Directory - how not toMNSEC 2018 - Active Directory - how not to
MNSEC 2018 - Active Directory - how not toMNCERT
 
MNSEC 2018 - Mongolian Internet Healthiness
MNSEC 2018 - Mongolian Internet HealthinessMNSEC 2018 - Mongolian Internet Healthiness
MNSEC 2018 - Mongolian Internet HealthinessMNCERT
 
MNSEC 2018 - Malware Distribution Trends, October 2018
MNSEC 2018 -  Malware Distribution Trends, October 2018 MNSEC 2018 -  Malware Distribution Trends, October 2018
MNSEC 2018 - Malware Distribution Trends, October 2018 MNCERT
 
MNSEC 2018 - Evolving DDoS Threat Landscape
MNSEC 2018 - Evolving DDoS Threat LandscapeMNSEC 2018 - Evolving DDoS Threat Landscape
MNSEC 2018 - Evolving DDoS Threat LandscapeMNCERT
 
MNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensicsMNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensicsMNCERT
 
MNSEC 2018 - Linux hardening
MNSEC 2018 - Linux hardeningMNSEC 2018 - Linux hardening
MNSEC 2018 - Linux hardeningMNCERT
 
MNSEC 2018 - Cryptography
MNSEC 2018 - CryptographyMNSEC 2018 - Cryptography
MNSEC 2018 - CryptographyMNCERT
 
MNSEC 2018 - MNCERT REPORT
MNSEC 2018 - MNCERT REPORTMNSEC 2018 - MNCERT REPORT
MNSEC 2018 - MNCERT REPORTMNCERT
 
MNSEC 2018 - Data center security
MNSEC 2018 - Data center securityMNSEC 2018 - Data center security
MNSEC 2018 - Data center securityMNCERT
 
MNSEC 2018 - Information security in blockchain
MNSEC 2018 - Information security in blockchainMNSEC 2018 - Information security in blockchain
MNSEC 2018 - Information security in blockchainMNCERT
 

More from MNCERT (12)

MNSEC 2018 - Threat Intel Sharing from a CSIRT Standpoint
MNSEC 2018 - Threat Intel Sharing from a CSIRT StandpointMNSEC 2018 - Threat Intel Sharing from a CSIRT Standpoint
MNSEC 2018 - Threat Intel Sharing from a CSIRT Standpoint
 
MNSEC 2018 - Observations from the APNIC Community Honeynet Project
MNSEC 2018 -  Observations from the APNIC Community Honeynet Project MNSEC 2018 -  Observations from the APNIC Community Honeynet Project
MNSEC 2018 - Observations from the APNIC Community Honeynet Project
 
MNSEC 2018 - Active Directory - how not to
MNSEC 2018 - Active Directory - how not toMNSEC 2018 - Active Directory - how not to
MNSEC 2018 - Active Directory - how not to
 
MNSEC 2018 - Mongolian Internet Healthiness
MNSEC 2018 - Mongolian Internet HealthinessMNSEC 2018 - Mongolian Internet Healthiness
MNSEC 2018 - Mongolian Internet Healthiness
 
MNSEC 2018 - Malware Distribution Trends, October 2018
MNSEC 2018 -  Malware Distribution Trends, October 2018 MNSEC 2018 -  Malware Distribution Trends, October 2018
MNSEC 2018 - Malware Distribution Trends, October 2018
 
MNSEC 2018 - Evolving DDoS Threat Landscape
MNSEC 2018 - Evolving DDoS Threat LandscapeMNSEC 2018 - Evolving DDoS Threat Landscape
MNSEC 2018 - Evolving DDoS Threat Landscape
 
MNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensicsMNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensics
 
MNSEC 2018 - Linux hardening
MNSEC 2018 - Linux hardeningMNSEC 2018 - Linux hardening
MNSEC 2018 - Linux hardening
 
MNSEC 2018 - Cryptography
MNSEC 2018 - CryptographyMNSEC 2018 - Cryptography
MNSEC 2018 - Cryptography
 
MNSEC 2018 - MNCERT REPORT
MNSEC 2018 - MNCERT REPORTMNSEC 2018 - MNCERT REPORT
MNSEC 2018 - MNCERT REPORT
 
MNSEC 2018 - Data center security
MNSEC 2018 - Data center securityMNSEC 2018 - Data center security
MNSEC 2018 - Data center security
 
MNSEC 2018 - Information security in blockchain
MNSEC 2018 - Information security in blockchainMNSEC 2018 - Information security in blockchain
MNSEC 2018 - Information security in blockchain
 

Recently uploaded

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Fortinet Quarterly Threat Landscape Report Highlights Mongolia and Global Trends

  • 1. © Copyright Fortinet Inc. All rights reserved. FortiGuard Labs Threat Landscape Highlights MNSEC 2018
  • 2. © Copyright Fortinet Inc. All rights reserved. 2018 Threat Landscape Predictions FortiGuard Labs
  • 3. 3
  • 4. 4
  • 5. 5
  • 6. 6
  • 7. © Copyright Fortinet Inc. All rights reserved. FortiGuard Labs Threat Telemetry Global and Mongolia – 2018 (Thus Far)
  • 8. 8 0 10,000 20,000 30,000 40,000 50,000 60,000 70,000 80,000 APACHE.STRUTS.2.JAKARTA.MULTIPART.PARSER.CODE.EXECUTION GENERIC.JAVASCRIPT.CRYPTOCURRENCY.MINING.SCRIPT ORACLE.WEBLOGIC.SERVER.WLS-WSAT.COMPONENT.CODE.INJECTION MS.IIS.WEBDAV.PROPFIND.SCSTORAGEPATHFROMURL.BUFFER.OVERFLOW PHP.CGI.ARGUMENT.INJECTION PREVALENCE Top 5 Prevalent Attacks – Global
  • 9. 9 0 5,000 10,000 15,000 20,000 25,000 30,000 35,000 ADWARE/AGENT VBA/AGENT.3E09!TR.DLDR RISKWARE/AGENT VBA/TROJANDOWNLOADER.JAC!TR MSOFFICE/CVE_2017_11882.B!EXPLOIT PREVALENCE Top 5 Prevalent Malware – Global
  • 10. 10 0 5,000 10,000 15,000 20,000 25,000 30,000 35,000 40,000 GH0ST.RAT PUSHDO ANDROMEDA SALITY ZEROACCESS PREVALENCE Top 5 Prevalent Botnets – Global
  • 11. 11 Top 5 Prevalent Attacks – Mongolia 0 5 10 15 20 25 30 GENERIC.JAVASCRIPT.CRYPTOCURRENCY.MINING.SCRIPT BACKDOOR.DOUBLEPULSAR PHP.CGI.ARGUMENT.INJECTION MS.SMB.SERVER.TRANS.PEEKING.DATA.INFORMATION.DISCLOSURE ORACLE.WEBLOGIC.SERVER.WLS-WSAT.COMPONENT.CODE.INJECTION PREVALENCE
  • 12. 12 Top 5 Prevalent Malware – Mongolia 0 2 4 6 8 10 12 14 RISKWARE/DRIVERPACK ANDROID/HIDDAD.HY!TR ADWARE/AIRPUSH!ANDROID RISKWARE/COINHIVE W32/KRYPTIK.GGXM!TR PREVALENCE
  • 13. 13 Top 5 Prevalent Botnets – Mongolia 0 2 4 6 8 10 12 14 16 18 GH0ST.RAT SALITY ANDROMEDA H-WORM GOZI PREVALENCE
  • 14. © Copyright Fortinet Inc. All rights reserved. Quarterly Threat Landscape Report Q2 2018
  • 15. 15
  • 16. CVE-2017-5638 – Apache Struts 2 RCE
  • 17. 17
  • 18. 18
  • 19. 19
  • 20. 20 INTERNET Public Cloud Web Honeypot VM Drupal CMS Drupal CMS deployed on a Linux Instance FortiGate NGFW in Monitoring Mode FortiGate NGFW FortiAnalyzer FortiAnalyzer for Centralized Reporting
  • 23. 23 Client Side Browser Based Cryptojacking
  • 24. 24 FortiGuard Labs @ fortiguard.com
  • 25. 25 NSS Labs 3rd-Party Testing 9 Recommendations out of 9! Independent Testing WAFBDS NGIPS BPS DCSGDCIPS AEP NGFW SD-WAN
  • 26. © Copyright Fortinet Inc. All rights reserved. баярлалаа