2014: Mid-Year Threat Review

38
2014 Mid-Year Threat Review The good, the bad and the ugly

description

Our researcher Aryeh Goretsky took a look at some of the more interesting pieces of malware and threats that have occurred over the first six months of the year 2014. And what a year it has been, with some serious new developments as well as persistence of numerous older threats.

Transcript of 2014: Mid-Year Threat Review

Page 1: 2014: Mid-Year Threat Review

2014 Mid-Year Threat Review

The good, the bad and the ugly

Page 2: 2014: Mid-Year Threat Review

Presenter

Aryeh Goretsky, MVP, ZCSEDistinguished ResearcherESET North America

[email protected]@eset (global)

@esetna (US + Canada)

Page 3: 2014: Mid-Year Threat Review

About ESET

• Leading security solution provider for companies of all sizes, home and phones

• Pioneered and continues to lead the industry in proactive threat detection

• Presence in more than 180 countries worldwide• Protecting over 100 million users• Ten years of consecutive VB100 awards†• 5th Largest Endpoint Security Vendor‡

†Source: Virus Bulletin Magazine‡Source: IDC, Worldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor Shares

Page 4: 2014: Mid-Year Threat Review

What’s on the agenda?

• A brief look into ESET’s threat database• Android malware• Banking bots & Bitcoin thieves• Heartbleed SSL vulnerability• Internet of Things (IoT)

• Mac & iPhone• Nation-state malware• Windigo/Ebury malware campaign• Windows XP reaches its end of life

Page 5: 2014: Mid-Year Threat Review

What this presentation is not about

• BYOD & mobile device threats• Data breaches (eBay, Target, …)• Edward Snowden, NSA, et al• Multifactor authentication• Passwords and PINs• Phishing, scams & social media• Windows 8.1 Update

Page 6: 2014: Mid-Year Threat Review

Threat Database Updates

Page 7: 2014: Mid-Year Threat Review

Threat Database Updates

[CHART REDACTED]

To view this slide, please see the presentation at:

https://www.brighttalk.com/webcast/1718/110971

Page 8: 2014: Mid-Year Threat Review

Android is becoming Windows

Page 9: 2014: Mid-Year Threat Review

Android Malware

• Amount of malware continues to grow• Can be deployed by Windows malware (q.v.)• Reports of smartphones & tablets shipping

with pre-installed malware• Everything old is new again: – first worm discovered, Android/Samsapo– first ransomware discovered, Android/Simplocker

• On the plus side– Google plans to periodically re-scan installed apps–Most malware originates outside of Google Play,

device or carrier stores

Page 10: 2014: Mid-Year Threat Review
Page 11: 2014: Mid-Year Threat Review

Android Malware

Have you seen any malware, potentially unwanted applications or junk apps on your Android devices?

Yes

no

Page 12: 2014: Mid-Year Threat Review

Banking bots & Bitcoin thieves

• Arrival of *coin mining and stealing on multiple platforms, technologies (Android, BAT, MSIL, Win32, VBS)

• Win32/Corkow banking Trojan targets Bitcoin wallets, Android developers and Russian business bank accounts

• Win32/Qadars banking bot now drops Android iBanking component Android/Spy.Agent.AF via Facebook webinject

Page 13: 2014: Mid-Year Threat Review

Heartbleed SSL Vulnerability

• 2 year old flaw in OpenSSL allows eavesdropping into communications

• About two-thirds of web sites were affected• Also affected networking gear from Cisco,

Juniper and others; in VPN software, etc.• Windows 8 inbox VPN clients, too• May have been exploited for those 2 years

before being discovered

Page 14: 2014: Mid-Year Threat Review

Internet of Things

• Smart TVs – “Red Button” bot in your living room? – Script injection, credential theft, malware?– all via broadcast (EU standard, soon in US)

• Smart TVs – the spy in your living room?– Some have microphones and webcams

• Not apparent when they’re on; or how to turn off (or if)• Can be remotely taken over (Samsung)

– Sent viewing habits, URLs, filenames of private videos (LG)

– Replace images/videos on screen (Philips)

• Tesla’s iPhone app, used to lock/unlock vehicle, vulnerable to brute-forcing

Infected

^

Page 15: 2014: Mid-Year Threat Review

IOiT: Routers and DVRs, etc.

• Residential gateway broadband routers under attack from worms like Win32/RBrute– DNS changing

• Browser injection– Ad injection substitution, spying, etc.

• Credential theft– bank fraud, shopping, social media, webmail …

• Search engine redirection– Bing, Google, Yahoo redirect to sponsored & PPC searches

– coin mining (DVR, NAS...)• Nowhere near as effective as PCs, but remember:

“Quantity has a quality all its own.” – Joseph Stalin

Page 16: 2014: Mid-Year Threat Review

IOiT: Routers and DVRs, etc.

[LIST OF AFFECTED VENDORS REDACTED]

To view this slide, please see the presentation at:

https://www.brighttalk.com/webcast/1718/110971

Page 17: 2014: Mid-Year Threat Review

IOiT: Routers and DVRs, etc.

Reminder:

1. Disable access to admin settings on LAN and wireless interfaces

2. Update firmware to latest version (manual check may be required-do not rely on autoupdate)

3. Use a str0ng password

Page 18: 2014: Mid-Year Threat Review

IOiT: Fighting router-based threats

Page 19: 2014: Mid-Year Threat Review

Internet of Things

Do you use any of these Internet connected devices?

Home Automation (thermostat, fire/CO2 alarms, X10, Zigbee, etc.)

Network Attached Storage (NAS) Next-gen gaming console Router / Wi-FI Access Point Smart TV and/or Digital Video Recorder

(DVR)

Infected

^

Page 20: 2014: Mid-Year Threat Review

Mac, iPad & iPhone an Apple a day…

No major campaigns targeting OS X & iOS, but…

• GotoFail, a critical SSL vulnerability is patched

• Targeted attacks continue, such as against Chinese and Tibetan advocacy groups

• Weird ransomware attacks target Australian and New Zealand iPhones, iPads & Macs

Page 21: 2014: Mid-Year Threat Review

Nation-state malware update

• OSX/Appetite trojan used against Falun Gong and Tibetan activists

• MiniDuke (aka Win32/SandaEva) continues to be used– Targets include European governments,

institutions and NGOs

• Use of Win32/Agent.VXU against Ministry of Natural Resources and the Environment in Vietnam (US equivalent: EPA)

Page 22: 2014: Mid-Year Threat Review

The Windigo Campaign…anything but Windows

• Started with investigation into Linux/Ebury– OpenSSH backdoor + credential stealer–Malicious library and patch to OpenSSH

binaries– Took several steps to avoid detection

• Includes Linux/Cdorked, Perl/Calfbot and Win32/Glupteba.M families

• Over 25,000 servers infected over past 2 years

• Affected Linux, FreeBSD, OpenBSD, Mac OS X– Plus some Windows servers running Perl +

Cygwin

Page 23: 2014: Mid-Year Threat Review

Windows XP reaches EOL status

• On April 8th, support ended for Windows XP– An update, MS14-021, released on 5/1/14 due

to extraordinary circumstances– One-time event, don’t expect it again

• Globally, 30% of PCs still running XP– Regionally, ranging from 11% to 61% usage

• If you’re still running XP:– Patch systems to final set of updates– Isolate– Figure out migration strategy now

Page 27: 2014: Mid-Year Threat Review

Resources: Internet of Things (1/4)

ESET’s We Live Security (blog)

• Attack on Samsung’s Boxee TV service leaks 158,000 passwords and emails

• Channel Cybercrime: Bug allows hackers to hijack screen of Philips TVs

• Fridge raiders: Will 2014 really be the year your smart home gets hacked?

• Hacker amasses $620,000 in cryptocurrency using infected computers

• LG admits that its Smart TVs have been watching users and transmitting data without consent

Page 28: 2014: Mid-Year Threat Review

Resources: Internet of Things (2/4)

ESET’s We Live Security (blog)

• ‘Major’ Smart TV vulnerability could allow mass wireless attacks

• More than 300,000 wireless routers hijacked by criminals in global attack

• Mysterious ‘Moon’ worm spreads into many Linksys routers – and hunts new victims

• Simplocker Ransomware: New variants spread by Android downloader apps

• Smart TVs can be infected with spyware – just like smartphones

Page 29: 2014: Mid-Year Threat Review

Resources: Internet of Things (3/4)

ESET’s We Live Security (blog)

• Stop TVs spying on us. U.S. Senator calls for safer Smart devices

• Surveillance cameras hijacked to mine Bitcoin while watching you

• Tesla shocker as researcher picks electric supercar’s lock

• The Internet of Things isn’t a malware-laced game of cyber-Cluedo… yet

• Win32/Sality newest component: a router’s primary DNS changer named Win32/Rbrute

Page 30: 2014: Mid-Year Threat Review

Resources: Internet of Things (4/4)

ESET’s Virus Radar (threat encyclopedia)

• Win32/Sality

• Win32/Rbrute

Page 31: 2014: Mid-Year Threat Review

Resources: Mac Malware

ESET’s We Live Security (blog)

• 10 years of Mac OS X malware

• Five tips to help control your privacy on Mac OS X

• iPhone and Apple ransom incidents? Don’t delay locking down your i-stuff

• Master of Mavericks: How to secure your Mac using Apple’s latest update

• Urgent iPhone and iPad security update, Mac OS X as well

ESET’s Virus Radar (threat encyclopedia)

• OSX/Appetite

Page 33: 2014: Mid-Year Threat Review

Resources: Windigo Campaign

ESET’s We Live Security (blog)

• An in-depth Analysis of Linux/Ebury

• Interview: Windigo victim speaks out on the ‘stealth’ malware that attacked his global company

• Operation Windigo – the vivisection of a large Linux server-side credential-stealing malware campaign

• Over 500,000 PCs attacked every day after 25,000 UNIX servers hijacked by Operation Windigo

• Windigo not Windigone: Linux/Ebury updatedESET research papers

• Operation Windigo (PDF)

Page 34: 2014: Mid-Year Threat Review

Resources: Windows XP EOL

ESET’s We Live Security (blog)

• 5 Tips for protecting Windows XP machines after April 8, 2014

• Goodbye, Windows XP!

• With just days to go, just how many PCs are still running Windows XP?

• Windows exploitation in 2013

• XP-diency: beyond the end of the line

Page 35: 2014: Mid-Year Threat Review

Special Thanks

Kudos to

Bruce P. BurrellDavid HarleyAmelia HewEmilio PlumeyJavier SeguraAaron SheinbeinMarek Zeman

for their assistance with the ESET 2014 Mid Year Threat Report!

Page 36: 2014: Mid-Year Threat Review

I would like to request one of the following

Contact from ESET SalesBusiness Edition TrialPassMark® Competitive Analysis ReportMonthly Global Threat Report

Polling question:

Page 37: 2014: Mid-Year Threat Review

Q&A Discussion

Page 38: 2014: Mid-Year Threat Review