SNW EUROPE; DATACENTER TECHNOLOGIES;...

19
POWERING THE CLOUD : 30 th 31 st October 2012, Congress Frankfurt SNW EUROPE; DATACENTER TECHNOLOGIES; VIRTUALIZATION WORLD #ptc #SNWEurope #vw #dct Physical or Virtual. On premise or in the cloud. An endpoint is an endpoint is an endpoint: and needs proper protection. Presented by Peter Beardmore, Senior Director of Product Marketing, Kaspersky Lab Session reference KN16 for your feedback forms

Transcript of SNW EUROPE; DATACENTER TECHNOLOGIES;...

Page 1: SNW EUROPE; DATACENTER TECHNOLOGIES; …files.vogel.de/vogelonline/vogelonline/companyfiles/5903.pdfSNW EUROPE; DATACENTER TECHNOLOGIES; VIRTUALIZATION WORLD #ptc #SNWEurope #vw #dct

POWERING THE CLOUD : 30th – 31st October 2012, Congress Frankfurt

SNW EUROPE; DATACENTER TECHNOLOGIES; VIRTUALIZATION WORLD

#ptc #SNWEurope #vw #dct

Physical or Virtual. On premise or in the cloud. An endpoint is an

endpoint is an endpoint: and needs proper protection.

Presented by Peter Beardmore, Senior Director of Product Marketing,

Kaspersky Lab

Session reference KN16 for your feedback forms

Page 2: SNW EUROPE; DATACENTER TECHNOLOGIES; …files.vogel.de/vogelonline/vogelonline/companyfiles/5903.pdfSNW EUROPE; DATACENTER TECHNOLOGIES; VIRTUALIZATION WORLD #ptc #SNWEurope #vw #dct

Physical or Virtual.

On premise or in the cloud.

An endpoint is an endpoint is an endpoint:

and needs proper protection.

Page 3: SNW EUROPE; DATACENTER TECHNOLOGIES; …files.vogel.de/vogelonline/vogelonline/companyfiles/5903.pdfSNW EUROPE; DATACENTER TECHNOLOGIES; VIRTUALIZATION WORLD #ptc #SNWEurope #vw #dct

Malware attacks at a glance

PAGE 3 |

• Over 125,000 new malicious samples found every day

• Currently over 8 Million signatures in our AV database

Page 4: SNW EUROPE; DATACENTER TECHNOLOGIES; …files.vogel.de/vogelonline/vogelonline/companyfiles/5903.pdfSNW EUROPE; DATACENTER TECHNOLOGIES; VIRTUALIZATION WORLD #ptc #SNWEurope #vw #dct

Four Main Actors

PAGE 4 |

• Cyber criminals (financially motivated)

• Hacktivists

• APT (targeted attacks against businesses)

• Nation-state cyber-espionage

Page 5: SNW EUROPE; DATACENTER TECHNOLOGIES; …files.vogel.de/vogelonline/vogelonline/companyfiles/5903.pdfSNW EUROPE; DATACENTER TECHNOLOGIES; VIRTUALIZATION WORLD #ptc #SNWEurope #vw #dct

Attacking consumers

PAGE 5 |

• Vast majority of attacks via the web

• Java has taken over as preferred target of exploitation

• Cyber-crime market has matured

• Fake AV, Ransomware and banker malware for the most part

• VM-aware

Page 6: SNW EUROPE; DATACENTER TECHNOLOGIES; …files.vogel.de/vogelonline/vogelonline/companyfiles/5903.pdfSNW EUROPE; DATACENTER TECHNOLOGIES; VIRTUALIZATION WORLD #ptc #SNWEurope #vw #dct

Targeting businesses in general

PAGE 6 |

• Better ROI

• Network worms

• Extremely persistent

• Use of stolen certificates

• Post-Stuxnet trend

• Privilege escalation exploits

Page 7: SNW EUROPE; DATACENTER TECHNOLOGIES; …files.vogel.de/vogelonline/vogelonline/companyfiles/5903.pdfSNW EUROPE; DATACENTER TECHNOLOGIES; VIRTUALIZATION WORLD #ptc #SNWEurope #vw #dct

VM(M) in sight

PAGE 7 |

• Just recently…

Page 8: SNW EUROPE; DATACENTER TECHNOLOGIES; …files.vogel.de/vogelonline/vogelonline/companyfiles/5903.pdfSNW EUROPE; DATACENTER TECHNOLOGIES; VIRTUALIZATION WORLD #ptc #SNWEurope #vw #dct

It doesn’t stop here

PAGE 8 |

Page 9: SNW EUROPE; DATACENTER TECHNOLOGIES; …files.vogel.de/vogelonline/vogelonline/companyfiles/5903.pdfSNW EUROPE; DATACENTER TECHNOLOGIES; VIRTUALIZATION WORLD #ptc #SNWEurope #vw #dct

It’s an ongoing trend…

PAGE 9 |

Page 10: SNW EUROPE; DATACENTER TECHNOLOGIES; …files.vogel.de/vogelonline/vogelonline/companyfiles/5903.pdfSNW EUROPE; DATACENTER TECHNOLOGIES; VIRTUALIZATION WORLD #ptc #SNWEurope #vw #dct

Let’s go back a bit more

PAGE 10 |

Page 11: SNW EUROPE; DATACENTER TECHNOLOGIES; …files.vogel.de/vogelonline/vogelonline/companyfiles/5903.pdfSNW EUROPE; DATACENTER TECHNOLOGIES; VIRTUALIZATION WORLD #ptc #SNWEurope #vw #dct

Increased focus started a while ago

PAGE 11 |

Page 12: SNW EUROPE; DATACENTER TECHNOLOGIES; …files.vogel.de/vogelonline/vogelonline/companyfiles/5903.pdfSNW EUROPE; DATACENTER TECHNOLOGIES; VIRTUALIZATION WORLD #ptc #SNWEurope #vw #dct

‘APT’ – Advanced Persistent Threats

PAGE 12 |

• Very organized, very targeted

• Sometimes sophisticated, sometimes rudimentary

• E-mail is preferred delivery mechanism – malicious PDF, Word .doc

• Flash files inside PDF and Office documents very popular

Page 13: SNW EUROPE; DATACENTER TECHNOLOGIES; …files.vogel.de/vogelonline/vogelonline/companyfiles/5903.pdfSNW EUROPE; DATACENTER TECHNOLOGIES; VIRTUALIZATION WORLD #ptc #SNWEurope #vw #dct

Levels of attackers

PAGE 13 |

Top tier

• All own code, introducing brand new zero-day

Second tier

• Re-used code, new zero-day

Third tier

• Re-used code, re-used zero-day

Fourth tier

• All old stuff (usage of patched vulnerabilities)

Page 14: SNW EUROPE; DATACENTER TECHNOLOGIES; …files.vogel.de/vogelonline/vogelonline/companyfiles/5903.pdfSNW EUROPE; DATACENTER TECHNOLOGIES; VIRTUALIZATION WORLD #ptc #SNWEurope #vw #dct

Remember the RSA attack?

Page 15: SNW EUROPE; DATACENTER TECHNOLOGIES; …files.vogel.de/vogelonline/vogelonline/companyfiles/5903.pdfSNW EUROPE; DATACENTER TECHNOLOGIES; VIRTUALIZATION WORLD #ptc #SNWEurope #vw #dct

Even the nation-state attacks (Duqu)

Page 16: SNW EUROPE; DATACENTER TECHNOLOGIES; …files.vogel.de/vogelonline/vogelonline/companyfiles/5903.pdfSNW EUROPE; DATACENTER TECHNOLOGIES; VIRTUALIZATION WORLD #ptc #SNWEurope #vw #dct

VM(M)-specific security scenarios

PAGE 16 |

• Privilege Escalation / Escape to host

• Network traffic sniffing

• Lost audit trails

• Everything still has to be patched

• Mostly future threats

• Innovation spurred on by security researchers and APT

Page 17: SNW EUROPE; DATACENTER TECHNOLOGIES; …files.vogel.de/vogelonline/vogelonline/companyfiles/5903.pdfSNW EUROPE; DATACENTER TECHNOLOGIES; VIRTUALIZATION WORLD #ptc #SNWEurope #vw #dct

Just a couple months ago…

| 31 October 2012 Kaspersky Lab PowerPoint Template PAGE 17 |

Page 18: SNW EUROPE; DATACENTER TECHNOLOGIES; …files.vogel.de/vogelonline/vogelonline/companyfiles/5903.pdfSNW EUROPE; DATACENTER TECHNOLOGIES; VIRTUALIZATION WORLD #ptc #SNWEurope #vw #dct

Conclusions

PAGE 18 |

• There’s no significant difference between the VM and real world

• For non-targeted attacks security through obscurity works

• Being second worst is no longer a valid tactic

• All the signs point toward more VM-specific attacks

Page 19: SNW EUROPE; DATACENTER TECHNOLOGIES; …files.vogel.de/vogelonline/vogelonline/companyfiles/5903.pdfSNW EUROPE; DATACENTER TECHNOLOGIES; VIRTUALIZATION WORLD #ptc #SNWEurope #vw #dct

Thank You

www.ThreatPost.com