2021在不确定的世界中驾驭网络安全.docx
《2021在不确定的世界中驾驭网络安全.docx》由会员分享,可在线阅读,更多相关《2021在不确定的世界中驾驭网络安全.docx(39页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、CONTENTSTHE POWER OF SHARING2EXECUTIVE SUMMARY3THE FUTURE OF RANSOMWARE5Data theft creates a secondary extortion market5Ransoms rise as attacks increase7Days-in-the-life of a ransomware rapid responder9EVERYDAY THREATS TO ENTERPRISES - CANARIES IN THE COALMINE10Attacks targeting Windows & Linux serv
2、ers10Underestimate “commodity” malware at your peril12Delivery mechanisms14Information security: A 20-year retrospective18COVID-19 AS A FORCE-MULTIPLIER IN ATTACKS20Home is the new perimeter20Crimeware as a service21Spam, scams, and broken promises22Remote work raises the importance of secure cloud
3、computing25What the CCTC means for a rapid response to large scale threats27NOT LETTING YOUR GUARD DOWN: THREATS VIA NONTRADITIONAL PLATFORMS28Android Joker malware growing in volume28Ads & PUAs increasingly indistinguishable from malware29Using your own strengths against you: Criminal abuse of secu
4、rity tools31Digital epidemiology33EVERYDAY THREATS TO ENTERPRISES - CANARIES IN THE COAL MINEAttacks targeting Windows & Linux servers* - SFX ZIP volume unpacked 10,501,489 bytesU n$a.zipna dll- ETERNALBIUEETERNAlCHAMPlOh* ETERNAIROMANC6.RERNALSYNERGY上Idllj. ETERNALBIUE ETERNALCHAMPION HERNAIROMANCE
5、 ETERNALSYNERGYPath=c:windows Sxlent=l Overwrite=liDjpdaSRlIdownShets, m.exe To cwilhamst- -w- - i .QOther Actions Hello Christopher,I am in a closed-Door meeting at the moment,I need you to handle a short task. Reply with your cells.Thankssophos labsIn this real-world example of a business-email co
6、mpromise attempt, the fraudster poses as an executive asking an employee to respond to an urgent request. The email has a different Reply-To address (from a Gmail account) than the one in the From: header, a dead giveaway that something is awry - if the target is paying attention to the mail headers
7、. Source: SophosLabs.From les, 一 下,Reply Reply All ForwardSubject REQUEST8/20/2020 2:23 AMTo alasdairOther Actions -Hello Alasdair,I am planning a surprise for some of the staffs with gift cards and your confidentiality would be appreciated in order not to ruin the surprise. Are you available to get
8、 some purchase done?RegardsLesSent from my iPhonesophos labsFig. 10. After the target has acknowledged the initial request, the fraudster makes the “ask - providing a pretext that appears plausible. Source: SophosLabs.From-ul: e:- RE:Expense To Reply Reply All ,Forward 9/16/2020 8JOAM Other Actions
9、I need you to make a purchase. I am looking you to keep it between us till they get it. need 5 pieces of it amounting to $S00. Keep for reimbursement.to surprise some of the staff with gift cards today. I want I need Steam wallet gift card of $100 face value each, i each cards and receipt carefully
10、so you can expense themGet the physical card at a local store then attach the scanned pictures showing the pinyou scratch the back out and scan them or take pictures and and email it to me.Can you get on this right away?Thanks.sophos labsFig.11. At some point during the attack, the BEC scammer will
11、make a request that flies in the face of common sense, like a request to make a sudden, large wire transfer to an account unfamiliar to the scams target. This provides another opportunity for a wary staffer to question the nature of the request: Why would the executive need a photograph of the back
12、of a gift card with the PIN scratched off when they*re going to be handed out as gifts? Source: SophosLabs.Weird science: retro Office glitch strikes againSOPHOS 2021 THREAT REPORTInformation security: A 20-year retrospectiveWhile an annual report gives us an opportunity to look back at significant
13、events of the past year, we thought a look further back - at the past two decades - would provide context for how we arrived in our current threat landscape. The turn of the millennium marked a milestone, when information security became a professional discipline and a bona fide industry. This timel
14、ine of threats and events represent significant, representative moments in the evolution of threat behavior.As both enterprises and individuals adopted the internet for both business and entertainment, large networks were ripe targets for the emergence of prolific worms - self-propagating malware. C
15、umulatively, worms infected tens of millions of systems worldwide and cost over $100 billion in damages and remediation costs.2000-2004The Worm Era2000ILOVEYOU2000ILOVEYOUJuly2001CodeRedJanuary2003SQLSlammerJanuary2004BagleAugustAugustJanuary200120032004CodeRed IIBlasterMyDoomAugust2003SobigApril200
16、4SasserSeptemberAugustFebruary200120032004NimdaWelchiaNetsky2013CryptoLockerOctober2003Sober2005-2012The Malware Monetization Era20062007200820092010Blackhole exploit kit2011Rx SpamStormConfickerStuxnetMalvertising2013-PresentThe Ransomware Era2013Snowden leaks2014Point-of-sale (POS) malware2016Mira
17、iMay 2017 WannaCry2018Magecart attacks2019Extortion ransomware2020APT tactics by threat actors2007ZeusJune 2017 NotPetyaSOPHOSFig.12. Source: Sophos1818November 2020SOPHOS 2021 THREAT REPORT2000-2004 - The Worm era2000-I LOVE YOUThe ILOVEYOU worm used a social engineering trick that persists even to
18、day: It arrived as a spam email attachment, eventually infecting about 10% of all internet-connected Windows computers.July 2001 - CodeRedNamed after the flavor of Mountain Dew its discoverers were drinking at the time, CodeRed used a buffer overflow vulnerability in IIS to spread itself and deface
19、websites. It was followed a month later by an upgraded version that installed a backdoor on networked computers.August 2001 - CodeRed IISeptember 2001 - NimdaJanuary 2003 - SQL SlammerAt only 376 bytes, Slammer exploited a buffer overflow in Microsoft database applications. Doubling its infections e
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 2021 不确定 世界 驾驭 网络安全
限制150内