13.07.2015 Views

hp-security-research-cyber-risk-report-pdf-2-w-1408

hp-security-research-cyber-risk-report-pdf-2-w-1408

hp-security-research-cyber-risk-report-pdf-2-w-1408

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

HP Security Research | Cyber Risk Report 2015Notable malwareRansomwareAlthough the concept of ransomware goes back to the days of the DOS operating system, it is onlyin the last couple of years that it has become a contender to fake or rogue anti-virus software inprevalence and the potential to cause damage to victims’ data.Perhaps the most notable ransomware is CryptoLocker, which appeared at the end of 2013 andcaused a lot of damage to end users and organizations until the FBI’s operation Tovar 76 disrupted itsdistribution channel and brought down a large Gameover Zeus botnet.Nevertheless, the business model in which users’ data is held for ransom by malware usingasymmetric encryption algorithms to encrypt it has spurned a number of copycats, withCryptoWall 77 being the most well-known.In addition to the ransomware that actually encrypts the data (so that the only way to recover is torestore it from unaffected backup media), another class of malware that simply locks user accessto the operating system (e.g., Reveton 78 ) or to the Web browser (e.g., Krypterade 79 ) is also veryprevalent but thankfully much easier to remove.Ransomware threats are here to stay and organizations must have a sound backup and restorepolicy in place for all business data in order to mitigate the potentially destructive effects of asuccessful attack. Not much detail is known about individuals and organizations that resort to thelast desperate step of paying attackers the money, nor whether the required data (or the privatekey required for decryption) is delivered to victims after the ransom money is paid. Judging by theprevalence of ransomware threats, however, this <strong>cyber</strong>-criminal business model appears to bequite successful.76http://www.fbi.gov/news/pressrel/press-releases/u.s.-leads-multi-nationalaction-against-gameover-zeus-botnetand-cryptolocker-ransomware-chargesbotnet-administrator.77http://www.symantec.com/<strong>security</strong>_response/writeup.jsp?docid=2014-061923-2824-99.78http://krebson<strong>security</strong>.com/2012/08/insidea-reveton-ransomware-operation/.79http://www.microsoft.com/<strong>security</strong>/portal/threat/Encyclopedia/Entry.aspx?Name=Ransom:JS/Krypterade.A#tab=2.80http://www.langner.com/en/wp-content/uploads/2013/11/To-kill-a-centrifuge.<strong>pdf</strong>.81http://securelist.com/analysis/publications/67483/stuxnet-zero-victims/.82http://www.symantec.com/content/en/us/enterprise/media/<strong>security</strong>_response/whitepapers/regin-analysis.<strong>pdf</strong>.High-complexity malwareThe best-known example of high-complexity malware is Stuxnet, 80 which was designed to attackindustrial systems, particularly centrifuges used for the enrichment of uranium in the IranianNatanz fuel enrichment plant. Malware such as Stuxnet poses a lot of questions for a malware<strong>research</strong>er. Some questions are never answered, and some are answered only after lengthy,iterative <strong>research</strong>, where even the smallest clues are followed. In the case of Stuxnet, new detailswere revealed 81 in 2014, almost four years after the malware was first discovered by the malware<strong>research</strong> community.The year 2014 marked the discovery of another highly complex malware suspected to be developedby an organized and well-funded group of developers—Regin. 82 Regin is a multi-componentmalware designed as a framework that allows for the creation of multiple plugins. Regin employssophisticated hiding methods and encrypted virtual file systems, and was designed for the purposeof <strong>security</strong> intelligence gathering by continuously monitoring individuals and organizations. It mayhave been in use since 2008, but the first samples were discovered by Symantec and Kaspersky<strong>research</strong>ers as recently as 2013. The <strong>research</strong> shows that many components of Regin are not yetdiscovered and additional functionality and versions may exist in the wild.Once again, this supports our conclusion that a skilled attacker will be able to penetrate alltraditional levels of defense and maintain access to victim systems by choosing attack tools thatwill not show up on the radar of anti-malware and other protections.27

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!