18
Evolving with the threats Alexander Hägglund Sales Engineer – Nordics & Baltics

Evolving with the threats - ATEA€¦ · $2.3B 2007 $800M 2014 Locky Ransomware $1.1B 2016 FinFischer Spyware 2003 $780M Exploit as a Service $500M 2015 TRADITIONAL MALWARE ADVANCED

  • Upload
    others

  • View
    8

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Evolving with the threats - ATEA€¦ · $2.3B 2007 $800M 2014 Locky Ransomware $1.1B 2016 FinFischer Spyware 2003 $780M Exploit as a Service $500M 2015 TRADITIONAL MALWARE ADVANCED

Evolving with the threats

Alexander HägglundSales Engineer – Nordics & Baltics

Page 2: Evolving with the threats - ATEA€¦ · $2.3B 2007 $800M 2014 Locky Ransomware $1.1B 2016 FinFischer Spyware 2003 $780M Exploit as a Service $500M 2015 TRADITIONAL MALWARE ADVANCED

Evolution of IoT

Page 3: Evolving with the threats - ATEA€¦ · $2.3B 2007 $800M 2014 Locky Ransomware $1.1B 2016 FinFischer Spyware 2003 $780M Exploit as a Service $500M 2015 TRADITIONAL MALWARE ADVANCED

3

Melissa Virus

1998

$1.2B

Love LetterWorm

$15B

1999

$2.3B

2007

$800M

2014

LockyRansomware

$1.1B

2016

FinFischerSpyware

2003

$780M

Exploit as aService

$500M

2015

TRADITIONAL MALWARE ADVANCED THREATS

The Evolution of Endpoint ThreatsFrom Malware to Exploits

2009 - INTRODUCTION OF POLYPACK

“CRIMEWARE AS A SERVICE”

Page 4: Evolving with the threats - ATEA€¦ · $2.3B 2007 $800M 2014 Locky Ransomware $1.1B 2016 FinFischer Spyware 2003 $780M Exploit as a Service $500M 2015 TRADITIONAL MALWARE ADVANCED

Traditional Malware Advanced Threats

The Evolution of Endpoint SecurityFrom Anti-Malware to Anti-Exploit to Next-Generation

Exposure Prevention

URL BlockingWeb Scripts

Download Rep

Pre-Exec Analytics

Generic MatchingHeuristicsCore Rules

Signatures

Known MalwareMalware Bits

Run-Time

SignaturelessBehavior AnalyticsRuntime Behavior

Exploit Detection

Technique Identification

Page 5: Evolving with the threats - ATEA€¦ · $2.3B 2007 $800M 2014 Locky Ransomware $1.1B 2016 FinFischer Spyware 2003 $780M Exploit as a Service $500M 2015 TRADITIONAL MALWARE ADVANCED

Exponential growth in new malware27% of all malware variants in history were created in the last 12 months

0

100000

200000

300000

400000

500000

600000

700000

800000

2007 2008 2009 2010 2011 2012 2013 2014 2015 2016

Total Malware (AV-Test)

Page 6: Evolving with the threats - ATEA€¦ · $2.3B 2007 $800M 2014 Locky Ransomware $1.1B 2016 FinFischer Spyware 2003 $780M Exploit as a Service $500M 2015 TRADITIONAL MALWARE ADVANCED

Machine learning – Is it the answer?

Page 7: Evolving with the threats - ATEA€¦ · $2.3B 2007 $800M 2014 Locky Ransomware $1.1B 2016 FinFischer Spyware 2003 $780M Exploit as a Service $500M 2015 TRADITIONAL MALWARE ADVANCED

Machine Learning: Image Recognition

Page 8: Evolving with the threats - ATEA€¦ · $2.3B 2007 $800M 2014 Locky Ransomware $1.1B 2016 FinFischer Spyware 2003 $780M Exploit as a Service $500M 2015 TRADITIONAL MALWARE ADVANCED

Machine Learning Framework – Image Recognition

8

= “cat”

= “tomato”

= “apple”

Page 9: Evolving with the threats - ATEA€¦ · $2.3B 2007 $800M 2014 Locky Ransomware $1.1B 2016 FinFischer Spyware 2003 $780M Exploit as a Service $500M 2015 TRADITIONAL MALWARE ADVANCED

Machine Learning for Malware Detection

9

= “bad program” aka malware

= “good program” aka benignware

Page 10: Evolving with the threats - ATEA€¦ · $2.3B 2007 $800M 2014 Locky Ransomware $1.1B 2016 FinFischer Spyware 2003 $780M Exploit as a Service $500M 2015 TRADITIONAL MALWARE ADVANCED

Why Deep Learning?

10

Page 11: Evolving with the threats - ATEA€¦ · $2.3B 2007 $800M 2014 Locky Ransomware $1.1B 2016 FinFischer Spyware 2003 $780M Exploit as a Service $500M 2015 TRADITIONAL MALWARE ADVANCED

Machine Learning Vs. Deep Learning

11

DEE

P L

EAR

NIN

G

Interconnected Layers of Neurons, Each Identifying More Complex Features

INPUT OUTPUT

OUTPUT

MA

CH

INE

LEA

RN

ING

Decision Tree

INPUT

Random Forest

OUTPUTINPUT

Sophos Confidential

Page 12: Evolving with the threats - ATEA€¦ · $2.3B 2007 $800M 2014 Locky Ransomware $1.1B 2016 FinFischer Spyware 2003 $780M Exploit as a Service $500M 2015 TRADITIONAL MALWARE ADVANCED

We’re secure now, right?

Page 13: Evolving with the threats - ATEA€¦ · $2.3B 2007 $800M 2014 Locky Ransomware $1.1B 2016 FinFischer Spyware 2003 $780M Exploit as a Service $500M 2015 TRADITIONAL MALWARE ADVANCED
Page 14: Evolving with the threats - ATEA€¦ · $2.3B 2007 $800M 2014 Locky Ransomware $1.1B 2016 FinFischer Spyware 2003 $780M Exploit as a Service $500M 2015 TRADITIONAL MALWARE ADVANCED

Haha! All your files are encrypted!

Give me money!

Let‘s see what we can find here..

Information is more valuable

Page 15: Evolving with the threats - ATEA€¦ · $2.3B 2007 $800M 2014 Locky Ransomware $1.1B 2016 FinFischer Spyware 2003 $780M Exploit as a Service $500M 2015 TRADITIONAL MALWARE ADVANCED
Page 16: Evolving with the threats - ATEA€¦ · $2.3B 2007 $800M 2014 Locky Ransomware $1.1B 2016 FinFischer Spyware 2003 $780M Exploit as a Service $500M 2015 TRADITIONAL MALWARE ADVANCED

Social Engineering – One of the biggest threats

Social Engineering bypasses all technologies, including firewalls.

– Kevin Mitnick

Page 17: Evolving with the threats - ATEA€¦ · $2.3B 2007 $800M 2014 Locky Ransomware $1.1B 2016 FinFischer Spyware 2003 $780M Exploit as a Service $500M 2015 TRADITIONAL MALWARE ADVANCED
Page 18: Evolving with the threats - ATEA€¦ · $2.3B 2007 $800M 2014 Locky Ransomware $1.1B 2016 FinFischer Spyware 2003 $780M Exploit as a Service $500M 2015 TRADITIONAL MALWARE ADVANCED

Educate your users!