13
WYSI WYG Peter Stancik Security Evangelist n

WYSI WYG Peter Stancik Security Evangelist. Infection vectors Blackhat SEO Social engineering Drive-by download SPAM Social networks

Embed Size (px)

Citation preview

Page 1: WYSI WYG Peter Stancik Security Evangelist. Infection vectors Blackhat SEO Social engineering Drive-by download SPAM Social networks

WYSI WYG

Peter Stancik Security Evangelist

n

Page 2: WYSI WYG Peter Stancik Security Evangelist. Infection vectors Blackhat SEO Social engineering Drive-by download SPAM Social networks

What you see is not what you get

Page 3: WYSI WYG Peter Stancik Security Evangelist. Infection vectors Blackhat SEO Social engineering Drive-by download SPAM Social networks

What you see is not what you get

Page 4: WYSI WYG Peter Stancik Security Evangelist. Infection vectors Blackhat SEO Social engineering Drive-by download SPAM Social networks

Infection vectors

Blackhat SEO

Social engineering

Drive-by download

SPAM

Social networks

Page 5: WYSI WYG Peter Stancik Security Evangelist. Infection vectors Blackhat SEO Social engineering Drive-by download SPAM Social networks

Blackhat SEO

Page 6: WYSI WYG Peter Stancik Security Evangelist. Infection vectors Blackhat SEO Social engineering Drive-by download SPAM Social networks

Social networks

Page 7: WYSI WYG Peter Stancik Security Evangelist. Infection vectors Blackhat SEO Social engineering Drive-by download SPAM Social networks

What do I get (instead)?

Banking Trojans

Something “special” from the grey zone…

Scareware …Rogue AVs, Registry Cleaners

…with mobile components

…etc…

Page 8: WYSI WYG Peter Stancik Security Evangelist. Infection vectors Blackhat SEO Social engineering Drive-by download SPAM Social networks

Banking Trojans

Page 9: WYSI WYG Peter Stancik Security Evangelist. Infection vectors Blackhat SEO Social engineering Drive-by download SPAM Social networks

• Man-in-the-Browser• Man-in-the-Mobile

Scenario:1. Steal credentials using MitB2. Infect victim’s mobile phone – MitMo3. Log in using stolen credentials; perform transaction4. Mobile malware forwards authentication SMS to attacker5. Fill in authentication code and complete transaction

Zeus and now SpyEye: detected as SymbOS/Spitmo

*pictures from http://securityblog.s21sec.com/2010/09/zeus-mitmo-man-in-mobile-ii.html

Banking Trojans

Page 10: WYSI WYG Peter Stancik Security Evangelist. Infection vectors Blackhat SEO Social engineering Drive-by download SPAM Social networks

Rogue AV

Page 11: WYSI WYG Peter Stancik Security Evangelist. Infection vectors Blackhat SEO Social engineering Drive-by download SPAM Social networks

DNS Changer

Page 12: WYSI WYG Peter Stancik Security Evangelist. Infection vectors Blackhat SEO Social engineering Drive-by download SPAM Social networks

CA Breaches

Page 13: WYSI WYG Peter Stancik Security Evangelist. Infection vectors Blackhat SEO Social engineering Drive-by download SPAM Social networks

Thank you!

[email protected] blog.eset.com