threat predictions 2011
TRANSCRIPT
![Page 1: Threat predictions 2011](https://reader038.vdocuments.us/reader038/viewer/2022102322/54bfc8e74a795969098b45af/html5/thumbnails/1.jpg)
Copyright 2009 Trend Micro Inc.
Trend Micro Threat Predictions for 2011
Classification 05/03/2023 1
![Page 2: Threat predictions 2011](https://reader038.vdocuments.us/reader038/viewer/2022102322/54bfc8e74a795969098b45af/html5/thumbnails/2.jpg)
Copyright 2009 Trend Micro Inc.
Threats Today
Classification 05/03/2023 2
FACT #1:More than 80% of Today’s Top Malware Arrives via Web1
1 – source TrendLabs data Apr – Sept 20102 – source Trend Micro Smart Protection Network
FACT #2:3.5 new threats every second are released by cybercriminals2
![Page 3: Threat predictions 2011](https://reader038.vdocuments.us/reader038/viewer/2022102322/54bfc8e74a795969098b45af/html5/thumbnails/3.jpg)
Copyright 2009 Trend Micro Inc.
The Power of Trend Micro Smart Protection Network• 60 billion queries every 24 hours
• Blocks 5.5 billion threats daily
• Processes 3.2 terabytes of data daily
• An average 102 million users connected to the network each day
Classification 05/03/2023 3
![Page 4: Threat predictions 2011](https://reader038.vdocuments.us/reader038/viewer/2022102322/54bfc8e74a795969098b45af/html5/thumbnails/4.jpg)
Copyright 2009 Trend Micro Inc.
Prediction #1 – Cloud-related issues• Security Demands on cloud service providers
will increase
– Proof of concept attacks against cloud infrastructure
and virtualized systems will emerge in 2011
– Diversity of Operating Systems at the endpoints
forces the bad guys to focus more on critical cloud
services and server infrastructures
Classification 05/03/2023 4
![Page 5: Threat predictions 2011](https://reader038.vdocuments.us/reader038/viewer/2022102322/54bfc8e74a795969098b45af/html5/thumbnails/5.jpg)
Copyright 2009 Trend Micro Inc.
Prediction #2 – Targeted Attacks and Cyber-Espionage• Mid-sized companies will be targeted in cyber-
espionage
– Easy-to-use underground toolkits enable targeted
attacks on particular types of organization
• ZeuS primarily targeted small businesses in 2010
– Growth of targeted and localized attacks will
continue both against big name brands and/or
critical infrastructure
Classification 05/03/2023 5
![Page 6: Threat predictions 2011](https://reader038.vdocuments.us/reader038/viewer/2022102322/54bfc8e74a795969098b45af/html5/thumbnails/6.jpg)
Copyright 2009 Trend Micro Inc.
Prediction #3 – The Cybercrime Underground Evolution• Further consolidation in the cybercrime
underground
– Groups merge and/or join forces as global, public
attention for cyber attacks grows
• Example: ZeuS / SpyEye
Classification 05/03/2023 6
![Page 7: Threat predictions 2011](https://reader038.vdocuments.us/reader038/viewer/2022102322/54bfc8e74a795969098b45af/html5/thumbnails/7.jpg)
Copyright 2009 Trend Micro Inc.
Prediction #4 – Clever Malware Campaigning• It’s all about social engineering. • Fewer infiltrated websites, more cleverly
crafted and localized HTML e-mails with URL’s pointing to the infection source– Malware campaigning will ensure fast and reliable
spreading of the downloader – The downloader then downloads randomly
generated binaries to avoid detection
Classification 05/03/2023 7
![Page 8: Threat predictions 2011](https://reader038.vdocuments.us/reader038/viewer/2022102322/54bfc8e74a795969098b45af/html5/thumbnails/8.jpg)
Copyright 2009 Trend Micro Inc.
Prediction #5 – Malware Attacks• Increasing use of stolen or legitimate digital
certificates in malware attacks, to avoid detection
• Huge growth in use of complex domain generation algorithms (as used by Conficker & LICAT) in Advanced Persistent Threats, and increase in Java-based attacks
Classification 05/03/2023 8
![Page 9: Threat predictions 2011](https://reader038.vdocuments.us/reader038/viewer/2022102322/54bfc8e74a795969098b45af/html5/thumbnails/9.jpg)
Copyright 2009 Trend Micro Inc.
Prediction #6 – Focus for Vulnerabilities and Exploits• Growth in exploits for alternative operating
systems, programs and web browsers, combined with tremendous growth in the use of application vulnerabilities (Flash, etc)
Classification 05/03/2023 9
![Page 10: Threat predictions 2011](https://reader038.vdocuments.us/reader038/viewer/2022102322/54bfc8e74a795969098b45af/html5/thumbnails/10.jpg)
Copyright 2009 Trend Micro Inc.
Prediction #7 – Security Vendors Become Targets• Security vendors’ brands will increasingly be
targeted by criminalsResult: Confusion and insecurity among users
Classification 05/03/2023 10
![Page 11: Threat predictions 2011](https://reader038.vdocuments.us/reader038/viewer/2022102322/54bfc8e74a795969098b45af/html5/thumbnails/11.jpg)
Copyright 2009 Trend Micro Inc.
Prediction #8 – Mobile Risks• More proof of concept, and some successful
attacks on mobile devices, but not yet mainstream
• Cybercriminals will explore profitability of mobile device attacks, but monoculture is required before such attacks become mainstream
Classification 05/03/2023 11
![Page 12: Threat predictions 2011](https://reader038.vdocuments.us/reader038/viewer/2022102322/54bfc8e74a795969098b45af/html5/thumbnails/12.jpg)
Copyright 2009 Trend Micro Inc.
Prediction #9 – Old Malware Reinfections• Some security vendors will run into trouble
with local signatures not being able to store all the threat information
– They will retire old signatures which will lead to
infections with old/outdated malware
Classification 05/03/2023 12
![Page 13: Threat predictions 2011](https://reader038.vdocuments.us/reader038/viewer/2022102322/54bfc8e74a795969098b45af/html5/thumbnails/13.jpg)
Copyright 2009 Trend Micro Inc.
Prediction #10 – Vulnerable Legacy Systems• Targeted attacks on “unpatchable” (but widely
used) legacy systems
– Windows 2000/Windows XP SP2
– Embedded systems like Telecom switchboards etc.
Classification 05/03/2023 13
![Page 14: Threat predictions 2011](https://reader038.vdocuments.us/reader038/viewer/2022102322/54bfc8e74a795969098b45af/html5/thumbnails/14.jpg)
Copyright 2009 Trend Micro Inc.
THANK YOU!
Classification 05/03/2023 14