How to kill a plant

Post on 10-May-2022

3 views 0 download

Transcript of How to kill a plant

Per SöderqvistSales EngineerPer Söderqvist

Senior Team leader – Sales Engineer

“How to kill a plant”

RansomwareFirst Wave

Ransomware First Wave

Cryptolocker

Locky

Cryptowall

TorrentLocker

CryptoMix

HydraCrypt

UmbreCrypt AlphaCrypt

Locker Cerber

TeslaCrypt

My Top 3 list

Ransomware

The Popcorn Ransomware

ThunderCrypt

RansomwareSecond Wave

WannaCry / NotPetya

RansomwareThird Wave

?

11

Problems with IoT

12

• Security is expensive therefore not many suppliers of IoT devices invest in that.

• Demand for IoT devices has increased so much that the suppliers rush the product on to the market.

• No common platform/OS or API, that could be used to protect these devices

IoT - Mirai botnet

• “In September 2016, hackers used 152,000 consumer IoT devices to initiate a distributed denial of service (DDoS) attack on French hosting provider OVH. They were able to inundate the company with 1Tbps of traffic, causing mayhem for customers around the world.”

• The Mirai botnet was first found in August 2016 by MalwareMustDie, a whitehat malware research group

14

Bluetooth – BlueBorne exploit

15

• Doesn't even need to pair their device with that of the victim.• exploit cleverly attacks portions of the software needed to establish a

connection to hijack the Bluetooth stack itself

• Currently not in the Wild.

• Apple, Google, and Microsoft have all patched the exploit.

Bluetooth Low Energy aka Bluetooth Smart

16

• Toothbrushes• Lamps• Alarm clocks• Coffee makers• Headphones

• Speakers some with built in Microphone• Smart Watches• Medical devices• Alarms• Door locks• Padlocks• etc

Demo

Internet Of Things will not go away!

Next Generation of Security

Evolution of Client Security – The game of Cat and Mouse

1971

First Malware

“First” Ransomware

Cloud based lookup

First Polymorphic

malware

2011 2008 2010

Heuristic and Behavior analysis

20031987

Signature based

Detection

1989

Anti-Spam

1990

Spam

2013

Artificial Intelligence

1991 2013

AntiExploit

2017

First Worm like ransomware

2016

Exploit kits

20

Malware Samples per day reaches

100 000+

Machine Learning vs Deep Learning

CAR

CAR

Machine Learning, Deep Learning and Artificial Intelligence

22

CAT

One Final Thought…