Unintentional Insider Threats: A Review of Phishing and Malware Incidents by Economic Sector
1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional...
-
Upload
silvester-elwin-norman -
Category
Documents
-
view
219 -
download
3
Transcript of 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional...
![Page 1: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/1.jpg)
1©2014 Check Point Software Technologies Ltd.
Modern Threats and Malware
Kierk Sanderlin
Regional Engineering Manager
![Page 2: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/2.jpg)
2©2014 Check Point Software Technologies Ltd. 2©2014 Check Point Software Technologies Ltd.
We are surrounded by buzzwords
but what do they all mean?
![Page 3: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/3.jpg)
3©2014 Check Point Software Technologies Ltd.
A Little History
![Page 4: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/4.jpg)
4©2014 Check Point Software Technologies Ltd.
Behind The Scenes
Who would write a virus?A
Why would they write it?B
![Page 5: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/5.jpg)
5©2014 Check Point Software Technologies Ltd.
Behind The Scenes
‘80s and ‘90s
Nerds
Show OffCause Damage
Who
Why
![Page 6: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/6.jpg)
6©2014 Check Point Software Technologies Ltd.
Examples
Ping Pong Videohttp://www.youtube.com/watch?v=yxHalzuPyi8
Cascade Videohttp://www.youtube.com/watch?v=z7g-v3d7-Gk
Other Celebrities:
CIHMelissa
ILOVEYOU
![Page 7: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/7.jpg)
7©2014 Check Point Software Technologies Ltd.
Behind the Scenes
‘80s and ‘90s 21st Century
NerdsCriminals
Nation-State
Steal MoneySteal Data
Show OffCause Damage
Who
Why
Cause Damage
![Page 8: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/8.jpg)
8©2014 Check Point Software Technologies Ltd.
Examples
Criminals Nation-State
• Zeus• Spy-Eye• ZeroAccess/Sirefef• Carberp• Cridex• [more to come]
• Stuxnet• Duqu• Flame• Gauss• Shamoon• APT1• [more to come]
![Page 9: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/9.jpg)
9©2014 Check Point Software Technologies Ltd.
One Ware to Rule Them All
Steal Damage
• Spyware • Ransomware
Harass
• Adware• Scareware• Fake AV
Generic Names
• Virus• Trojan• Worm• Malware
M A L W
A R E
![Page 10: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/10.jpg)
10©2014 Check Point Software Technologies Ltd.
• Someone else’s code running on your server without your permission or knowledge is bad
• Malware can change functionality, based on collected information
• Malware can download other malware
• Bot-herders rent out parts of their network
• Bot-herders can change their mind
Why Do That?
![Page 11: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/11.jpg)
11©2014 Check Point Software Technologies Ltd.
• Was trademarked by
• Describes the phases of an attack
• Has become an industry standard
• We’ll get back to this later…
Cyber Kill Chain™
![Page 12: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/12.jpg)
12©2014 Check Point Software Technologies Ltd.
Attack Scenario
Spearphishing1Malware-bearing Spam2Link-bearing Spam3Pirated Software4Drive-By Download5Infected Media6
![Page 13: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/13.jpg)
13©2014 Check Point Software Technologies Ltd.
Attack Scenario
Spearphishing1Malware-bearing Spam2Link-bearing Spam3Pirated Software4Drive-By Download5Infected Media6
![Page 14: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/14.jpg)
14©2014 Check Point Software Technologies Ltd.
Spearphishing1Phishing Example #1: Completely Generic
![Page 15: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/15.jpg)
15©2014 Check Point Software Technologies Ltd.
Spearphishing1
![Page 16: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/16.jpg)
16©2014 Check Point Software Technologies Ltd.
Spearphishing1
![Page 17: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/17.jpg)
17©2014 Check Point Software Technologies Ltd.
Spearphishing1
![Page 18: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/18.jpg)
18©2014 Check Point Software Technologies Ltd.
Spearphishing1
![Page 19: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/19.jpg)
19©2014 Check Point Software Technologies Ltd.
Spearphishing1Spearphishing
A Phishing email aimed at a particular victim. The email is crafted using information that the victim is most likely to respond to. Might contain actual actionable content.
• Examples:
• CV’s sent to HR personnel
• A business proposal based on the victim’s previous work
• A request for opinion, decision or help
![Page 20: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/20.jpg)
20©2014 Check Point Software Technologies Ltd.
Spearphishing1Spearphishing
Most of the times, the emailwill contain a malicious document. The document, in turn, contains an Exploit targeting a vulnerability, whether Disclosed or Undisclosed (also known as a 0-Day Vulnerability)
![Page 21: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/21.jpg)
21©2014 Check Point Software Technologies Ltd.
Spearphishing1Spearphishing
Most of the times, the emailwill contain a malicious document.
ActualContent
![Page 22: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/22.jpg)
22©2014 Check Point Software Technologies Ltd.
Spearphishing1Spearphishing
Most of the times, the emailwill contain a malicious document. The document, in turn, contains an Exploit targeting a vulnerability, whether Disclosed or Undisclosed (also known as a 0-Day Vulnerability),
Exploit
ActualContent
![Page 23: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/23.jpg)
23©2014 Check Point Software Technologies Ltd.
Spearphishing1Spearphishing
Most of the times, the emailwill contain a malicious document. The document, in turn, contains an Exploit targeting a vulnerability, whether Disclosed or Undisclosed (also known as a 0-Day Vulnerability), and aPayload,
Exploit
ActualContent
Payload
![Page 24: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/24.jpg)
24©2014 Check Point Software Technologies Ltd.
Spearphishing1Spearphishing
Most of the times, the emailwill contain a malicious document. The document, in turn, contains an Exploit targeting a vulnerability, whether Disclosed or Undisclosed (also known as a 0-Day Vulnerability), and aPayload, which installs aMalware on the computer.
Exploit
ActualContent
Payload
Malware
![Page 25: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/25.jpg)
25©2014 Check Point Software Technologies Ltd.
Attack Scenario
Spearphishing1
Link-bearing Spam3Pirated Software4Drive-By Download5Infected Media6
Malware-bearing Spam2
![Page 26: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/26.jpg)
26©2014 Check Point Software Technologies Ltd.
Malware-bearing Spam2
![Page 27: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/27.jpg)
27©2014 Check Point Software Technologies Ltd.
Malware-bearing Spam20-Day Vulnerability
When a vulnerability is published or disclosed, the days until it’s patched are counted. This is the age of the vulnerability. If the vulnerability was never disclosed, it is still unpatched. 0 days have passed since its disclosure.
An Exploit is a piece of code and data that takes advantage of an unpatched vulnerability, in order to gain Code Execution or Privilege Escalation.
![Page 28: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/28.jpg)
28©2014 Check Point Software Technologies Ltd.
Attack Scenario
Spearphishing1
Pirated Software4Drive-By Download5Infected Media6
Malware-bearing Spam2Link-bearing Spam3
![Page 29: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/29.jpg)
29©2014 Check Point Software Technologies Ltd.
Link-bearing Spam3
![Page 30: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/30.jpg)
30©2014 Check Point Software Technologies Ltd.
Link-bearing Spam3Exploit Kit
A collection of Exploits, usually Web-oriented, that are used to infect a computer through its browser or associated plugins. The exploits will usually target JavaScript, Java or Flash vulnerabilities.
An Exploit Kit is a good example for CaaS – Crime as a Service.
![Page 31: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/31.jpg)
31©2014 Check Point Software Technologies Ltd.
Attack Scenario
Spearphishing1
Drive-By Download5Infected Media6
Malware-bearing Spam2Link-bearing Spam3Pirated Software4
![Page 32: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/32.jpg)
32©2014 Check Point Software Technologies Ltd.
Pirated Software4
![Page 33: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/33.jpg)
33©2014 Check Point Software Technologies Ltd.
Pirated Software4Bundled Malware
A lot of today’s software is not free. If you don’t pay, you can’t use it properly. People try to bypass this protection by looking for a Cracked Copy of the software, or a KeyGen (Key Generator).
When you use cracked software, it is actually a modified software. You may think that the only change is the removal of the protection, but nothing prevents the attacker from including whatever additional functionality they desire.
![Page 34: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/34.jpg)
34©2014 Check Point Software Technologies Ltd.
Pirated Software4Bundled Malware
The same applies to KeyGens. They really do generate a valid serial number, but at the same time they install a malware in the background.
The most famous example is Android Apps. Hackers take a software that costs money, repackage it with malware and put it back on the store, under the same name, for free.
![Page 35: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/35.jpg)
35©2014 Check Point Software Technologies Ltd.
Attack Scenario
Spearphishing1
Infected Media6
Malware-bearing Spam2Link-bearing Spam3Pirated Software4Drive-By Download5
![Page 36: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/36.jpg)
36©2014 Check Point Software Technologies Ltd.
Drive-By Download5
![Page 37: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/37.jpg)
37©2014 Check Point Software Technologies Ltd.
Drive-By Download5
![Page 38: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/38.jpg)
38©2014 Check Point Software Technologies Ltd.
Drive-By Download5
![Page 39: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/39.jpg)
39©2014 Check Point Software Technologies Ltd.
Drive-By Download5
![Page 40: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/40.jpg)
40©2014 Check Point Software Technologies Ltd.
Drive-By Download5Watering Hole Attack
Borrowed from the Wild Life world, it describes an attack on a website that attracts many visitors, just like the watering hole.
Instead of spending agreat deal of resourcesin order to attack manyvictims, the attackeronly has to attack onevictim – the popularwebsite.
![Page 41: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/41.jpg)
41©2014 Check Point Software Technologies Ltd.
Attack Scenario
Spearphishing1Malware-bearing Spam2Link-bearing Spam3Pirated Software4Drive-By Download5Infected Media6
![Page 42: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/42.jpg)
42©2014 Check Point Software Technologies Ltd.
Infected Media6
![Page 43: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/43.jpg)
43©2014 Check Point Software Technologies Ltd.
Infected Media6
![Page 44: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/44.jpg)
44©2014 Check Point Software Technologies Ltd.
Infected Media6
![Page 45: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/45.jpg)
45©2014 Check Point Software Technologies Ltd.
Infected Media6
![Page 46: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/46.jpg)
46©2014 Check Point Software Technologies Ltd.
Back to the Cyber Kill Chain™
Code Execution
Privilege EscalationExploit Kit
SpamSpearphishing
Pirated Software
Bundled Malware
KeyGen
Cracked Software
Watering Hole Attack
Drive-By Download
0-Day Vulnerability
Payload
Malware
![Page 47: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/47.jpg)
47©2014 Check Point Software Technologies Ltd. 47©2014 Check Point Software Technologies Ltd.
![Page 48: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/48.jpg)
48©2014 Check Point Software Technologies Ltd.
Why Would Anyone Attack Me?
© Brian Krebs
![Page 49: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/49.jpg)
49©2014 Check Point Software Technologies Ltd.
Alternate Topic
Advanced Persistent Threat
Another Pointless Term?
OR
![Page 50: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/50.jpg)
50©2014 Check Point Software Technologies Ltd.
Advanced Persistent Threat
Nation-State
Targeted Attack
0-Day Vulnerability
Unknown Tools
Spearphishing
Compromised PC
![Page 51: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/51.jpg)
51©2014 Check Point Software Technologies Ltd.
Random Attack
Hacker / Criminal
Wide Campaign
0-Day / Unpatched
New / Existing Tool
Spam / Drive-By
Compromised PC
![Page 52: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/52.jpg)
52©2014 Check Point Software Technologies Ltd.
Nation-State
Targeted Attack
Unknown Vulnerability
Unknown Tools
Spearphishing
Compromised PC
Hacker / Criminal
Wide Campaign
0-Day / Unpatched
New / Existing Tool
Spam / Drive-By
Compromised PC
Now Let’s Compare…
![Page 53: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/53.jpg)
53©2014 Check Point Software Technologies Ltd.
And…on October 21st, 2012
![Page 54: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/54.jpg)
54©2014 Check Point Software Technologies Ltd.
What it looks like…
![Page 55: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/55.jpg)
55©2014 Check Point Software Technologies Ltd.
Summary
“I’m not interesting, no one will attack me” and “It’s too complicated” are irrelevant responses.A
![Page 56: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/56.jpg)
56©2014 Check Point Software Technologies Ltd.
Summary
“I’m not interesting, no one will attack me” and “It’s too complicated” are irrelevant responses.A
The balance is shifting from Prevention to Detection. B
![Page 57: 1 ©2014 Check Point Software Technologies Ltd. Modern Threats and Malware Kierk Sanderlin Regional Engineering Manager.](https://reader038.fdocuments.us/reader038/viewer/2022103022/56649cea5503460f949b5adc/html5/thumbnails/57.jpg)
57©2014 Check Point Software Technologies Ltd.
Summary
“I’m not interesting, no one will attack me” and “It’s too complicated” are irrelevant responses.A
The balance is shifting from Prevention to Detection. B
There is no silver bullet. You must have layered security covering all fronts.C