Advanced Threat Report 2H 2011
Total Page:16
File Type:pdf, Size:1020Kb
WHITE PAPER FIREEYE ADVANCED THREAT REPORT 2H 2011 SECURITY REIMAGINED FireEye Advanced Threat Report: 2H 2011 CONTENTS Inside This Report ....................................................................................................................................................................................................................................................................................................................... 3 Finding 1 .......................................................................................................................................................................................................................................................................................................................................................... 3 The fastest growing malware categories in the second half of 2011 were PPI (pay per installs) and information stealers Finding 2 .......................................................................................................................................................................................................................................................................................................................................................... 5 Of the thousands of malware families, the “Top 50” generated 80% of successful malware infections Finding 3 .......................................................................................................................................................................................................................................................................................................................................................... 6 Over 95% of enterprise networks have a security gap despite $20B spent annually on IT security Finding 4 .......................................................................................................................................................................................................................................................................................................................................................... 7 Spear phishing attacks increase when enterprise security operations centers are lightly staffed or understaffed, particularly during holidays Conclusions .............................................................................................................................................................................................................................................................................................................................................. 8 Methodology ............................................................................................................................................................................................................................................................................................................................................ 9 About FireEye ........................................................................................................................................................................................................................................................................................................................................ 9 2 www.fireeye.com FireEye Advanced Threat Report: 2H 2011 Inside This Report Key Findings The FireEye Advanced Threat Report for the 1. The fastest growing malware categories second half of 2011 is based on research and in the second half of 2011 were PPI trend analysis conducted by the FireEye Malware (pay per installs) and information stealers. Intelligence Labs. This report provides an overview of advanced targeted attacks in the second half of 2. Of the thousands of malware families, 2011 and was developed to provide insights into the “Top 50” generated 80% of successful the current threat landscape, evolving advanced malware infections. persistent threat (APT) tactics, and the level of infiltration seen in organizational networks today. 3. Over 95% of enterprise networks have a This is not a typical threat report with just tallies security gap despite $20B spent annually of the millions of well-known malware or billions on IT security. of spam messages. 4. Spear phishing attacks increase when To complete the threat landscape picture, enterprise security operations centers are the FireEye Advanced Threat Report focuses lightly staffed or understaffed, particularly on the threats that have successfully evaded during holidays. traditional defenses. These are the unknown threats and advanced targeted attacks that are Finding 1: The fastest growing dynamic and stealthy. And, we have found that malware categories in the second they are extremely effective at compromising half of 2011 were PPI (pay per installs) organizations’ networks. and information stealers The FireEye research team categorizes malware FireEye is in the unique position to illuminate according to its primary purpose but it is import- this advanced targeted attack activity since our ant to note that advanced malware often offers appliances are deployed in enterprises across a combination of features. For instance, any malware the globe as the last line of network defense behind seen stealing information from a compromised firewalls, IPS, and other security gateways. Given computer falls under the information stealer this unique position, we are able to share our category, while malware programs that bypass findings on the advanced threats that routinely security mechanisms to provide access to compro- bypass signature-, reputation- and basic behav- mised machines are classified as a backdoor. ior-based technologies, the $20B spent on IT defenses each year. In the second half of 2011, pay-per-install (PPI) downloaders, worms, backdoors, and information This report dives into the FireEye Malware steal-ers represented the four most prevalent Intelligence Labs’ analysis of shared threat data categories of malware. PPIs are malware programs from global deployments of FireEye Malware that charge a fee to download or distribute other Protection Systems (MPS). This threat data is malware programs. These programs differ from anonymized, real-time information shared by normal down-loaders/droppers in that a PPI brand-name enterprises, government agencies, malware author gets paid for every successful and educational institutions that subscribe to install of another malware program. Of the top our Malware Protection Cloud (MPC). four malware categories, information stealers and backdoors present the greatest threat to enterprises. 3 www.fireeye.com FireEye Advanced Threat Report: 2H 2011 Figure 1: Breakdown of second half of 2011 malware categories distribution A special category called Bitcoin Miner has also The majority of worm infections that we saw been created since the FireEye Malware Protection were attributed to machines infected with the Cloud (MPC) showed a phenomenal increase Conficker worm. Even after 3 years, since it was in this class of malware. Bitcoins are virtual first detected, Conficker still continues to remain currencies stored in “wallets” on user’s comput- one of the more popular worms infecting ers. This category of malware was seen stealing machines worldwide. these wallets and uploading them to the attack- er’s command and control servers. Although this The graph below shows the most widespread malware can be cat-egorized as an information information stealing malware that we observed stealer, we chose to separate it out to show its during the second half of 2011. prevalence in the second half of 2011. Figure 2: Most popular information stealers in second half of 2011 4 www.fireeye.com FireEye Advanced Threat Report: 2H 2011 Following are descriptions of several of these • Clampi is a Trojan capable of stealing information stealing malware programs: users’ passwords and other sensitive financial information. • Zbot saw an increase in newer variants in 2011. We speculate that the rise in different variants Finding 2: Of the thousands of mal- of Zeus is connected to the leak of its source ware families, the “Top 50” generated code. Primarily a banking trojan, Zbot is a threat 80% of successful malware infections to small, medium, and large enterprises. In the second half of 2011, we saw that the top 50 malware families generated 80% of successful • Sality is a malicious program that has the infections. Reviewing the top 50 malware families, ability to overwrite executable files. It is also we noticed that the more successful code bases known to contain Trojan components. Some have been optimized to be dynamic and deceptive. variants of Sality also contain the ability to steal sensitive personal or financial data. In the We observed that very few malware families FireEye MPC labs we saw that the use of Sality accounted for larger infection rates. 50% of the was almost as widespread as Zbot. cases were attributed to malware families ranked 1 – 13 in the second half of 2011. • LdPinch is a piece of malware that did not make it to the 1H 2011 Advanced Threat Report. How do criminals make their malware and In the latter half of 2011, we saw a tremendous domains dynamic? Point-and-click Toolkits increase in machines infected with LdPinch. This shift could indicate that the top ranked The powerful program is capable of stealing malware programs increasingly use advanced account credentials from various services. techniques to