SlideShare a Scribd company logo
How Malware Works
About AlienVault
Agenda
• What is malware?
• Malware variants
• How does it get in?
• Tips for mitigating risk
• Detecting malware with USM
What is Malware?
Malware is a portmanteau that
refers to malicious software and
encompasses a large variety of
computer programs designed to
steal sensitive data, gain
unauthorized access, or just
wreak havoc.
Malware Variants
Ransomware
• Cryptolocker
• Bitlocker
• Cryptovault
Remote access
• Rootkits
Data gathering
• Spyware
• Adware
General maliciousness
Top Threats seen by SpiceHeads
We asked SpiceHeads what kind of malware they are seeing and
these seem to be the most prevalent:
• Ransomware
• Potentially Unwanted Programs (PUPs)
• Misc phishing emails
• Malicious email attachments disguised as
PDFs, Excel docs, etc.
Most popular “funny” answer?
Users… :p
How does it get in?
Users
• Blindly clicking links in email, social media, etc.
• Downloading and running email attachments
• Disgruntled/generally malicious users
• Using company assets outside of corporate perimeter
Social Engineering
• Phishing/Spearphishing
• Drive-by downloads
• Malicious executables
But, wait… I have Endpoint Protection!
While Anti-Malware scanners will spot the majority of malicious files, there are
several ways to get past them:
• Polymorphic code
- Over lifespan of malware
- In real-time (every copy looks different)
• Encryption/packing
• Stealth
- Monitor system resource utilization
- Hiding malware in legitimate applications
- Sometimes even block anti-virus and/or system messages that
might alert a user to the malware’s presence
• Some legacy Firewalls may not have the tech to detect
Risk Mitigation
Education
• Ongoing training
- New, different malware variants
- Delivery mechanisms
• Institute a policy
- What you can and cannot download on the corporate network
- What to do if your users get hit
Containment
• Network segmentation
Risk Mitigation
Continuous Monitoring
• Operate under the assumption that you will get breached
- If prevention doesn’t work for these folks, why do you think it would
work for you?
• Multiple detection methods
- Don’t put all of your eggs in one basket
AlienVault Vision
Accelerating and simplifying threat
detection and incident response for IT
teams with limited resources, on day
one
Enable organizations of all sizes to
benefit from the power of crowd-
sourced threat intelligence & unified
security
AlienVault USM:
Discover Security That’s Highly Intelligent
Unified Security Management Platform
Accelerates and simplifies threat detection and incident response for IT teams with
limited resources, on day one
AlienVault Labs Threat Intelligence
Identifies the most significant threats targeting your
network and provides context-specific remediation
guidance
Open Threat Exchange
The world’s largest repository of crowd-sourced
threat data, provides a continuous view of
real-time threats
AlienVault Approach:
Unified Security Management
USM Platform
ASSET DISCOVERY
• Active Network Scanning
• Passive Network Scanning
• Asset Inventory
• Host-based Software Inventory
VULNERABILITY
ASSESSMENT
• Continuous
Vulnerability Monitoring
• Authenticated /
Unauthenticated Active
Scanning
BEHAVIORAL MONITORING
• Log Collection
• Netflow Analysis
• Service Availability Monitoring
SIEM
• SIEM Event Correlation
• Incident Response
INTRUSION DETECTION
• Network IDS
• Host IDS
• File Integrity Monitoring
Built-In, Essential Security Capabilities
Open Threat Exchange
DEMO
888.613.6023
ALIENVAULT.COM
CONTACT US
HELLO@ALIENVAULT.COM
Now for some Questions..
Questions? Hello@AlienVault.com
Twitter : @alienvault
Test Drive AlienVault USM
Download a Free 30-Day Trial
http://www.alienvault.com/free-trial
Check out our 15-Day Trial of USM for AWS
https://www.alienvault.com/free-trial/usm-for-aws
Try our Interactive Demo Site
http://www.alienvault.com/live-demo-site

More Related Content

PPTX
Improve Situational Awareness for Federal Government with AlienVault USM
AlienVault
 
PPTX
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
AlienVault
 
PPTX
How to Detect System Compromise & Data Exfiltration with AlienVault USM
AlienVault
 
PPTX
Simplify PCI DSS Compliance with AlienVault USM
AlienVault
 
PPTX
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
AlienVault
 
PPTX
Alienvault threat alerts in spiceworks
AlienVault
 
PPTX
Incident response live demo slides final
AlienVault
 
PPTX
IDS for Security Analysts: How to Get Actionable Insights from your IDS
AlienVault
 
Improve Situational Awareness for Federal Government with AlienVault USM
AlienVault
 
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
AlienVault
 
How to Detect System Compromise & Data Exfiltration with AlienVault USM
AlienVault
 
Simplify PCI DSS Compliance with AlienVault USM
AlienVault
 
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
AlienVault
 
Alienvault threat alerts in spiceworks
AlienVault
 
Incident response live demo slides final
AlienVault
 
IDS for Security Analysts: How to Get Actionable Insights from your IDS
AlienVault
 

What's hot (20)

PPTX
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
AlienVault
 
PPTX
Creating Correlation Rules in AlienVault
AlienVault
 
PDF
Open Source IDS Tools: A Beginner's Guide
AlienVault
 
PPTX
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
AlienVault
 
PPTX
How to Solve Your Top IT Security Reporting Challenges with AlienVault
AlienVault
 
PPTX
How to Detect SQL Injections & XSS Attacks with AlienVault USM
AlienVault
 
PPTX
Demo how to detect ransomware with alien vault usm_gg
AlienVault
 
PPTX
AWS Security Best Practices for Effective Threat Detection & Response
AlienVault
 
PPTX
Improve Threat Detection with OSSEC and AlienVault USM
AlienVault
 
PPTX
How to Detect a Cryptolocker Infection with AlienVault USM
AlienVault
 
PPTX
Automating Critical Security Controls for Threat Remediation and Compliance
Qualys
 
PPTX
Otx introduction sw
AlienVault
 
PPTX
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
AlienVault
 
PPTX
Improve Security Visibility with AlienVault USM Correlation Directives
AlienVault
 
PPTX
Six Steps to SIEM Success
AlienVault
 
PDF
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Qualys
 
PPTX
Anatomy of an Attack - Sophos Day Belux 2014
Sophos Benelux
 
PDF
Web App Attacks - Stats & Remediation
Qualys
 
PPT
Safeguard your enterprise against ransomware
Quick Heal Technologies Ltd.
 
PPTX
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Symantec
 
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
AlienVault
 
Creating Correlation Rules in AlienVault
AlienVault
 
Open Source IDS Tools: A Beginner's Guide
AlienVault
 
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
AlienVault
 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
AlienVault
 
How to Detect SQL Injections & XSS Attacks with AlienVault USM
AlienVault
 
Demo how to detect ransomware with alien vault usm_gg
AlienVault
 
AWS Security Best Practices for Effective Threat Detection & Response
AlienVault
 
Improve Threat Detection with OSSEC and AlienVault USM
AlienVault
 
How to Detect a Cryptolocker Infection with AlienVault USM
AlienVault
 
Automating Critical Security Controls for Threat Remediation and Compliance
Qualys
 
Otx introduction sw
AlienVault
 
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
AlienVault
 
Improve Security Visibility with AlienVault USM Correlation Directives
AlienVault
 
Six Steps to SIEM Success
AlienVault
 
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Qualys
 
Anatomy of an Attack - Sophos Day Belux 2014
Sophos Benelux
 
Web App Attacks - Stats & Remediation
Qualys
 
Safeguard your enterprise against ransomware
Quick Heal Technologies Ltd.
 
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Symantec
 
Ad

Similar to How Malware Works (20)

PPTX
How to Investigate Threat Alerts in Spiceworks!
AlienVault
 
PPTX
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
AlienVault
 
PPTX
Malware detection how to spot infections early with alien vault usm
AlienVault
 
PDF
Incident Response Whitepaper - AlienVault
Jermund Ottermo
 
PPTX
Improve threat detection with hids and alien vault usm
AlienVault
 
PDF
Declaration of Mal(WAR)e
NetSPI
 
PDF
Declaration of malWARe
Scott Sutherland
 
PPTX
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
AlienVault
 
PPTX
Vulnerability Management: What You Need to Know to Prioritize Risk
AlienVault
 
PPTX
Security Operations Center (SOC) Essentials for the SME
AlienVault
 
PDF
Anatomy of a cyber attack
Mark Silver
 
PPTX
IT Security Basics For Managers
Daniel Owens
 
PPTX
Spice world 2014 hacker smackdown
AlienVault
 
PPTX
Malware: To The Realm of Malicious Code (Training)
Satria Ady Pradana
 
PPTX
Malware Defense-in-Depth 2.0
Ayed Al Qartah
 
PDF
Stopping zero day threats
Zscaler
 
PDF
5 howtomitigate
richarddxd
 
PDF
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
TechSoup
 
PPTX
Cyber security awareness for end users
NetWatcher
 
PPTX
Security Minded - Ransomware Awareness
Greg Wartes, MCP
 
How to Investigate Threat Alerts in Spiceworks!
AlienVault
 
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
AlienVault
 
Malware detection how to spot infections early with alien vault usm
AlienVault
 
Incident Response Whitepaper - AlienVault
Jermund Ottermo
 
Improve threat detection with hids and alien vault usm
AlienVault
 
Declaration of Mal(WAR)e
NetSPI
 
Declaration of malWARe
Scott Sutherland
 
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
AlienVault
 
Vulnerability Management: What You Need to Know to Prioritize Risk
AlienVault
 
Security Operations Center (SOC) Essentials for the SME
AlienVault
 
Anatomy of a cyber attack
Mark Silver
 
IT Security Basics For Managers
Daniel Owens
 
Spice world 2014 hacker smackdown
AlienVault
 
Malware: To The Realm of Malicious Code (Training)
Satria Ady Pradana
 
Malware Defense-in-Depth 2.0
Ayed Al Qartah
 
Stopping zero day threats
Zscaler
 
5 howtomitigate
richarddxd
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
TechSoup
 
Cyber security awareness for end users
NetWatcher
 
Security Minded - Ransomware Awareness
Greg Wartes, MCP
 
Ad

More from AlienVault (10)

PDF
Malware Invaders - Is Your OS at Risk?
AlienVault
 
PDF
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
AlienVault
 
PDF
Insider Threat Detection Recommendations
AlienVault
 
PDF
Security operations center 5 security controls
AlienVault
 
PDF
PCI DSS Implementation: A Five Step Guide
AlienVault
 
PDF
The State of Incident Response - INFOGRAPHIC
AlienVault
 
PPTX
Best Practices for Configuring Your OSSIM Installation
AlienVault
 
PDF
Alien vault sans cyber threat intelligence
AlienVault
 
PPTX
Security by Collaboration: Rethinking Red Teams versus Blue Teams
AlienVault
 
PPTX
Prepare to Be Breached: How to Adapt your Security Controls to the “New Normal”
AlienVault
 
Malware Invaders - Is Your OS at Risk?
AlienVault
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
AlienVault
 
Insider Threat Detection Recommendations
AlienVault
 
Security operations center 5 security controls
AlienVault
 
PCI DSS Implementation: A Five Step Guide
AlienVault
 
The State of Incident Response - INFOGRAPHIC
AlienVault
 
Best Practices for Configuring Your OSSIM Installation
AlienVault
 
Alien vault sans cyber threat intelligence
AlienVault
 
Security by Collaboration: Rethinking Red Teams versus Blue Teams
AlienVault
 
Prepare to Be Breached: How to Adapt your Security Controls to the “New Normal”
AlienVault
 

Recently uploaded (20)

PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Doc9.....................................
SofiaCollazos
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 

How Malware Works

  • 3. Agenda • What is malware? • Malware variants • How does it get in? • Tips for mitigating risk • Detecting malware with USM
  • 4. What is Malware? Malware is a portmanteau that refers to malicious software and encompasses a large variety of computer programs designed to steal sensitive data, gain unauthorized access, or just wreak havoc.
  • 5. Malware Variants Ransomware • Cryptolocker • Bitlocker • Cryptovault Remote access • Rootkits Data gathering • Spyware • Adware General maliciousness
  • 6. Top Threats seen by SpiceHeads We asked SpiceHeads what kind of malware they are seeing and these seem to be the most prevalent: • Ransomware • Potentially Unwanted Programs (PUPs) • Misc phishing emails • Malicious email attachments disguised as PDFs, Excel docs, etc. Most popular “funny” answer? Users… :p
  • 7. How does it get in? Users • Blindly clicking links in email, social media, etc. • Downloading and running email attachments • Disgruntled/generally malicious users • Using company assets outside of corporate perimeter Social Engineering • Phishing/Spearphishing • Drive-by downloads • Malicious executables
  • 8. But, wait… I have Endpoint Protection! While Anti-Malware scanners will spot the majority of malicious files, there are several ways to get past them: • Polymorphic code - Over lifespan of malware - In real-time (every copy looks different) • Encryption/packing • Stealth - Monitor system resource utilization - Hiding malware in legitimate applications - Sometimes even block anti-virus and/or system messages that might alert a user to the malware’s presence • Some legacy Firewalls may not have the tech to detect
  • 9. Risk Mitigation Education • Ongoing training - New, different malware variants - Delivery mechanisms • Institute a policy - What you can and cannot download on the corporate network - What to do if your users get hit Containment • Network segmentation
  • 10. Risk Mitigation Continuous Monitoring • Operate under the assumption that you will get breached - If prevention doesn’t work for these folks, why do you think it would work for you? • Multiple detection methods - Don’t put all of your eggs in one basket
  • 11. AlienVault Vision Accelerating and simplifying threat detection and incident response for IT teams with limited resources, on day one Enable organizations of all sizes to benefit from the power of crowd- sourced threat intelligence & unified security
  • 12. AlienVault USM: Discover Security That’s Highly Intelligent
  • 13. Unified Security Management Platform Accelerates and simplifies threat detection and incident response for IT teams with limited resources, on day one AlienVault Labs Threat Intelligence Identifies the most significant threats targeting your network and provides context-specific remediation guidance Open Threat Exchange The world’s largest repository of crowd-sourced threat data, provides a continuous view of real-time threats AlienVault Approach: Unified Security Management
  • 14. USM Platform ASSET DISCOVERY • Active Network Scanning • Passive Network Scanning • Asset Inventory • Host-based Software Inventory VULNERABILITY ASSESSMENT • Continuous Vulnerability Monitoring • Authenticated / Unauthenticated Active Scanning BEHAVIORAL MONITORING • Log Collection • Netflow Analysis • Service Availability Monitoring SIEM • SIEM Event Correlation • Incident Response INTRUSION DETECTION • Network IDS • Host IDS • File Integrity Monitoring Built-In, Essential Security Capabilities
  • 16. DEMO
  • 17. 888.613.6023 ALIENVAULT.COM CONTACT US [email protected] Now for some Questions.. Questions? [email protected] Twitter : @alienvault Test Drive AlienVault USM Download a Free 30-Day Trial http://www.alienvault.com/free-trial Check out our 15-Day Trial of USM for AWS https://www.alienvault.com/free-trial/usm-for-aws Try our Interactive Demo Site http://www.alienvault.com/live-demo-site

Editor's Notes

  • #12: We are dedicated to providing a simplified security solution that, when coupled with affordable pricing, is the perfect fit for organizations with limited budgets and few in-house resources. AlienVault’ gives smaller IT organizations the ability to accelerate and simplify their threat detection and remediation efforts, as well as regulatory compliance. With our unified, simplified approach, you can go from deployment to insight in less than one day
  • #14: Predictability of USM platform and security data: Ownership of the built-in data sources and management platform, coupled with unmatched security expertise delivered by the AlienVault Labs team of security experts, provides effective security controls and seamlessly integrated threat intelligence for any environment AlienVault Labs threat research team spends countless hours mapping out the different types of attacks, the latest threats, suspicious behavior, vulnerabilities and exploits they uncover across the entire threat landscape. They leverage the power of OTX, the world’s largest crowd-sourced repository of threat data to provide global insight into attack trends and bad actors. This eliminates the need for IT teams to conduct their own research on each threat.   They provide Specific, Relevant, and Actionable Threat Intelligence– such as, Over 2,000 predefined correlation directives, eliminating the need for customers to create their own, which is one of the primary sources of frustration with other SIEM products. Besides correlation directives, the AlienVault Labs Threat Intelligence regularly publishes threat intelligence updates to the USM platform in the form of IDS signatures, vulnerability audits, asset discovery signatures, IP reputation data, data source plugins, and report templates.
  • #15: ----- Meeting Notes (4/17/15 15:31) ----- These 5 essential capabilities are the strength of the platform Rename Threat Detection "Intrusion Detection"