The Threat Landscape.



An exponential rise in the sophistication and scale of attacks has led to an astonishing increase in the number of compromised computers and networks worldwide. According to Gartner Research, as many as 3 out of every 4 computers may be infected with undetectable, financially motivated, malicious software.

The highly publicized Conficker botnet is simply one of the 35,000 pieces of malicious software released every day. Though the still unknown developers of Conficker have yet to fully utilize their network of zombie computers they have achieved a remarkable feat. Using relatively simple yet effective propagation and command and control techniques, this single piece of malicious software has at one point compromised and maintained control over 5.5 million systems. Many of these systems were protected by dated controls developed in the early age of the Internet.

While the complexity of the malware is dependent on its creator, attackers have an array of tools and techniques at their disposal to maintain control of compromised systems and stay invisible to security controls as long as possible. Command line and GUI packages to create malicious software are freely distributed, or custom developed and sold with support across the Internet. Anti-virus bypass, anti-decompiling and debugging, network control bypass, fast-flux and double fast-flux are just some of the techniques currently used by cyber criminals.

Defence Intelligence uses behavioural analysis to identify and terminate beaconing by malicious software. Equipped with expert knowledge of malware authoring, malware propagation, command and control techniques, real-time data analysis, and industry configured offerings, Defence Intelligence products are specifically designed to drastically reduce network exposure to compromise threats.

With the ability to detect and respond to major Internet threats, Defence Intelligence products are an integral part of your multi-layered security suite.

Click here to find out how Defence Intelligence products provide a strong level of protection over your network, keeping your network secure.





research.

© 2008-2010 Network Defence Intelligence Inc.