+ All Categories
Home > Technology > The Cyber Espionage Blueprint by RSA Security

The Cyber Espionage Blueprint by RSA Security

Date post: 08-Jun-2015
Category:
Upload: emc-academic-alliance
View: 338 times
Download: 7 times
Share this document with a friend
Description:
Read more via http://blogs.rsa.com/the-cyber-espionage-blueprint/?fb_source=pubv1
Popular Tags:
1
Finding Finding Finding 01 02 03 04 05 The Current State of Cyber Threats EMC 2 , EMC, RSA, the RSA logo, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. © Copyright 2013 EMC Corporation. All rights reserved. Number of cyber espionage malware samples analyzed for the “Blueprint” report Approx. # of Trojan families used in Cyber Espionage campaigns Percent of cyber espionage malware samples with random or nonsensical filenames Percent of cyber espionage malware samples using standard ports to communicate Percent of cyber espionage malware samples installed in the user profile directory 2397 60 54% 68% 67% Finding Finding Findings listed above come from the report, “The Cyber Espionage Blueprint”
Transcript
Page 1: The Cyber Espionage Blueprint by RSA Security

Finding

Finding

Finding

• 01• 02

03 •

04 •

• 05

The Current State of Cyber Threats

EMC2, EMC, RSA, the RSA logo, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States andother countries. All other trademarks used herein are the property of their respective owners. © Copyright 2013 EMC Corporation. All rights reserved.

Number of cyber espionagemalware samples analyzedfor the “Blueprint” report

Approx. # of Trojan familiesused in Cyber Espionage

campaigns

Percent of cyber espionagemalware samples with randomor nonsensical filenames

Percent of cyber espionagemalware samples usingstandard ports to communicate

Percent of cyber espionage malwaresamples installed in the user profile directory

2397

60

54%

68%

67%

Finding

Finding

Findings listed above come from the report, “The Cyber Espionage Blueprint”

Recommended