{"id":6126,"date":"2014-09-29T10:00:25","date_gmt":"2014-09-29T14:00:25","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/?p=6126"},"modified":"2020-02-27T03:49:37","modified_gmt":"2020-02-26T16:49:37","slug":"virus_bulletin-conference_recap","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/virus_bulletin-conference_recap\/6126\/","title":{"rendered":"Bitcoins, Home Hacking, Apple Malware and More at Virus Bulletin"},"content":{"rendered":"<p>The Virus Bulletin conference took place in Seattle, Washington last week. It\u2019s touted as the oldest security conference in the world, and while the event generally boasts a full line-up of enterprise-oriented presentations, like <a href=\"https:\/\/www.kaspersky.com.au\/blog\/black_hat_recap_2014\/\" target=\"_blank\" rel=\"noopener\">Black Hat<\/a>, this year\u2019s conference played host to an increasing number of consumer and general interest topics under discussion as well.<\/p>\n<p>Two briefings of interest were (full disclosure) presented by my colleagues here at Kaspersky Lab: an explanation of the rapid escalation of Bitcoin theft from petty crime to Hollywood heists, and another presentation about hacking the modern home. An overview of the state of malware targeting Apple\u2019s Mac OS X operating system, and a look at how white collar crime is changing on the Android operating system, caught our eyes as well.<\/p>\n<p><strong>Home Hacking<\/strong><\/p>\n<p>David Jacoby wrote about his experience <a href=\"https:\/\/www.kaspersky.com.au\/blog\/how-i-hacked-my-home\/\" target=\"_blank\" rel=\"noopener\">hacking the various devices in his home<\/a> here on Kaspersky Daily recently. He asked, \u201c\u2026if we can\u2019t secure ourselves against current threats, what good will it do to identify potential new future threats?\u201d<\/p>\n<p>That question was born of Jacoby\u2019s concern that we, as an industry, spend too much time talking about zero-days and lofty vulnerabilities in connected cars, refrigerators, hotels, home alarm systems, toilets and other so-called \u201cInternet of things\u201d devices that few people own. Meanwhile we spend too little time focusing on the problems we\u2019ve known about for years and the woeful state of security for things that nearly everybody owns, like SmartTVs, routers, printers, modems, gaming consoles and network storage devices.<\/p>\n<div class=\"pullquote\">The conclusion that I had is why don\u2019t you put out a special network segment where you put all of these devices and actually separate them from your network where you have your workstations, computers, phones, tablets and so on.<\/div>\n<p>Before starting his endeavor, Jacoby says he was pretty sure his home was secure. He is, after all, an accomplished security researcher who spends nearly all of his professional time thinking about network security. This is precisely why he was shocked by the lack of proper security controls built into connected devices and the number of vulnerabilities present within them.<\/p>\n<p>In a <a href=\"https:\/\/threatpost.com\/david-jacoby-on-hacking-his-home\/108517\" target=\"_blank\" rel=\"noopener nofollow\">podcast with Threatpost editor-in-chief Dennis Fisher at Virus Bulletin<\/a> earlier this week, Jacoby noted an interesting paradigm: as people become better about protecting their mobile devices and traditional computers, they seem to care less about the security of networked hard-drives, wireless printers and the assorted other devices with access to their home networks.<\/p>\n<p>\u201cWe need to start thinking about how we connect our home appliances in our home\u201d Jacoby said. \u201cThe conclusion that I had is why don\u2019t you put out a special network segment where you put all of these devices and actually separate them from your network where you have your workstations, computers, phones, tablets and so on.<strong>\u00a0<\/strong><\/p>\n<p><strong>Apple Malware<\/strong><\/p>\n<p>Patrick Wardle, director of research at Synack, spoke about malware persistence on Mac machines. Over the last five years, Wardle\u2019s data illustrated, OS X has doubled its market share from seven to nearly 15 percent of home and enterprise workstations. Apple is now the third ranked vendor of personal computers in the United States.<\/p>\n<p>In 2012, Apple said: \u201cIt doesn\u2019t get PC viruses. A Mac isn\u2019t susceptible to the thousands of viruses plaguing Windows-based computers.\u201d That second sentence is technically true. However, the first sentence, as Wardle\u2019s presentation demonstrated, is patently false. As much as some would hate to admit it, Mac machines are PC\u2019s.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>The fast rise of #Bitcoins, #Apple malware, hackable consumer devices &amp; more security story\u2019s from #VB2014<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F38Du&amp;text=The+fast+rise+of+%23Bitcoins%2C+%23Apple+malware%2C+hackable+consumer+devices+%26amp%3B+more+security+story%26%238217%3Bs+from+%23VB2014\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Wardle claims that the very first Mac virus was called \u2018Elk Cloner\u2019. It targeted the Apple II, which was popular in the early 1980\u2019s. Last year, Wardle says 30 new families of malware emerged targeting the OS X platform. That number certainly pales in comparison to the amount of malware families targeting Windows machines and <a href=\"https:\/\/www.kaspersky.com.au\/blog\/android-malware\/\" target=\"_blank\" rel=\"noopener\">Android devices<\/a>.<\/p>\n<p>However, Wardle asserts that the increasing number of Macs on the market, along with the relatively weak antivirus protections deployed by most Mac users and a serious lack of Mac malware analysis tools could spell trouble, which is precisely why he\u2019s working on \u201cidentifying persistence mechanisms in OS X and studying malware that abuses these, [so] we can (better) protect ourselves.\u201d<\/p>\n<p><strong>Bitcoin Bonanza<\/strong><\/p>\n<p>Kaspersky Lab researcher Santiago Pontiroli of Argentina gave a brief and interesting overview of the <a href=\"https:\/\/securelist.com\/blog\/research\/66625\/well-that-escalated-quickly\/\" target=\"_blank\" rel=\"noopener\">rapid escalation of Bitcoin crime<\/a> from penny-stealing malware to million dollar robberies over the past few years. His presentation bears resemblance to Wardle\u2019s, because they both illustrate an all-too-common point: that criminals \u2013 like legitimate businesses \u2013 flock toward popularity because there\u2019s more money in the popular than in the obscure.<\/p>\n<p>In the case of Bitcoin, it\u2019s precipitate rise to popularity and the concurrent attraction of criminals cannot be attributed to one source but rather a collection of factors, many of which are shared. For example, Pontiroli explains that the ability to buy nearly anything from nearly anywhere brought in many early adopters, but also ushered in criminals who sought to sell drugs, weapons and worse. It\u2019s decentralized, unregulated and private, three incredibly appealing factors for those that would like to avoid taxation or launder money. Bitcoin also gives users the ability to be their own bank, which has proven more difficult that initially imagined.<\/p>\n<p><strong>Android and White Collar Crime<\/strong><\/p>\n<p>Another promising talk, which unfortunately had not yet been presented by deadline time, was Luis Corrons\u2019 briefing about exposing the ever-larger group of white collar criminals exploiting the Android operating system. His talk promised to explore the evolution of Android crime.<\/p>\n<p>He says most Android crime plays out as premium SMS scams where a criminal compels your phone to send text messages to premium rate SMS numbers. The user is then charged for those texts, and the attacker profits. To this point, such scams have been perpetuated by lookalike applications sneaking into the Google Play store. In this way, users believe they are downloading the Angry Birds app, but they are actually downloading a malicious application that will secretly send pricey text messages.<\/p>\n<p>Corrons claims that in recent months, new techniques have emerged. Now, he says, the attackers are honest about the intentions of their apps \u2013 specifically that the users who download them are enrolling in a premium rate SMS services \u2013 and yet users are downloading them anyway.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Virus Bulletin is a traditionally enterprise-focused event, but each year topics of consumer interest, like Apple malware, hackable devices and Bitcoin are presented.<\/p>\n","protected":false},"author":42,"featured_media":6127,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[105,14,374,834,794,43,97,833],"class_list":{"0":"post-6126","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-android","9":"tag-apple","10":"tag-bitcoin","11":"tag-conferences","12":"tag-iot","13":"tag-privacy","14":"tag-security-2","15":"tag-virus-bulletin"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/virus_bulletin-conference_recap\/6126\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/virus_bulletin-conference_recap\/4161\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/virus_bulletin-conference_recap\/4071\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/virus_bulletin-conference_recap\/4580\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/virus_bulletin-conference_recap\/4824\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/virus_bulletin-conference_recap\/5367\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/virus_bulletin-conference_recap\/6126\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/virus_bulletin-conference_recap\/4972\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/virus_bulletin-conference_recap\/5367\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/virus_bulletin-conference_recap\/6126\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/6126","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=6126"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/6126\/revisions"}],"predecessor-version":[{"id":26518,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/6126\/revisions\/26518"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/6127"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=6126"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=6126"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=6126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}