Welcome!

Release Management Authors: Liz McMillan, Jnan Dash, Lori MacVittie, Gilad Parann-Nissany, Carmen Gonzalez

News Feed Item

Trend Micro Custom Defense Takes "Command and Control" of Advanced Persistent Threats

Unique Solution Delivers Breakthroughs in Identifying and Blocking Targeted Attack Communications

CUPERTINO, Calif., Feb. 25, 2013 /PRNewswire/ -- Trend Micro Incorporated (TYO: 4704; TSE: 4704), is introducing new advances in its Custom Defense solution that focus on identifying and blocking the command and control (C&C) communications used by advanced persistent threats (APTs) and targeted attacks. Trend Micro Custom Defense is the industry's first advanced threat protection solution that enables organizations not only to detect and analyze these attacks, but also to rapidly adapt their protection and respond to the attackers.

These new advances in C&C response provide unique custom detection and protection for network, gateway, server and endpoint protection points, along with centralized alerting and C&C risk intelligence to keep the customer informed and in control of the response to C&C activity. For the first time, enterprise organizations will have the visibility and intelligence to detect and respond to this important attack indicator before the damage is done.

APTs Directed by C&C Communications

APTs and targeted attacks continue to evade the standard defenses of organizations, as recently witnessed with attacks on the New York Times, Wall Street Journal and US Federal Reserve. According to a recent ISACA member survey, 21 percent of respondents reported that their enterprise has already been victimized by an APT, and 63 percent think it is only a matter of time before their enterprise is targeted.

These attacks are typically remotely orchestrated via C&C communications between the infiltrated systems and the attackers themselves. Advanced malware used for an attack will "call back" for additional downloads and new instructions.  Throughout the attack, the perpetrators will also use this channel to open and manipulate backdoor network access to discover and exfiltrate their targeted data. 2012 Verizon research verified that exploitation of backdoor or command and control channels were used in nearly 50 percent of all stolen data investigated.1

The C&C Detection Challenge

Identifying and responding to C&C communications is a critical factor in detecting a targeted attack, but unlike large-scale botnets, the intermittent and low-volume APT C&C traffic is difficult to detect. And the attackers don't make it easy, attempting to hide C&C traffic with techniques such as changing and redirecting addresses, using legitimate applications and sites as the conduit, and even setting up C&C servers within a customer's network. Trend Micro researchers note that the average lifespan of a C&C address is less than three days and that many sophisticated attackers use techniques only detectable with specialized network-based detection on-site at the organization.

Recently tracked C&C data from TrendLabs℠ researchers shows over 1500 active C&C sites, with victims per site ranging from 1 to over 25,000. Of note, over two-thirds of these sites had three or fewer active victims. Over 25 percent of the sites had a lifespan of one day or less. Over 50 percent had a lifespan of four days or less.

"Most security vendors lack the expertise, scale, technology and resources to reliably identify the various types of C&C.  And when their web, messaging or endpoint products do detect a C&C, it's likely to be simply blocked or logged without notice – the same way any minor event is handled. So in most cases, the organization never knows that it may be under a serious targeted attack," Steve Quane, chief product officer at Trend Micro.

Enterprise security teams need to reliably answer these critical questions:

  • Is there C&C activity on my network?
  • Is it a simple botnet or a possible targeted attack?
  • How risky is it? Where and whom is it from?
  • Should I immediately block and remediate or monitor it further?

The Trend Micro Custom Defense Solution for C&C Response

Only the Trend Micro Custom Defense solution can answer these questions with the C&C detection, intelligence and response control needed to stop a targeted attack before the damage is done. At RSA 2013, Trend Micro is introducing and demonstrating these new and unique Custom Defense C&C functions:

  • Enhanced identification and tracking of C&C communications in the cloud and on the customer network
  • Built-in detection of C&C communications activity in network, gateway, server, and endpoint protection points
  • Centralized C&C alerting, dedicated C&C risk intelligence, flexible response control options
  • Adaptive security updates to inform all products of new C&C detection
  • Open web services APIs to include any security product in the Custom Defense

How It Works

Global Identification and Tracking: Trend Micro™ Smart Protection Network™ and Trend Micro Threat Researchers

The Smart Protection Network automatically identifies active C&C sites worldwide based on daily processing of 12 Billion IP/URL inquires and the correlation of over six Terabytes of data. Its correlation engines keep up with the changing nature of C&C addresses, and it employs the latest innovations from Trend Micro's 1200 threat researchers to continually detect all evasive measures taken by attackers.

Trend Micro threat researchers also collect and examine the forensic evidence of attempted targeted attacks over the tens of thousands of Trend Micro enterprise customers worldwide. Peeling back the layers of an attack, they gain further insight into C&C, malware, and attacker techniques, driving constant improvement in the Smart Protection Network and Trend Micro products.

Network-Based Detection and Learning with Trend Micro™ Deep Discovery Advanced Threat Protection

Trend Micro Deep Discovery uses customer-specific threat detection to discover advanced malware, communications and attacker activities at the network level. Unique "fingerprint" detection of cloaked C&C traffic can identify attackers' use of legitimate applications and websites, as well as other advanced techniques such as the use of internal C&C servers. Deep Discovery custom sandbox analysis can also discover new C&C destinations of zero-day malware attacks and update the Smart Protection Network and all customer security protection points.

Integrated Protection Across Products; Centralized Alerts and Control

The latest global and local C&C detection information powers Trend Micro enterprise security products at the endpoint, server, network, gateway, and messaging protection points to identify and control C&C activity across the customer environment. C&C detection at any point is clearly identified on a centralized console, alerting the security team and allowing them to control the course of action. C&C risk assessment, containment and remediation are aided by unique Threat Connect intelligence on the severity, activity, origins and related addresses of the C&C site – helping to determine whether the communication represents a high risk, whether it should be immediately blocked, and how the containment and remediation should proceed.

Products and Availability

These Trend Micro products will include the new Custom Defense C&C functions, with Beta versions available in February 2013 and individual product General Availability dates throughout 1H 2013.

Endpoint Security

  • Trend MicroOfficeScan

Server, Virtualization & Cloud Security

  • Trend MicroDeep Security

Network Security

  • Trend MicroDeep Discovery

Messaging Security

  • Trend MicroInterScan Mail Security
  • Trend MicroScanMail for Exchange, Trend MicroScanMail for Lotus Domino

Web Security

  • Trend MicroInterScan Web Security

Central Management

  • Trend Micro Control Manager

Quotes

"Trend Micro is the only major security vendor who gets APTs - and we continue to expand and deliver on our Custom Defense vision. C&C can be a critical APT attack indicator. Customers have the right to expect their security products to do a better job of detecting risky C&C and giving them the intelligence they need to respond appropriately. We are leading the way by improving our C&C detection and intelligence, integrating it into each of our products, and providing the visibility and response control that customers need to combat their attackers," said Kevin Faulkner, director of product marketing at Trend Micro.

"We are big fans of Trend Micro Custom Defense.  It not only detects and analyzes APTs but also allows us to rapidly respond. In its first two months on our network, Deep Discovery spotted and stopped 5,000 anonymous events on our WAN that were not caught by any other security layer," said John Dickson, Director, IT Infrastructure Republic National Distributing Company, Atlanta, Georgia.

"Attacks on the enterprise today are more sophisticated and targeted than ever before.  Trend Micro's Custom Defense solution and the C&C detection and response control capabilities it offers across the Trend Micro product line will help customers to better identify and deal appropriately with attacks to their organization," said Richard Stiennon, chief research analyst, IT-Harvest.

Additional Assets:
APT C&C Communication Superior Detection with Trend Micro Custom Defense (Trend Micro Solution Brief) 
ISACA Advanced Persistent Threats Awareness Survey
TrendLabs research paper: Detecting APT Activity with Network Traffic Analysis
Tracking Known C&C Traffic infographic
Custom Defense White Paper
Custom Defense web page  
Trend Micro Custom Defense Video

Sources:
1.     2012 Data Breach Investigations Reports, Verizon RISK Team, March 2012

About Trend Micro

Trend Micro Incorporated (TYO: 4704; TSE: 4704), the global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers.  A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits our customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro™ Smart Protection Network™ global threat intelligence data mining framework, our products and services stop threats where they emerge – from the Internet. They are supported by 1,000+ threat intelligence experts around the globe. 

Additional information about Trend Micro Incorporated and the products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at http://newsroom.trendmicro.com/  and as part of an RSS feed at www.trendmicro.com/rss.   Or follow our news on Twitter at @TrendMicro.

SOURCE Trend Micro Incorporated

SOURCE Trend Micro Incorporated

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smart...
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
"A lot of times people will come to us and have a very diverse set of requirements or very customized need and we'll help them to implement it in a fashion that you can't just buy off of the shelf," explained Nick Rose, CTO of Enzu, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud enviro...
SYS-CON Events announced today that MobiDev, a client-oriented software development company, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software company that develops and delivers turn-key mobile apps, websites, web services, and complex softw...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, discussed the impact of technology on identity. Sho...
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet and...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
IoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, ...
WebRTC is about the data channel as much as about video and audio conferencing. However, basically all commercial WebRTC applications have been built with a focus on audio and video. The handling of “data” has been limited to text chat and file download – all other data sharing seems to end with screensharing. What is holding back a more intensive use of peer-to-peer data? In her session at @ThingsExpo, Dr Silvia Pfeiffer, WebRTC Applications Team Lead at National ICT Australia, looked at differ...
"ReadyTalk is an audio and web video conferencing provider. We've really come to embrace WebRTC as the platform for our future of technology," explained Dan Cunningham, CTO of ReadyTalk, in this SYS-CON.tv interview at WebRTC Summit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
In his General Session at 16th Cloud Expo, David Shacochis, host of The Hybrid IT Files podcast and Vice President at CenturyLink, investigated three key trends of the “gigabit economy" though the story of a Fortune 500 communications company in transformation. Narrating how multi-modal hybrid IT, service automation, and agile delivery all intersect, he will cover the role of storytelling and empathy in achieving strategic alignment between the enterprise and its information technology.
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, Sandy Ca...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Providing secure, mobile access to sensitive data sets is a critical element in realizing the full potential of cloud computing. However, large data caches remain inaccessible to edge devices for reasons of security, size, format or limited viewing capabilities. Medical imaging, computer aided design and seismic interpretation are just a few examples of industries facing this challenge. Rather than fighting for incremental gains by pulling these datasets to edge devices, we need to embrace the i...
Internet of @ThingsExpo, taking place June 6-8, 2017 at the Javits Center in New York City, New York, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @ThingsExpo New York Call for Papers is now open.