Protecting your self and your
data in the cyber age
Stephen Cobb, CISSP
Security Researcher, ESET NA
Back then*: very few people cared about
computer security
*Published 1991. Note that the publisher added “complete” to the title.
But now: we’re all computer users
*Go to StaySafeOnline.org for more about STOP | THINK | CONNECT
Our Agenda: Cybersecurity for all
• Answers to questions, such as:
– What are the risks of online banking?
– What about identity theft?
– Can hackers get to those home security cameras
we just installed?
– How to properly secure home routers
– How to protect our children on social media such
as Facebook
• But first:
– Why is there so much cybercrime?
GLOBAL MARKET FOR:
STOLEN INFORMATION
CYBERCRIME SERVICES
CYBERCRIME TOOLS
This fuels a lot of cybercrime
Sadly, cybercrime pays
More than
all the bank
robberies
that year
0
1000
2000
3000
4000
5000
6000
7000
8000
9000
$-
$100
$200
$300
$400
$500
$600
$700
$800
$900
Millions
Bank robbery vs. Internet fraud
Source: FBI/IC3. Note that bank robberies are declining in number and
average loot per job. Fraud is clearly rising, these are not all the cases.
$ cyber fraud
losses
# of bank robberies
Sadly, the risks remain low
$100million
Thereisnowa“cyber”
mostwanted
Cybercrime has created an global
market for information
How does cybercrime pay?
1. First, criminals steal information and sell it
on the black market
• Low risk, high reward
2. Then different criminals buy the stolen
data and commit fraud, e.g.
• Charge your accounts
• Get your tax refund
• Riskier than #1
• But still safer than robbing banks
Who are the players in these underground
markets?
Markets for Cybercrime Tools and Stolen Data (RAND, 2014)
BEWARE WORK
AT HOME SCAMS!
Tools of the trade: point-n-click malware
• See the movie Blackhat?
• The bad guys used a RAT
• Remote Access Tool
• Here’s a RAT’s eye view of an
infected computer:
• access to your microphone,
webcam, files, passwords, and
everything else…
Your card data sold here
• Carding sites
• Sold as card “dumps”
• E.g. McDumpals
• A real website
• Priced by
– Freshness
– Balance
– Type
– Location
Thanks to krebsonsecurity.com for screenshots
Theyhavesales
Theyrun
specials
Theyhave
refund
policies
Not just credit card data
YOUR NAME, PHYSICAL ADDRESS,
PHONE, EMAIL, EMPLOYER
YOUR DATE OF BIRTH,
MEDICAL RECORD NUMBER,
SOCIAL SECURITY NUMBER,
DRIVER’S LICENSE DETAILS
YOUR INSURANCE PROVIDER,
PLAN TYPE, PAYMENT INFO,
CREDIT CARD, BANK ACCOUNT
PATIENT HISTORY, BLOOD TYPE,
ALLERGIES, SYMPTOMS, MEDICAL
CONDITIONS, PRESCRIPTIONS,
GENETIC DATA
ELECTRONIC HEALTH RECORD L1: Basic personal: stolen to
sell to spammers and for data
mining, profiling, appending
L2: Non-public identifiers: sold
for various kinds of identity
theft such as tax ID fraud
L3: Financial data: sold for
financial fraud, billing scams,
theft of funds
L4: Medical data: sold for use
in medical ID fraud, billing
fraud, drug and service
theft and abuse
Electronic health records are targeted for
general and medical ID theft
So, what are the risks and defensive
measures for…
• Online banking
• Identity theft
• Internet cameras
• Home networks
• Social media
• And more…
*This is my dog, because about now we need some cheering up.
Risks of online banking?
• Relatively low risk, some benefits
• Improved tracking of transactions
• Account alerts
– Withdrawals
– Purchases
– Dollar limits
– Location limits
• But guard your credentials!
Watch where you use your cards
• Fringe websites
– Major source of infection
• Dodgy ATMs
– Skimmers
• Support scams
• Many others
*Published 1991. Note that the publisher added “complete” to the title.
How to protect against ID theft
• Recognize the different types
of identity theft
– Payment card fraud
– New account fraud
– Tax identity fraud
• Guard your credentials
– Account numbers
– User names, passwords
Guard SSNs and account info
• Who has their Social Security Card on
them right now? Why?
• Don’t give the number out unless you
absolutely have to
• Put a Security Freeze on your children’s
credit (before the bad guys do)
• Shred paper mail that shows SSN or bank
account numbers
Password protect all your devices
• They often have access to a lot of your
identity data
• Laptops, smartphones, tablets
• Don’t share devices
• Know how to
lock/track devices
Run antivirus on all devices
• A good antivirus suite will not only block
malicious files, but also
– Stop phishing, intercept bad
URLs, block
inappropriate
content
– Plus firewall,
anti-theft,
education
Can someone really hack our home
security system and watch those cameras
we just installed?
• If you connect them to the internet and
don’t change the default password?
• Maybe!
• Research the model
• Google name + hacked
How to secure home routers
• Home routers are being targeted
• Make sure firmware is up-to-date
• Change the default password
• Hint: it may be “password”
• And anyone can find out that default
password…
Securiing home routers
• Use WPA encryption
• Don’t use WEP encryption
• Change the default SSID
• Hide the SSID
Social media risks?
• Scams, fake offers, fake people
• It can seem so real because our friends
are there: we tend to trust social media
• But it may be abused by “friends”
• If you are a parent
and/or guardian
– Have the social
media conversation
sooner rather than later
– Poor choices can lead
to very bad outcomes
Staying safe on social media
• Monitor their accounts
• Review privacy & security settings
• Use a social media scanner
• “Think before you post”
– Good advice for all of us
Stay safe online!
• A website full of security tips and advice
for everyone:
– www.StaySafeOnline.org
Use the web to stay up to date
• IdentityTheft.gov
• IdTheftCenter.org
• KrebsOnSecurity.com
• WeLiveSecurity.com
Thank you!
• www.WeLiveSecurity.com
• www.eset.com

Cybersecurity for the non-technical

  • 1.
    Protecting your selfand your data in the cyber age Stephen Cobb, CISSP Security Researcher, ESET NA
  • 2.
    Back then*: veryfew people cared about computer security *Published 1991. Note that the publisher added “complete” to the title.
  • 3.
    But now: we’reall computer users *Go to StaySafeOnline.org for more about STOP | THINK | CONNECT
  • 4.
    Our Agenda: Cybersecurityfor all • Answers to questions, such as: – What are the risks of online banking? – What about identity theft? – Can hackers get to those home security cameras we just installed? – How to properly secure home routers – How to protect our children on social media such as Facebook • But first: – Why is there so much cybercrime?
  • 5.
    GLOBAL MARKET FOR: STOLENINFORMATION CYBERCRIME SERVICES CYBERCRIME TOOLS
  • 6.
    This fuels alot of cybercrime
  • 7.
    Sadly, cybercrime pays Morethan all the bank robberies that year
  • 8.
    0 1000 2000 3000 4000 5000 6000 7000 8000 9000 $- $100 $200 $300 $400 $500 $600 $700 $800 $900 Millions Bank robbery vs.Internet fraud Source: FBI/IC3. Note that bank robberies are declining in number and average loot per job. Fraud is clearly rising, these are not all the cases. $ cyber fraud losses # of bank robberies
  • 9.
    Sadly, the risksremain low $100million
  • 10.
  • 11.
    Cybercrime has createdan global market for information
  • 12.
    How does cybercrimepay? 1. First, criminals steal information and sell it on the black market • Low risk, high reward 2. Then different criminals buy the stolen data and commit fraud, e.g. • Charge your accounts • Get your tax refund • Riskier than #1 • But still safer than robbing banks
  • 13.
    Who are theplayers in these underground markets? Markets for Cybercrime Tools and Stolen Data (RAND, 2014) BEWARE WORK AT HOME SCAMS!
  • 14.
    Tools of thetrade: point-n-click malware
  • 15.
    • See themovie Blackhat? • The bad guys used a RAT • Remote Access Tool • Here’s a RAT’s eye view of an infected computer: • access to your microphone, webcam, files, passwords, and everything else…
  • 16.
    Your card datasold here • Carding sites • Sold as card “dumps” • E.g. McDumpals • A real website • Priced by – Freshness – Balance – Type – Location
  • 17.
  • 18.
  • 19.
    Not just creditcard data
  • 20.
    YOUR NAME, PHYSICALADDRESS, PHONE, EMAIL, EMPLOYER YOUR DATE OF BIRTH, MEDICAL RECORD NUMBER, SOCIAL SECURITY NUMBER, DRIVER’S LICENSE DETAILS YOUR INSURANCE PROVIDER, PLAN TYPE, PAYMENT INFO, CREDIT CARD, BANK ACCOUNT PATIENT HISTORY, BLOOD TYPE, ALLERGIES, SYMPTOMS, MEDICAL CONDITIONS, PRESCRIPTIONS, GENETIC DATA ELECTRONIC HEALTH RECORD L1: Basic personal: stolen to sell to spammers and for data mining, profiling, appending L2: Non-public identifiers: sold for various kinds of identity theft such as tax ID fraud L3: Financial data: sold for financial fraud, billing scams, theft of funds L4: Medical data: sold for use in medical ID fraud, billing fraud, drug and service theft and abuse Electronic health records are targeted for general and medical ID theft
  • 21.
    So, what arethe risks and defensive measures for… • Online banking • Identity theft • Internet cameras • Home networks • Social media • And more… *This is my dog, because about now we need some cheering up.
  • 22.
    Risks of onlinebanking? • Relatively low risk, some benefits • Improved tracking of transactions • Account alerts – Withdrawals – Purchases – Dollar limits – Location limits • But guard your credentials!
  • 23.
    Watch where youuse your cards • Fringe websites – Major source of infection • Dodgy ATMs – Skimmers • Support scams • Many others *Published 1991. Note that the publisher added “complete” to the title.
  • 24.
    How to protectagainst ID theft • Recognize the different types of identity theft – Payment card fraud – New account fraud – Tax identity fraud • Guard your credentials – Account numbers – User names, passwords
  • 25.
    Guard SSNs andaccount info • Who has their Social Security Card on them right now? Why? • Don’t give the number out unless you absolutely have to • Put a Security Freeze on your children’s credit (before the bad guys do) • Shred paper mail that shows SSN or bank account numbers
  • 26.
    Password protect allyour devices • They often have access to a lot of your identity data • Laptops, smartphones, tablets • Don’t share devices • Know how to lock/track devices
  • 27.
    Run antivirus onall devices • A good antivirus suite will not only block malicious files, but also – Stop phishing, intercept bad URLs, block inappropriate content – Plus firewall, anti-theft, education
  • 28.
    Can someone reallyhack our home security system and watch those cameras we just installed? • If you connect them to the internet and don’t change the default password? • Maybe! • Research the model • Google name + hacked
  • 29.
    How to securehome routers • Home routers are being targeted • Make sure firmware is up-to-date • Change the default password • Hint: it may be “password” • And anyone can find out that default password…
  • 31.
    Securiing home routers •Use WPA encryption • Don’t use WEP encryption • Change the default SSID • Hide the SSID
  • 32.
    Social media risks? •Scams, fake offers, fake people • It can seem so real because our friends are there: we tend to trust social media • But it may be abused by “friends” • If you are a parent and/or guardian – Have the social media conversation sooner rather than later – Poor choices can lead to very bad outcomes
  • 33.
    Staying safe onsocial media • Monitor their accounts • Review privacy & security settings • Use a social media scanner • “Think before you post” – Good advice for all of us
  • 34.
    Stay safe online! •A website full of security tips and advice for everyone: – www.StaySafeOnline.org
  • 35.
    Use the webto stay up to date • IdentityTheft.gov • IdTheftCenter.org • KrebsOnSecurity.com • WeLiveSecurity.com
  • 36.

Editor's Notes

  • #5 PwC Global Economic Crime Survey 2014
  • #8 FYI – $50 million is more than the total loot from a year’s worth of bank robberies in America. And the entire budget of the FBI is about $8 billion.
  • #9 .
  • #12 Using various tools and websites, some of which we will look at in a moment, criminals can quickly and efficiently mount a cybercrime operation, purchasing all of the ingredients, and selling or “fencing” their ill-gotten gains, like your company’s banking credentials, or you customers’ credit cards.
  • #14 Not just Russians
  • #16 Who was the hero played by? Chris Hemsworth
  • #17 Note: these are actual screenshots. There is no legal issue with displaying these. Meet McDumpals, an online market where criminals who have stolen payment card data sell it to crooks who then use it for fraudulent purchases. People who know this is the face of cybercrime today tend to take security more seriously.
  • #18 $8.40 to $6.80 Show typical operations at an online data mart, and some prices. Krebs and others who track prices note rapid declines when large new data collections are put on the market (e.g. Target) and also decline over time as data ages.
  • #19 This series of screenshots shows typical operations at an online data mart, and some prices. Krebs and others who track prices note rapid declines when large new data collections are put on the market (e.g. Target) and also decline over time as data ages.