SlideShare a Scribd company logo
1 of 22
Overall Sponsor
HACKING THE HUMAN MIND
2015 US Platinum Meeting | New Orleans
pete.pouridis@mcx.com
469-312-2119
“Companies spend millions of
dollars on firewalls, encryption,
and secure access devices and
it's money wasted because
none of these measures
address the weakest link in the
security chain: the people who
use, administer, operate and
account for computer systems
that contain protected
information”
Kevin Mitnick
The Human Element of
Information Security
2015 US Platinum Meeting | New Orleans
2015 US Platinum Meeting | New Orleans
• Over 60% were stolen Credentials obtained
through SE attacks
• 28% of Breached resulted from week
passwords
80% of all breached retailers were PCI
Compliant at the time of the breach
The Attack Vector Of Choice
• Advancement of Technology Systems
• Majority rely on Static Credentials
o User Name and Password
o Cumbersome, inconvenient, not user friendly
• Exploit Human Behavior
o Trust of the Millennial Generation
o Adoption and understanding of older generation
• Exploit Human Motivators
o Fear
o Greed
o Willingness to Please or Serve
2015 US Platinum Meeting | New Orleans
The Attack Cycle
Typical 4 Steps
1. Information Gathering
o Success of an attack depends on this step
o Most important to focus on and affect success
2. Establishing Trust/Rapport
o Instantly
o Over time
3. Exploitation
o Attack focuses on trust/rapport built
o Affirming or Validating themselves to target
4. Execution
2015 US Platinum Meeting | New Orleans
Dark Web
Big Business
2015 US Platinum Meeting | New Orleans
Pick Your Poison
2015 US Platinum Meeting | New Orleans
Phishing
• Phishing scams use spoofed emails and
websites as lures to prompt people to
voluntarily hand over sensitive
information.
2015 US Platinum Meeting | New Orleans
Spear Phishing
• Spear phishing is an e-mail spoofing
fraud attempt that targets a specific
organization, seeking unauthorized
access to confidential data
• The spear phisher thrives on familiarity
He knows your name, your email
address and something about you
• Typically not “Random Hackers”
Spear Phishing
“Fear Example”
If you hover your mouse over the links
in the email you can see the actual
website the link will take you to on the
bottom bar
Spear Phishing
2015 US Platinum Meeting | New Orleans
Spear Phishing
2015 US Platinum Meeting | New Orleans
2015 US Platinum Meeting | New Orleans
• Telephone version of phishing is
often called Vishing
• Can be used alone or in
conjunction with a Phishing email
Vishing
• Relies on “social engineering”
techniques to trick one into
providing PII or valuable
Information
2015 US Platinum Meeting | New Orleans
• “Smishing” uses cell phone
text messages to lure
consumers in. Often the text
will contain a URL or phone
number
• The phone number often
has an automated voice
response system which asks
for your immediate
attention
Smishing
• In many cases, the
Smishing message
will come from a
"5000" number
instead of displaying
an actual phone
number
• This usually indicates
the SMS message
was sent via email
2015 US Platinum Meeting | New Orleans
Smishing
2015 US Platinum Meeting | New Orleans
Malvertising
• A malicious form of Internet
advertising used to spread
malware
• Hiding malicious code within
relatively safe online
advertisements. These ads can
lead a victim to unreliable
content or directly infect a
victim's computer with malware
• Relies on social network
advertising or user-supplied
content publishing services
Malvertising
2015 US Platinum Meeting | New Orleans
Mitigating the Risk
• Have a policy in place
• Educate Your Staff And Associates
o Don’t click through Emails or Texts from Unknown
Sources
o Don’t publish/share job-related activities on social
media and forums
2015 US Platinum Meeting | New Orleans
2015 US Platinum Meeting | New Orleans
Mitigating the Risk
Mitigating the Risk
• Have a policy in place
• Educate Your Staff And Associates
o Don’t click through Emails or Texts from Unknown
Sources
o Don’t publish/share job-related activities on social
media and forums
o Regular Social Pen Testing and Training
o 3rd Party Vendors and Partners
o Protecting your personal and company information
o Call Centers and Support Desk
2015 US Platinum Meeting | New Orleans
Mitigating the Risk
• Network Access
• Local Administrator Permissions
• Two Factor Authentication as a minimum Standard
• DLP and Data Categorization
• Cloud Based Storage and Collaboration Share Drives
• Password protecting Files
• Adopt Strong User Name and Password Standards
o Regular Changing of Passwords
o Use of Password “E-Vault” Applications
o Use Single Sign On
o Move away from static credentials
2015 US Platinum Meeting | New Orleans
2015 US Platinum Meeting | New Orleans

More Related Content

What's hot

10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness Program10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness ProgramWiley
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityStephen Cobb
 
Cyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To MeCyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To MeSimon Salter
 
Common Cyberthreats and How to Prevent Them (2019)
Common Cyberthreats and How to Prevent Them (2019)Common Cyberthreats and How to Prevent Them (2019)
Common Cyberthreats and How to Prevent Them (2019)Evan Clark
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
A Night of Phishing @ IUPUI Cyber Security Club
A Night of Phishing @ IUPUI Cyber Security ClubA Night of Phishing @ IUPUI Cyber Security Club
A Night of Phishing @ IUPUI Cyber Security ClubCurtis Brazzell
 
01 Application Security Fundamentals - part 1 - introduction and goals
01 Application Security Fundamentals - part 1 - introduction and goals01 Application Security Fundamentals - part 1 - introduction and goals
01 Application Security Fundamentals - part 1 - introduction and goalsappsec
 
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation
2017 Cyber Risk Grades by Industry: Normshield Executive PresentationNormShield, Inc.
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPTRajat Kumar
 
A delightful way to teach kids about computers
A delightful way to teach kids about computersA delightful way to teach kids about computers
A delightful way to teach kids about computers806670
 
NormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration OverviewNormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration OverviewNormShield, Inc.
 
Revealing the dark web
Revealing the dark webRevealing the dark web
Revealing the dark webVeriato
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public SectorScott Geye
 

What's hot (20)

10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness Program10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness Program
 
Phishing Incident Response Playbook
Phishing Incident Response PlaybookPhishing Incident Response Playbook
Phishing Incident Response Playbook
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
 
Cyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To MeCyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To Me
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Common Cyberthreats and How to Prevent Them (2019)
Common Cyberthreats and How to Prevent Them (2019)Common Cyberthreats and How to Prevent Them (2019)
Common Cyberthreats and How to Prevent Them (2019)
 
PHISHING PROTECTION
 PHISHING PROTECTION PHISHING PROTECTION
PHISHING PROTECTION
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
A Night of Phishing @ IUPUI Cyber Security Club
A Night of Phishing @ IUPUI Cyber Security ClubA Night of Phishing @ IUPUI Cyber Security Club
A Night of Phishing @ IUPUI Cyber Security Club
 
01 Application Security Fundamentals - part 1 - introduction and goals
01 Application Security Fundamentals - part 1 - introduction and goals01 Application Security Fundamentals - part 1 - introduction and goals
01 Application Security Fundamentals - part 1 - introduction and goals
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
 
Cyber Security Predictions 2016
Cyber Security Predictions 2016Cyber Security Predictions 2016
Cyber Security Predictions 2016
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPT
 
A delightful way to teach kids about computers
A delightful way to teach kids about computersA delightful way to teach kids about computers
A delightful way to teach kids about computers
 
NormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration OverviewNormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration Overview
 
Revealing the dark web
Revealing the dark webRevealing the dark web
Revealing the dark web
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 

Similar to 2015 NOLA_HHM_SE_PP_092015

Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxStephen Jesukanth Martin
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesArnav Chowdhury
 
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptx
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptxAvoiding the Top Social Media Frauds in 2024 Protective Measures.pptx
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptxafiyashaikh25
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Keeping an Eye On Risk - Current Concerns and Supervisory Oversight
Keeping an Eye On Risk - Current Concerns and Supervisory OversightKeeping an Eye On Risk - Current Concerns and Supervisory Oversight
Keeping an Eye On Risk - Current Concerns and Supervisory OversightCBIZ, Inc.
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessMaherHamza9
 
Social Engineering, or hacking people
Social Engineering, or hacking peopleSocial Engineering, or hacking people
Social Engineering, or hacking peopleTudor Damian
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and MoreCommunity IT Innovators
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Spear Phishing Attacks
Spear Phishing AttacksSpear Phishing Attacks
Spear Phishing AttacksIsaacDavid27
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayMichele Chubirka
 
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyCyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyJames Mulhern
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWPICPE
 

Similar to 2015 NOLA_HHM_SE_PP_092015 (20)

Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
 
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptx
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptxAvoiding the Top Social Media Frauds in 2024 Protective Measures.pptx
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Keeping an Eye On Risk - Current Concerns and Supervisory Oversight
Keeping an Eye On Risk - Current Concerns and Supervisory OversightKeeping an Eye On Risk - Current Concerns and Supervisory Oversight
Keeping an Eye On Risk - Current Concerns and Supervisory Oversight
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
 
Social Engineering, or hacking people
Social Engineering, or hacking peopleSocial Engineering, or hacking people
Social Engineering, or hacking people
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
DWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for NonprofitsDWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for Nonprofits
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Spear Phishing Attacks
Spear Phishing AttacksSpear Phishing Attacks
Spear Phishing Attacks
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyCyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 

2015 NOLA_HHM_SE_PP_092015

  • 2. 2015 US Platinum Meeting | New Orleans pete.pouridis@mcx.com 469-312-2119
  • 3. “Companies spend millions of dollars on firewalls, encryption, and secure access devices and it's money wasted because none of these measures address the weakest link in the security chain: the people who use, administer, operate and account for computer systems that contain protected information” Kevin Mitnick The Human Element of Information Security 2015 US Platinum Meeting | New Orleans
  • 4. 2015 US Platinum Meeting | New Orleans • Over 60% were stolen Credentials obtained through SE attacks • 28% of Breached resulted from week passwords 80% of all breached retailers were PCI Compliant at the time of the breach
  • 5. The Attack Vector Of Choice • Advancement of Technology Systems • Majority rely on Static Credentials o User Name and Password o Cumbersome, inconvenient, not user friendly • Exploit Human Behavior o Trust of the Millennial Generation o Adoption and understanding of older generation • Exploit Human Motivators o Fear o Greed o Willingness to Please or Serve 2015 US Platinum Meeting | New Orleans
  • 6. The Attack Cycle Typical 4 Steps 1. Information Gathering o Success of an attack depends on this step o Most important to focus on and affect success 2. Establishing Trust/Rapport o Instantly o Over time 3. Exploitation o Attack focuses on trust/rapport built o Affirming or Validating themselves to target 4. Execution 2015 US Platinum Meeting | New Orleans
  • 7. Dark Web Big Business 2015 US Platinum Meeting | New Orleans
  • 8. Pick Your Poison 2015 US Platinum Meeting | New Orleans Phishing • Phishing scams use spoofed emails and websites as lures to prompt people to voluntarily hand over sensitive information.
  • 9. 2015 US Platinum Meeting | New Orleans Spear Phishing • Spear phishing is an e-mail spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data • The spear phisher thrives on familiarity He knows your name, your email address and something about you • Typically not “Random Hackers”
  • 10. Spear Phishing “Fear Example” If you hover your mouse over the links in the email you can see the actual website the link will take you to on the bottom bar
  • 11. Spear Phishing 2015 US Platinum Meeting | New Orleans
  • 12. Spear Phishing 2015 US Platinum Meeting | New Orleans
  • 13. 2015 US Platinum Meeting | New Orleans • Telephone version of phishing is often called Vishing • Can be used alone or in conjunction with a Phishing email Vishing • Relies on “social engineering” techniques to trick one into providing PII or valuable Information
  • 14. 2015 US Platinum Meeting | New Orleans • “Smishing” uses cell phone text messages to lure consumers in. Often the text will contain a URL or phone number • The phone number often has an automated voice response system which asks for your immediate attention Smishing • In many cases, the Smishing message will come from a "5000" number instead of displaying an actual phone number • This usually indicates the SMS message was sent via email
  • 15. 2015 US Platinum Meeting | New Orleans Smishing
  • 16. 2015 US Platinum Meeting | New Orleans Malvertising • A malicious form of Internet advertising used to spread malware • Hiding malicious code within relatively safe online advertisements. These ads can lead a victim to unreliable content or directly infect a victim's computer with malware • Relies on social network advertising or user-supplied content publishing services
  • 17. Malvertising 2015 US Platinum Meeting | New Orleans
  • 18. Mitigating the Risk • Have a policy in place • Educate Your Staff And Associates o Don’t click through Emails or Texts from Unknown Sources o Don’t publish/share job-related activities on social media and forums 2015 US Platinum Meeting | New Orleans
  • 19. 2015 US Platinum Meeting | New Orleans Mitigating the Risk
  • 20. Mitigating the Risk • Have a policy in place • Educate Your Staff And Associates o Don’t click through Emails or Texts from Unknown Sources o Don’t publish/share job-related activities on social media and forums o Regular Social Pen Testing and Training o 3rd Party Vendors and Partners o Protecting your personal and company information o Call Centers and Support Desk 2015 US Platinum Meeting | New Orleans
  • 21. Mitigating the Risk • Network Access • Local Administrator Permissions • Two Factor Authentication as a minimum Standard • DLP and Data Categorization • Cloud Based Storage and Collaboration Share Drives • Password protecting Files • Adopt Strong User Name and Password Standards o Regular Changing of Passwords o Use of Password “E-Vault” Applications o Use Single Sign On o Move away from static credentials 2015 US Platinum Meeting | New Orleans
  • 22. 2015 US Platinum Meeting | New Orleans

Editor's Notes

  1. Company attacks to gain financial or corporate secrets Consumer [personal] – Comes to you as ATO In many ways in the weakest link Not effectively addressed, if at all, in a comprehensive security framework
  2. This is a graphical interpretation of the larger breaches over the past 2 years
  3. 60% of people use the same username and PW High Level Associates – Typically give Exec admins/Assistance their credentials and access. Exec Admin/Assistant typically has elevated access and, to Confidential Information Very High Conversion Rates 2/3 % v. 25/30 %
  4. 4 STEPS of An ATTACK CYBCLE Establish Trust/Rapport Big Smile or Friendly approach as you grab an opening door Building an Online profile with the target Exploitation Holding Door Open and allowing access to building Giving up user names and passwords Use Information gathered to validate themselves to the target Execution The goal of the attack is accomplished Erasing digital footprints
  5. It isn’t surprising, then, that the term “phishing” is commonly used to describe these ploys. There is also a good reason for the use of “ph” in place of the “f” in the spelling of the term. Some of the earliest hackers were known as phreaks. Phreaking refers to the exploration, experimenting and study of telecommunication systems. Phreaks and hackers have always been closely linked. The “ph” spelling was used to link phishing scams with these underground communities.
  6. BUT - more likely to be conducted by perpetrators out for financial gain, trade secrets or military information.
  7. Configure your mail/messaging Platform by pre-pending inbound email of the subject line with “External”
  8. People can also use this information to pretend to be you and open new lines of credit. Common forms of Vishing is calling from Help Desk or IT Support Continue to build on information they obtain (i.e. Operation System and version) which validates them with the next level of person
  9. Do not respond to Smishing messages– a reply of “STOP” is often used to validate an active number. Because newer form people are more susceptible to getting hooked
  10. EXAMPLE OF Bad and Legit Text SMS
  11. Malvertising reaches record levels in June Malvertising campaigns have reached more users than ever before, reported security firm Invincea yesterday, with many brand-name websites affected. The criminals actually bid for the prime advertising slots, though they probably pay for them with stolen credit card numbers. Then they use zero-day Adobe exploits to install clickfraud, botnet, ransomware, and banking Trojan malware. And the attackers don't stop with just one type of infection, he added. "We have seen instances where the initial infection delivers clickfraud malware and then, say, two days later, it will encrypt the hard disk," he said. The websites themselves were not hacked and, for the most part, the publishers were unaware of the malicious activity, according to Belcher, as the criminals got in through the advertising networks. Another tactic that is becoming more common with attackers is that of "sleeper" malware, which lies dormant after download for 14 hours or longer, in order to evade network sandboxes looking for suspicious activity.
  12. Continues to be one of the most popular attacks
  13. Have a Policy – So that associates know what to do and Who to Call One of the Biggest Targets - Call Centers being trained on account maintenance protocols, etc. SOCIAL MEDIA PUBLISHING Open Source Intelligence – “OSINT” PROTECTING PERSONAL COMPANY INFO Again - 60% of people use the same PW for everything Clear Screen
  14. Have a Policy – So that associates know what to do and Who to Call One of the Biggest Targets - Call Centers being trained on account maintenance protocols, etc. SOCIAL MEDIA PUBLISHING Open Source Intelligence – “OSINT” SOCIAL PEN TESTING PHISHING, SPEAR and VISHING Physical ACCESS DROP a BLACK BOX on Open Network Jack DROP THUMB DRIVE SEND POS KEYBOARD PROTECTING PERSONAL COMPANY INFO Again - 60% of people use the same PW for everything Clear Screen
  15. Move away from static credentials 2 Factor; Dynamic Authentication; BioMetrics