SlideShare a Scribd company logo
1 of 45
War Stories - From The
Front Lines Of InfoSec!
@stuhirstinfosec
Disclaimers;
I like memes.
I don’t take myself too seriously.
Some of these stories may or
may not have happened….
@stuhirstinfosec
Who Am I?
@stuhirstinfosec
• Public Speaker
• Run Security Scotland
Meet Up
• Run the AWS Security
Slack Forum
• Regular LinkedIn ‘Brain
Farter’
@stuhirstinfosec
The most difficult part of
security incidents is that we
don’t know what we don’t
know!
(and we often rely on people telling us!)
@stuhirstinfosec
INCIDENT
NUMBER ONE
@stuhirstinfosec
For legal
reasons, I can’t
tell you….
@stuhirstinfosec
@stuhirstinfosec
Boogle BadWords -
Compromised Passwords
Impact: £30,000 of account
spend
Attack vector: hack
What Happened/What Did We
Do….
@stuhirstinfosec
Lessons Learned!
2FA all the things!
Use a password manager!
Don’t trust 3rd parties, even boogle!
@stuhirstinfosec
INCIDENT
NUMBER TWO
@stuhirstinfosec
Open AWS ElasticSearch
Cluster
Impact: outage
Attack vector: ransomware
What Happened/What Did
We Do….
@stuhirstinfosec
@stuhirstinfosec
Open AWS S3 Buckets are
one of the easiest hacks to
do….
… you just need to find them!
@stuhirstinfosec
Lessons Learned!
Don’t make anything in AWS publicly
accessible by default!
Alert on S3 open to the world!
Automate, automate, automate!
@stuhirstinfosec
INCIDENT
NUMBER THREE
@stuhirstinfosec
Phishing email with
macro in Word doc
Impact: minimal
Attack vector: Phishing
What Happened/What
Did We Do….
@stuhirstinfosec
Lessons Learned!
Don’t jump to conclusions!
Allow yourself time to make
decisions!
Educate, train and test!
@stuhirstinfosec
INCIDENT
NUMBER FOUR
@stuhirstinfosec
Two mySQL databases with
default creds
Impact: thousands in bug
bounty payment
Attack vector: hack
What Happened/What Did We
Do….
@stuhirstinfosec
Lessons Learned!
Be careful who you get to carry
out work for you!
Lock down your data, all of it!
@stuhirstinfosec
INCIDENT
NUMBER FIVE
@stuhirstinfosec
The Mystery Chinese
‘Bots’
Impact: hours of
investigation!
Attack vector: none?!
What Happened/What Did
We Do….
@stuhirstinfosec
Lessons Learned!
Understand when an incident has
reached a conclusion!
Focus on what you CAN protect, not
on what you CAN’T
@stuhirstinfosec
INCIDENT
NUMBER SIX
@stuhirstinfosec
The Public Wi-fi
Password!
Impact: unknown
Attack vector: hack
What Happened/What
Did We Do….
@stuhirstinfosec
Lessons Learned!
Check your office space before
events!
Employ a healthy dose of paranoia!
@stuhirstinfosec
INCIDENT
NUMBER SEVEN
@stuhirstinfosec
The Trump Balloon
Impact: Twitter
craziness!
Attack vector: unknown
What Happened/What
Did We Do….
@stuhirstinfosec
Lessons Learned!
Don’t trust what you read on Twitter!
Be careful with what you say on social
media!
Protect your personal accounts - you’re
easy to find!
@stuhirstinfosec
INCIDENT
NUMBER EIGHT
@stuhirstinfosec
Wannacry
Impact: A month of
pain!
Attack vector: malware
What Happened/What
Did We Do….
@stuhirstinfosec
Where were we when Wannacry first kicked
off?
@stuhirstinfosec
Where was I for the week after it kicked off?
@stuhirstinfosec
Lessons Learned!
Don’t take holidays!
Be prepared to change your view
on something, quickly!
@stuhirstinfosec
INCIDENT
NUMBER NINE
@stuhirstinfosec
The p*ssed-off leaver!
Impact: £20k a week!
Attack vector:
insider/rogue employee
What Happened/What
Did We Do….
@stuhirstinfosec
1.84 days to spot
2.£20k a week cost
3.Nearly 50 failures in
process
@stuhirstinfosec
Lessons Learned!
Not everyone leaves ‘happy’
If you’re a manager, ensure
accesses have been removed!
@stuhirstinfosec
SOME OF THE MORE
LIGHT HEARTED
INCIDENTS!!!
@stuhirstinfosec
@stuhirstinfosec
And to leave you with….
Toilet humour….
@stuhirstinfosec
@stuhirstinfosec
Lessons Learned!
Don’t take your laptop into the
toilet!
Stickers help!
@stuhirstinfosec
Thank you!
We’re recruiting!
Twitter; stuhirstinfosec

More Related Content

What's hot

Mobile Tools for Journalists
Mobile Tools for JournalistsMobile Tools for Journalists
Mobile Tools for Journalists
Mandy Jenkins
 
Mpowerment Outreach & Best Practices
Mpowerment Outreach & Best PracticesMpowerment Outreach & Best Practices
Mpowerment Outreach & Best Practices
Taylor Stockett
 
DH 199 Social Media Analytics
DH 199 Social Media AnalyticsDH 199 Social Media Analytics
DH 199 Social Media Analytics
Stephanie Wong
 
Cloudcamp London - Drones
Cloudcamp London - DronesCloudcamp London - Drones
Cloudcamp London - Drones
Chris Swan
 

What's hot (14)

Mobile Tools for Journalists
Mobile Tools for JournalistsMobile Tools for Journalists
Mobile Tools for Journalists
 
Mpowerment Outreach & Best Practices
Mpowerment Outreach & Best PracticesMpowerment Outreach & Best Practices
Mpowerment Outreach & Best Practices
 
Twitter for Desert Research
Twitter for Desert ResearchTwitter for Desert Research
Twitter for Desert Research
 
Reporting 1
Reporting 1Reporting 1
Reporting 1
 
Twitter 101: Everything You Always Wanted To Know * But Were Afraid To Ask
Twitter 101: Everything You Always Wanted To Know * But Were Afraid To AskTwitter 101: Everything You Always Wanted To Know * But Were Afraid To Ask
Twitter 101: Everything You Always Wanted To Know * But Were Afraid To Ask
 
Porque Investir em um time de segurança ofensiva?
Porque Investir em um time de segurança ofensiva?Porque Investir em um time de segurança ofensiva?
Porque Investir em um time de segurança ofensiva?
 
DH 199 Social Media Analytics
DH 199 Social Media AnalyticsDH 199 Social Media Analytics
DH 199 Social Media Analytics
 
Webinar: Personal Online Privacy - Sucuri Security
Webinar: Personal Online Privacy - Sucuri SecurityWebinar: Personal Online Privacy - Sucuri Security
Webinar: Personal Online Privacy - Sucuri Security
 
OPSEC for Families
OPSEC for FamiliesOPSEC for Families
OPSEC for Families
 
Ethics in Journalism 2018
Ethics in Journalism 2018Ethics in Journalism 2018
Ethics in Journalism 2018
 
News Literacy, Fall 2020: Week 11 Lecture
News Literacy, Fall 2020: Week 11 LectureNews Literacy, Fall 2020: Week 11 Lecture
News Literacy, Fall 2020: Week 11 Lecture
 
Artificial Intelligence & Neural Networks
Artificial Intelligence & Neural NetworksArtificial Intelligence & Neural Networks
Artificial Intelligence & Neural Networks
 
Cloudcamp London - Drones
Cloudcamp London - DronesCloudcamp London - Drones
Cloudcamp London - Drones
 
Twitter Basics
Twitter BasicsTwitter Basics
Twitter Basics
 

Similar to War Stories - From The Front Lines Of InfoSec!

Social mobile safety
Social mobile safetySocial mobile safety
Social mobile safety
Ernest Staats
 
People the biggest cyber risk
People the biggest cyber riskPeople the biggest cyber risk
People the biggest cyber risk
University of Hertfordshire
 
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
Santhosh Tuppad
 
9 Common Workplace Violence Myths Putting Your Company At Risk
9 Common Workplace Violence Myths Putting Your Company At Risk9 Common Workplace Violence Myths Putting Your Company At Risk
9 Common Workplace Violence Myths Putting Your Company At Risk
Warrior Concepts International, Inc.
 

Similar to War Stories - From The Front Lines Of InfoSec! (20)

An Imposter's Journey Into InfoSec
An Imposter's Journey Into InfoSecAn Imposter's Journey Into InfoSec
An Imposter's Journey Into InfoSec
 
An Imposter's Journey Into InfoSec
An Imposter's Journey Into InfoSecAn Imposter's Journey Into InfoSec
An Imposter's Journey Into InfoSec
 
Hi DevOps, I'm Security, I Love You
Hi DevOps, I'm Security, I Love YouHi DevOps, I'm Security, I Love You
Hi DevOps, I'm Security, I Love You
 
Social mobile safety
Social mobile safetySocial mobile safety
Social mobile safety
 
Stu Hirst - Thinking Out cLoud July 2019
Stu Hirst - Thinking Out cLoud July 2019Stu Hirst - Thinking Out cLoud July 2019
Stu Hirst - Thinking Out cLoud July 2019
 
Why Do Hackers Hack?
Why Do Hackers Hack?Why Do Hackers Hack?
Why Do Hackers Hack?
 
Stu Hirst - 10 Years To Ciso
Stu Hirst - 10 Years To CisoStu Hirst - 10 Years To Ciso
Stu Hirst - 10 Years To Ciso
 
People the biggest cyber risk
People the biggest cyber riskPeople the biggest cyber risk
People the biggest cyber risk
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Security is dead, Long live the Hacker
Security is dead, Long live the HackerSecurity is dead, Long live the Hacker
Security is dead, Long live the Hacker
 
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Reining in the Data   ITAG tech360 Penn State Great Valley 2015 Reining in the Data   ITAG tech360 Penn State Great Valley 2015
Reining in the Data ITAG tech360 Penn State Great Valley 2015
 
Personal internet security
Personal internet securityPersonal internet security
Personal internet security
 
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
 
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
 
9 Common Workplace Violence Myths Putting Your Company At Risk
9 Common Workplace Violence Myths Putting Your Company At Risk9 Common Workplace Violence Myths Putting Your Company At Risk
9 Common Workplace Violence Myths Putting Your Company At Risk
 
Staying Safe & Secure on Twitter
Staying Safe & Secure on TwitterStaying Safe & Secure on Twitter
Staying Safe & Secure on Twitter
 
Secure All Teh Things - Add 2 factor authentication to your own CFML projects
Secure All Teh Things - Add 2 factor authentication to your own CFML projectsSecure All Teh Things - Add 2 factor authentication to your own CFML projects
Secure All Teh Things - Add 2 factor authentication to your own CFML projects
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
An Introduction to Maskirovka aka Information Operations
An Introduction to Maskirovka aka Information OperationsAn Introduction to Maskirovka aka Information Operations
An Introduction to Maskirovka aka Information Operations
 
Password Attack and its Types-1.pdf
Password Attack and its Types-1.pdfPassword Attack and its Types-1.pdf
Password Attack and its Types-1.pdf
 

More from Stu Hirst (7)

Stu Hirst - Imposter Syndrome 2024 - Presented at Cloud Expo Europe (Cyber Ke...
Stu Hirst - Imposter Syndrome 2024 - Presented at Cloud Expo Europe (Cyber Ke...Stu Hirst - Imposter Syndrome 2024 - Presented at Cloud Expo Europe (Cyber Ke...
Stu Hirst - Imposter Syndrome 2024 - Presented at Cloud Expo Europe (Cyber Ke...
 
AWS Meet Up COPENHAGEN.pptx
AWS Meet Up COPENHAGEN.pptxAWS Meet Up COPENHAGEN.pptx
AWS Meet Up COPENHAGEN.pptx
 
Stu Hirst - Thinking Out cLoud 2020
Stu Hirst - Thinking Out cLoud 2020Stu Hirst - Thinking Out cLoud 2020
Stu Hirst - Thinking Out cLoud 2020
 
Stu Hirst "Thinking Out cLoud" 2019
Stu Hirst "Thinking Out cLoud" 2019Stu Hirst "Thinking Out cLoud" 2019
Stu Hirst "Thinking Out cLoud" 2019
 
Turing's Testers - Security Scotland May 2018
Turing's Testers - Security Scotland May 2018Turing's Testers - Security Scotland May 2018
Turing's Testers - Security Scotland May 2018
 
DevSecOps - a 2 year journey of success & failure!
DevSecOps - a 2 year journey of success & failure!DevSecOps - a 2 year journey of success & failure!
DevSecOps - a 2 year journey of success & failure!
 
Building a Security culture at Skyscanner 2016
Building a Security culture at Skyscanner 2016Building a Security culture at Skyscanner 2016
Building a Security culture at Skyscanner 2016
 

Recently uploaded

CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Recently uploaded (20)

AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 

War Stories - From The Front Lines Of InfoSec!