SlideShare a Scribd company logo
1 of 96
Download to read offline
A Look into Cyber Crime
//Cyber Security 
The interconnection and reliance of physical lifeline 
functions over the Internet (cyberspace) that impacts: 
ā€“ National Security 
ā€“ Public Health and Safety 
ā€“ Economic well-being 
Most people spend more time and energy going around problems than trying to solve them. 
~Henry Ford 
2
Cyber Security and Cyber Crime 
The first step is to admit that there is a problem. 
3
A computer lets you make more mistakes faster than any 
invention in human history - with the possible exceptions 
of handguns and tequila. 
~Mitch Ratliff 
With just a few keystrokes, cybercriminals around the 
world can disrupt our economy. 
~Ralph Basham, Director of the U.S. Secret Service 
The Internet is the crime scene of the 21st Century. 
~ Cyrus Vance Jr. , Manhattan District Attorney 
4
5
We are all connected 
Cyber Security is like 
a Public Health Issue 
6 
We impact 
each other. 
What are and 
who sets safety 
protocols? 
Sometimes 
getting a shot 
only treats the 
symptoms and 
not the causeā€¦
Why is this happening? 
7
ā€¢ Insulin pumps and pacemakers 
ā€¢ Automobiles 
ā€¢ POS and ATMs 
ā€¢ ORCL ā€“ MSFT ā€“ SYMC ā€“ RSA ā€“ VRSN ā€“ Bit9 
ā€¢ GOOG ā€“ AAPL ā€“ FB ā€“ AMZN ā€“YHOO ā€“ LNKD ā€“ GM ā€“ NSANY 
ā€¢ US drone fleet 
ā€¢ Internet of Things 
8 
Vulnerable! Connected! 
Cloud 
Mobile 
Big Data Social
Cyber Crime 
ā€¢ Global and growing industry 
ā€¢ Increasing in size and efficiency 
ā€¢ Targets everyone and every company 
ā€¢ Low barrier to entry 
ā€¢ Levels the playing field for many interests 
//Are you surprised? Seriously? 
9
We Are Only Seeing the Tip of the Iceberg 
HEADLINE GRABBING ATTACKS 
THOUSANDS MORE BELOW THE SURFACE 
APT Attacks 
Zero-Day Attacks 
Polymorphic Attacks 
Targeted Attacks 
Source: FireEye 10
Who are the Cyber Crime Actors? 
11
Basic Cybercrime Organizations 
ā€¢ Fluid and change members frequently 
ā€¢ Will form and disband on a ā€œper projectā€ basis 
ā€¢ Rife with amateurs, take a lot of risk considering the 
small payoffs 
ā€¢ Although the most troublesome, they are considered the 
bottom feeders 
ā€“ Think criminal script kiddies 
ā€“ This is usually who the Feds get, not the big guys 
12
Professional Hackers 
ā€¢ Paid per the job, usually flat rates 
ā€¢ State-side hackers can earn up to $200K a year 
ā€¢ The work is usually writing tools for others to use, 
developing/finding new exploits, and coding up 
malware 
ā€¢ Occasionally they will do a black bag job, but 
these are rare, unless they are simply looking for 
ā€œlootā€ on easy targets 
13
Spammers 
ā€¢ They earn millions per year selling their direct mail 
services 
ā€¢ They are not picky and do not consider the person 
doing the selling is committing fraud, including the 
Russia Mafia 
ā€¢ After years of jumping from ISP to ISP, it is much easier 
to lease ā€œcapacityā€ from hacker botnets or develop 
their own 
ā€¢ They are the main employer of professional hackers 
14
Traditional Mafia 
ā€¢ They are currently leaving most of the ā€œworkā€ 
to others 
ā€¢ Online ventures are sticking close to such 
things as pr0n, online gambling, etc. 
ā€¢ They are taking advantage of technology, 
using computers heavily, and using reliable 
encryption 
15
Organizedā€¦Crime 
Different levels of participants in the underground market 
Markets for Cybercrime Tools and Stolen Data (RAND, 2014) 
16
Russian Mafia 
ā€¢ Cybercrime elements are considered ā€œdivisionsā€ 
ā€“ The actual hackers themselves are kept 
compartmentalized 
ā€¢ Due to protection from a corrupt Russian 
government, most ā€œbig casesā€ do not net the big 
players, e.g. Operation Firewall 
ā€¢ There are thousands of organized crime gangs 
operating out of Russia, although most are not 
involved in cybercrime. 
ā€¢ When new hacking talent is needed, they will force 
hackers to work for them (or kill them and/or their 
families) 17
Former Soviet Military 
ā€¢ Military industrial complex in Soviet Russia was even 
more corrupt than their USA counterparts 
ā€¢ With the collapse of communism, many upper 
military personnel in Russia had few skills that paid 
well 
ā€“ Good at money laundering 
ā€“ Good at moving goods across borders 
ā€“ Connections with international crime 
18
China - Espionage 
ā€¢ Mandiantā€™s 2013 report on the Chinese (APT1) 
ā€“ Attacks on 141 organizations since 2006 (115 were in the US) 
ā€¢ Substantial evidence of Chinese sponsored activities 
ā€“ Report includes photos, forensics, communications, and profiles 
ā€¢ Soon after Mandiantā€™s report, the US government publishes a 140 
page strategy to combat the theft of US trade secrets 
ā€¢ The US government initially attempted to halt the attacks on US 
organizations 
ā€“ But soon resorted to asking China to please stop stealing our stuff 
ā€¢ Chinaā€™s response to the Mandiant report was that it was 
ā€œunprofessionalā€ to publish and make such claims 
19
China - Espionage 
ā€¢ According to the US Justice Department, of 20 cases of economic espionage 
and trade secret criminal cases from January 2009 to January 2013, 16 
involved Chinese nationals; i.e. organizations hired foreign nationals to work 
on national security level projects (DuPont, NASA, Google, Intel, DoD, etc.) 
ā€¢ 63% of impacted organizations learn they were breached from an external 
source, like law enforcement 
ā€¢ Organizations are being targeted by more than one attack group, sometimes in 
succession 
ā€¢ In 2012, 38% of targets were attacked again after the original incident was 
remediated, lodging more than one thousand attempts to regain entry to 
former victims 
ā€¢ Feb 2013 report (Akamai) shows that 30% of all observed attacks came from 
China and 13% originated from within the US 
ā€¢ March 2013 report (Solutionary) states that the majority of attacks on the US 
are now originating in the US 
20
China - Espionage 
Source: FireEye 21
Espionage ā€“ China and Russia 
Source: FireEye 22
Multi-Vector Analysis of Operation Beebus Attack 
1 
Key Attack Characteristics 
SMTP / HTTP 
Backdoor Backdoor 
3 
Multi-vectored attack 
update.exe Apr 2011 
UKNOWN Sept 2011 
RHT_SalaryGuide_2012.pdf Dec 2011 
Feb 2012 
Mar 2012 
Apr 2012 
May 2012 
Jul 2012 
Aug 2012 
Sept 2012 
Nov 2012 
Jan 2013 
install_flash_player.tmp2 
Conflict-Minerals-Overview-for-KPMG.doc 
dodd-frank-conflict-minerals.doc 
update.exe 
Boeing_Current_Market_Outlook_ā€¦pdf 
Understand your blood test report.pdf 
RHT_SalaryGuide_2012.pdf 
sensor environments.doc 
FY2013_Budget_Request.doc 
Dept of Defense FY12 ā€¦Boeing.pdf 
April is the Cruelest Month.pdf 
National Human Rightsā€¦China.pdf 
Security Predictionsā€¦2013.pdf 
rundll32.exe 
UKNOWN 
сŠ¾Š¾Š±Ń‰Šøть.doc 
install_flash_player.ex 
install_flash_player.tmp2 
Global_A&D_outlook_2012.pdf 
Defense Industry 
UAV/UAS Manufacturers 
Aerospace Industry 
1 ā€“ Email/Web with weaponized malware 
2 ā€“ Backdoor DLL dropped 
3 ā€“ Encrypted callback over HTTP to C&C 
2 
C&C Server: 
worldnews.alldownloads.ftpserver.biz 
Encrypted callback 
Timeline of attack ā€“ multiple vectors, multiple 
campaigns 
Weaponized Email 
(RHT_SalaryGuide_2012.pdf) 
1. Nation state driven attack using multiple vectors & files in campaigns spread over 2 years 
2. Exploits known vulnerabilities in several Adobe products such as Reader and Flash Player 
3. Targeted attacks - each campaign tried to compromise few specific individuals 
4. Encrypted callback communications to hide exfiltrated data 
Source: FireEye 23
China and the US Economy 
Nov 2014 
The US - China relationship is the most consequential in the world today period. 
And it will do much to determine the shape of the 21st century. 
That means we have to get it right. 
~John Kerry, Secretary of State 
US trade deficit with China is the largest in the world. 
US imports more from China than from Canada, Mexico, Japan, and Germany. 
US invests more in China, than China does in US. 
You could say China is America's banker. 
~CNN 
24
You Should Care 
Cyber Security and Cyber Crime are 
Important Issues 
Itā€™s Bad Right Now 
25
26
Tyler/Savage Estimate of Global Cost of Cyber Crime 
ā€¢ Cost of genuine cybercrime 
ā€¢ $3.46 billion 
ā€¢ Cost of transitional cybercrime 
ā€¢ $46.60 billion 
ā€¢ Cost of cybercriminal infrastructure 
ā€¢ $24.84 billion 
ā€¢ Cost of traditional crimes going 
cyber 
ā€¢ $150.20 billion 
ā€¢ Total = $225.10 billion 
Based on 2007-2010 data, authors disinclined to aggregate 27
Cyber Crime Costs in 2014 
ā€¢ Cyber attacks on large US companies resulted in an 
average of $12.7M in annual damages 
ā€“ 9.7% Increase from 2013 
ā€“ $1,601 Cost of damages for smaller companies per worker 
ā€“ $427 Cost of damages for larger companies per worker 
Ponemon Institute 2014 Cost of Cybercrime Survey 
28
Cost Framework for Cyber Crime 
Cost Framework for Cyber Crime 
Internal cost activity 
centres 
Detection 
Investigation & escalation 
Containment 
Recovery 
Ex-post response 
External consequences 
and costs 
Information loss or theft 
Business disruption 
Equipment damage 
Revenue loss 
Direct, indirect and 
opportunity costs 
associated with 
cyber crimes 
10/7/14 Ponemon InstituteĀ© presentation 29
Average annualized cost by industry sector 
$1,000,000 omitted 
$10.6 
$9.2 
$9.0 
$9.3 
$8.6 
$6.9 
$8.3 
$8.1 
$9.0 
$8.1 
$4.2 
$6.3 
$5.7 
$6.4 
$6.8 
$4.7 
$5.9 
$6.0 
$5.9 
$14.5 
$12.7 
$20.6 
$20.6 
$21.9 
$20.8 
$26.5 
$4.2 
$17.6 
$- $5.0 $10.0 $15.0 $20.0 $25.0 $30.0 
Energy & utilities 
Defense 
Financial services 
Technology 
Communications 
Transportation 
Services 
Retail 
Industrial 
Public sector 
Education & research 
Consumer products 
Healthcare 
Hospitality 
Five-year average FY 2014 
10/7/14 Ponemon InstituteĀ© presentation 30
Average annualized cyber crime cost weighted by attack 
frequency 
$25,110 
$20,507 
$22,631 
$18,915 
$1,819 
$1,690 
$1,495 
$1,166 
$1,166 
$933 
$150,539 
$121,725 
$146,005 
$131,254 
$120,519 
$207,527 
$182,025 
$226,449 
$- $50,000 $100,000 $150,000 $200,000 $250,000 
Denial of service 
Malicious insiders 
Malicious code 
Web-based attacks 
Phishing & social engineering 
Stolen devices 
Botnets 
Viruses, worms, trojans 
Malware 
Five-year average FY 2014 
10/7/14 Ponemon InstituteĀ© presentation 31
Percentage cost for external consequences 
40% 
38% 
18% 
7% 
2% 2% 
42% 
31% 
17% 
4% 
45% 
40% 
35% 
30% 
25% 
20% 
15% 
10% 
5% 
0% 
Information loss Business disruption Revenue loss Equipment damages Other costs 
FY 2014 Five-year average 
10/7/14 Ponemon InstituteĀ© presentation 32
Percentage cost by activities conducted to 
resolve a cyber attack 
30% 
19% 
16% 
14% 15% 
14% 15% 
11% 
9% 
26% 
21% 
9% 
35% 
30% 
25% 
20% 
15% 
10% 
5% 
0% 
Detection Recovery Investigation Containment Ex-post response Incident mgmt 
FY 2014 Five-year average 
10/7/14 Ponemon InstituteĀ© presentation 33
Budgeted or earmarked spending according to six 
IT security layers 
38% 
17% 16% 
13% 
12% 11% 
6% 
40% 
17% 
15% 
10% 
5% 
45% 
40% 
35% 
30% 
25% 
20% 
15% 
10% 
5% 
0% 
Network layer Data layer Application layer Human layer Physical layer Host layer 
FY 2014 FY 2013 
10/7/14 Ponemon InstituteĀ© presentation 34
Dollar Losses from Computer Fraud Cases 
IC3 report, mainly US, mainly cases referred for investigation 
35
Contrast with FBI non-cyber crime stats: 
Fewer bank robberies, less loot 
7,644 7,720 
6,957 7,272 
Average loot 
Incidents 
6,182 6,071 6,062 5,628 
5,086 
$10,086 
$8,268 
$9,254 
$9,996 
$11,787 
$10,198 
$7,585 $7,643 $7,539 
14,000 
12,000 
10,000 
8,000 
6,000 
4,000 
2,000 
- 
2003 2004 2005 2006 2007 2008 2009 2010 2011 
36
Numbers Show a Harsh Reality 
2/3 of U.S. firms 
report that 
they have been the 
victim of cyber attacks 
00.01 Every second 14 adults become a 
40% of all IT executives 
expect a major 
cybersecurity incident 
115% CAGR 
unique malware 
since 2009 
victim of cyber crime 
9,000+ 
malicious websites 
identified per day 
6.5x Number of cyber 
attacks since 2006 
95 new vulnerabilities 
discovered each week 
Source: FireEye 37
The Attacks and Weapons 
38
Elements of Cyber Crime Operations 
ā€¢ Host an exploit kit on a server 
ā€¢ Put malware on different server 
ā€¢ Send malicious email linked to exploit kit 
ā€¢ Find holes in visiting systems 
ā€¢ Use holes to infect visitors with malware 
ā€¢ Use console on command and control box 
ā€¢ To steal, DDoS, spread more malware 
ā€¢ Use markets to sell/rent infected systems 
ā€¢ Use markets to sell any data you can find 
39
The Weapons 
ā€¢ Botnets 
ā€“ Average size is 5000 computers, some have been as large as 500,000 
computers 
ā€“ New command and control software allows botnet capacity leasing of 
subsections of the botnet 
ā€¢ Phishing 
ā€“ You guys *do* know what phishing is, right? 
ā€¢ Targeted Viruses 
ā€“ Used to create quick one-time-use botnets 
ā€“ Also used when specifically targeting a single site or organization 
ā€¢ The usual Internet attack tools 
40
Exploit Toolkits & Malware 
ā€¢ In 2013, Exploit Toolkits cost between $40 and $4k 
ā€¢ The Malware that likely compromised Targetā€™s POS system, 
cost less than $3,000. 
ā€¢ 61% of all malware is based on pre-existing toolkits; upgrades 
keep them current and provide additional capabilities 
(ā€œValueā€) 
ā€¢ Toolkits used for Targeted Attacks can create custom Blog 
entries, emails, IMs, & web site templates to entice targets 
toward malicious links / content. (Blackhole >100k/day) 
41
Exploit Toolkits & Malware 
ā€¢ Traditional attacks were loud, high volume attacks typically 
stopped by threat monitoring tools 
ā€¢ Todayā€™s sniper attacks use specific exploits to get clear shots at 
the objective 
ā€¢ The convergence of Social Engineering, Social Profiling, and 
Geo-Location improve attack success 
ā€¢ Rogue software (anti-virus, registry cleaner, machine speed 
improvement, backup software, etc) 
ā€“ Increase in MAC Malware (MAC Defender) 
ā€“ +50% attacks on Social Media sites were Malware 
42
Cyber Crime Tools are Readily Available 
From a chart by DeepEnd Research 
ā€¢ Exploit Kits 
ā€¢ Buy or rent 
ā€¢ A few hundred dollars to 
thousands 
ā€¢ Add new exploits over time 
ā€¢ Note all of the Java exploits 
43
Proliferation and Variety of Exploit Kits Over Time 
Markets for Cybercrime Tools and Stolen Data (RAND, 2014) 
44
Attacks: Spam 
2013 SPAM Results 
ā€¢ Spam is at 69% of all global email 
ā€¢ Phishing attacks are 1 in every 414 
emails 
ā€¢ Email that contained a virus were 1 in 
every 291 
ā€¢ Top Industries Attacked: 
Manufacturing, Financial, Services, 
Government, Energy 
ā€¢ Top Recipients Attacked: R&D, Sales, 
C-Suite, Shared Mailbox 
45
Attacks: Phishing / Spearing Phishing 
46
Attacks: Ransomware 
ā€¢ Mobile Internet will continue to increase as it 
eventually takes the place of desktop Internet. 
ā€¢ The illegal drug organizations are looking to Cyber 
Crime to facilitate their business and expand their 
operations. Your organization could be infiltrated by an 
insider, socially engineered for identities and social 
profiles, and potentially held hostage with 
ransomeware. 
ā€¢ Localized Crypto-LNoactikone Srta fter aottmack sR oun Us.sSi. ain cirsea soen e 
of the current Threats 47
Attacks: Botnets 
48 
ļ‚ž A botnet is a large number of compromised computers that are used to 
create and send spam or viruses or flood a network with messages as a 
denial of service attack. 
ļ‚ž The compromised computers are called zombies
Attacks: Water Holing 
Several attacks in 2013 were conducted by luring 
victims to accept malware or follow a link to an 
infected site. 4% of all email contained a 
Malware or a link to and infected site. 
There are 6 stages of the attack: 
49
Attacks: Water Holing 
50
Attacks: Water Holing ā€“ Facebook 
ā€¢ Typo-Squatting 
ā€¢ Fake Facebook Applications 
ā€¢ Hidden Camera Video Lure 
ā€¢ Celebrity Deaths 
ā€¢ Fake Offers & Gifts 
ā€¢ Browser Plugin Scams 
ā€¢ Fake Profile Creeper 
ā€¢ Blog Spam Attack 
51
Search Engine Poisoning (SEP) 
2013 saw an increase in malware infections as a result of 
SEP. 
ā€¢ Hackers crawling current news headlines, creating 
related malicious sites and conducting SEP 
ā€¢ Google Images ā€“ links to source photo 
ā€¢ Using web analytics to determine what people are 
searching for 
52
Attacks: Amplification DDoS 
Attacker Amplifier Victim 
C.Rossow ā€“ Amplification DDoS Attacks: Defenses for Vulnerable Protocols 53
DDOS - 14 Network Protocols Vulnerable to Amplification 
54 
ā€˜87 
ā€™90 
ā€˜88 
ā€˜87 
ā€˜99 ā€˜83 
ā€˜83 ā€˜99 
2003 
2001 
2002 
C.Rossow ā€“ Amplification DDoS Attacks: Defenses for Vulnerable Protocols
DDOS - Amplification Attacks in Practice 
55 
Cloudflare Blog post, February 2014 
Cloudflare Blog post, March 2013 
C.Rossow ā€“ Amplification DDoS Attacks: Defenses for Vulnerable Protocols
November 2014 Massive Website Attack on One Company 
56
Attacks: Remote Access Tools (RATs) 
ā€¢ RATs and Remote Server Administration Tools 
ā€“ Avoid using remote administration tools on point-of-sale devices 
ā€¢ Severely lock them down with strong passwords and use other strong security 
controls 
ā€“ Crooks exploit vulnerabilities or use weak/default credentials 
ā€“ Verizon and Trustwave findings: 
ā€¢ Remote access tools installed on the point-of-sale device are the leading cause of 
card data breaches 
ā€¢ Attackers scan Internet for remote administration software and then use 
automated tools to break-in 
ā€¢ Symantec pcAnywhere 
ā€“ January 2012, Symantec acknowledged that hackers stole the source code 
ā€“ Urged users to either update the software or remove the program altogether 
57
Attack: Passwords 
//Passwords are the new perimeter 
ā€¢ Passwords are weak 
ā€¢ Use multi-factor authentication as much as you can 
ā€¢ Obey common good practices for administrative 
accounts 
ā€¢ Do not reuse passwords on multiple sites 
ā€“ Utilize a password wallet 
ā€“ Utilize privileged account vault 
ā€¢ Obey common good practices for passwords 
ā€¢ Be mindful what email account resets account password 
59
Underground Dump store - McDumpals 
krebsonsecurity.com 60
61
62
63
64
Underground Stolen Medical Records for Sale 
9/14 Medical 
records being sold 
in bulk for as little 
as $6.40 apiece 
krebsonsecurity.com 65
Imperial Russia: 
Ad selling medical and financial records stolen 
66
ID Theft Service - Superget.info 
krebsonsecurity.com 67
Fraud Forum: Point-and-Click Tools for Sale 
krebsonsecurity.com 68
Example - Internet Black Market Pricing Guide 
ā€¢ Exploit code for known flaw 
ā€“ $100-$500 if no exploit code exists 
ā€“ Price drops to $0 after exploit code is ā€œpublicā€ 
ā€¢ Exploit code for unknown flaw - $1000-$5000 
ā€“ Buyers include iDefense, Russian Mafia, Chinese and French governments, 
etc 
ā€¢ List of 5000 IP addresses of computers infected with spyware/trojan 
for remote control - $150-$500 
ā€¢ List of 1000 working credit card numbers - $500-$5000 
ā€“ Price has increased since Operation Firewall 
ā€¢ Annual salary of a top-end skilled black hat hacker working for 
spammers - $100K-$200K 
69
Contents used with permission from FireEye.
~80% 
of companies are 
compromised! 
Contents used with permission from FireEye.
Value of a Hacked Email Account 
krebsonsecurity.com 
Crime shops charge between $1 to $3 for active accounts at dell.com, overstock.com, walmart.com, tesco.com, 
bestbuy.com and target.com, to name just a few 
72
The Scrap Value of a Hacked PC 
Your life 
commoditized 
krebsonsecurity.com 73
Value of a Hacked Smart Mobile Device 
74
Problems with Cyber Security 
Executive and Business Issues: 
ā€¢ Under investing on Information Security 
ā€¢ Security needs Board and Senior Team visibility 
ā€“ Boards and Senior Team need cyber education 
ā€¢ Use your CISO (if you have one) 
ā€¢ Need to think more broadly on the ecosystem 
ā€“ Critical security decisions are missing in Product and 
Services Teams 
ā€¢ Associated with revenue 
ā€¢ Where is cyber security thinking pre-launch? 
75
Problems with Cyber Security 
Problems with Infosec: 
ā€¢ The bad guys have the upper hand 
ā€“ Only need to find one way in 
ā€“ Mostly exploit the weakest link ā€“ People 
ā€“ Security is not built-in to most products and services by default 
ā€¢ Security is a People, Process, and then Technology problem 
ā€“ Security is not a Product 
ā€¢ Focus misplaced on Compliance only 
ā€“ Problem is shared with Audit and Compliance teams 
ā€¢ Need to learn from othersā€™ mistakes 
ā€“ Lots of examples 
ā€¢ Breaches - Root Cause Analysis and Post Incident Review 
ā€“ Information Sharing & Analysis Centers (ISACs) 
76
Learning From Otherā€™s Mistakes 
ā€¢ Target breach clean up estimated at $100M 
ā€¢ The Home Depot breach clean up estimated at $62M 
ā€œIf I only got a fraction of that annually.ā€ 
~anonymous CISO 77
Learning From Otherā€™s Mistakes 
Root Cause / Post Incident Review 
ā€¢ How did these companies get hacked? 
ā€¢ What did the intruders do once in? 
ā€¢ Did they take anything? 
//Who knows what really happened? 
78
The REAL Big Data for Infosec, BUT need more 
79
Percentage annualized cyber crime cost by attack type 
5% 
4% 
4% 
4% 
6% 
9% 
8% 
10% 
10% 
13% 
14% 
13% 
19% 
18% 
24% 
23% 
6% 
12% 
0% 5% 10% 15% 20% 25% 30% 
Malicious code 
Denial of services 
Web-based attacks 
Phishing & social engineering 
Stolen devices 
Malicious insiders 
Malware 
Viruses, worms, trojans 
Botnets 
Five-year average FY 2014 
10/7/14 Ponemon InstituteĀ© presentation 80
Verizon 2014 Data Breach Investigations Report 
81
Problems with Detection 
Mandiant appears to have more solid data on nation-state attacks 82
Problems with Detection 
Verizon 2014 DBIR 170 days to detect an attack 
31 days on average to resolve cyber attacks 
ā€¢ $21,000 cost per day to resolve 
ā€¢ Insider attacks took the longest time to resolve 
2014 Cost of Cybercrime Survey 
Ponemon Institute 
There is data is out there. 
There is a lot of data that is not collected. 
There is a lot of data that is not out there and stays protected. 
83 
Verizon appears to have more solid data on merchant/commercial attacks
What Can You Do About This 
ā€¢ Be Better Prepared 
ā€¢ Acknowledge Youā€™re Not Doing Enough 
ā€¢ Acknowledge You Need Help 
84
Doomsday and Naked and Afraid Criteria 
0-100 Scale: 
1- Food (renewable) 
2- Water 
3- Shelter 
4- Security 
5- X-Factor 
0-10 Rating Scale: 
Primitive Survival Rating (PSR) 
Novice--Intermediate--Expert 
85 
5 Functions Low, Medium, and High 
Notice a Pattern Forming?
Framework for Defensible Cyber Security 
NIST Cyber Security Framework 
ā€¢ Highlights 5 security standards 
ā€“ ISOIEC 27001, COBIT, NIST 800-53, CCS SANS 20, ISAIEC 62443 
ā€¢ Risk-based 
ā€“ ISO 31000, ISOIEC 27005, NIST 800-39, ECS RMP 
ā€¢ Framework Core - 5 Functions 
ā€“ Identify, Protect, Detect, Respond, Recover 
ā€“ 98 Outcomes (Expectations of Security) 
ā€¢ Tiers and Profiles 
ā€“ Partial (Tier 1) to Adaptive (Tier 4) 
ā€¢ Criteria for cyber success 
ā€“ Used by Insurance companies 
ā€“ Used in SEC cyber security examination blueprint 
Security is a journey 
and not a destination 
86
Due Care and Heightened Expectations 
Refers to the effort made by an ordinarily prudent or reasonable 
party to avoid harm to another, taking the circumstances into 
account. 
Refers to the level of judgment, care, prudence, determination, 
and activity that a person would reasonably be expected to do 
under particular circumstances. 
87
Cyber Security Framework of Success 
Risk Management 
NIST CSF 
We will bankrupt ourselves in the vain search for absolute security. ~Dwight D. Eisenhower 
88
The Defenderā€™s Advantage 
Learning from the past ā€“ Implementing Cyber Kill Chain 
Should Be Your Infosec Teamā€™s Mindset 
89
The Attack Life Cycle ā€“ Multiple Stages 
1 Exploitation of system 
2 Malware executable download 
3 Callbacks and control established 
Compromised 
Web server, or 
Web 2.0 site 
1 
Callback Server 
IPS 
2 3 
4 Data exfiltration 
Malware spreads laterally 
5 
File Share 2 
5 
File Share 1 
4 
Breach detection is critical 
Assume that youā€™ve been compromised 
90
The Defenderā€™s Advantage 
One person's "paranoia" is another person's "engineering redundancy.ā€œ 
~Marcus J. Ranum 
91
What Defenders Need to Know 
ā€¢ The type of cyber crime to expect 
ā€¢ This is one area where we do have data 
ā€¢ Strategy to defend against them 
ā€¢ A layered defense 
92
Our Users and Current Culture 
The user's going to pick dancing pigs over security every time. 
ā€” Bruce Schneier 
If you reveal your secrets to the wind, you should not blame the wind for 
revealing them to the trees. 
ā€” Kahlil Gibran 
93 
Our Weakest Link
What Leaders Can Do to Help 
Educate, inspire, and demand 
real change towards the culture of security 
Security is Everyoneā€™s Job 
94
</What is Needed> 
ā€¢ Organization visibility and agility for security 
ā€¢ Seek thought leadership (a CISO) 
ā€“ Security needs visibility to senior team and Board 
ā€¢ Wisely invest in defensible security 
ā€¢ Follow a risk-based approach 
ā€¢ Follow a structured methodology like the NIST CSF 
ā€“ Use the data available to fine-tune defenses 
ā€“ Learn from your mistakes and otherā€™s mistakes 
ā€“ Plan and test security operations and response 
ā€¢ Knowledge is Power 
ā€“ Getting hacked is a matter of When not If 
ā€“ Security is a Journey, not a Destination 
ā€“ Security is Everyone's Job 
ā€“ Security is a team sport ā€“ It takes the village to be successful 
ā€“ Reality-check: A child can be the adversary 95
Security used to be an inconvenience sometimes, but now it's a necessity all the time. 
~Martina Navratilova after the stabbing of Monica Seles by a fan of Steffi Graf, 1993 
Phil Agcaoili 
Co-Founder & Board Member, Southern CISO Security Council 
Distinguished Fellow and Fellows Chairman, Ponemon Institute 
Founding Member, Cloud Security Alliance (CSA) 
Inventor & Co-Author, CSA Cloud Controls Matrix, 
GRC Stack, Security, Trust and Assurance Registry (STAR), and 
CSA Open Certification Framework (OCF) 
Contributor, NIST Cybersecurity Framework version 1 
@hacksec 
https://www.linkedin.com/in/philA 
96

More Related Content

What's hot

Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_securityEr Mahendra Yadav
Ā 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
Ā 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.Niloy Biswas
Ā 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsGoutama Bachtiar
Ā 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahadaliuet
Ā 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
Ā 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
Ā 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global ThreatNTT Innovation Institute Inc.
Ā 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Jim Geovedi
Ā 

What's hot (20)

Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
Ā 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
Ā 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
Ā 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
Ā 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
Ā 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
Ā 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
Ā 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Ā 
Cybercrime
CybercrimeCybercrime
Cybercrime
Ā 
cyber crime
cyber crimecyber crime
cyber crime
Ā 
1358619756 cyber terrorism
1358619756 cyber terrorism1358619756 cyber terrorism
1358619756 cyber terrorism
Ā 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
Ā 
cyber crime
cyber crimecyber crime
cyber crime
Ā 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Ā 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
Ā 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Ā 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
Ā 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Ā 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
Ā 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Ā 

Similar to AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid

Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
Ā 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsFidelis Cybersecurity
Ā 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorismshaympariyar
Ā 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
Ā 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 febmharbpavia
Ā 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bankshreemala1
Ā 
The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010- Mark - Fullbright
Ā 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018Panda Security
Ā 
12 must-know-cybersecurity
12 must-know-cybersecurity12 must-know-cybersecurity
12 must-know-cybersecurityAdrian Hall
Ā 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxbkbk37
Ā 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxwrite12
Ā 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...Ben Griffith
Ā 
A1 - CiberseguranƧa - Raising the Bar for Cybersecurity
A1 - CiberseguranƧa - Raising the Bar for CybersecurityA1 - CiberseguranƧa - Raising the Bar for Cybersecurity
A1 - CiberseguranƧa - Raising the Bar for CybersecuritySpark Security
Ā 

Similar to AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid (20)

220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
Ā 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
Ā 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
Ā 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Ā 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
Ā 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Ā 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
Ā 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank
Ā 
The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010
Ā 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
Ā 
12 must-know-cybersecurity
12 must-know-cybersecurity12 must-know-cybersecurity
12 must-know-cybersecurity
Ā 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Ā 
Ht t17
Ht t17Ht t17
Ht t17
Ā 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
Ā 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
Ā 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Ā 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
Ā 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
Ā 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
Ā 
A1 - CiberseguranƧa - Raising the Bar for Cybersecurity
A1 - CiberseguranƧa - Raising the Bar for CybersecurityA1 - CiberseguranƧa - Raising the Bar for Cybersecurity
A1 - CiberseguranƧa - Raising the Bar for Cybersecurity
Ā 

More from Phil Agcaoili

Cybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the NoiseCybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the NoisePhil Agcaoili
Ā 
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the MinePhil Agcaoili
Ā 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philAPhil Agcaoili
Ā 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingPhil Agcaoili
Ā 
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Phil Agcaoili
Ā 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber SecurityPhil Agcaoili
Ā 
OWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter MeetingOWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter MeetingPhil Agcaoili
Ā 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Phil Agcaoili
Ā 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Phil Agcaoili
Ā 
2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?Phil Agcaoili
Ā 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...Phil Agcaoili
Ā 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Phil Agcaoili
Ā 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityPhil Agcaoili
Ā 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13Phil Agcaoili
Ā 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityPhil Agcaoili
Ā 
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsPhil Agcaoili
Ā 
Moneysec - Moneyball for Security
Moneysec - Moneyball for SecurityMoneysec - Moneyball for Security
Moneysec - Moneyball for SecurityPhil Agcaoili
Ā 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryPhil Agcaoili
Ā 
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312Phil Agcaoili
Ā 
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...
2013 Democratization Of Technology   How Cloud And Consumerization Change Eve...2013 Democratization Of Technology   How Cloud And Consumerization Change Eve...
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...Phil Agcaoili
Ā 

More from Phil Agcaoili (20)

Cybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the NoiseCybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the Noise
Ā 
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
Ā 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA
Ā 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
Ā 
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Ā 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
Ā 
OWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter MeetingOWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter Meeting
Ā 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Ā 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Ā 
2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?
Ā 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
Ā 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Ā 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber Security
Ā 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13
Ā 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber Security
Ā 
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
Ā 
Moneysec - Moneyball for Security
Moneysec - Moneyball for SecurityMoneysec - Moneyball for Security
Moneysec - Moneyball for Security
Ā 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 February
Ā 
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Ā 
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...
2013 Democratization Of Technology   How Cloud And Consumerization Change Eve...2013 Democratization Of Technology   How Cloud And Consumerization Change Eve...
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...
Ā 

Recently uploaded

Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
Ā 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
Ā 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
Ā 
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130 Available With Roomdivyansh0kumar0
Ā 
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Roomdivyansh0kumar0
Ā 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
Ā 
Chennai Call Girls Porur Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Chennai Call Girls Porur Phone šŸ† 8250192130 šŸ‘… celebrity escorts serviceChennai Call Girls Porur Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Chennai Call Girls Porur Phone šŸ† 8250192130 šŸ‘… celebrity escorts servicesonalikaur4
Ā 
Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”soniya singh
Ā 
Call Girls In Sukhdev Vihar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Sukhdev Vihar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Sukhdev Vihar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Sukhdev Vihar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”soniya singh
Ā 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ā˜
Ā 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
Ā 
Russian Call Girls in Kolkata Samaira šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkataanamikaraghav4
Ā 
Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...Sheetaleventcompany
Ā 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
Ā 
VIP Kolkata Call Girl Kestopur šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur šŸ‘‰ 8250192130 Available With Roomdivyansh0kumar0
Ā 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
Ā 
Low Rate Call Girls Kolkata Avani šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkataanamikaraghav4
Ā 
Delhi Call Girls Rohini 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip Callshivangimorya083
Ā 

Recently uploaded (20)

Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Ā 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Ā 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
Ā 
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130 Available With Room
Ā 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Ā 
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Room
Ā 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
Ā 
Chennai Call Girls Porur Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Chennai Call Girls Porur Phone šŸ† 8250192130 šŸ‘… celebrity escorts serviceChennai Call Girls Porur Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Chennai Call Girls Porur Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Ā 
Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Ā 
Call Girls In Sukhdev Vihar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Sukhdev Vihar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Sukhdev Vihar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Sukhdev Vihar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Ā 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
Ā 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Ā 
Russian Call Girls in Kolkata Samaira šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Ā 
Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...
Ā 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
Ā 
VIP Kolkata Call Girl Kestopur šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur šŸ‘‰ 8250192130 Available With Room
Ā 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Ā 
Low Rate Call Girls Kolkata Avani šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Ā 
Delhi Call Girls Rohini 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip Call
Ā 
Model Call Girl in Jamuna Vihar Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in  Jamuna Vihar Delhi reach out to us at šŸ”9953056974šŸ”Model Call Girl in  Jamuna Vihar Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Jamuna Vihar Delhi reach out to us at šŸ”9953056974šŸ”
Ā 

AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid

  • 1. A Look into Cyber Crime
  • 2. //Cyber Security The interconnection and reliance of physical lifeline functions over the Internet (cyberspace) that impacts: ā€“ National Security ā€“ Public Health and Safety ā€“ Economic well-being Most people spend more time and energy going around problems than trying to solve them. ~Henry Ford 2
  • 3. Cyber Security and Cyber Crime The first step is to admit that there is a problem. 3
  • 4. A computer lets you make more mistakes faster than any invention in human history - with the possible exceptions of handguns and tequila. ~Mitch Ratliff With just a few keystrokes, cybercriminals around the world can disrupt our economy. ~Ralph Basham, Director of the U.S. Secret Service The Internet is the crime scene of the 21st Century. ~ Cyrus Vance Jr. , Manhattan District Attorney 4
  • 5. 5
  • 6. We are all connected Cyber Security is like a Public Health Issue 6 We impact each other. What are and who sets safety protocols? Sometimes getting a shot only treats the symptoms and not the causeā€¦
  • 7. Why is this happening? 7
  • 8. ā€¢ Insulin pumps and pacemakers ā€¢ Automobiles ā€¢ POS and ATMs ā€¢ ORCL ā€“ MSFT ā€“ SYMC ā€“ RSA ā€“ VRSN ā€“ Bit9 ā€¢ GOOG ā€“ AAPL ā€“ FB ā€“ AMZN ā€“YHOO ā€“ LNKD ā€“ GM ā€“ NSANY ā€¢ US drone fleet ā€¢ Internet of Things 8 Vulnerable! Connected! Cloud Mobile Big Data Social
  • 9. Cyber Crime ā€¢ Global and growing industry ā€¢ Increasing in size and efficiency ā€¢ Targets everyone and every company ā€¢ Low barrier to entry ā€¢ Levels the playing field for many interests //Are you surprised? Seriously? 9
  • 10. We Are Only Seeing the Tip of the Iceberg HEADLINE GRABBING ATTACKS THOUSANDS MORE BELOW THE SURFACE APT Attacks Zero-Day Attacks Polymorphic Attacks Targeted Attacks Source: FireEye 10
  • 11. Who are the Cyber Crime Actors? 11
  • 12. Basic Cybercrime Organizations ā€¢ Fluid and change members frequently ā€¢ Will form and disband on a ā€œper projectā€ basis ā€¢ Rife with amateurs, take a lot of risk considering the small payoffs ā€¢ Although the most troublesome, they are considered the bottom feeders ā€“ Think criminal script kiddies ā€“ This is usually who the Feds get, not the big guys 12
  • 13. Professional Hackers ā€¢ Paid per the job, usually flat rates ā€¢ State-side hackers can earn up to $200K a year ā€¢ The work is usually writing tools for others to use, developing/finding new exploits, and coding up malware ā€¢ Occasionally they will do a black bag job, but these are rare, unless they are simply looking for ā€œlootā€ on easy targets 13
  • 14. Spammers ā€¢ They earn millions per year selling their direct mail services ā€¢ They are not picky and do not consider the person doing the selling is committing fraud, including the Russia Mafia ā€¢ After years of jumping from ISP to ISP, it is much easier to lease ā€œcapacityā€ from hacker botnets or develop their own ā€¢ They are the main employer of professional hackers 14
  • 15. Traditional Mafia ā€¢ They are currently leaving most of the ā€œworkā€ to others ā€¢ Online ventures are sticking close to such things as pr0n, online gambling, etc. ā€¢ They are taking advantage of technology, using computers heavily, and using reliable encryption 15
  • 16. Organizedā€¦Crime Different levels of participants in the underground market Markets for Cybercrime Tools and Stolen Data (RAND, 2014) 16
  • 17. Russian Mafia ā€¢ Cybercrime elements are considered ā€œdivisionsā€ ā€“ The actual hackers themselves are kept compartmentalized ā€¢ Due to protection from a corrupt Russian government, most ā€œbig casesā€ do not net the big players, e.g. Operation Firewall ā€¢ There are thousands of organized crime gangs operating out of Russia, although most are not involved in cybercrime. ā€¢ When new hacking talent is needed, they will force hackers to work for them (or kill them and/or their families) 17
  • 18. Former Soviet Military ā€¢ Military industrial complex in Soviet Russia was even more corrupt than their USA counterparts ā€¢ With the collapse of communism, many upper military personnel in Russia had few skills that paid well ā€“ Good at money laundering ā€“ Good at moving goods across borders ā€“ Connections with international crime 18
  • 19. China - Espionage ā€¢ Mandiantā€™s 2013 report on the Chinese (APT1) ā€“ Attacks on 141 organizations since 2006 (115 were in the US) ā€¢ Substantial evidence of Chinese sponsored activities ā€“ Report includes photos, forensics, communications, and profiles ā€¢ Soon after Mandiantā€™s report, the US government publishes a 140 page strategy to combat the theft of US trade secrets ā€¢ The US government initially attempted to halt the attacks on US organizations ā€“ But soon resorted to asking China to please stop stealing our stuff ā€¢ Chinaā€™s response to the Mandiant report was that it was ā€œunprofessionalā€ to publish and make such claims 19
  • 20. China - Espionage ā€¢ According to the US Justice Department, of 20 cases of economic espionage and trade secret criminal cases from January 2009 to January 2013, 16 involved Chinese nationals; i.e. organizations hired foreign nationals to work on national security level projects (DuPont, NASA, Google, Intel, DoD, etc.) ā€¢ 63% of impacted organizations learn they were breached from an external source, like law enforcement ā€¢ Organizations are being targeted by more than one attack group, sometimes in succession ā€¢ In 2012, 38% of targets were attacked again after the original incident was remediated, lodging more than one thousand attempts to regain entry to former victims ā€¢ Feb 2013 report (Akamai) shows that 30% of all observed attacks came from China and 13% originated from within the US ā€¢ March 2013 report (Solutionary) states that the majority of attacks on the US are now originating in the US 20
  • 21. China - Espionage Source: FireEye 21
  • 22. Espionage ā€“ China and Russia Source: FireEye 22
  • 23. Multi-Vector Analysis of Operation Beebus Attack 1 Key Attack Characteristics SMTP / HTTP Backdoor Backdoor 3 Multi-vectored attack update.exe Apr 2011 UKNOWN Sept 2011 RHT_SalaryGuide_2012.pdf Dec 2011 Feb 2012 Mar 2012 Apr 2012 May 2012 Jul 2012 Aug 2012 Sept 2012 Nov 2012 Jan 2013 install_flash_player.tmp2 Conflict-Minerals-Overview-for-KPMG.doc dodd-frank-conflict-minerals.doc update.exe Boeing_Current_Market_Outlook_ā€¦pdf Understand your blood test report.pdf RHT_SalaryGuide_2012.pdf sensor environments.doc FY2013_Budget_Request.doc Dept of Defense FY12 ā€¦Boeing.pdf April is the Cruelest Month.pdf National Human Rightsā€¦China.pdf Security Predictionsā€¦2013.pdf rundll32.exe UKNOWN сŠ¾Š¾Š±Ń‰Šøть.doc install_flash_player.ex install_flash_player.tmp2 Global_A&D_outlook_2012.pdf Defense Industry UAV/UAS Manufacturers Aerospace Industry 1 ā€“ Email/Web with weaponized malware 2 ā€“ Backdoor DLL dropped 3 ā€“ Encrypted callback over HTTP to C&C 2 C&C Server: worldnews.alldownloads.ftpserver.biz Encrypted callback Timeline of attack ā€“ multiple vectors, multiple campaigns Weaponized Email (RHT_SalaryGuide_2012.pdf) 1. Nation state driven attack using multiple vectors & files in campaigns spread over 2 years 2. Exploits known vulnerabilities in several Adobe products such as Reader and Flash Player 3. Targeted attacks - each campaign tried to compromise few specific individuals 4. Encrypted callback communications to hide exfiltrated data Source: FireEye 23
  • 24. China and the US Economy Nov 2014 The US - China relationship is the most consequential in the world today period. And it will do much to determine the shape of the 21st century. That means we have to get it right. ~John Kerry, Secretary of State US trade deficit with China is the largest in the world. US imports more from China than from Canada, Mexico, Japan, and Germany. US invests more in China, than China does in US. You could say China is America's banker. ~CNN 24
  • 25. You Should Care Cyber Security and Cyber Crime are Important Issues Itā€™s Bad Right Now 25
  • 26. 26
  • 27. Tyler/Savage Estimate of Global Cost of Cyber Crime ā€¢ Cost of genuine cybercrime ā€¢ $3.46 billion ā€¢ Cost of transitional cybercrime ā€¢ $46.60 billion ā€¢ Cost of cybercriminal infrastructure ā€¢ $24.84 billion ā€¢ Cost of traditional crimes going cyber ā€¢ $150.20 billion ā€¢ Total = $225.10 billion Based on 2007-2010 data, authors disinclined to aggregate 27
  • 28. Cyber Crime Costs in 2014 ā€¢ Cyber attacks on large US companies resulted in an average of $12.7M in annual damages ā€“ 9.7% Increase from 2013 ā€“ $1,601 Cost of damages for smaller companies per worker ā€“ $427 Cost of damages for larger companies per worker Ponemon Institute 2014 Cost of Cybercrime Survey 28
  • 29. Cost Framework for Cyber Crime Cost Framework for Cyber Crime Internal cost activity centres Detection Investigation & escalation Containment Recovery Ex-post response External consequences and costs Information loss or theft Business disruption Equipment damage Revenue loss Direct, indirect and opportunity costs associated with cyber crimes 10/7/14 Ponemon InstituteĀ© presentation 29
  • 30. Average annualized cost by industry sector $1,000,000 omitted $10.6 $9.2 $9.0 $9.3 $8.6 $6.9 $8.3 $8.1 $9.0 $8.1 $4.2 $6.3 $5.7 $6.4 $6.8 $4.7 $5.9 $6.0 $5.9 $14.5 $12.7 $20.6 $20.6 $21.9 $20.8 $26.5 $4.2 $17.6 $- $5.0 $10.0 $15.0 $20.0 $25.0 $30.0 Energy & utilities Defense Financial services Technology Communications Transportation Services Retail Industrial Public sector Education & research Consumer products Healthcare Hospitality Five-year average FY 2014 10/7/14 Ponemon InstituteĀ© presentation 30
  • 31. Average annualized cyber crime cost weighted by attack frequency $25,110 $20,507 $22,631 $18,915 $1,819 $1,690 $1,495 $1,166 $1,166 $933 $150,539 $121,725 $146,005 $131,254 $120,519 $207,527 $182,025 $226,449 $- $50,000 $100,000 $150,000 $200,000 $250,000 Denial of service Malicious insiders Malicious code Web-based attacks Phishing & social engineering Stolen devices Botnets Viruses, worms, trojans Malware Five-year average FY 2014 10/7/14 Ponemon InstituteĀ© presentation 31
  • 32. Percentage cost for external consequences 40% 38% 18% 7% 2% 2% 42% 31% 17% 4% 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% Information loss Business disruption Revenue loss Equipment damages Other costs FY 2014 Five-year average 10/7/14 Ponemon InstituteĀ© presentation 32
  • 33. Percentage cost by activities conducted to resolve a cyber attack 30% 19% 16% 14% 15% 14% 15% 11% 9% 26% 21% 9% 35% 30% 25% 20% 15% 10% 5% 0% Detection Recovery Investigation Containment Ex-post response Incident mgmt FY 2014 Five-year average 10/7/14 Ponemon InstituteĀ© presentation 33
  • 34. Budgeted or earmarked spending according to six IT security layers 38% 17% 16% 13% 12% 11% 6% 40% 17% 15% 10% 5% 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% Network layer Data layer Application layer Human layer Physical layer Host layer FY 2014 FY 2013 10/7/14 Ponemon InstituteĀ© presentation 34
  • 35. Dollar Losses from Computer Fraud Cases IC3 report, mainly US, mainly cases referred for investigation 35
  • 36. Contrast with FBI non-cyber crime stats: Fewer bank robberies, less loot 7,644 7,720 6,957 7,272 Average loot Incidents 6,182 6,071 6,062 5,628 5,086 $10,086 $8,268 $9,254 $9,996 $11,787 $10,198 $7,585 $7,643 $7,539 14,000 12,000 10,000 8,000 6,000 4,000 2,000 - 2003 2004 2005 2006 2007 2008 2009 2010 2011 36
  • 37. Numbers Show a Harsh Reality 2/3 of U.S. firms report that they have been the victim of cyber attacks 00.01 Every second 14 adults become a 40% of all IT executives expect a major cybersecurity incident 115% CAGR unique malware since 2009 victim of cyber crime 9,000+ malicious websites identified per day 6.5x Number of cyber attacks since 2006 95 new vulnerabilities discovered each week Source: FireEye 37
  • 38. The Attacks and Weapons 38
  • 39. Elements of Cyber Crime Operations ā€¢ Host an exploit kit on a server ā€¢ Put malware on different server ā€¢ Send malicious email linked to exploit kit ā€¢ Find holes in visiting systems ā€¢ Use holes to infect visitors with malware ā€¢ Use console on command and control box ā€¢ To steal, DDoS, spread more malware ā€¢ Use markets to sell/rent infected systems ā€¢ Use markets to sell any data you can find 39
  • 40. The Weapons ā€¢ Botnets ā€“ Average size is 5000 computers, some have been as large as 500,000 computers ā€“ New command and control software allows botnet capacity leasing of subsections of the botnet ā€¢ Phishing ā€“ You guys *do* know what phishing is, right? ā€¢ Targeted Viruses ā€“ Used to create quick one-time-use botnets ā€“ Also used when specifically targeting a single site or organization ā€¢ The usual Internet attack tools 40
  • 41. Exploit Toolkits & Malware ā€¢ In 2013, Exploit Toolkits cost between $40 and $4k ā€¢ The Malware that likely compromised Targetā€™s POS system, cost less than $3,000. ā€¢ 61% of all malware is based on pre-existing toolkits; upgrades keep them current and provide additional capabilities (ā€œValueā€) ā€¢ Toolkits used for Targeted Attacks can create custom Blog entries, emails, IMs, & web site templates to entice targets toward malicious links / content. (Blackhole >100k/day) 41
  • 42. Exploit Toolkits & Malware ā€¢ Traditional attacks were loud, high volume attacks typically stopped by threat monitoring tools ā€¢ Todayā€™s sniper attacks use specific exploits to get clear shots at the objective ā€¢ The convergence of Social Engineering, Social Profiling, and Geo-Location improve attack success ā€¢ Rogue software (anti-virus, registry cleaner, machine speed improvement, backup software, etc) ā€“ Increase in MAC Malware (MAC Defender) ā€“ +50% attacks on Social Media sites were Malware 42
  • 43. Cyber Crime Tools are Readily Available From a chart by DeepEnd Research ā€¢ Exploit Kits ā€¢ Buy or rent ā€¢ A few hundred dollars to thousands ā€¢ Add new exploits over time ā€¢ Note all of the Java exploits 43
  • 44. Proliferation and Variety of Exploit Kits Over Time Markets for Cybercrime Tools and Stolen Data (RAND, 2014) 44
  • 45. Attacks: Spam 2013 SPAM Results ā€¢ Spam is at 69% of all global email ā€¢ Phishing attacks are 1 in every 414 emails ā€¢ Email that contained a virus were 1 in every 291 ā€¢ Top Industries Attacked: Manufacturing, Financial, Services, Government, Energy ā€¢ Top Recipients Attacked: R&D, Sales, C-Suite, Shared Mailbox 45
  • 46. Attacks: Phishing / Spearing Phishing 46
  • 47. Attacks: Ransomware ā€¢ Mobile Internet will continue to increase as it eventually takes the place of desktop Internet. ā€¢ The illegal drug organizations are looking to Cyber Crime to facilitate their business and expand their operations. Your organization could be infiltrated by an insider, socially engineered for identities and social profiles, and potentially held hostage with ransomeware. ā€¢ Localized Crypto-LNoactikone Srta fter aottmack sR oun Us.sSi. ain cirsea soen e of the current Threats 47
  • 48. Attacks: Botnets 48 ļ‚ž A botnet is a large number of compromised computers that are used to create and send spam or viruses or flood a network with messages as a denial of service attack. ļ‚ž The compromised computers are called zombies
  • 49. Attacks: Water Holing Several attacks in 2013 were conducted by luring victims to accept malware or follow a link to an infected site. 4% of all email contained a Malware or a link to and infected site. There are 6 stages of the attack: 49
  • 51. Attacks: Water Holing ā€“ Facebook ā€¢ Typo-Squatting ā€¢ Fake Facebook Applications ā€¢ Hidden Camera Video Lure ā€¢ Celebrity Deaths ā€¢ Fake Offers & Gifts ā€¢ Browser Plugin Scams ā€¢ Fake Profile Creeper ā€¢ Blog Spam Attack 51
  • 52. Search Engine Poisoning (SEP) 2013 saw an increase in malware infections as a result of SEP. ā€¢ Hackers crawling current news headlines, creating related malicious sites and conducting SEP ā€¢ Google Images ā€“ links to source photo ā€¢ Using web analytics to determine what people are searching for 52
  • 53. Attacks: Amplification DDoS Attacker Amplifier Victim C.Rossow ā€“ Amplification DDoS Attacks: Defenses for Vulnerable Protocols 53
  • 54. DDOS - 14 Network Protocols Vulnerable to Amplification 54 ā€˜87 ā€™90 ā€˜88 ā€˜87 ā€˜99 ā€˜83 ā€˜83 ā€˜99 2003 2001 2002 C.Rossow ā€“ Amplification DDoS Attacks: Defenses for Vulnerable Protocols
  • 55. DDOS - Amplification Attacks in Practice 55 Cloudflare Blog post, February 2014 Cloudflare Blog post, March 2013 C.Rossow ā€“ Amplification DDoS Attacks: Defenses for Vulnerable Protocols
  • 56. November 2014 Massive Website Attack on One Company 56
  • 57. Attacks: Remote Access Tools (RATs) ā€¢ RATs and Remote Server Administration Tools ā€“ Avoid using remote administration tools on point-of-sale devices ā€¢ Severely lock them down with strong passwords and use other strong security controls ā€“ Crooks exploit vulnerabilities or use weak/default credentials ā€“ Verizon and Trustwave findings: ā€¢ Remote access tools installed on the point-of-sale device are the leading cause of card data breaches ā€¢ Attackers scan Internet for remote administration software and then use automated tools to break-in ā€¢ Symantec pcAnywhere ā€“ January 2012, Symantec acknowledged that hackers stole the source code ā€“ Urged users to either update the software or remove the program altogether 57
  • 58.
  • 59. Attack: Passwords //Passwords are the new perimeter ā€¢ Passwords are weak ā€¢ Use multi-factor authentication as much as you can ā€¢ Obey common good practices for administrative accounts ā€¢ Do not reuse passwords on multiple sites ā€“ Utilize a password wallet ā€“ Utilize privileged account vault ā€¢ Obey common good practices for passwords ā€¢ Be mindful what email account resets account password 59
  • 60. Underground Dump store - McDumpals krebsonsecurity.com 60
  • 61. 61
  • 62. 62
  • 63. 63
  • 64. 64
  • 65. Underground Stolen Medical Records for Sale 9/14 Medical records being sold in bulk for as little as $6.40 apiece krebsonsecurity.com 65
  • 66. Imperial Russia: Ad selling medical and financial records stolen 66
  • 67. ID Theft Service - Superget.info krebsonsecurity.com 67
  • 68. Fraud Forum: Point-and-Click Tools for Sale krebsonsecurity.com 68
  • 69. Example - Internet Black Market Pricing Guide ā€¢ Exploit code for known flaw ā€“ $100-$500 if no exploit code exists ā€“ Price drops to $0 after exploit code is ā€œpublicā€ ā€¢ Exploit code for unknown flaw - $1000-$5000 ā€“ Buyers include iDefense, Russian Mafia, Chinese and French governments, etc ā€¢ List of 5000 IP addresses of computers infected with spyware/trojan for remote control - $150-$500 ā€¢ List of 1000 working credit card numbers - $500-$5000 ā€“ Price has increased since Operation Firewall ā€¢ Annual salary of a top-end skilled black hat hacker working for spammers - $100K-$200K 69
  • 70. Contents used with permission from FireEye.
  • 71. ~80% of companies are compromised! Contents used with permission from FireEye.
  • 72. Value of a Hacked Email Account krebsonsecurity.com Crime shops charge between $1 to $3 for active accounts at dell.com, overstock.com, walmart.com, tesco.com, bestbuy.com and target.com, to name just a few 72
  • 73. The Scrap Value of a Hacked PC Your life commoditized krebsonsecurity.com 73
  • 74. Value of a Hacked Smart Mobile Device 74
  • 75. Problems with Cyber Security Executive and Business Issues: ā€¢ Under investing on Information Security ā€¢ Security needs Board and Senior Team visibility ā€“ Boards and Senior Team need cyber education ā€¢ Use your CISO (if you have one) ā€¢ Need to think more broadly on the ecosystem ā€“ Critical security decisions are missing in Product and Services Teams ā€¢ Associated with revenue ā€¢ Where is cyber security thinking pre-launch? 75
  • 76. Problems with Cyber Security Problems with Infosec: ā€¢ The bad guys have the upper hand ā€“ Only need to find one way in ā€“ Mostly exploit the weakest link ā€“ People ā€“ Security is not built-in to most products and services by default ā€¢ Security is a People, Process, and then Technology problem ā€“ Security is not a Product ā€¢ Focus misplaced on Compliance only ā€“ Problem is shared with Audit and Compliance teams ā€¢ Need to learn from othersā€™ mistakes ā€“ Lots of examples ā€¢ Breaches - Root Cause Analysis and Post Incident Review ā€“ Information Sharing & Analysis Centers (ISACs) 76
  • 77. Learning From Otherā€™s Mistakes ā€¢ Target breach clean up estimated at $100M ā€¢ The Home Depot breach clean up estimated at $62M ā€œIf I only got a fraction of that annually.ā€ ~anonymous CISO 77
  • 78. Learning From Otherā€™s Mistakes Root Cause / Post Incident Review ā€¢ How did these companies get hacked? ā€¢ What did the intruders do once in? ā€¢ Did they take anything? //Who knows what really happened? 78
  • 79. The REAL Big Data for Infosec, BUT need more 79
  • 80. Percentage annualized cyber crime cost by attack type 5% 4% 4% 4% 6% 9% 8% 10% 10% 13% 14% 13% 19% 18% 24% 23% 6% 12% 0% 5% 10% 15% 20% 25% 30% Malicious code Denial of services Web-based attacks Phishing & social engineering Stolen devices Malicious insiders Malware Viruses, worms, trojans Botnets Five-year average FY 2014 10/7/14 Ponemon InstituteĀ© presentation 80
  • 81. Verizon 2014 Data Breach Investigations Report 81
  • 82. Problems with Detection Mandiant appears to have more solid data on nation-state attacks 82
  • 83. Problems with Detection Verizon 2014 DBIR 170 days to detect an attack 31 days on average to resolve cyber attacks ā€¢ $21,000 cost per day to resolve ā€¢ Insider attacks took the longest time to resolve 2014 Cost of Cybercrime Survey Ponemon Institute There is data is out there. There is a lot of data that is not collected. There is a lot of data that is not out there and stays protected. 83 Verizon appears to have more solid data on merchant/commercial attacks
  • 84. What Can You Do About This ā€¢ Be Better Prepared ā€¢ Acknowledge Youā€™re Not Doing Enough ā€¢ Acknowledge You Need Help 84
  • 85. Doomsday and Naked and Afraid Criteria 0-100 Scale: 1- Food (renewable) 2- Water 3- Shelter 4- Security 5- X-Factor 0-10 Rating Scale: Primitive Survival Rating (PSR) Novice--Intermediate--Expert 85 5 Functions Low, Medium, and High Notice a Pattern Forming?
  • 86. Framework for Defensible Cyber Security NIST Cyber Security Framework ā€¢ Highlights 5 security standards ā€“ ISOIEC 27001, COBIT, NIST 800-53, CCS SANS 20, ISAIEC 62443 ā€¢ Risk-based ā€“ ISO 31000, ISOIEC 27005, NIST 800-39, ECS RMP ā€¢ Framework Core - 5 Functions ā€“ Identify, Protect, Detect, Respond, Recover ā€“ 98 Outcomes (Expectations of Security) ā€¢ Tiers and Profiles ā€“ Partial (Tier 1) to Adaptive (Tier 4) ā€¢ Criteria for cyber success ā€“ Used by Insurance companies ā€“ Used in SEC cyber security examination blueprint Security is a journey and not a destination 86
  • 87. Due Care and Heightened Expectations Refers to the effort made by an ordinarily prudent or reasonable party to avoid harm to another, taking the circumstances into account. Refers to the level of judgment, care, prudence, determination, and activity that a person would reasonably be expected to do under particular circumstances. 87
  • 88. Cyber Security Framework of Success Risk Management NIST CSF We will bankrupt ourselves in the vain search for absolute security. ~Dwight D. Eisenhower 88
  • 89. The Defenderā€™s Advantage Learning from the past ā€“ Implementing Cyber Kill Chain Should Be Your Infosec Teamā€™s Mindset 89
  • 90. The Attack Life Cycle ā€“ Multiple Stages 1 Exploitation of system 2 Malware executable download 3 Callbacks and control established Compromised Web server, or Web 2.0 site 1 Callback Server IPS 2 3 4 Data exfiltration Malware spreads laterally 5 File Share 2 5 File Share 1 4 Breach detection is critical Assume that youā€™ve been compromised 90
  • 91. The Defenderā€™s Advantage One person's "paranoia" is another person's "engineering redundancy.ā€œ ~Marcus J. Ranum 91
  • 92. What Defenders Need to Know ā€¢ The type of cyber crime to expect ā€¢ This is one area where we do have data ā€¢ Strategy to defend against them ā€¢ A layered defense 92
  • 93. Our Users and Current Culture The user's going to pick dancing pigs over security every time. ā€” Bruce Schneier If you reveal your secrets to the wind, you should not blame the wind for revealing them to the trees. ā€” Kahlil Gibran 93 Our Weakest Link
  • 94. What Leaders Can Do to Help Educate, inspire, and demand real change towards the culture of security Security is Everyoneā€™s Job 94
  • 95. </What is Needed> ā€¢ Organization visibility and agility for security ā€¢ Seek thought leadership (a CISO) ā€“ Security needs visibility to senior team and Board ā€¢ Wisely invest in defensible security ā€¢ Follow a risk-based approach ā€¢ Follow a structured methodology like the NIST CSF ā€“ Use the data available to fine-tune defenses ā€“ Learn from your mistakes and otherā€™s mistakes ā€“ Plan and test security operations and response ā€¢ Knowledge is Power ā€“ Getting hacked is a matter of When not If ā€“ Security is a Journey, not a Destination ā€“ Security is Everyone's Job ā€“ Security is a team sport ā€“ It takes the village to be successful ā€“ Reality-check: A child can be the adversary 95
  • 96. Security used to be an inconvenience sometimes, but now it's a necessity all the time. ~Martina Navratilova after the stabbing of Monica Seles by a fan of Steffi Graf, 1993 Phil Agcaoili Co-Founder & Board Member, Southern CISO Security Council Distinguished Fellow and Fellows Chairman, Ponemon Institute Founding Member, Cloud Security Alliance (CSA) Inventor & Co-Author, CSA Cloud Controls Matrix, GRC Stack, Security, Trust and Assurance Registry (STAR), and CSA Open Certification Framework (OCF) Contributor, NIST Cybersecurity Framework version 1 @hacksec https://www.linkedin.com/in/philA 96