SlideShare a Scribd company logo
1 of 12
Download to read offline
The Emperor’s Old Clothes
Industry Myths Lead to Complacency & Risk
Grant Moerschel & Andreas Xenos
Cylance Solutions Team
Many	
  years	
  ago	
  there	
  was	
  an	
  Emperor	
  so	
  exceedingly	
  fond	
  of	
  	
  
new	
  clothes	
  that	
  he	
  spent	
  all	
  his	
  money	
  on	
  being	
  well	
  dressed.	
  	
  
One	
  day	
  two	
  swindlers	
  came	
  who	
  convinced	
  the	
  Emperor	
  their	
  	
  
fine	
  cloth	
  had	
  a	
  wonderful	
  way	
  of	
  becoming	
  invisible	
  to	
  anyone	
  	
  
who	
  was	
  unfit	
  for	
  his	
  office,	
  or	
  who	
  was	
  unusually	
  stupid.	
  
	
  
Ul@mately	
  the	
  Emperor	
  paraded	
  through	
  the	
  streets	
  nude	
  for	
  all	
  	
  
the	
  world	
  to	
  see.	
  
	
  
The	
  Emperor	
  is	
  DELUSIONAL,	
  knows	
  it,	
  and	
  does	
  not	
  care.	
  
How…
Did	
  this	
  happen?	
  
•  The	
  Emperor	
  believed	
  what	
  he	
  was	
  told	
  
without	
  checking	
  the	
  facts.	
  
•  He	
  was	
  full	
  of	
  pride	
  
•  He	
  surrounded	
  himself	
  with	
  “yes”	
  men	
  
•  In	
  the	
  end…	
  
	
  
He knew he had been cheated
However, his pride got in the way
Nothing had changed.
Takeaways •  Poor	
  leadership	
  
•  Environment	
  
•  Character	
  
	
  
Myths •  60%	
  of	
  compromises	
  do	
  not	
  use	
  malware.	
  
•  Preven@on	
  is	
  dead,	
  it	
  is	
  now	
  about	
  the	
  
mean@me	
  to	
  remediate.	
  
•  There	
  is	
  always	
  going	
  to	
  be	
  a	
  pa@ent	
  zero	
  
•  The	
  more	
  layers,	
  the	
  beOer	
  your	
  protec@on.	
  
•  AOribu@on	
  is	
  cri@cal	
  
•  The	
  aOacks	
  coming	
  out	
  today	
  are	
  more	
  
advanced	
  and	
  sophis@cated.	
  
Sound	
  
familiar?	
  
The Truth
…nothing	
  is	
  new	
  
•  Buffer	
  overflows	
  and	
  ROP	
  have	
  been	
  
around	
  for	
  30	
  years+	
  
•  Heap	
  sprays	
  are	
  just	
  glorified	
  buffer	
  
overflows.	
  
•  Using	
  normal	
  func@onality	
  in	
  a	
  malicious	
  
manner	
  is	
  nothing	
  new.	
  
•  Creden@al	
  stealing	
  
•  Hijacking	
  
•  Web	
  aOacks	
  
•  Database	
  aOacks	
  
Noise
Intelligence	
  
APT	
  
Na@on	
  State	
  Sponsored	
  
Threat	
  Landscape	
  Revolu@onary	
  
Evolving	
  
	
  
China	
  
Eastern	
  European	
  
Russia	
  
Hack@vism	
  
Espionage	
  
Advanced	
  Malware	
  
Enhanced	
  Visibility	
  
Red	
  Light	
  District	
  
Diskless	
  AOacks	
  
Why… •  Some	
  companies	
  propagate	
  myths	
  to	
  serve	
  
their	
  own	
  agenda.	
  
•  Individuals	
  use	
  myths	
  to	
  protect	
  reputa@on,	
  
rela@onships,	
  self	
  preserva@on,	
  etc.	
  
•  It’s	
  easier	
  to	
  “keep	
  doing	
  it	
  the	
  way	
  we	
  
have	
  always	
  done	
  it.”	
  
Headlines… •  “The	
  malware	
  was	
  undetectable	
  by	
  industry	
  
standard	
  an@virus	
  so_ware.”	
  
•  “The	
  scope	
  of	
  this	
  aOack	
  differs	
  from	
  any	
  we	
  
have	
  responded	
  to	
  in	
  the	
  past…”	
  
•  “The	
  boOom	
  line	
  is	
  that	
  this	
  was	
  an	
  
unparalleled	
  and	
  well	
  planned	
  crime,	
  carried	
  
out	
  by	
  an	
  organized	
  group,	
  for	
  which	
  neither	
  
[we]	
  nor	
  other	
  companies	
  could	
  have	
  been	
  
fully	
  prepared.”	
  
Breaking
News….
"this	
  change	
  [reduc@on]	
  in	
  customer	
  buying	
  
paOerns	
  is	
  at	
  least	
  par@cularly	
  due	
  in	
  changes	
  
in	
  the	
  threat	
  landscape	
  in	
  the	
  wake	
  of	
  the	
  
global	
  cyber	
  security	
  agreements	
  we've	
  seen	
  
with	
  China	
  that	
  is	
  making	
  headlines	
  since	
  
September,…"	
  	
  
	
  
Business	
  is	
  down	
  right	
  now	
  because	
  our	
  
government	
  asked	
  the	
  adversary	
  to	
  play	
  nice.	
  	
  
Takeaways •  Trust,	
  but	
  verify	
  
•  Challenge	
  the	
  old	
  
•  Overcome	
  human	
  nature,	
  we	
  
are	
  lazy.	
  
•  Encourage	
  openness	
  
•  Ques@on	
  the	
  hype	
  
•  Rehash	
  of	
  the	
  old	
  is	
  not	
  new.	
  
Booth # 300

More Related Content

Similar to Emperor's Myths Lead to Complacency

Stories, Myth, and the Humane Network
Stories, Myth, and the Humane NetworkStories, Myth, and the Humane Network
Stories, Myth, and the Humane NetworkPeter Wang
 
Computer Security
Computer SecurityComputer Security
Computer Securitytonik
 
2600 v17 n2 (summer 2000)
2600 v17 n2 (summer 2000)2600 v17 n2 (summer 2000)
2600 v17 n2 (summer 2000)Felipe Prado
 
Fix What Matters: A Data Driven Approach to Vulnerability Management
Fix What Matters: A Data Driven Approach to Vulnerability ManagementFix What Matters: A Data Driven Approach to Vulnerability Management
Fix What Matters: A Data Driven Approach to Vulnerability ManagementMichael Roytman
 
Artificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO ComplianceArtificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO CompliancePECB
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...Steve Poole
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime finalHarsha Matta
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerSteve Poole
 
Study on Zeus Banking Malware
Study on Zeus Banking MalwareStudy on Zeus Banking Malware
Study on Zeus Banking MalwareShaik Anisa
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Vibrant Event
 
Civilian OPSEC in cyberspace
Civilian OPSEC  in cyberspaceCivilian OPSEC  in cyberspace
Civilian OPSEC in cyberspacezapp0
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker SideCybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker SideSteve Poole
 
How to stop and apocalypse with second hand laptops and Open Source Software.
How to stop and apocalypse with second hand laptops and Open Source Software.How to stop and apocalypse with second hand laptops and Open Source Software.
How to stop and apocalypse with second hand laptops and Open Source Software.Emerson Tan
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Steve Poole
 

Similar to Emperor's Myths Lead to Complacency (20)

Stories, Myth, and the Humane Network
Stories, Myth, and the Humane NetworkStories, Myth, and the Humane Network
Stories, Myth, and the Humane Network
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
2600 v17 n2 (summer 2000)
2600 v17 n2 (summer 2000)2600 v17 n2 (summer 2000)
2600 v17 n2 (summer 2000)
 
Fix What Matters: A Data Driven Approach to Vulnerability Management
Fix What Matters: A Data Driven Approach to Vulnerability ManagementFix What Matters: A Data Driven Approach to Vulnerability Management
Fix What Matters: A Data Driven Approach to Vulnerability Management
 
Artificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO ComplianceArtificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO Compliance
 
The #FreeAI Manifesto
The #FreeAI ManifestoThe #FreeAI Manifesto
The #FreeAI Manifesto
 
Hacking
HackingHacking
Hacking
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime final
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 
The Guardian Avatar
The Guardian AvatarThe Guardian Avatar
The Guardian Avatar
 
Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
 
Study on Zeus Banking Malware
Study on Zeus Banking MalwareStudy on Zeus Banking Malware
Study on Zeus Banking Malware
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Civilian OPSEC in cyberspace
Civilian OPSEC  in cyberspaceCivilian OPSEC  in cyberspace
Civilian OPSEC in cyberspace
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker SideCybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker Side
 
How to stop and apocalypse with second hand laptops and Open Source Software.
How to stop and apocalypse with second hand laptops and Open Source Software.How to stop and apocalypse with second hand laptops and Open Source Software.
How to stop and apocalypse with second hand laptops and Open Source Software.
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 

Emperor's Myths Lead to Complacency

  • 1. The Emperor’s Old Clothes Industry Myths Lead to Complacency & Risk Grant Moerschel & Andreas Xenos Cylance Solutions Team
  • 2. Many  years  ago  there  was  an  Emperor  so  exceedingly  fond  of     new  clothes  that  he  spent  all  his  money  on  being  well  dressed.     One  day  two  swindlers  came  who  convinced  the  Emperor  their     fine  cloth  had  a  wonderful  way  of  becoming  invisible  to  anyone     who  was  unfit  for  his  office,  or  who  was  unusually  stupid.     Ul@mately  the  Emperor  paraded  through  the  streets  nude  for  all     the  world  to  see.     The  Emperor  is  DELUSIONAL,  knows  it,  and  does  not  care.  
  • 3. How… Did  this  happen?   •  The  Emperor  believed  what  he  was  told   without  checking  the  facts.   •  He  was  full  of  pride   •  He  surrounded  himself  with  “yes”  men   •  In  the  end…     He knew he had been cheated However, his pride got in the way Nothing had changed.
  • 4. Takeaways •  Poor  leadership   •  Environment   •  Character    
  • 5. Myths •  60%  of  compromises  do  not  use  malware.   •  Preven@on  is  dead,  it  is  now  about  the   mean@me  to  remediate.   •  There  is  always  going  to  be  a  pa@ent  zero   •  The  more  layers,  the  beOer  your  protec@on.   •  AOribu@on  is  cri@cal   •  The  aOacks  coming  out  today  are  more   advanced  and  sophis@cated.   Sound   familiar?  
  • 6. The Truth …nothing  is  new   •  Buffer  overflows  and  ROP  have  been   around  for  30  years+   •  Heap  sprays  are  just  glorified  buffer   overflows.   •  Using  normal  func@onality  in  a  malicious   manner  is  nothing  new.   •  Creden@al  stealing   •  Hijacking   •  Web  aOacks   •  Database  aOacks  
  • 7. Noise Intelligence   APT   Na@on  State  Sponsored   Threat  Landscape  Revolu@onary   Evolving     China   Eastern  European   Russia   Hack@vism   Espionage   Advanced  Malware   Enhanced  Visibility   Red  Light  District   Diskless  AOacks  
  • 8. Why… •  Some  companies  propagate  myths  to  serve   their  own  agenda.   •  Individuals  use  myths  to  protect  reputa@on,   rela@onships,  self  preserva@on,  etc.   •  It’s  easier  to  “keep  doing  it  the  way  we   have  always  done  it.”  
  • 9. Headlines… •  “The  malware  was  undetectable  by  industry   standard  an@virus  so_ware.”   •  “The  scope  of  this  aOack  differs  from  any  we   have  responded  to  in  the  past…”   •  “The  boOom  line  is  that  this  was  an   unparalleled  and  well  planned  crime,  carried   out  by  an  organized  group,  for  which  neither   [we]  nor  other  companies  could  have  been   fully  prepared.”  
  • 10. Breaking News…. "this  change  [reduc@on]  in  customer  buying   paOerns  is  at  least  par@cularly  due  in  changes   in  the  threat  landscape  in  the  wake  of  the   global  cyber  security  agreements  we've  seen   with  China  that  is  making  headlines  since   September,…"       Business  is  down  right  now  because  our   government  asked  the  adversary  to  play  nice.    
  • 11. Takeaways •  Trust,  but  verify   •  Challenge  the  old   •  Overcome  human  nature,  we   are  lazy.   •  Encourage  openness   •  Ques@on  the  hype   •  Rehash  of  the  old  is  not  new.