SlideShare a Scribd company logo
UNDER THE HOOD
DARIUS POVILAITIS
DARIUS@ESEC.LT
HTTPS://TYRIMAI.ESEC.LT
MASSIVE REMOTE WORK – CHALLENGES IN THE
BEGINNING
What challenges arise when people massively started remote work ?
• The massive shift to remote work overwhelmed organizations internet links ( e.g. remote user count
increased 1200% )
• That caused problems for security patch install over those saturated internet links
• Service quality issues while video communications are forced to go over VPN
• Security scanning of remote workplaces might be impacted as well
• People started to use more and more online services be it public or private sector.
• Etc.
SOLUTIONS ?
These problems caused by massive instant shift for the remote work can be managed by redesigning your
network, process flows, etc.
Split tunneling might be the case for the saturated internet links. But this cure might cause another
problems – e.g. for the security:
• In split tunneling situation remote employees might lose additional protection provided by enterprise
defense systems. So the security risks arise even at the operational level.
These are indirect security risks caused by some major changes in the infrastructure and are / were
temporary. But let's look at the direct security risks.
MAJOR SECURITY RISKS
• Social / technical attacks
• Technical attacks
SOCIAL / TECHNICAL ATTACKS
• Due to CORONA, massive shift to collaboration platforms occurred.
• Those platforms has attracted increased attention from the hackers and some of them had
some serious security vulnerabilities ( e.g. Zoom ). People were well informed regarding
those vulnerabilities.
• Other popular collaboration platforms like Teams/Office365 did not receive so much attention.
Meanwhile most organizations using Office365 have authentication setup which might expose them to
the social-technical attacks.
• During the quarantine period people were forced to use more and more public services online.
The same is true for the financial institutions – all went online. Activities not directly related to work
also might bring some dangers.
O365 AUTHENTICATION METHODS
• User / password
• User / password + 2FA ( e.g. SMS or Microsoft Authenticator )
• Federation (here you can use digital certificates)
O365 - TWO FACTOR AUTHENTICATION
If an organization wants to implement O365 in a secure way, they are considering all the above-mentioned
authentication solutions. User password authentication is insecure – everyone understands that.
Federation with certificates – are legacy – that's what I was told by local solution providers. The winner
here is two factor authentication – 2FA – that's what is said
• Username / password with SMS (or Microsoft Authenticator ) solves all authentication risks. Really ?
Do you have such a setup ?
• What would you say if just one email or SMS could break all your security ?
• The biggest problem here is that organizations don't even understand that they could be very easy
target since they are assured that 2FA is very secure.
DEMO / MOVIE
• https://tyrimai.esec.lt/movies/ivairus/o365/all1.mp4
MICROSOFT O365
• It was nothing new :) The time to setup the interception just took several hours.
• It is very easy to enumerate the organizations which are using O365
• After that – just some spoofed SMS or emails – and you might be exposed
CHECK YOUR ORGANIZATION SETUP
During the break you can ask to try that on your organization. Sometimes it is very challenging to see that
someone else is inside your organization :)
ORGANIZATIONS USING O365
THE CYBER KILL CHAIN
The kill chain in cybersecurity defines various phases of an attack . Attacks may occur in phases and can be
disrupted through controls established at each phase.
The biggest challenge and the most important / difficult steps in containing an attack is to:
• Identify and prevent an attack in advance
• Mitigate an ongoing attack
Let's look at some real attack mitigation examples
MITIGATION CAPABILITIES / CURRENT SITUATION
• Companies usually do not boast when the intrusion occurs. So it is difficult to estimate the real situation
in this area
• On the other side we do see multiple cybersecurity incidents that are in the mass media. Let's analyze
them. Let's pay attention how these threats are mitigated when they are identified.
• The examples provided would show how real attack could be identified and stopped / mitigated. That
way we can estimate our capabilities to mitigate attacks.
• The conclusions you should make yourself :)
MAIN HACKERS TARGET
• In 99% cases – they are after money or something that lets them to make that money. Remember that.
SOCIAL / TECHNICAL ATTACKS - 1337 SMS
• Massive SMS subscribe to expensive services using number 1337.
• Mostly done using hacked websites .
• Attacks are not stopped for years.
• Here is a short movie how these attacks look like:
https://tyrimai.esec.lt/index.php?option=com_content&view=article&id=35
YEAR 2018
YEAR 2020
MITIGATION RESULTS – 1337 SMS
• Search the google for the keywords – 1337 SMS – you will see fresh complaints from multiple people
LINKS
• https://www.delfi.lt/mokslas/technologijos/ispeja-apie-nesuvaldomus-sukcius-uztenka-vienos-sms-kad-
is-jusu-nesustabdomai-siurbtu-pinigus.d?id=84490425
• https://www.delfi.lt/mokslas/technologijos/ispeja-apie-gudriai-veikiancius-sukcius-uztenka-vieno-sms-
kad-is-jusu-nesustabdomai-siurbtu-pinigus.d?id=78880551
• https://tyrimai.esec.lt/index.php?option=com_content&view=article&id=35
SOCIAL / TECHNICAL ATTACKS - CREDIT CARD
STEALING
KRISTIANA ESHOP
HUNDREDS OF WEBSITES IN THE END OF 2019
EMERGENCY RESPONSE CENTRE – NUMBER 112
CREDIT CARD STEALING - MITIGATIONS
• In some cases can be done rather easily. Current biggest credit card stealing botnet in Lithuania can be
easily stopped by just blocking several small networks.
ACTIVE MITIGATION ACTIONS
• Nothing that I know
• Some institutions – e.g. Bank of Lithuania or Gaming Control Authority block access to illegal websites.
• Why this cannot be done to stop stealing credit card data from Lithuanian citizens ?
"Show Must Go On" ...
LINKS
• https://www.delfi.lt/mokslas/technologijos/tiriama-ar-buvo-isilauzta-i-kristiana-el-parduotuve-galimai-
pasisavinti-klientu-duomenys.d?id=84499591
• https://tyrimai.esec.lt/index.php?option=com_content&view=article&id=52
• https://www.lrytas.lt/it/ismanyk/2019/12/12/news/sokiruojantis-tyrimas-400-lietuvisku-interneto-
svetainiu-slapcia-vagia-vartotoju-pinigus-ir-duomenis-12894109/
• https://tyrimai.esec.lt/index.php?option=com_content&view=article&id=55
PUBLIC / FINANCIAL SERVICES ATTACKS
During the quarantine period people were forced to use more and more public services online. The same is
true for the financial institutions – all went online
• Incorrect implementation of SMART-ID / Msignature has led to massive attacks against users.
• Obvious problem that has been before everyone eyes for several years
• Very slow problem fixing
• Problem fixing speed changes instantly if the attack hits certain organization
SMART-ID / MSIGNATURE
• Attack hit banks. To be more precise – the banks users. Remember – target is money.
• Due to the incorrect authentication implementation also all Egovernment services ( more than 600 )
were impacted
• It took more than half a year for Egovernment services to become not impacted ( not verified very
carefully)
• Some organizations were very fast fixing that problem – took it seriously ( State Enterprise Centre of
Registers )
• Some organizations are still impacted
OWASP TESTING GUIDE
NKSC
IGNITIS
DEMO / MOVIE
• https://tyrimai.esec.lt/index.php?option=com_content&view=article&id=48
LINKS
• https://www.15min.lt/verslas/naujiena/finansai/sukciai-seb-banko-vartotoju-atpazinimo-kodus-
paprasciausiai-atspedavo-spraga-bandoma-uzlopyti-662-1256248
• https://tyrimai.esec.lt/index.php?option=com_content&view=article&id=48
THANK YOU!
DARIUS@ESEC.LT

More Related Content

What's hot

Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach
Aviva Spectrum™
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
GuardEra Access Solutions, Inc.
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
Leandro Bennaton
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
London School of Cyber Security
 
Sec and ethics presentation
Sec and ethics presentationSec and ethics presentation
Sec and ethics presentationDarren McManus
 
Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012
Marco Morana
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident response
Brian Honan
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
The Network Support Company
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of users
Joel Cardella
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliabilitycaca1009
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
IT-Toolkits.org
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
WSO2Con EU 2016: Reinforcing Your Enterprise with Security Architectures
WSO2Con EU 2016: Reinforcing Your Enterprise  with Security ArchitecturesWSO2Con EU 2016: Reinforcing Your Enterprise  with Security Architectures
WSO2Con EU 2016: Reinforcing Your Enterprise with Security Architectures
WSO2
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingKimberly Hood
 
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus Cloud
Swapna Shetye
 
June 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be YouJune 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be You
seadeloitte
 

What's hot (18)

Case study
Case studyCase study
Case study
 
Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 
Sec and ethics presentation
Sec and ethics presentationSec and ethics presentation
Sec and ethics presentation
 
Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident response
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of users
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
WSO2Con EU 2016: Reinforcing Your Enterprise with Security Architectures
WSO2Con EU 2016: Reinforcing Your Enterprise  with Security ArchitecturesWSO2Con EU 2016: Reinforcing Your Enterprise  with Security Architectures
WSO2Con EU 2016: Reinforcing Your Enterprise with Security Architectures
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
 
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus Cloud
 
June 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be YouJune 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be You
 

Similar to Under thehood

Cybersecurity During the COVID Era
Cybersecurity During the COVID EraCybersecurity During the COVID Era
Cybersecurity During the COVID Era
Citrin Cooperman
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
Cognizant
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
netwealthInvest
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
Melbourne IT
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterprise
Jason Bloomberg
 
Security human
Security humanSecurity human
Security human
Jisc
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Knowledge Group
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
RedZone Technologies
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
Imperva
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET Journal
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptx
srikmhh
 
a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2Mike Revell
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
Intronis MSP Solutions by Barracuda
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
Lucy Denver
 
Digitalisation du secteur de l’eau #2 : Protocoles de communication, hebergem...
Digitalisation du secteur de l’eau #2 : Protocoles de communication, hebergem...Digitalisation du secteur de l’eau #2 : Protocoles de communication, hebergem...
Digitalisation du secteur de l’eau #2 : Protocoles de communication, hebergem...
Cluster H2O
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
manigoyal112
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
Jim Kaplan CIA CFE
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Accellis Technology Group
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx
lorainedeserre
 

Similar to Under thehood (20)

Cybersecurity During the COVID Era
Cybersecurity During the COVID EraCybersecurity During the COVID Era
Cybersecurity During the COVID Era
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterprise
 
Security human
Security humanSecurity human
Security human
 
File000119
File000119File000119
File000119
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptx
 
a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
 
Digitalisation du secteur de l’eau #2 : Protocoles de communication, hebergem...
Digitalisation du secteur de l’eau #2 : Protocoles de communication, hebergem...Digitalisation du secteur de l’eau #2 : Protocoles de communication, hebergem...
Digitalisation du secteur de l’eau #2 : Protocoles de communication, hebergem...
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx
 

Recently uploaded

How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 

Recently uploaded (16)

How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 

Under thehood

  • 1. UNDER THE HOOD DARIUS POVILAITIS DARIUS@ESEC.LT HTTPS://TYRIMAI.ESEC.LT
  • 2. MASSIVE REMOTE WORK – CHALLENGES IN THE BEGINNING What challenges arise when people massively started remote work ? • The massive shift to remote work overwhelmed organizations internet links ( e.g. remote user count increased 1200% ) • That caused problems for security patch install over those saturated internet links • Service quality issues while video communications are forced to go over VPN • Security scanning of remote workplaces might be impacted as well • People started to use more and more online services be it public or private sector. • Etc.
  • 3. SOLUTIONS ? These problems caused by massive instant shift for the remote work can be managed by redesigning your network, process flows, etc. Split tunneling might be the case for the saturated internet links. But this cure might cause another problems – e.g. for the security: • In split tunneling situation remote employees might lose additional protection provided by enterprise defense systems. So the security risks arise even at the operational level. These are indirect security risks caused by some major changes in the infrastructure and are / were temporary. But let's look at the direct security risks.
  • 4. MAJOR SECURITY RISKS • Social / technical attacks • Technical attacks
  • 5. SOCIAL / TECHNICAL ATTACKS • Due to CORONA, massive shift to collaboration platforms occurred. • Those platforms has attracted increased attention from the hackers and some of them had some serious security vulnerabilities ( e.g. Zoom ). People were well informed regarding those vulnerabilities. • Other popular collaboration platforms like Teams/Office365 did not receive so much attention. Meanwhile most organizations using Office365 have authentication setup which might expose them to the social-technical attacks. • During the quarantine period people were forced to use more and more public services online. The same is true for the financial institutions – all went online. Activities not directly related to work also might bring some dangers.
  • 6. O365 AUTHENTICATION METHODS • User / password • User / password + 2FA ( e.g. SMS or Microsoft Authenticator ) • Federation (here you can use digital certificates)
  • 7. O365 - TWO FACTOR AUTHENTICATION If an organization wants to implement O365 in a secure way, they are considering all the above-mentioned authentication solutions. User password authentication is insecure – everyone understands that. Federation with certificates – are legacy – that's what I was told by local solution providers. The winner here is two factor authentication – 2FA – that's what is said • Username / password with SMS (or Microsoft Authenticator ) solves all authentication risks. Really ? Do you have such a setup ? • What would you say if just one email or SMS could break all your security ? • The biggest problem here is that organizations don't even understand that they could be very easy target since they are assured that 2FA is very secure.
  • 8.
  • 9.
  • 10.
  • 11. DEMO / MOVIE • https://tyrimai.esec.lt/movies/ivairus/o365/all1.mp4
  • 12. MICROSOFT O365 • It was nothing new :) The time to setup the interception just took several hours. • It is very easy to enumerate the organizations which are using O365 • After that – just some spoofed SMS or emails – and you might be exposed
  • 13. CHECK YOUR ORGANIZATION SETUP During the break you can ask to try that on your organization. Sometimes it is very challenging to see that someone else is inside your organization :)
  • 15. THE CYBER KILL CHAIN The kill chain in cybersecurity defines various phases of an attack . Attacks may occur in phases and can be disrupted through controls established at each phase. The biggest challenge and the most important / difficult steps in containing an attack is to: • Identify and prevent an attack in advance • Mitigate an ongoing attack Let's look at some real attack mitigation examples
  • 16. MITIGATION CAPABILITIES / CURRENT SITUATION • Companies usually do not boast when the intrusion occurs. So it is difficult to estimate the real situation in this area • On the other side we do see multiple cybersecurity incidents that are in the mass media. Let's analyze them. Let's pay attention how these threats are mitigated when they are identified. • The examples provided would show how real attack could be identified and stopped / mitigated. That way we can estimate our capabilities to mitigate attacks. • The conclusions you should make yourself :)
  • 17. MAIN HACKERS TARGET • In 99% cases – they are after money or something that lets them to make that money. Remember that.
  • 18. SOCIAL / TECHNICAL ATTACKS - 1337 SMS • Massive SMS subscribe to expensive services using number 1337. • Mostly done using hacked websites . • Attacks are not stopped for years. • Here is a short movie how these attacks look like: https://tyrimai.esec.lt/index.php?option=com_content&view=article&id=35
  • 21. MITIGATION RESULTS – 1337 SMS • Search the google for the keywords – 1337 SMS – you will see fresh complaints from multiple people
  • 23. SOCIAL / TECHNICAL ATTACKS - CREDIT CARD STEALING
  • 25. HUNDREDS OF WEBSITES IN THE END OF 2019
  • 26. EMERGENCY RESPONSE CENTRE – NUMBER 112
  • 27. CREDIT CARD STEALING - MITIGATIONS • In some cases can be done rather easily. Current biggest credit card stealing botnet in Lithuania can be easily stopped by just blocking several small networks.
  • 28.
  • 29. ACTIVE MITIGATION ACTIONS • Nothing that I know • Some institutions – e.g. Bank of Lithuania or Gaming Control Authority block access to illegal websites. • Why this cannot be done to stop stealing credit card data from Lithuanian citizens ? "Show Must Go On" ...
  • 30. LINKS • https://www.delfi.lt/mokslas/technologijos/tiriama-ar-buvo-isilauzta-i-kristiana-el-parduotuve-galimai- pasisavinti-klientu-duomenys.d?id=84499591 • https://tyrimai.esec.lt/index.php?option=com_content&view=article&id=52 • https://www.lrytas.lt/it/ismanyk/2019/12/12/news/sokiruojantis-tyrimas-400-lietuvisku-interneto- svetainiu-slapcia-vagia-vartotoju-pinigus-ir-duomenis-12894109/ • https://tyrimai.esec.lt/index.php?option=com_content&view=article&id=55
  • 31. PUBLIC / FINANCIAL SERVICES ATTACKS During the quarantine period people were forced to use more and more public services online. The same is true for the financial institutions – all went online • Incorrect implementation of SMART-ID / Msignature has led to massive attacks against users. • Obvious problem that has been before everyone eyes for several years • Very slow problem fixing • Problem fixing speed changes instantly if the attack hits certain organization
  • 32. SMART-ID / MSIGNATURE • Attack hit banks. To be more precise – the banks users. Remember – target is money. • Due to the incorrect authentication implementation also all Egovernment services ( more than 600 ) were impacted • It took more than half a year for Egovernment services to become not impacted ( not verified very carefully) • Some organizations were very fast fixing that problem – took it seriously ( State Enterprise Centre of Registers ) • Some organizations are still impacted
  • 33.
  • 35. NKSC
  • 37. DEMO / MOVIE • https://tyrimai.esec.lt/index.php?option=com_content&view=article&id=48