anatomy of a data theft attack
play

Anatomy of a Data Theft Attack For Sacramento ISACA January 2016 - PowerPoint PPT Presentation

Anatomy of a Data Theft Attack For Sacramento ISACA January 2016 Mike Landeck Cyber Security Consultant Agenda 1. USB Attacks 2. QR Code Attacks 3. Advanced Phishing Attacks 4. Malvertising 5. Watering Hole Attacks 6. How Simple Browser


  1. Anatomy of a Data Theft Attack For Sacramento ISACA January 2016 Mike Landeck Cyber Security Consultant

  2. Agenda 1. USB Attacks 2. QR Code Attacks 3. Advanced Phishing Attacks 4. Malvertising 5. Watering Hole Attacks 6. How Simple Browser Modifications Would Have Stopped These 7. Name Your Own Adventure (Time Permitting)

  3. DISCLAIMER • I do not speak on behalf of my employer. The information and perspectives I present are personal and do not represent those of my employer. • When I say “We have seen” I’m typically referring to the industry in general and not necessarily my current employer or any previous clients. • While it may look like we’re hacking on the Internet, everything we’re attacking today exists solely on my laptop. No laws are being broken

  4. Rubber Ducky Downloads • OSX Internet • grab • local dns • OSX Grab • wifi Protocol Slurp passwords and poisoning Minecraft backdoor • OSX User Backdoor email • netcat FTP Account • WiFi • Android 5.x • ducky phisher download Password and password Lockscreen • EICAR AV test and upload to FTP grabber • Basic Terminal • fork bomb reverse • OSX iMessage • deny net Commands Ubuntu • ftp download shell Capture access • batch wiper drive upload • non • OSX Internet • disable avg eraser • generic batch malicious Protocol Slurp 2012 • Chrome Password • hide cmd auto • OSX Local DNS • OSX Root Stealer window defacer Poisoning Backdoor • copy file to desktop • Information • OS X Wget • OSX • OSX User • create wireless Gathering and Passwordless Backdoor network association Ubuntu Execute SSH access (ssh • OSX Ascii keys) Prank

  5. Rubber Ducky Downloads

  6. Self-inflicted Gunshot Wounds QR Codes and Millennials

  7. Self-inflicted Gunshot Wounds

  8. Self-inflicted Gunshot Wounds

  9. Risk Path for a Data Theft Attack Physical Infiltration Near-Site Attack Remote Cyber Attack- Human Target “spear phishing” Remote Cyber Attack- Perimeter

  10. Name a Major Breach that DIDN’T Start With One of These Watering Hole Phishing Malvertising Organized Crime   Nation States   Hacktivists  

  11. Making it Personal Attacking ISACA

  12. Attacking Sacramento’s ISACA Chapter    

  13. Go-time Email Examples- Malware To : vicepresident@isaca-sacramento.org To : president@isaca-sacramento.org From : president@isaca-sacramento.org From : communications@isaca-sacramento.org Subject : For Web Site Subject : Sacramento Chapter Account Discrepancy Maria- This just came in from ISACA about Katheryn- Please post this to the website ASAP some missing money. I don’t have David’s as the registration deadline is coming up. Please contact Mike for a Please contact Mike for a address in my phone. Can you please It’s the registration form for the CRISC exam. clean copy. clean copy. forward this to him ASAP? Also, please have David forward it to the membership. Thanks, Thanks, Howard Howard Attached : SacError.pdf Attached : June-2016-CRISC-Exam-Registration- Form_frm_Eng_1115.pdf

  14. Phishing Email Demo- Malware Writing and Distributing Malware using the Social Engineering Toolkit

  15. Phishing Email Demo- Credential Harvesting Phishing the Webmaster’s Credentials

  16. Go-time Email Examples- Getting the Webmaster’s Credentials To : webmaster@isaca-sacramento.org From : communications@isaca- sacramento.org Subject : Web Site Problems Please contact Mike for a clean copy. Katheryn- I think something is broken in the members’ section. Can you take a look at this page? Thanks, David

  17. How I View the Attack Process and Awareness Training Opportunities Social Media Job Sites Employee Profiles Google LinkedIn Religion Organizations Research Sites Scanning Professional Associations Who do you Corporate trust? Friends/Colleagues IT Professional Delivery Profile Tech Vectors Interests Personal IT What are you Web Site Memberships emotional about? Phishing & Social Exposures from Role-Based IT Engineering social media data Security Training Awareness

  18. Phishing Emails

  19. Actual Phishing Logins Exchange.pitt.edu.auth.logon.aspx.bluebird.vn Images.google.com Subdomain Domain Subdomain Domain Image credit: University of Pittsburg, pitt.edu

  20. Actual Phishing Logins

  21. Phished ISACA Login- Is it or isn’t it?

  22. Malvertising Google’s Double Click and Yahoo! Ads Have Both Fallen Victim

  23. Malvertising Examples: 1. JavaScript 2. Flash Malware (#1 Attack Vector) 3. Full Server Compromise Image Credit: riskmanagementmonitor.com

  24. Watering Holes Nation State’s Newest Attack Vector

  25. Watering Holes Example: Watering Hole Example Image credit: http://blog.smartekh.com/

  26. 4 Things You Can Do Right Now Prevent What I Have Demonstrated

  27. Sign in with a GUEST Account (Not Administrator) Can be downloaded from cybersecology.com/harden-firefox.pdf

  28. Modify Your Settings: Options Can be downloaded from cybersecology.com/harden-firefox.pdf

  29. Modify Your Settings: Add-ons Can be downloaded from cybersecology.com/harden-firefox.pdf

  30. Modify Your Settings: Add-ons Can be downloaded from cybersecology.com/harden-firefox.pdf

  31. How Well Does This Work? Hardened Default Full AV Common Browser Attack Vectors Browser Browser • Psuedo-malicious Flash Settings Settings Adobe • Psuedo-malicious JavaScript Flash JavaScript Antivirus • Infected ISACA PDF Infected PDF QR Code Sticker QR Code CyberSecOlogy Sticker URL • Watering Watering Hole Hole Attack Watering Hole Example • Malvertising

  32. Contact Info @MikeLandeck www.CyberSecology.com linkedin.com/in/mikelandeck MikeLandeckCyberSec  gmail.com Please provide me feedback by taking the survey at https://www.surveymonkey.com/r/WXFY2CG

  33. Questions

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend