Anatomy of a Data Theft Attack For Sacramento ISACA January 2016 - - PowerPoint PPT Presentation

anatomy of a data theft attack
SMART_READER_LITE
LIVE PREVIEW

Anatomy of a Data Theft Attack For Sacramento ISACA January 2016 - - PowerPoint PPT Presentation

Anatomy of a Data Theft Attack For Sacramento ISACA January 2016 Mike Landeck Cyber Security Consultant Agenda 1. USB Attacks 2. QR Code Attacks 3. Advanced Phishing Attacks 4. Malvertising 5. Watering Hole Attacks 6. How Simple Browser


slide-1
SLIDE 1

Anatomy of a Data Theft Attack For Sacramento ISACA January 2016

Mike Landeck Cyber Security Consultant

slide-2
SLIDE 2

Agenda

  • 1. USB Attacks
  • 2. QR Code Attacks
  • 3. Advanced Phishing Attacks
  • 4. Malvertising
  • 5. Watering Hole Attacks
  • 6. How Simple Browser Modifications Would Have Stopped These
  • 7. Name Your Own Adventure (Time Permitting)
slide-3
SLIDE 3

DISCLAIMER

  • I do not speak on behalf of my employer. The information and

perspectives I present are personal and do not represent those of my employer.

  • When I say “We have seen” I’m typically referring to the industry

in general and not necessarily my current employer or any previous clients.

  • While it may look like we’re hacking on the Internet, everything

we’re attacking today exists solely on my laptop. No laws are being broken

slide-4
SLIDE 4

Rubber Ducky Downloads

  • OSX Internet

Protocol Slurp

  • OSX User Backdoor
  • Android 5.x

Lockscreen

  • Basic Terminal

Commands Ubuntu

  • batch wiper drive

eraser

  • Chrome Password

Stealer

  • copy file to desktop
  • create wireless

network association

  • grab

passwords and email

  • ducky phisher
  • EICAR AV test
  • fork bomb
  • ftp download

upload

  • generic batch
  • hide cmd

window

  • Information

Gathering Ubuntu

  • local dns

poisoning

  • netcat FTP

download and reverse shell

  • non

malicious auto defacer

  • OS X Wget

and Execute

  • OSX Ascii

Prank

  • OSX Grab

Minecraft Account Password and upload to FTP

  • OSX iMessage

Capture

  • OSX Internet

Protocol Slurp

  • OSX Local DNS

Poisoning

  • OSX

Passwordless SSH access (ssh keys)

  • wifi

backdoor

  • WiFi

password grabber

  • deny net

access

  • disable avg

2012

  • OSX Root

Backdoor

  • OSX User

Backdoor

slide-5
SLIDE 5

Rubber Ducky Downloads

slide-6
SLIDE 6

Self-inflicted Gunshot Wounds

QR Codes and Millennials

slide-7
SLIDE 7

Self-inflicted Gunshot Wounds

slide-8
SLIDE 8

Self-inflicted Gunshot Wounds

slide-9
SLIDE 9

Risk Path for a Data Theft Attack

Physical Infiltration

Near-Site Attack Remote Cyber Attack- Human Target “spear phishing” Remote Cyber Attack- Perimeter

slide-10
SLIDE 10

Name a Major Breach that DIDN’T Start With One

  • f These

Phishing Malvertising Watering Hole Organized Crime   Nation States   Hacktivists  

slide-11
SLIDE 11

Making it Personal

Attacking ISACA

slide-12
SLIDE 12

Attacking Sacramento’s ISACA Chapter

   

slide-13
SLIDE 13

Go-time Email Examples- Malware

To: vicepresident@isaca-sacramento.org From: president@isaca-sacramento.org Subject: Sacramento Chapter Account Discrepancy Maria- This just came in from ISACA about some missing money. I don’t have David’s address in my phone. Can you please forward this to him ASAP? Thanks, Howard Attached: SacError.pdf

To: president@isaca-sacramento.org From: communications@isaca-sacramento.org Subject: For Web Site

Katheryn- Please post this to the website ASAP as the registration deadline is coming up. It’s the registration form for the CRISC exam. Also, please have David forward it to the membership. Thanks, Howard

Attached: June-2016-CRISC-Exam-Registration- Form_frm_Eng_1115.pdf

Please contact Mike for a clean copy. Please contact Mike for a clean copy.

slide-14
SLIDE 14

Phishing Email Demo- Malware

Writing and Distributing Malware using the Social Engineering Toolkit

slide-15
SLIDE 15

Phishing Email Demo- Credential Harvesting

Phishing the Webmaster’s Credentials

slide-16
SLIDE 16

Go-time Email Examples- Getting the Webmaster’s Credentials

To: webmaster@isaca-sacramento.org From: communications@isaca- sacramento.org Subject: Web Site Problems

Katheryn- I think something is broken in the members’ section. Can you take a look at this page? Thanks, David Please contact Mike for a clean copy.

slide-17
SLIDE 17

How I View the Attack Process and Awareness Training Opportunities

Profile

Friends/Colleagues Professional Interests Web Site Memberships

Delivery

Vectors Who do you trust? What are you emotional about?

Tech

Corporate IT Personal IT

Exposures from social media data

Social Media Google Research Sites Employee Profiles Religion Organizations Professional Associations Job Sites LinkedIn Scanning

Phishing & Social Engineering Awareness Role-Based IT Security Training

slide-18
SLIDE 18

Phishing Emails

slide-19
SLIDE 19

Actual Phishing Logins

Exchange.pitt.edu.auth.logon.aspx.bluebird.vn

Subdomain Domain

Images.google.com

Subdomain Domain Image credit: University of Pittsburg, pitt.edu

slide-20
SLIDE 20

Actual Phishing Logins

slide-21
SLIDE 21

Phished ISACA Login- Is it or isn’t it?

slide-22
SLIDE 22

Malvertising

Google’s Double Click and Yahoo! Ads Have Both Fallen Victim

slide-23
SLIDE 23

Malvertising

Examples:

  • 1. JavaScript
  • 2. Flash Malware (#1 Attack Vector)
  • 3. Full Server Compromise

Image Credit: riskmanagementmonitor.com

slide-24
SLIDE 24

Watering Holes

Nation State’s Newest Attack Vector

slide-25
SLIDE 25

Watering Holes

Example: Watering Hole Example Image credit: http://blog.smartekh.com/

slide-26
SLIDE 26

4 Things You Can Do Right Now

Prevent What I Have Demonstrated

slide-27
SLIDE 27

Sign in with a GUEST Account (Not Administrator)

Can be downloaded from cybersecology.com/harden-firefox.pdf

slide-28
SLIDE 28

Modify Your Settings: Options

Can be downloaded from cybersecology.com/harden-firefox.pdf

slide-29
SLIDE 29

Modify Your Settings: Add-ons

Can be downloaded from cybersecology.com/harden-firefox.pdf

slide-30
SLIDE 30

Modify Your Settings: Add-ons

Can be downloaded from cybersecology.com/harden-firefox.pdf

slide-31
SLIDE 31

How Well Does This Work?

Common Browser Attack Vectors

  • Psuedo-malicious Flash
  • Psuedo-malicious JavaScript

Antivirus

  • Infected ISACA PDF

QR Code Sticker

  • CyberSecOlogy Sticker URL

Watering Hole

  • Watering Hole Example

Hardened Browser Settings Default Browser Settings Full AV

Adobe Flash JavaScript Infected PDF QR Code

Watering Hole Attack Malvertising

slide-32
SLIDE 32

Contact Info

@MikeLandeck www.CyberSecology.com linkedin.com/in/mikelandeck MikeLandeckCyberSec gmail.com Please provide me feedback by taking the survey at https://www.surveymonkey.com/r/WXFY2CG

slide-33
SLIDE 33

Questions