Cyber Crimes the Good, the Bad, and the Ugly Mohd Serieh QCB - - PowerPoint PPT Presentation

cyber crimes
SMART_READER_LITE
LIVE PREVIEW

Cyber Crimes the Good, the Bad, and the Ugly Mohd Serieh QCB - - PowerPoint PPT Presentation

Cyber Crimes the Good, the Bad, and the Ugly Mohd Serieh QCB Information & Security Conference November 2017 1 Knowledge check I have internet access but I dont shop online, this means I wont become a victim of Cyber Crime.


slide-1
SLIDE 1

Mohd Serieh QCB Information & Security Conference November 2017

Cyber Crimes

the Good, the Bad, and the Ugly

1

slide-2
SLIDE 2

“I have internet access but I don’t shop online, this means I won’t become a victim of Cyber Crime.” Is this statement True or False?

Knowledge check

2

slide-3
SLIDE 3

“Cybercrime is limited to any criminal act dealing with computers and networks” Is this statement True or False?

Knowledge check

3

slide-4
SLIDE 4

“Cybercrime includes only traditional crimes conducted through the internet” Is this statement True or False?

Knowledge check

4

slide-5
SLIDE 5

“70% of fraud is cyber enabled” Is this statement True or False?

Knowledge check

5

slide-6
SLIDE 6

The good

slide-7
SLIDE 7

The average total cost of data breach decreased by 11% this year. The average cost for each lost or stolen record containing sensitive and confidential information also significantly decreased 12% this year.

  • 1. Cost of data breach is decreasing

Source: 2017 Cost of Data Breach Study: Global Overview Ponemon Institute, June 2017

7

slide-8
SLIDE 8
  • 2. More corporates are starting to rely on cloud security

No plans yet Putting plans together, unsure when will deploy Putting plans together, deployement end of year Pilot deployment in place A full-service deployment in place

11% 17% 28% 18% 19% 9%

Several services are in place, fairly mature

Source: Amazon estimates based on 1000 compute cycles (300 compute cycles, 700 peak cycles) and data transfer (3000 GB of In data and 6,000 GB of “out” data). Source: Gartner, “Private Cloud Matures, Hybrid Cloud Is Next,” Thomas J. Bittman,

8

slide-9
SLIDE 9
  • The hacker behind JPMordan Chase Hack, world’s largest-

ever bank hack, arrested in Russia;

  • Hacker Gets 4 Years in Prison for Selling Stolen Bank

Accounts on the Dark Web;

  • Teen Behind Titanium DDoS Stresser Pleads Guilty in

London: used to launch over 1.7 million DDoS attacks;

  • FBI Arrests Customer of Xtreme Stresser DDoS-for-Hire

Service;

  • Joint Cyber Operation Takes Down Avalanche Criminal

Network Servers Enabled Nefarious Activity Worldwide;

  • Hacker known as Guccifer sentenced to 52 months in

prison;

  • And the list goes on…
  • 3. Year-end cybercrime update 2016

9

slide-10
SLIDE 10

The bad

slide-11
SLIDE 11

Cybercrime trends are higher than any other category

1 2 3 4 5 6 7 Apr 2010 to Mar 2011 Apr 2011 to Mar 2012 Apr 2012 to Mar 2013 Apr 2013 to Mar 2014 Apr 2014 to Mar 2015 Apr 2015 to Mar 2016 Theft from a person Domistic burglary Vehicle theft Voilence towards a person Criminal damage Fraud & cybercrime

There were almost 6M incidents of fraud and cybercrime last year, according to the 2016 Crime Survey for England and Wales- more than any other category of crime, and almost as much as all the other categories measured in the survey when added together.

Source: million incidents

11

slide-12
SLIDE 12

80 86 93

74 76 78 80 82 84 86 88 90 92 94

2016 2017 2018

And so are the costs

Worldwide security spending ($bn)

Source: Gartner

12

slide-13
SLIDE 13

Furthermore, highly regulated industries have the highest per-record data breach costs

Healthcare Education Pharmaceutical Financial Consumer Energy Retail Hospitality

$359 $294 $227 $206 $155 $141 $105 $122

*Currencies converted to US dollars Source: 2014 Cost of Data Breach Study: Global Analysis, Ponemon Institute, sponsored by IBM

slide-14
SLIDE 14

Insert Confidentiality Level in slide footer

And the ugly

14

slide-15
SLIDE 15

Most enterprises lack security capabilities

15

slide-16
SLIDE 16

And they know it!

0% 10% 20% 30% 40% 50% 60% 70% 80%

Fully prepared Somewhat prepared Not where we want to be unsure

How prepared is your company for a cyber event? KPMG research

Are we prepared? Seventy-two percent of CEOs say they are not fully prepared for a cyber event, 50% more than 2015 Can you be fully prepared? CEOs frequently said: “we are as prepared as we can be” or “you can never be fully prepare” How to prepare? By practicing the ability to respond to cyber events. Companies need an ability to be agile and deal with the unexpected

2016 KPMG Channel Islands Limited

16

slide-17
SLIDE 17

There are only two types of companies: Those that have been hacked and those that don’t know they have been hacked.

Robert S. Mueller, III, Director FBI

17

slide-18
SLIDE 18

5 10 15 20 25 30

Chicken pox Ebola Rabies HIV

Incubation period in weeks

Just like infections, there is an incubation period for hacks

People know they are infected, WHEN the symptoms start showing. NOT when they are infected

Hacking is like infection, Your systems do not know they are hacked until it is too late.

18

slide-19
SLIDE 19

Scared Yet?

  • Hardware and software keep getting

cheaper;

  • Combine the Internet and a global

scope, the the potential for attacks is limitless;

  • Security will always be breached;
  • Even when laws are passed to

increase technological safeguards, new technology will always outstrip legislation

19

slide-20
SLIDE 20

What are you going to do about it?

20

slide-21
SLIDE 21

Here are the questions any CISO want to be able to answer…

1

Establishing Baseline

Identify what needs to be defended or

  • bserved as well as

formulate a risk profile to detect abnormalities

  • Who are the

attractive targets?

  • Which applications

to defend?

  • What is the normal

behavior profile for users, assets, and application

2

Sophisticated Attacks

Gain awareness of a motivated/incentiviz ed attacker attempting to hide/disguise the attack

  • Which assets are

already compromised?

  • Which external

domain may be the source of attacks?

  • Are there any low

profile network traffic elements that might signal an

  • ngoing imminent

attack?

4

Predict Hackitvism

5

Counter Cyber Attacks

Inform of an impeding or ongoing attack by criminal groups

  • Which geographical

region may be the

  • rigin of an attack?
  • Which hacking tools

maybe used and who is gaining access to them?

  • Are there symptoms
  • f an attack

underway or being planned manifesting themselves as support issues?

6

Mitigate Fraud

Surface new or existing fraud methods that may compromise its compliance with regulations or cause sinigicant losses to its financial operations

  • How can the
  • rganization identify

a fraudulent activity?

  • Which users have

compromised identities that may lead a fraudlent activity?

  • Can well known

fraud attempts have pattens can either be detected or even anticipated?

3

Quality Insider Threats

Identify or warn of users within the

  • rganization who

may be inclined to perform actions that are detrimental to the organization’s

  • perations
  • What data is being

leaked or lost and by whom?

  • Who internally has

the motivation to compromise the cyber operation?

  • Who is exhibiting

abnormal usage behavior? Alert to a possible attack from groups that sympathize with causes that are contrary to the interests

  • Which controversial

issues may trigger a negative sentiment about the

  • rganization
  • How to identify and

monitor intentions?

  • How does publicity
  • f the company in

the media impact risk?

21

slide-22
SLIDE 22

And no one knows backdoor answers, like our good old friend The Hacker

22

slide-23
SLIDE 23

What is a hacker?

1. Creates and modifies. computer software and computer hardware; 2. Exploits systems and gains unauthorized access. through clever tactics and detailed knowledge; 3. Computer enthusiast/person who enjoys learning programming languages; 4. Someone who breaks into computers; 5. Can make a computer do what they want; 6. Anyone who ‘breaks open’ code and manipulates it in a clever or original; 7. Not necessarily illegal.

23

slide-24
SLIDE 24

The US Department of Justice called him “the most wanted computer criminal in US history” After serving a year in prison for hacking into the Digital Equipment Corporation’s network, he was let out for three years of supervised release. But near the end of that period, he fled and went on a 2.5-year hacking spree that involved breaching the national defense warning system and stealing corporate secrets.

Kevin Mitnick (AKA The Darkside Hacker)

24

slide-25
SLIDE 25

He infiltrated 97 US military and NASA computers, by installing virus and deleting a few files. All the efforts to satisfy his curiosity.

Gary McKinnon (AKA Solo)

25

slide-26
SLIDE 26

Part of hacking group called lulzSec who Gained credentials for hacking into Sony, News International, CIA, FBI, Scotland Yard, and several noteworthy accounts. So notorious was the group that when it hacked into News Corporations account, they put across a false report of Rupert Murdoch having passed away. Topiary also an associate of Anonymous

Jake Leslie Davis (AKA: Topiary)

26

slide-27
SLIDE 27

Hacked into Yahoo!, Microsoft, Google, and The New York Times. This, although culminated into his arrest, it later helped him gain the batch of an American Threat Analyst. A guy who would hack into top-notch accounts sitting in the spacious and comforting cafeterias, libraries, internet cafes, soon turned Wikileaks suspect Bradley Manning over to FBI. While Manning was arrested for leaking several hundred sensitive US government documents, Lamo went hiding or should we presume, undercover?

Adrian Lamo

27

slide-28
SLIDE 28

Targeting the over-sensitive nerves, what Mathew Bevan along with his alleged partner Richard Pryce did, could have triggered great many issues between USA and North Korea. The duo hacked the US military computers and used it as a means to infiltrate the foreign systems. The crucial contents of Korean Atomic Research Institute were dumped into USAF

  • system. However, the contents were majorly relevant

to South Korea and hence, less volatile. But this, nonetheless, could have led to a huge international issue

Mathew Bevan and Richard Pryce (AKA Datastream cowboy)

28

slide-29
SLIDE 29

An American computer hacker and co-founder of the hacking group LulzSec. He later turned informant for the FBI, working with the agency for over ten months to aid them in identifying

  • ther hackers from LulzSec and related groups

LulzSec intervened in the affairs of organizations such as News Corporation, Stratfor, UK and American law enforcement bodies and Irish political party Fine Gael

Hector Monsegur (AKA Sabu)

29

slide-30
SLIDE 30

Jan Krissler used high resolution photos, including

  • ne from a government press office, to successfully

recreate the fingerprints of Germany’s Defence Minister, Ursula von der Leyen..

Jan Krissler (AKA Starbug)

30

slide-31
SLIDE 31

So what are you going to do about it??

31

slide-32
SLIDE 32

“Hire the hacker!”

Underworld investigator Journalist Misha Glenny

32

slide-33
SLIDE 33

George Hotz

His famed PlayStation 3 and Apple phone hacks served as resume fodder to his current employer

Peter Hajas

Peter Hajas is the creator of uber-popular iOS jailbreak app MobileNotifier,

Jonny Lee

famously hacked a Nintendo Wiimote using a few ballpoint pens and infrared lights.

Jeff Moss

AKA "Dark Tangent" the founder of Black Hat and the annual DefCon computer hacker conference

Chris Putnam

created an XSS- based worm on Facebook and modified infected pages to look just like MySpace profiles.

Big companies do that already

33

slide-34
SLIDE 34

“What I did in my youth is hundreds of times easier today. Technology breeds crime.”

Frank Abagnale

Do you recognize this person?

34

slide-35
SLIDE 35

White Hat Grey Hat Black Hat Types of hackers

White Hat”- hired by large corporations, or governments Usually as a “Tiger Team” Tiger Team is a team that is hired to test the security of networks/find flaws or loopholes Will snoop around networks, trying to find loopholes If such loophole(s) is/are found – report created explaining how hack was achieved Unhired, People who break into networks for fun, Usually don’t intentionally cause harm (following hacker ethic). Enjoy doing this, Perceived as challenge. Want to “test security to prevent such attacks in future” Stereotypical hacker you hear about in the media, Break into systems and damage them May write things like “you just got served by X group” May delete files, erase portions of code, etc.“

35

slide-36
SLIDE 36

You need experienced security professionals, People who know how to defend networks, systems, Innovation, forward thinking Penetration testing is part of the (larger) security auditing/analysis process To perform comprehensive security analysis process takes into account many other aspects (e.g., source code analysis, policy analysis, social engineering You want somebody who can find problems before the bad guys do

Why you should consider legal hacking

36

slide-37
SLIDE 37

Only the paranoid survive

Andrew S. Grove, the President and CEO of Dell

37

slide-38
SLIDE 38

Thank you

mohd.serieh@vodafone.com