How to Think Like a Hacker: Lessons Learned & Best Practices - - PowerPoint PPT Presentation

how to think like a hacker lessons learned best practices
SMART_READER_LITE
LIVE PREVIEW

How to Think Like a Hacker: Lessons Learned & Best Practices - - PowerPoint PPT Presentation

How to Think Like a Hacker: Lessons Learned & Best Practices Jointly hosted by: PRESENTERS BRIAN KIRK ANNIE BRINK DIRECTOR BUSINESS DEVELOPMENT Digital Operations Digital Operations And Cybersecurity And Cybersecurity Direct:


slide-1
SLIDE 1

How to Think Like a Hacker: Lessons Learned & Best Practices

Jointly hosted by:

slide-2
SLIDE 2

PRESENTERS

ANONYMOUS

INTERNATIONAL Hacktivist / Activist Internet Vigilante

ANNIE BRINK

Direct: 864.242.2685 Annie.Brink@elliottdavis.com

BUSINESS DEVELOPMENT Digital Operations And Cybersecurity

BRIAN KIRK

Direct: 864.242.2606 Brian.Kirk@elliottdavis.com

DIRECTOR Digital Operations And Cybersecurity

slide-3
SLIDE 3

(IN) FAMOUS HACKING GROUPS

i

slide-4
SLIDE 4

WHO ARE WE DEFENDING AGAINST AGAIN?

i

Recreational

  • Fame and notoriety
  • Limited technical

resources

  • Known exploits

Criminal

  • Vandalism
  • Limited technical

capabilities

Hacktivist

  • Statement
  • Relentless,

emotionally committed

  • Vast networks
  • Targeted attacks

Organized Crime

  • Economic gain
  • Significant technical

resources and capabilities

  • Established

syndicates

  • Adware, crimeware,

IP theft

State Sponsored

  • Cyber war, state

secrets, industrial espionage

  • Highly sophisticated
  • Nearly unlimited

resources

  • Advanced persistent

threats

INCREASING RESOURCES AND SOPHISTICATION The expansion of attacker types, their resources, and their sophistication

slide-5
SLIDE 5

IN THE NEWS

i

slide-6
SLIDE 6

ANYTHING DIFFERENT THIS YEAR?

i

slide-7
SLIDE 7

TRENDING THREATS

i

A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid Ransomware Attack through corporate email systems on individuals who have access and means to conduct fraudulent financial transactions Business Email Compromise Incident where information is stolen or taken from an Office 365 email system without the knowledge or authorization of the system’s

  • wner

O365 Data Breach

slide-8
SLIDE 8

A LOOK INTO THE CURRENT STATE OF THE INDUSTRY

i

  • A 238% increase in cyber attacks against banks is

linked to COVID-19 - ZDNET.COM

  • As of May 2nd, the FBI is showing an increase of

800% reported cyber crimes to their divisions – entrepreneur.com

  • Coronavirus may be the largest-ever global

security threat. - thenextweb.com

  • Anyone know of any schools recently impacted by

cybersecurity problems?

slide-9
SLIDE 9

WHY ARE ATTACKS SO SUCCESSFUL?

i

  • Lack of understanding of risk: Organizations do not

think they are a target for cybercrime

  • Lack of funding: Budget for information technology

is limited, and security is an overall fraction because…

  • UPTIME is considered the most important metric

(and rightfully so)

  • Lack of knowledge about real world threats and

methods to prevent them

slide-10
SLIDE 10

ALL ORGANIZATIONS ARE TARGETS

i

  • Nearly half of all cyberattacks are committed against small businesses.
  • 60 percent of small companies that suffer a cyberattack are out of

business within six months, according to the U.S. National Cyber Security Alliance.

  • Cisco security experts explain that small/midmarket businesses are

more inclined to pay ransoms to adversaries so that they can quickly resume normal operations after a ransomware attack. They simply can’t afford the downtime and lack of access to critical data — including customer data.

slide-11
SLIDE 11

HOW SOME TARGETS ARE ACQUIRED BY CRIMINALS

i

Fake finance server placed online with known software vulnerabilities +2 hours Automated bot discovers and scans system + 2 days Hacker returns to remove system data +15 seconds Automated bot exploits known vulnerabilities + 5 mins Automated bot traverses system, catalogs data, and goes quiet

Live Security Test Performed in Late 2018 Attacks are initially driven through automated ‘bots’ which either automate spam messages or scan the internet for vulnerabilities and carry out large portions of cyber attacks without any human interaction.

slide-12
SLIDE 12

HOW RANSOMWARE WORKS

i

slide-13
SLIDE 13

HOW RANSOMWARE WORKS

i

76% of attacks typically happen during the night or

  • n weekends
slide-14
SLIDE 14

HOW RANSOMWARE WORKS – A NEW WRINKLE

i

Starting in late 2019, a hybrid variety of cyber attack has emerged, in which traditional ransomware tactics are combined with data exfiltration. Attackers notify their victims that if they fail to pay the ransom demand, not only will data on the infected systems remain encrypted, but the attackers will expose highly sensitive data to the public as well.

slide-15
SLIDE 15

HOW RANSOMWARE WORKS – A NEW WRINKLE

i

The only way to know that exfiltrated data is safe from misuse is to know that it was protected by strong, persistent encryption before it was exfiltrated. Encryption isn't a complete answer—firewalls, antimalware, and then some, will continue to be necessary—but by locking down its highest- value data in advance, an organization can protect itself against the worst consequences of this emerging threat.

slide-16
SLIDE 16

HOW ATTACKS HAPPEN (BEC)

i

Bogus Invoice Scheme From Third Party High Ranking Executive Scheme Internal Email Account Compromise

slide-17
SLIDE 17

Cybersecurity: Where to Start

slide-18
SLIDE 18

WHAT SHOULD BUSINESSES BE DOING?

i

Define what risks are acceptable to your organization: A risk assessment is a non- technical consideration that most organizations overlook when considering

  • cybersecurity. It is important for every organization to determine their greatest area of

risk to profitability. Develop an Incident Response Plan (and test it): One area often overlooked by many

  • rganizations is the ability to recover from a serious incident (physical, weather related,

cyber, etc.). The risks associated with many cybersecurity threats can be mitigated by having a mature Incident Response Plan that meets a recovery time pre-approved by executive management.

slide-19
SLIDE 19

WHAT SHOULD BUSINESSES BE DOING?

i

Secure your backups: Do you think Garmin had a backup? Of course they did. Make sure you have an OFFLINE backup…tape or cloud….something attackers can’t reach if they gain administrative access to your network. Develop a ‘Defense in Depth’ strategy: If you spend much time with cybersecurity professionals, you will often hear the term “defense in depth”. This terminology is used to define a process where organizations do not trust one technology, control, or even IT provider to secure their organization. Test your team: Trust but verify is a well known mantra in the security industry. You should trust your information technology team but verify they are protecting your

  • rganization from known risks.
slide-20
SLIDE 20

WAYS TO MEASURE CYBER PROGRAM EFFECTIVENESS

i

PROGRAM ASSESSMENT

slide-21
SLIDE 21

WAYS TO MEASURE CYBER PROGRAM EFFECTIVENESS

i

PROGRAM ASSESSMENT

slide-22
SLIDE 22

PENETRATION TESTING

i

Reconnaissance Active Scanning Exploitation Post Exploitation Reporting

  • Apply custom OSINT inventory to domains, systems, and employees
  • Evaluate internet / social media footprint of key employees
  • Perform passive reconnaissance and external footprinting
  • Recon-NG
  • Shodan/dnsdumpster
  • Custom Scripts

Example Tools Key Capabilities

  • Identify live hosts, their services and service versions
  • Discover web applications running on each system
  • Create a target list and approach
  • NMAP Masscan
  • Nikto/Wpscan
  • Directory Scanner/Custom Scripts
  • Determine risk and likelihood of attack success
  • Develop and manually execute custom exploits
  • If in-scope, perform user based attacks using social engineering toolkit
  • Custom Code
  • Metasploit
  • Social Engineer Toolkit (SET)
  • Use local tools and expertise to move laterally and escalate privileges
  • Assess if accounts can be enumerated or password hashes extracted
  • Attempt to script exploit to evaluate data exfiltration capabilities
  • Local tools such as PowerShell or Bash
  • Custom scripts in Python or JS
  • Metasploit/Core Impact
  • Final Report containing all the above steps
  • Overview of each issue with a risk score
  • Screen Shots and POC code
  • Remediation steps
slide-23
SLIDE 23

OPEN SOURCE INTELLIGENCE (OSINT) REVIEW

i

OSINT reports are useful as they give your company insight into the types and amounts of information that has been gathered and stored on the Internet about your organization. The review is performed without directly engaging the Customer network or systems, utilizing a range of effective open source gathering tools to collect information. The goal

  • f this report is to assist your team in improving its cybersecurity posture.
  • This assessment utilizes gathering techniques based on the Penetration Testing Execution Standard (PTES)
  • methodology. This approach is designed to mimic the intelligence gathering actions of computer attackers looking

to identify security vulnerabilities against an organization.

  • We analyze impact of publicly exposed user credentials from recent high profile security breaches against the user

base since credential reuse can result in data breaches, system compromises, and loss of data.

  • This assessment will use open source information to discover lists of known exploitable weaknesses in your

network and hosts, along with unauthorized routes into the target network.

slide-24
SLIDE 24

This material was used by Elliott Davis during an oral presentation; it is not a complete record of the discussion. This presentation is for informational purposes and does not contain or convey specific advice. It should not be used or relied upon in regard to any particular situation or circumstances without first consulting the appropriate advisor. No part of the presentation may be circulated, quoted, or reproduced for distribution without prior written approval from Elliott Davis.

Disclaimer

slide-25
SLIDE 25

Thank you!

Brian Kirk Brian.Kirk@elliottdavis.com 864.242.2606