Ben Hayden
IT & Risk Consultant
Social Engineering Ben Hayden IT & Risk Consultant Ben Hayden - - PowerPoint PPT Presentation
Cybersecurity and Social Engineering Ben Hayden IT & Risk Consultant Ben Hayden Background: US Marine Corps Law Enforcement Financial Institution IT Security/Fraud U of I BBA ISU MS @2016. Proprietary &
Ben Hayden
IT & Risk Consultant
Ben Hayden
Background:
– IT Security/Fraud
@2016. Proprietary & Confidential. SHAZAM, Inc. information is of general applicability and current as of date of presentation.
Disclaimers
@2016. Proprietary & Confidential. SHAZAM, Inc. information is of general applicability and current as of date of presentation.
Question 1
@2016. Proprietary & Confidential. SHAZAM, Inc. information is of general applicability and current as of date of presentation.
Question
@2016. Proprietary & Confidential. SHAZAM, Inc. information is of general applicability and current as of date of presentation.
Why do organizations/people “get hacked”?
Source: 2016 Verizon Data Breach Report
Why are we here?
@2016. Proprietary & Confidential. SHAZAM, Inc. information is of general applicability and current as of date of presentation.
More than 169 million personal records were exposed with an average cost of $154 per stolen record (minus medical records - $363 per record).
Source: 2015 ITRC Data Breach Report
Risks
@2016. Proprietary & Confidential. SHAZAM, Inc. information is of general applicability and current as of date of presentation.
Risks
@2016. Proprietary & Confidential. SHAZAM, Inc. information is of general applicability and current as of date of presentation.
Case Studies
@2016. Proprietary & Confidential. SHAZAM, Inc. information is of general applicability and current as of date of presentation.
server.
days until the system was restored.
Attack Cycle
@2016. Proprietary & Confidential. SHAZAM, Inc. information is of general applicability and current as of date of presentation.
Target Identification
Recon
Gaining Access Scanning the Network Exploits Exfiltration
Target Identification
@2016. Proprietary & Confidential. SHAZAM, Inc. information is of general applicability and current as of date of presentation.
Target Identification
Attack Example
@2016. Proprietary & Confidential. SHAZAM, Inc. information is of general applicability and current as of date of presentation.
Recon
Attack Example
@2016. Proprietary & Confidential. SHAZAM, Inc. information is of general applicability and current as of date of presentation.
Social Engineering
Approximately 70% of attacks used a combination of phishing and hacking.
Source: 2016 Verizon Data Breach Report
Gaining Access
Attack Example
@2016. Proprietary & Confidential. SHAZAM, Inc. information is of general applicability and current as of date of presentation.
Attack Example
@2016. Proprietary & Confidential. SHAZAM, Inc. information is of general applicability and current as of date of presentation.
Network is probed for vulnerabilities
Open ports Out-of-date patches Unlocked systems Administrator access
Multiple access points established
Scanning the Network
Attack Example
@2016. Proprietary & Confidential. SHAZAM, Inc. information is of general applicability and current as of date of presentation.
Tools
What are they looking for?
Scanning the Network
Scanning
@2016. Proprietary & Confidential. SHAZAM, Inc. information is of general applicability and current as of date of presentation.
Scanning
@2016. Proprietary & Confidential. SHAZAM, Inc. information is of general applicability and current as of date of presentation.
Scanning
@2016. Proprietary & Confidential. SHAZAM, Inc. information is of general applicability and current as of date of presentation.
Scanning
@2016. Proprietary & Confidential. SHAZAM, Inc. information is of general applicability and current as of date of presentation.
Attack Example
@2016. Proprietary & Confidential. SHAZAM, Inc. information is of general applicability and current as of date of presentation.
What does it actually mean? Breaking/Circumvention Publically available rainbow tables
On average – 24 online accounts Only 6 passwords 73% of passwords are duplicates 47% of passwords are 5+ years old 77% of passwords are 1+ year old
Source: TeleSign Consumer Account Security Report
Attack Example
@2016. Proprietary & Confidential. SHAZAM, Inc. information is of general applicability and current as of date of presentation.
Types of Exploits
Exploits
Attack Example
@2016. Proprietary & Confidential. SHAZAM, Inc. information is of general applicability and current as of date of presentation.
Exfiltrating the data
What do they do with the data?
Unless it’s Ransomware
Exfiltration
What can you do?
@2016. Proprietary & Confidential. SHAZAM, Inc. information is of general applicability and current as of date of presentation.
Best Practices
QUESTIONS?
@2016. Proprietary & Confidential. SHAZAM, Inc. information is of general applicability and current as of date of presentation.