The Global Rise of Cybercrime James Manson Senior Solutions - - PowerPoint PPT Presentation

the global rise of cybercrime
SMART_READER_LITE
LIVE PREVIEW

The Global Rise of Cybercrime James Manson Senior Solutions - - PowerPoint PPT Presentation

The Global Rise of Cybercrime James Manson Senior Solutions Engineer 1 Targets and Motives 2 Everyone is online Half the worlds population is online 3.2Bn people Source: Tech Crunch 3 Australian online Statistics 17 million


slide-1
SLIDE 1

1

The Global Rise of Cybercrime

James Manson – Senior Solutions Engineer

slide-2
SLIDE 2

2

Targets and Motives

slide-3
SLIDE 3

3

Everyone is online

Half the world’s population is online – 3.2Bn people

Source: Tech Crunch

slide-4
SLIDE 4

4

Australian online Statistics

» 17 million Australians are active Facebook users out

  • f a total population of 24.4 Million

» 5 million Aussies using Instagram » 4 million signed up to LinkedIn » 4 million using Snap Chat » 3 million on Twitter » 15 million unique Australian visitors to YouTube

Source: roi.com.au

slide-5
SLIDE 5

5

Everything is connected

In 2018 328m new devices go online each month By 2020 there will be 50Bn+ devices online

slide-6
SLIDE 6

6

72% of Australians bank

  • nline

More than 75% of us shop online

We live in cyberspace

slide-7
SLIDE 7

7

Every 10 seconds, a consumer gets hit with ransomware Every 40 seconds, a company gets hit with ransomware. In 2017, the estimated cost of ransomware is in the region of $5bn

Security events by the seconds

Source: staysmartonline.gov.au

slide-8
SLIDE 8

8

It’s now very lucrative

OVER $1B WAS PAID TO RANSOMWARE CRIMINALS IN 2016

Source: CNN

slide-9
SLIDE 9

9

Ransomware Trends

slide-10
SLIDE 10

10 10

320k+

New Malware and PUAs

Exponential Growth of New Unknown Threats 25k

New Malicious URLs

46k

New Phishing Sites

1.2M+

New File Encounters

100k

New Malicious IPs

Threats Found Daily

Source: Webroot Threat Report 2017

This includes Ransomware & Cryptoware

slide-11
SLIDE 11

11 11

How are they getting in?

slide-12
SLIDE 12

12 12

The Need for Multi-Vector Protection

94%* of all malware is unique to a single endpoint, meaning most malware is unknown Phishing was behind 90%† of security incidents and breaches in 2017

90% 94%

Sources: †Verizon 2017 Data Breach Investigations Report.” Data Breach Report * Webroot Threat Report 2018

slide-13
SLIDE 13

13 13

»

2017 – 120+ million types of malware

»

320,000+ new malware variants/day

»

90% of businesses reported a security incident

»

Since 2012, 71% of breaches have been against companies <100 employees

»

Continuous and complex attacks – APTs carefully crafted and executed – Micro-variants – Polymorphic – Social engineering + Ransomware

»

Volume & Complexity

What’s happening with modern day threats?

slide-14
SLIDE 14

14 14

Phishing is Prolific

new zero-day phishing sites created per month1 average new phishing sites created per day1 yearly cost of phishing scams for US businesses2

1 Webroot. Quarterly Threat Trends, Sept 2017. (Sept 2017) 2 FBI. FBI Warns of Dramatic Increase in Business E-Mail Scams. (April 2016)

slide-15
SLIDE 15

15 15

So easy to let in but quite tricky to catch

slide-16
SLIDE 16

16 16

So easy to let in but quite tricky to catch

slide-17
SLIDE 17

17 17

So easy to let in but quite tricky to catch

slide-18
SLIDE 18

18 18

Define and research Targets Design and Acquire tools for infiltration Intrusion and Connection Initiated Obtain private information Cover tracks and remain undetected

slide-19
SLIDE 19

19 19

High-risk URLs 2016

slide-20
SLIDE 20

20 20

High-risk URLs 2017

slide-21
SLIDE 21

21 21

Guest WiFi

Sources: https://latesthackingnews.com/2017/12/05/connecting-airport-wifi-safe-right-wrong; https://www.bleepingcomputer.com/news/security/cryptojackers- found-on-starbucks-wifi-network-github-pirate-streaming-sites/; https://www.zdnet.com/article/hackers-are-using-hotel-wi-fi-to-spy-on-guests-steal-data/

slide-22
SLIDE 22

22 22

Ransomware as a Service

slide-23
SLIDE 23

23 23

The Emergence of CryptoJacking

slide-24
SLIDE 24

24 24

Emerging threat vectors IoT

slide-25
SLIDE 25

25 25

Notifiable Data Breach Scheme

Allen Kim – Channel Manager James Manson – Senior Solutions Engineer

slide-26
SLIDE 26

26 26

slide-27
SLIDE 27

27 27

slide-28
SLIDE 28

28 28

slide-29
SLIDE 29

29 29

slide-30
SLIDE 30

30 30

Best Practices for Security

slide-31
SLIDE 31

31 31

Web Threats are Increasing

www.legitimatesite.com

85%+

  • f malicious links

are hosted on legitimate sites

slide-32
SLIDE 32

32 32

RDP Prevalence

RDP used by admins to control servers remotely Gives hackers admin access to your whole network The default port is easy to scan for by an attacker Accounts can usually be cracked with brute force

slide-33
SLIDE 33

33 33

Macros

Macros & Visual Basic Script can be abused to create “weaponised” Word documents Macros is a feature in MS Office that is exploited when infecting a victim. Modern Office has this feature switched off but users can be fooled into switching off their own security

slide-34
SLIDE 34

34 34

A popular way of infecting devices for a long time

Email

Email filtering removes bad executables well but infected documents, script files and bad URLs have replaced them Gmail will soon block JavaScript files by default

slide-35
SLIDE 35

35 35

Updates

UPDATE EVERYTHING

(yes we know it’s a pain)

Windows Adobe Java MS Office Browsers Citrix Oracle AV Your TV Your Toaster…

slide-36
SLIDE 36

36 36

Passwords

Complexity 2 factor authentication Recovery options Expiry date

slide-37
SLIDE 37

37 37

Backups

slide-38
SLIDE 38

38 38

User Error is a Big Issue

\\

Source: IBM Cyber Security Intelligence Index

95% of all successful cyber attacks is caused by human error

35% SMBs would remain profitable after a data breach 50% would become unprofitable in <1 month

1 in 5 SMBs close for business as a result

72% of all cyber attacks are targeted at SMBs

slide-39
SLIDE 39

39 39

Cybersecurity Best Practice

Continuous Security Awareness Training is key to any adequate defense-in-depth strategy.

Security Awareness Training

Cybersecurity = People, Process (Procedures) and Technology

Physical Security Perimeter Internal Network Host Application Data

PEOPLE PROCESS TECHNOLOGY

The Three Pillars of Cybersecurity

slide-40
SLIDE 40

40 40

Real or Fake?

slide-41
SLIDE 41

41 41

Real or Fake?

May 31, 2018 4

slide-42
SLIDE 42

42 42

Real or Fake?

May 31, 2018 4

slide-43
SLIDE 43

43 43

Real Or Fake?

May 31, 2018 4

slide-44
SLIDE 44

44 44

Cybersecurity Best Practice

Continuous Security Awareness Training is key to any adequate defense-in-depth strategy.

Security Awareness Training

Cybersecurity = People, Process (Procedures) and Technology

Physical Security Perimeter Internal Network Host Application Data

PEOPLE PROCESS TECHNOLOGY

The Three Pillars of Cybersecurity

slide-45
SLIDE 45

45 45

Thank you

Allen Kim – Channel Manager James Manson – Senior Solutions Engineer