1
The Global Rise of Cybercrime
James Manson – Senior Solutions Engineer
The Global Rise of Cybercrime James Manson Senior Solutions - - PowerPoint PPT Presentation
The Global Rise of Cybercrime James Manson Senior Solutions Engineer 1 Targets and Motives 2 Everyone is online Half the worlds population is online 3.2Bn people Source: Tech Crunch 3 Australian online Statistics 17 million
1
James Manson – Senior Solutions Engineer
2
3
Source: Tech Crunch
4
» 17 million Australians are active Facebook users out
» 5 million Aussies using Instagram » 4 million signed up to LinkedIn » 4 million using Snap Chat » 3 million on Twitter » 15 million unique Australian visitors to YouTube
Source: roi.com.au
5
In 2018 328m new devices go online each month By 2020 there will be 50Bn+ devices online
6
72% of Australians bank
More than 75% of us shop online
7
Every 10 seconds, a consumer gets hit with ransomware Every 40 seconds, a company gets hit with ransomware. In 2017, the estimated cost of ransomware is in the region of $5bn
Source: staysmartonline.gov.au
8
Source: CNN
9
10 10
New Malware and PUAs
New Malicious URLs
New Phishing Sites
New File Encounters
New Malicious IPs
Source: Webroot Threat Report 2017
This includes Ransomware & Cryptoware
11 11
12 12
94%* of all malware is unique to a single endpoint, meaning most malware is unknown Phishing was behind 90%† of security incidents and breaches in 2017
Sources: †Verizon 2017 Data Breach Investigations Report.” Data Breach Report * Webroot Threat Report 2018
13 13
»
2017 – 120+ million types of malware
»
320,000+ new malware variants/day
»
90% of businesses reported a security incident
»
Since 2012, 71% of breaches have been against companies <100 employees
»
Continuous and complex attacks – APTs carefully crafted and executed – Micro-variants – Polymorphic – Social engineering + Ransomware
»
Volume & Complexity
What’s happening with modern day threats?
14 14
new zero-day phishing sites created per month1 average new phishing sites created per day1 yearly cost of phishing scams for US businesses2
1 Webroot. Quarterly Threat Trends, Sept 2017. (Sept 2017) 2 FBI. FBI Warns of Dramatic Increase in Business E-Mail Scams. (April 2016)
15 15
16 16
17 17
18 18
Define and research Targets Design and Acquire tools for infiltration Intrusion and Connection Initiated Obtain private information Cover tracks and remain undetected
19 19
20 20
21 21
Sources: https://latesthackingnews.com/2017/12/05/connecting-airport-wifi-safe-right-wrong; https://www.bleepingcomputer.com/news/security/cryptojackers- found-on-starbucks-wifi-network-github-pirate-streaming-sites/; https://www.zdnet.com/article/hackers-are-using-hotel-wi-fi-to-spy-on-guests-steal-data/
22 22
23 23
24 24
25 25
Allen Kim – Channel Manager James Manson – Senior Solutions Engineer
26 26
27 27
28 28
29 29
30 30
31 31
www.legitimatesite.com
32 32
RDP used by admins to control servers remotely Gives hackers admin access to your whole network The default port is easy to scan for by an attacker Accounts can usually be cracked with brute force
33 33
Macros & Visual Basic Script can be abused to create “weaponised” Word documents Macros is a feature in MS Office that is exploited when infecting a victim. Modern Office has this feature switched off but users can be fooled into switching off their own security
34 34
A popular way of infecting devices for a long time
Email filtering removes bad executables well but infected documents, script files and bad URLs have replaced them Gmail will soon block JavaScript files by default
35 35
(yes we know it’s a pain)
Windows Adobe Java MS Office Browsers Citrix Oracle AV Your TV Your Toaster…
36 36
Complexity 2 factor authentication Recovery options Expiry date
37 37
38 38
\\
Source: IBM Cyber Security Intelligence Index
35% SMBs would remain profitable after a data breach 50% would become unprofitable in <1 month
1 in 5 SMBs close for business as a result
39 39
Continuous Security Awareness Training is key to any adequate defense-in-depth strategy.
Security Awareness Training
Cybersecurity = People, Process (Procedures) and Technology
Physical Security Perimeter Internal Network Host Application Data
PEOPLE PROCESS TECHNOLOGY
The Three Pillars of Cybersecurity
40 40
41 41
May 31, 2018 4
42 42
May 31, 2018 4
43 43
May 31, 2018 4
44 44
Continuous Security Awareness Training is key to any adequate defense-in-depth strategy.
Security Awareness Training
Cybersecurity = People, Process (Procedures) and Technology
Physical Security Perimeter Internal Network Host Application Data
PEOPLE PROCESS TECHNOLOGY
The Three Pillars of Cybersecurity
45 45
Allen Kim – Channel Manager James Manson – Senior Solutions Engineer