Upload
eset
View
126
Download
2
Embed Size (px)
DESCRIPTION
Security expert Stephen Cobb looks at the goals and motives of criminal hackers, and how to mitigate the two main avenues of attack using smart scanning and strong authentication.
Citation preview
Stephen Cobb, CISSPSecurity Evangelist
Why THEY wantyour digital devices
To own your network?
36 ways to abuse hacked devices• Spam zombie• DDoS extortion zombie• Click fraud zombie• Anonymization proxy• CAPTCHA solving zombie
• eBay/PayPal fake auctions• Online gaming credentials• Website FTP credentials• Skype/VoIP credentials• Encryption certificates
• Fake antivirus• Ransomware• Email account ransom• Webcam image extortion
• Bank account data• Credit card data• Stock and 401K accounts• Wire transfer data
• Phishing site• Malware download site• Warez piracy server• Child porn server• Spam site
• Harvest email contacts• Harvest associated accounts• Access to corporate email• Webmail spam• Stranded abroad scams
• Facebook• Twitter• LinkedIn • Google+
• Online gaming characters• Online gaming goods/$$$• PC game license keys• OS license key
Based on original work by Brian Krebs: krebsonsecurity.com
Webserver
Botnetactivity
Email attacks
Virtualgoods
Reputationhijacking
Financial credentials
Hostage attacks
Account credentials
IMPACTADVANTAGEMONEY
CREDENTIALS
Verizon 2012 Data Breach Investigations Report
1 to 10
101 to 1,000
10,001 to 100,000
0 100 200 300 400 500 600
720 breaches by size of organization (em-ployees)
SMBs
The SMB sweet spot for the cyber-criminally inclined
Assets worthlooting
Level of protection
Big enterprise
SMB “sweet
spot”
Consumers
How do they get to your devices?
1. Malware involved in 69% of breaches2. Hacking* used in 81% of breaches
Breaches combining malware and hacking: 61%
Verizon 2012 Data Breach Investigations Report
*80% of hacking is passwords: default, missing, guessed, stolen, cracked
Tools of the trade
Thriving markets for credentials
Hot markets for hacked devices
All driven by proven business strategies
Specialization Modularity
Division of labor Standards
Markets
So how do you defend your devices?
Two main attacks…. …and defenses
Scanning
Authentication
Malware
Hacking
Scanning requires proper implementation
Scan devices while connected
Scan devices prior to connection
Require AV on mobile devices
0% 5% 10% 15% 20% 25% 30% 35% 40%
Measures in use at a sample of healthcare facili-ties
Ponemon Institute Third Annual Benchmark Study on Patient Privacy & Data Security
Authentication requires more than passwords
Passwords exposed in 2012: 75,000,000And those are just the ones we know aboutNeed to add a second factor to authentication
The defenses you need
SMART Scanning
STRONG Authentication
Malware
Hacking
Plus polices and training to implement effectively
Stephen Cobb [email protected]
Thank you!