50 SHADES OF CRIMEWARE. Manu Quintans // Frank Ruiz
|
|
- Molly Mills
- 8 years ago
- Views:
Transcription
1
2 50 SHADES OF CRIMEWARE Manu Quintans // Frank Ruiz
3 ABOUT US Frank Ruiz - Threat Intelligence Analyst at Fox IT y miembro de la organización sin animo de lucro mlw.re. Manu Quintans - Threat Intelligence Manager at Buguroo / Deloitte, miembro fundador de la organización sin anímo de lucro mlw.re focalizada en combatir amenazas en Internet.
4 Index What we know about Cyber-Crime?! Reality Bites! Intelligence! Understand Cyber-Crime activities! New trends at Cyber-Crime! DEMO TIME!! Previously on 2013! Examples (We have a Target) :)! Bye bye!! It s Time Back To Reality! Cyber-Crime Evolutions ! Infrastructures!
5 WHAT WE KNOW ABOUT! CYBER-CRIME?
6 Conventions ciber-. 1. Elemento compositivo prefijo, creado por acortamiento del adjetivo cibernético, que forma parte de términos relacionados con el mundo de las computadoras u ordenadores y de la realidad virtual. SEÑORA! Soy un T800, he venido del futuro a robarle la tarjeta monedero.
7 WHAT WE KNOW ABOUT CYBER-CRIME?! ARAB WINTER SMS INTERCEPTADOS
8 WHAT WE KNOW ABOUT CYBER-CRIME?! MOAR PONY! 1.580,00 WEBSITE LOGIN CREDENTIALS! 320,000 ACCOUNTS! 41,000 FTP ACCOUNT CREDENTIALS! RDP! SSH ACCESS
9 WHAT WE KNOW ABOUT CYBER-CRIME?! APT1 Obama runs first law about cybersecurity. CISPA (Cyber Intelligence Sharing and Protection Act) is runing again Mandiant, presents at RSA Conference new SOC. Securestate talk at 2005 about this group and there tools
10 WHAT WE KNOW ABOUT CYBER-CRIME?!
11 WHAT WE KNOW ABOUT CYBER-CRIME?! APT1
12 It s time back to reality
13 It s time back to reality
14 It s time back to reality
15 It s time back to reality
16 Understand! Cyber-Crime activities
17 Understand Cyber-Crime activities Indetectables! DamageLabs! LAYER #1 HackForums! The Undercoat! Just for kiddies DarkC0de! ExploitIN! Antichat!
18 LAYER #1 Understand Cyber-Crime activities
19 LAYER #1 Understand Cyber-Crime activities
20 LAYER #1 Understand Cyber-Crime activities
21 LAYER #1 Understand Cyber-Crime activities
22 Understand Cyber-Crime activities Pustota! Verified! LAYER #2 The Limbo! Semi Pro Infraud! CCPRO!
23 LAYER #2 Understand Cyber-Crime activities
24 LAYER #2 Understand Cyber-Crime activities
25 Understand Cyber-Crime activities LAYER #3 Maza! TopSecurity The Heaven s door! Gang stha! Korovka! Commuizn!
26 LAYER #3 Understand Cyber-Crime activities
27 LAYER #3 Understand Cyber-Crime activities
28 Understand Cyber-Crime activities Cryptolocker! Sinowall! LAYER #4 Gozi Private! From russia with love! ZeusP2P!
29 WHAT WE KNOW ABOUT CYBER-CRIME?! Indetectables! Pustota! Cryptolocker! Sinowall! DamageLabs! Verified! FINAL SCENARIO Maza! HackForums! TopSecurity Infraud! ExploitIN! Gozi The The The Heaven s Undercoat! Private! Limbo! door! From Just Gang stha! Semi russia for kiddies Pro with love! ZeusP2P! Korovka! Commuizn! CCPRO! Antichat! DarkC0de!
30 Previously on!
31 Previously Previously on First year, without new Banking Trojans. (Except s KINS aka Kasper)! Symlink Arrested (January)! Paunch Arrested (BlackHole Exploit Kit) (OCTOBER)! FBI shut down SilkRoad and they arrest Ross Willian Ulbrich. (OCTOBER)! Target Breach. :-) (NOVEMBER/DECEMBER)! FBI With Spanish Police Cooperation take s down Liberty Reserver and arrest CEO. (MAY 2013)! ZeusP2P (Game Over) and CryptoLocker Take down. - (MAY/JUN 2014)
32 Previously Has been a special year in the volition of the industry of cyber-crime!! The feeling of impunity begins to disappear.! Groups midlevel begin to close and professionalize their assets.! Ironically, the vetted gang s start to show some gaps.
33 Previously These Changes are due to! Detentions.! Proliferation of bloggers / twitters 'investigating' cybercrime scene. (Pr0n stars)! Insider Researchers.! Leaks (Pasties, services )
34 SWOT ANALYSIS Conclusions! The industry of Cyber-Crime,! now are more than closed! than ever.
35 New trends
36 OUR SERVICES New Trends at Cyber-Crime Industry 01 POS POS Malware - POINT OF SALES SYSTEM 02 TOR BASED NEW MOBILE MALWARE (EG: TOR BASED)! CRYPTOCURRENCIES Bitcoin, Litecoin, DogeCoin just Crypto Malware Miners!
37 OUR SERVICES POS POINT OF SALE, BUT WHY? The lack of a Banking Trojan for sale and the large increase in demand for cards has moved many players in this business. Citadel users move there business to this new system. Grows offer POS malware sales.
38 OUR SERVICES POS POINT OF SALE, What we found on markets? Alina Malware Dexter Malware BlackPos The Beauty,! the Bad,! the Ugly! and! Guest start 04 Soraya
39 OUR SERVICES POS POINT OF SALE, Sofware as Service? of course!
40 OUR SERVICES Mobile Malware Uses new resources like TOR. Increase of injections with support for mobile malware. Mobile malware for sale:! ibanking (as Service).! Perkele!
41 OUR SERVICES IBanking Malware
42 OUR SERVICES Perkele Malware
43 CryptoCurrencies
44 CryptoCurrencies
45 CryptoCurrencies
46 OUR SERVICES CryptoCurrencies TOTAL HASH RATE 24H HASH RATE
47 Examples!
48 Examples Example! TimeLine! Brian Krebs! 18/Dec/2013: Sources: Target Investigating Data Breach! 20/Dec/2013: Cards Stolen in Target Breach Flood Underground Markets! 22/Dec/2013: Non-US Cards Used At Target Fetch Premium! 24/Dec/2013: Who s Selling Credit Cards from Target?! 10/Jan/2014: Target: Names, s, Phone Numbers on Up To 70 Million Customers Stolen! 15/Jan/2014: A First Look at the Target Intrusion, Malware! 16/Jan/2014: A Closer Look at the Target Malware, Part II! 29/Jan/2014: New Clues in the Target Breach! 04/Feb/2014: These Guys Battled BlackPOS at a Retailer! 05/Feb/2014: Target Hackers Broke in Via HVAC Company! 12/Feb/2014: Attack on Vendor Set Up Breach at Target! 19/Feb/2014: Fire Sale on Cards Stolen in Target Breach! 25/Feb/2014: Card Backlog Extends Pain from Target Breach
49 Examples Example
50 Examples Example
51 NTELLIGENCE
52 Intelligence INTELLIGENCE
53 INTELL! INTELLIGENCE and remember Emerging threat research Strategic partnerships to share intelligence Tailored threat focus areas Live, dynamic intelligence feeds with advanced Actively tracking of cybercrime element Daily emerging threat reviews Awareness of the changing technology and business environment Metrics and rending data for multiple key threat indicators Recommendations on improved and refined processes + IN-TE-LLI-GEN-CE Botnet monitoring and analysis Malware reverse engineering Social media monitor Reputation scans Deep web monitoring Social engineering threats Spoofed websites All Source Intelligence Emerging tech review Loss management Vendor management Executive identity monitoring +
54 INFRASTRUCTURES
55 OUR SERVICES Simple Botnet INTERNET BOTNET
56 OUR SERVICES Simple Botnet With Proxy INTERNET BOTNET
57 OUR SERVICES Botnet With Double Proxy PROXY - 1 VICTIMS BOTNET INTERNET PROXY - 2
58 OUR SERVICES FAST FLUX + C&C VICTIM HTTP GET GET REDIRECT RESPONSE CONTENT FASTFLUX RESPONSE CONTENT
59 OUR SERVICES FAST FLUX + PROXY+ C&C VICTIM HTTP GET GET REDIRECT RESPONSE CONTENT FASTFLUX RESPONSE CONTENT
60 OUR SERVICES BulletProft Hosters Backend Server INTERNET BP HOSTER
61 OUR SERVICES OWN INFRASTRUCTURES OpenVPN Server Backend Server VICTIMS INTERNET Backend Server VPN Client IPIP Tunel Backend Server
62 OUR SERVICES TOR INFRASTRUCTURES Web Panel VICTIMS INTERNET TOR Network
63 OUR SERVICES P2P INFRASTRUCTURE INTERNET Web Panel VICTIMS P2P Network Backup Server
64 DEMO TIME
65 DEMO Concept BUILD POS ENVIROMENT SWIPE OUR CREDIT CARD BREATHE DEEPLY INFECT OUR POS CALM DOWN PWN THE BOTNET AND GET OUR MONEY BACK!
66 DEMO RESULTS Me robo mi tarjeta Yo quemé su botnet
67 THANKS!
68 WARING! SPAM IS COMING!
69 THANKS!!
70 Q/A
INDUSTRY OVERVIEW: RETAIL
ii IBM MSS INDUSTRY OVERVIEW: RETAIL RESEARCH AND INTELLIGENCE REPORT RELEASE DATE: JANUARY 5, 215 BY: DAVID MCMILLEN, SENIOR THREAT RESEARCHER Copyright IBM Corporation 214. All rights reserved. IBM and
More informationBotnets: The Advanced Malware Threat in Kenya's Cyberspace
Botnets: The Advanced Malware Threat in Kenya's Cyberspace AfricaHackon 28 th February 2014 Who we Are! Paula Musuva-Kigen Research Associate Director, Centre for Informatics Research and Innovation (CIRI)
More informationPrepare Yourself for the Digital Battlefield. Christopher May. 27 Feb 2014
Prepare Yourself for the Digital Battlefield Christopher May 27 Feb 2014 2014 Carnegie Mellon University Overview Who is this guy? What is the Digital Battlefield? Why do I want to work in Cyber Security?
More informationDissecting the Recent Cyber Security Breaches. Yu Cai School of Technology Michigan Technological University
Dissecting the Recent Cyber Security Breaches Yu Cai School of Technology Michigan Technological University Disclaimers Most information in this presentation was collected from various sources on the Internet.
More informationDNS Firewall Overview Speaker Name. Date
DNS Firewall Overview Speaker Name 1 1 Date Reserved. Agenda DNS Security Challenges DNS Firewall Solution Customers Call to Action 2 2 Reserved. APTs: The New Threat Landscape Nation-state or organized-crime
More informationEffective Methods to Detect Current Security Threats
terreactive AG. Swiss Cyber Storm 2015. Effective Methods to Detect Current Security Threats Enrico Petrov Director Managed Security Services terreactive October 21 st, 2015 terreactive Background. About
More informationSurviving and operating services despite highly skilled and well-funded organised crime groups. Romain Wartel, CERN CHEP 2015, Okinawa
Surviving and operating services despite highly skilled and well-funded organised crime groups Romain Wartel, CERN CHEP 2015, Okinawa 1 Operation Windigo (2011 - now) 30,000+ unique servers compromised
More informationOverview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms
Overview Common Internet Threats Tom Chothia Computer Security, Lecture 19 Phishing Sites Trojans, Worms, Viruses, Drive-bydownloads Net Fast Flux Domain Flux Infiltration of a Net Underground economy.
More informationEffective Methods to Detect Current Security Threats
terreactive AG. Swiss Cyber Storm 2015. Effective Methods to Detect Current Security Threats Taking your IT security to the next level, you have to consider a paradigm shift. In the past companies mostly
More informationEMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security Evangelist @StephenCoty
EMERGING THREATS & STRATEGIES FOR DEFENSE Stephen Coty Chief Security Evangelist @StephenCoty Industry Analysis 2014 Data Breaches - Ponemon Ponemon 2014 Data Breach Report *Statistics from 2013 Verizon
More informationIT Security Community
IT Security Community Who are we? The CompTIA IT Security is a group focused on the changing security issues of today. Who should join? Anyone looking to stay current with the ever- changing security landscape.
More informationSecurity workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013
Security workshop Belnet Aris Adamantiadis Brussels 18 th April 2013 Agenda What is a botnet? Symptoms How does it work? Life cycle How to fight against botnets? Proactive and reactive NIDS 2 What is a
More informationWho Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
More information«SWIPED AND APPROVED» Exposing carders fully automated e-shop selling stolen cards data
«SWIPED AND APPROVED» Exposing carders fully automated e-shop selling stolen cards data Contents 1. Introduction... 3 2. General SWIPED description... 4 3. Intelligence operation against SWIPED... 11 3.1.
More informationMicrosoft Security Response Center (MSRC) Microsoft Malware Protection Center (MMPC)
Security@Microsoft Trustworthy Computing (TwC) Programs supporting security outreach and engagement Microsoft Active Protections Program (MAPP), Government Security Program (GSP) (was SCP) Microsoft Security
More informationCITADEL TROJAN OUTGROWING ITS ZEUS ORIGINS
CITADEL TROJAN OUTGROWING ITS ZEUS ORIGINS May 2012 As of April 30th, 2012 the Citadel Trojan was at its fourth upgrade with Version 1.3.4.0 already in the hands of its customers. Citadel s features, bug
More informationOne Minute in Cyber Security
Next Presentation begins at 15:30 One Minute in Cyber Security Simon Bryden Overview Overview of threat landscape Current trends Challenges facing security vendors Focus on malware analysis The year? The
More informationAn New Approach to Security. Chris Ellis McAfee Senior System Engineer Chris_Ellis@McAfee.com
An New Approach to Security Chris Ellis McAfee Senior System Engineer Chris_Ellis@McAfee.com Advanced Targeted Attack Challenges Criminal Theft Sabotage Espionage After the Fact Expensive Public Uncertainty
More informationMalicious Network Traffic Analysis
Malicious Network Traffic Analysis Uncover system intrusions by identifying malicious network activity. There are a tremendous amount of network based attacks to be aware of on the internet today and the
More informationInnovations in Network Security
Innovations in Network Security Michael Singer April 18, 2012 AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies.
More informationDescription: Course Details:
Course: Malicious Network Traffic Analysis Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: There are a tremendous amount of network based attacks to be aware of on the internet
More informationRETHINKING ORC: NRF S CYBER SECURITY EFFORTS. OMG Cross Domain Threat & Risk Information Exchange Day, March 23, 2015
RETHINKING ORC: NRF S CYBER SECURITY EFFORTS OMG Cross Domain Threat & Risk Information Exchange Day, March 23, 2015 No Organization is Secure Source: http://www.informationisbeautiful.net An Average
More informationWhite paper. Phishing, Vishing and Smishing: Old Threats Present New Risks
White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have
More informationCurrent Threat Scenario and Recent Attack Trends
Current Threat Scenario and Recent Attack Trends Anil Sagar Additional Director Indian Computer Emergency Response Team (CERT-In) Objectives Current Cyber space Nature of cyberspace and associated risks
More informationWHEN THE HUNTER BECOMES THE HUNTED HUNTING DOWN BOTNETS USING NETWORK TRAFFIC ANALYSIS
WHEN THE HUNTER BECOMES THE HUNTED HUNTING DOWN BOTNETS USING NETWORK TRAFFIC ANALYSIS /ABOUT/ME Thomas Chopitea - Incident handler @CertSG Digital forensics & incident response (#DFIR), malware analysis,
More informationSurviving the Ever Changing Threat Landscape
Surviving the Ever Changing Threat Landscape Kevin Jordan Cyber Security Specialist Dell GLBA FFIEC NCUA PCI HIPAA NERC CIP FISMA 700+ Percentage of U.S. adults who Federal named online and banking state
More informationRemarkable Hacking-Incidents in 2013/2014
Remarkable Hacking-Incidents in 2013/2014 Peter Panholzer Arbeitsgruppe ICS CYBER SECURITY AUSTRIA Verein zur Förderung der Sicherheit Österreichs strategischer Infrastruktur Industrial Security Control
More informationUnified Security Management and Open Threat Exchange
13/09/2014 Unified Security Management and Open Threat Exchange RICHARD KIRK SENIOR VICE PRESIDENT 11 SEPTEMBER 2014 Agenda! A quick intro to AlienVault Unified Security Management (USM)! Overview of the
More informationPresented By: Corporate Security Information Security Treasury Management
Presented By: Corporate Security Information Security Treasury Management Is Your Business Prepared for a Cyber Incident? It s not a matter of if, it s a matter of when Cyber Attacks are on the Rise; Physical
More informationComprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
More informationCYBERSECURITY HOT TOPICS
1 CYBERSECURITY HOT TOPICS Secure Banking Solutions 2 Presenter Chad Knutson VP SBS Institute Senior Information Security Consultant Masters in Information Assurance CISSP, CISA, CRISC www.protectmybank.com
More informationDATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH
DATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH Andy Watson Grant Thornton LLP. All rights reserved. CYBERSECURITY 2 SURVEY OF CHIEF AUDIT EXECUTIVES (CAEs) GRANT THORNTON'S 2014 CAE SURVEY Data privacy and
More informationBeyond the Box: A Strategic Approach Against APTs
Beyond the Box: A Strategic Approach Against APTs Filippo Monticelli Regional Director Italy & Malta CYBERSECURITY SUMMIT 2015 Roma 20/05/2015 Copyright Fortinet Inc. All rights reserved. Complexity of
More informationInternet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
More informationPrimer TROUBLE IN YOUR INBOX 5 FACTS EVERY SMALL BUSINESS SHOULD KNOW ABOUT EMAIL-BASED THREATS
A Primer TROUBLE IN YOUR INBOX 5 FACTS EVERY SMALL BUSINESS SHOULD KNOW ABOUT EMAIL-BASED THREATS Even with today s breakthroughs in online communication, email is still one of the main ways that most
More informationLarge-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity
Computer Crime and Intellectual Property Section Large-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity Albert Rees Computer Crime and Intellectual Property Section (CCIPS) Criminal Division,
More informationSecurity Intelligence Services. www.kaspersky.com
Kaspersky Security Intelligence Services. Threat Intelligence Services www.kaspersky.com THREAT INTELLIGENCE SERVICES Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats
More informationBefore the DEPARTMENT OF COMMERCE Internet Policy Task Force
Before the DEPARTMENT OF COMMERCE Internet Policy Task Force In the Matter of Cybersecurity, Innovation Docket No. 100721305-0305-01 and the Internet Economy COMMENTS OF VeriSign, Inc Joe Waldron Director,
More informationIs security awareness a waste of time?
Is security awareness a waste of time? New York State Cyber Security Conference June 5, 2013 Scott Gréaux Vice President Product Management and Services, PhishMe, Inc. They are exploiting human vulnerabilities
More informationCyber Risk Management with COBIT 5
Cyber Risk Management with COBIT 5 Marco Salvato CISA, CISM, CGEIT, CRISC, COBIT 5 Approved Trainer 1 Agenda Common definition of Cyber Risk and related topics Differences between Cyber Security and IS
More informationData Center security trends
Data Center security trends Tomislav Tucibat Major accounts Manager, Adriatic Copyright Fortinet Inc. All rights reserved. IT Security evolution How did threat market change over the recent years? Problem:
More informationEvolution of attacks and Intrusion Detection
Evolution of attacks and Intrusion Detection AFSecurity seminar 11 April 2012 By: Stian Jahr Agenda Introductions What is IDS What is IDS in mnemoic How attacks have changed by time and how has it changed
More informationPoint-of-Sale (POS) Malware: Tactics and Strategies for Protecting Customer Payment Information
Point-of-Sale (POS) Malware: Tactics and Strategies for Protecting Customer Payment Information Bit9 and Carbon Black Jeffrey J. Guy 20 Feb 14 jjguy@bit9.com @jjguy 2014 Bit9. All Rights Reserved Introduction
More informationAnalyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
More informationCYBERSECURITY FRAUD LOSS ISSUES & HOW TO ADDRESS RISKS IN TODAY'S INSURANCE MARKETPLACE 12/16/2015. December 17, 2015
12/16/2015 CYBERSECURITY FRAUD LOSS ISSUES & HOW TO ADDRESS RISKS IN TODAY'S INSURANCE MARKETPLACE December 17, 2015 Angela R. Morelock, CPA, CFE, CFF, ABV Partner, BKD, LLP amorelock@bkd.com Jeff Eiserman
More informationEd Ferrara, MSIA, CISSP eferrara@temple.edu. Fox School of Business
MIS 5208 Week 4 Cybersecurity & Fraud Ed Ferrara, MSIA, CISSP eferrara@temple.edu Hacking Source: www.youtube.com Computer Crime A cyber breach is any event that intentionally or unintentionally causes
More informationPractice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited
Practice Good Enterprise Security Management Presented by Laurence CHAN, MTR Corporation Limited About Me Manager Information Security o o o o Policy formulation and governance Incident response Incident
More informationCyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015
Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology
More informationAddressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
More informationCyber Security 2014 SECURE BANKING SOLUTIONS, LLC
Cyber Security CHAD KNUTSON SECURE BANKING SOLUTIONS 2014 SECURE BANKING SOLUTIONS, LLC Presenter Chad Knutson Senior Information Security Consultant Masters in Information Assurance CISSP (Certified Information
More informationOtas%serumquis%es%explibu%sanimet%et%aut%omnisse Otas%serumquis%es%explibu%sanimet%et%aut%omnisse%nimpore%rendae% nonecerum% NUCLEUS BVBA MATTIAS GENIAR SENIOR SYSTEM ENGINEER dolorem.% MATTIAS@NUCLEUS.BE
More informationPhishing Activity Trends Report. 1 st Half 2009. Committed to Wiping Out Internet Scams and Fraud
1 st Half 2009 Committed to Wiping Out Internet Scams and Fraud January June 2009 Phishing Report Scope The quarterly APWG analyzes phishing attacks reported to the APWG by its member companies, its Global
More informationWhat s Hot and What s Not in the World of Cyber Security and Cyber Crime
Department of Technology, Management & Budget (DTMB) What s Hot and What s Not in the World of Cyber Security and Cyber Crime Dan Lohrmann, Chief Technology Officer Department of Technology, Management
More informationA TASTE OF HTTP BOTNETS
Botnets come in many flavors. As one might expect, these flavors all taste different. A lot of Internet users have had their taste of IRC, P2P and HTTP based botnets as their computers were infected with
More informationWhen less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński
When less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński 1 Agenda Spear-Fishing the new CEO Fear How to Fight Spear-Fishing It s All About the Data Evolution of the bad guys
More informationDefending Against. Phishing Attacks
Defending Against Today s Targeted Phishing Attacks DeFending Against today s targeted phishing attacks 2 Introduction Is this email a phish or is it legitimate? That s the question that employees and
More informationTop 10 Data Security Threats Plaguing Credit Unions
Top 10 Data Security Threats Plaguing Credit Unions (2H 2013 Threat Report) Andrew Jaquith CTO & SVP, Cloud Strategy Grace Zeng, SilverSky Labs February 20, 2014 Housekeeping rules Everyone s phone is
More informationThreat Intelligence is Dead. Long Live Threat Intelligence!
SESSION ID: STR-R02 Threat Intelligence is Dead. Long Live Threat Intelligence! Mark Orlando Director of Cyber Operations Foreground Security Background Threat Intelligence is Dead. Long Live Threat Intelligence!
More informationRLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses
RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123 Cybersecurity: A Growing Concern for Small Businesses Copyright Materials This presentation is protected by US and International Copyright
More informationSecuring Your Business s Bank Account
Commercial Banking Customers Securing Your Business s Bank Account Trusteer Rapport Resource Guide For Business Banking January 2014 Table of Contents 1. Introduction 3 Who is Trusteer? 3 2. What is Trusteer
More informationCyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799
Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies
More informationThreat landscape how are you getting attacked and what can you do better protect yourself and your e-commerce platform
Threat landscape how are you getting attacked and what can you do better protect yourself and your e-commerce platform Sebastian Zabala Senior Systems Engineer 2013 Trustwave Holdings, Inc. 1 THREAT MANAGEMENT
More information1. Ask what your financial institution knows or has personally experienced with regard to internal and external data breaches.
Part 1: Internal & External Data Breach Vulnerabilities Presented on: Thursday, February 12, 2 3 ET Co presented by: Ann Davidson VP of Risk Consulting at Allied Solutions Joe Majka CSO at Verifone 1 Breakdown
More informationCyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
More informationCybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015
Cybersecurity: A Growing Concern for All Businesses RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015 RLI Design Professionals is a Registered Provider with The American
More informationWhat the Biggest Data Breaches in Retail Have Taught Us about Cyber Security
What the Biggest Data Breaches in Retail Have Taught Us about Cyber Security With the holiday season upon us, much attention turns to the retail sector, which is expected to see unprecedented activity
More informationCOMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION. A Kill Chain Analysis of the 2013 Target Data Breach
COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION A Kill Chain Analysis of the 2013 Target Data Breach MAJORITY STAFF REPORT FOR CHAIRMAN ROCKEFELLER MARCH 26, 2014 Executive Summary In November and December
More informationCybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
More informationCYBERCRIME: What your Bank should be doing to Protect your Business. David Pollino Senior Vice President Fraud Prevention Officer
CYBERCRIME: What your Bank should be doing to Protect your Business David Pollino Senior Vice President Fraud Prevention Officer Agenda Changing Landscape Case of Efficient Services Escrow Group Six key
More informationNetworking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
More informationCombatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation
Combatting the Biggest Cyber Threats to the Financial Services Industry A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry Combatting
More informationNuclear Security Requires Cyber Security
Nuclear Security Requires Cyber Security A. DAVID MCKINNON, PH.D., MARY SUE HOXIE Cyber Physical Security Team, National Security Directorate Project on Nuclear Issues (PONI) Fall 2015 Conference PNNL-SA-113027
More informationSESSION 507 Thursday, March 26, 11:15 AM - 12:15 PM Track: Desktop Support
SESSION 507 Thursday, March 26, 11:15 AM - 12:15 PM Track: Desktop Support Desktop Support and Data Breaches: The Unknown Dangers Bryan Hood Senior Solutions Engineer, Bomgar bhood@bomgar.com Session Description
More information場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR
場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR Minimum Requirements of Security Management and Compliance
More informationSummary of the State of Security
Summary of the State of Security Tram Jewett, CISA CliftonLarsonAllen LLP Virginia GFOA Annual Spring Conference, 2016 1 1 Summary of the State of Security Tram Jewett, MS., CISA, 11 years IT audit and
More informationAdvanced Persistent Threats
Emilio Tonelli Senior Sales Engineer South Europe WatchGuard Technologies, Inc. Advanced Persistent Threats the new security challenge Are you protected? Current Threat Landscape 2 Global Threat Landscape:
More informationHong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
More informationSecuring Your Business with DNS Servers That Protect Themselves
Product Summary: The Infoblox Secure DNS Solution mitigates attacks on DNS servers by intelligently recognizing various attack types and dropping attack traffic while responding only to legitimate queries.
More informationSECURITY 2.0 LUNCHEON
PROTECTING YOUR ORGANIZATION SECURITY 2.0 LUNCHEON AGAINST CYBER THREATS Tommy Montgomery, Principal Consultant Viral Dhimar, Consultant Adam Ferguson, VP October 22, 2014 #SWCEvents Security 2.0: Next
More informationSplunk: Using Big Data for Cybersecurity
Next Session Begins at 14:40 Splunk: Using Big Data for Cybersecurity Joe Goldberg Splunk Splunk: Using Big Data for Cybersecurity Joseph Goldberg Splunk Advanced Threats in the Headlines Cyber Criminals
More informationUsing big data analytics to identify malicious content: a case study on spam emails
Using big data analytics to identify malicious content: a case study on spam emails Mamoun Alazab & Roderic Broadhurst Mamoun.alazab@anu.edu.au http://cybercrime.anu.edu.au 2 Outline Background Cybercrime
More informationAdvanced Persistent Threats
Advanced Persistent Threats Craig Harwood Channel Manager SADC and Indian Ocean Islands 1 Agenda Introduction Today s Threat landscape What is an Advance persistent Threat How are these crimes perpetrated
More informationWhat happens when you swipe your card?
What happens when you swipe your card? As hacking of top retailers make headlines, Bill Whitaker discovers how insecure your credit card information is this holiday season The following is a script of
More informationDragonfly: Energy Companies Under Sabotage Threat Symantec Security Response
Dragonfly: Energy Companies Under Sabotage Threat Symantec Security Response Dragonfly: Western Energy Companies Under Sabotage Threat 1 What is Dragonfly? Ongoing cyberespionage campaign Targeting the
More informationAI Engine Rules June 2014
AI Engine Rules June 2014 LogRhythm AI Engine Rules 2014 LogRhythm, Inc. All rights reserved This document contains proprietary information, which is protected by copyright. The software described in this
More informationMalware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
More informationBot-Trek Cyber Intelligence (CI)
(CI) a platform which allows customers the ability to monitor, analyze and predict potential threats to information security relevant to the company, its partners and customers Examples of Incidents Home
More informationES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS
ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISS The Internet Threat Landscape Symantec TM Dean Turner Director Global Intelligence Network Symantec Security
More informationUnknown threats in Sweden. Study publication August 27, 2014
Unknown threats in Sweden Study publication August 27, 2014 Executive summary To many international organisations today, cyber attacks are no longer a matter of if but when. Recent cyber breaches at large
More informationThe SMB Cyber Security Survival Guide
The SMB Cyber Security Survival Guide Stephen Cobb, CISSP Security Evangelist The challenge A data security breach can put a business out of business or create serious unbudgeted costs To survive in today
More informationKaspersky Lab. Contents
KASPERSKY DDOS INTELLIGENCE REPORT Q3 2015 Contents Contents... 1 Q3 events... 2 Attacks on financial organizations... 2 Unusual attack scenario... 2 XOR DDoS bot activity... 2 DDoS availability... 3 Statistics
More informationTrust the Innovator to Simplify Cloud Security
Trust the Innovator to Simplify Cloud Security Contents MailGuard Pty Ltd Page 1 of 7 2 Let s get real for a moment. Your antivirus software isn t stopping fastbreak phishing and other spam attacks like
More informationMicrosoft Security Intelligence Report
Microsoft Security Intelligence Report Volume 16 July through December, 2013 Key Findings Summary This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY,
More informationAutomated Protection on UCS with Trend Micro Deep Security
Copyright 2014 Trend Micro Inc. Automated Protection on UCS with Trend Micro Deep Security Chris Van Den Abbeele Senior presales Engineer Agenda 1. Industrialization of Cyber threats The boomerang of Project
More informationApplying the 80/20 approach for Operational Excellence. How to combat new age threats, optimize investments and increase security.
Applying the 80/20 approach for Operational Excellence How to combat new age threats, optimize investments and increase security Vinod Vasudevan Agenda Current Threat Landscape The 80/20 Approach Achieving
More informationDefending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
More informationExploring the Black Hole Exploit Kit
Exploring the Black Hole Exploit Kit Updated December 20, 2011 Internet Identity Threat Intelligence Department http://www.internetidentity.com http://www.internetidentity.com 12/29/11 Page 1/20 Summary
More informationGOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate
GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS Joe Goldberg Splunk Session ID: SPO-W09 Session Classification: Intermediate About Me Joe Goldberg Current: Splunk - Security Evangelist
More informationDNS POISONING, AKA PHARMING, MAKES THE HEADLINES IN NOVEMBER S NEWS
DNS POISONING, AKA PHARMING, MAKES THE HEADLINES IN NOVEMBER S NEWS December 2011 November saw DNS Poisoning, aka Pharming, making the headlines on more than one occasion: To name a few, the online threat
More informationINDUSTRY OVERVIEW: FINANCIAL
ii IBM MSS INDUSTRY OVERVIEW: FINANCIAL RESEARCH AND INTELLIGENCE REPORT RELEASE DATE: NOVEMBER 5, 2014 BY: JOHN KUHN, SENIOR THREAT RESEARCHER iii TABLE OF CONTENTS EXECUTIVE OVERVIEW... 1 MAJOR FINANCIAL
More information