Understanding the Real Cyber Security Threat
|
|
|
- Maurice Randell Young
- 9 years ago
- Views:
Transcription
1 Understanding the Real Cyber Security Threat & what you can do to protect yourself Barry Greene 1
2 Do we have your attention! "[T]he malware that was used would have gotten past 90 percent of the Net defenses that are out there today in private industry and [would have been] likely to challenge even state government," said Joe Demarest, assistant director of the Federal Bureau of Investigation s cyberdivision." 2
3 Agenda To gain a understanding of how we ve been battling cyber-crime, we must understand the fundamentals of the threat vector: 1. Context: What is really happening? 2. Today s Cybercriminal Toolkit The Criminal Cloud 3. Understanding Today s Cyber-Criminal Behavior Drivers 4. Now What? What you do? 3
4 Context: What is really happening. 4
5 What Do You Tell the Boss? Hacker ISP CPE Target 5
6 The SP s Watershed Feb
7 The Vetted Battling the Bad Guys 7
8 Who really stopped the Estonian DDOS? The Community of Trusted and Vetted network operators all around the world NSP-SEC. NSP-SEC Closed Security Operations Alias for engineers actively working with NSPs/ISPs to mitigate security incidents. Multiple Layers of sanity checking the applicability and trust levels of individuals. Not meant to be perfect just better than what we had before which was US government coordination 8
9 When BOTs Attack Inter AS 9
10 Miscreant - Incident Economic Cycles Lots of Problems & Attacks Incidents Peak Resolve the Problem Recession Community Mitigation Drive the Post Mortem Miscreant & Criminal R&D Trough Survive the Next Attack These Cycles Repeat New Criminal Revenue Opportunities Expansion Drive the Preparation time 10
11 Where is these insights coming from? Work the Problem Tactical Mitigation Post Mortem Mitigation & Operations Communities Craft Strategic Response Ops Meetings One-on-One Beer Meetings Empowerment Hardware Software What we re doing today. BCPs 11
12 Working the 40/40/20 Rule Sean Donelan s (back in his SBC days) [[email protected]] rule for end point patching: 40% of the customers care and will proactively patch 40% of the customers may someday care and fix/patch/delouse their machines 20% of the customers just do not care and have never responded to any effort to fix them. 12
13 Never underestimate the power of human communications as a tool to solve security problems. Our history demonstrates that since the Morris Worm, peer communication has been the most effect security tool. Barry Raveendran Greene 13
14 Example of Specializations Situational Consultation (Map the Crime Vector): OPSEC Trust s Main Team Situational Awareness: BTFC, Anti-S, SCADASEC (and others) Dissecting : YASMIL, II (perhaps MWP) Big Back Bone Security and IP Based Remediation: NSP-SEC Domain Name Takedown: NX-Domain DNS System Security: DNS-OARC Anti SPAM, Phishing, and Crime: MAAWG & APWG Vulnerability Management: FIRST Many other Confidential Groups specializing into specific areas, issues, incidents, and vulnerabilities. Investigative Portals providing focused, confidential investigation: OPSEC Trust Investigative Teams 14
15 Results DNS Changer Take Down The "DNS Changer" (aka Ghost Click ) crew that has been hijacking your constituent's DNS configs were arrested, infrastructure seized, and a major data center shutdown. 15
16 Top List of SP Security Fundamentals 1. Prepare your NOC 2. Mitigation Communities 3. inoc-dba Hotline (build communications channels) 4. Point Protection on Every Device 5. Edge Protection 6. Remote triggered black hole filtering 7. Sink holes 8. Source address validation on all customer traffic 9. Control Plane Protection 10. Total Visibility (Data Harvesting Data Mining) 11. Remediating Victimized Customers This list applies to Enterprises, Banks, Governments, Online providers, Cloud deployments, etc 16
17 But first, you need to understand the threat! If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle. Sun Tzu - Art of War 17
18 Pause for Questions
19 Cyber Criminal Toolkit that is the foundation for the Criminal Cloud 19
20 Cyber Criminal s Goal Build a BOTNET that can be used for: Vandalism Extortion Racketeering Terrorism Bullying Fraud Political Intimidation Theft Hijacking 20
21 But What About Anti Virus? Packing Tools allow the Cyber-Criminal to change the signature of the malware every hour on the hour This bypasses the antivirus software AV Engine Country Signature Ahnlab KR no_virus Aladdin (esafe) IL no_virus Alwil (avast) CZ no_virus Authentium US no_virus Avira (antivir) DE HEUR/Crypted BitDefender RO no_virus CA (E-Trust Ino) US no_virus CA (E-Trust Vet) US no_virus CAT (quickheal) IN no_virus ClamAV Trojan.Crypted-4 Dr. Web RU no_virus Eset (nod32) US no_virus Ewido DE no_virus Fortinet US no_virus Frisk (f-prot) IS no_virus Frisk (f-prot4) IS no_virus F-Secure FI Hupigon.gen130 Grisoft (avg) CZ no_virus Ikarus AT Backdoor.VB.EV Kaspersky RU no_virus Mcafee US no_virus Microsoft US no_virus Norman NO Hupigon.gen130 Panda ES no_virus Prevx GB no_virus Securecomputing US Heuristic.Crypted Sophos GB no_virus Sunbelt US VIPRE.Suspicious Symantec US no_virus TheHacker PE no_virus UNA UA no_virus VirusBlokAda (vba32) BY no_virus 21
22 Components of the Criminal Cloud SPAM BOTNET Drive-By Secondary Controller Proxy Payment Processors Name Servers! Avalanche: SPAM Cloud that you can lease time! Zeus: IPv6 Compliant Build your Own Criminal Cloud.! BlackHole: Metasploit Cloud you can lease Library Mule Operations Cyber-Criminal Victim of Crime New BOT in the BOTNET Packer TLD Domain 22
23 Stage Domain Name SPAM BOTNET Drive-By Secondary Controller Proxy Name Servers Stage on NS or FF NS IPv6 Get Domain BOT Herder Victim of Crime Packer TLD Domain 23
24 Prepare Drive-By SPAM BOTNET Drive-By Secondary Controller Proxy Send Name Servers Load Hacker Victim of Crime TLD Domain Packer 24
25 Social Engineered SPAM to Get People to Click (Spear Phishing) SPAM BOTNET Send SPAM Drive-By Secondary Controller Proxy IPv6 Click on me now Name Servers Hacker Victim of Crime TLD Domain Packer 25
26 Drive-By Violation Click on me now SPAM BOTNET Drive-By Secondary Controller Proxy Name Servers Hacker Victim of Crime TLD Domain Packer 26
27 Poison Anti-Virus Updates SPAM BOTNET Drive-By Secondary Controller Proxy Name Servers Anti-Virus Vendor Poison the anti-virus updates All updates to Hacker Victim of Crime TLD Domain Packer 27
28 Prepare Violated Computer SPAM BOTNET Drive-By Secondary Controller Proxy Name Servers Anti-Virus Vendor Call to secondary site Load secondary package Hacker Victim of Crime TLD Domain Packer 28
29 Call Home SPAM BOTNET Drive-By Secondary Controller Proxy Name Servers Victim of Crime Call to Controller Report: " Operating System " Anti-Virus " Location on the Net " Software " Patch Level " Bandwidth " Capacity of the computer Hacker TLD Domain Packer 29
30 Load Custom SPAM BOTNET Drive-By Secondary Controller Proxy Name Servers Go get New Module Hacker Victim of Crime TLD Domain Packer 30
31 Start Worming, Scanning, & Spreading SPAM BOTNET Drive-By Secondary Controller Proxy Name Servers BOTNET Herder IPv6 Victims of Crime IPv6 Packer TLD Domain 31
32 Load a Proxy with Trigger Corporate Network Drive-By Secondary Controller Proxy Name Servers Go get my proxy Hacker Victim of Crime TLD Domain Packer 32
33 Watch for the SSL VPN Connection Cool! Lets see what I can find to steal. Corporate Network Drive-By Secondary Controller Proxy Name Servers Hacker Victim of Crime Tell me when the SSL VPN Connection is Established TLD Domain Packer 33
34 Set up the Proxy Tunnel Cool! Lets see what I can find to steal. Corporate Network Drive-By Secondary Controller Proxy Name Servers Hacker Victim of Crime TLD Domain Packer 34
35 Proxy Behind the Bank Login Cool! Lets see what I can find to steal. BANKS Drive-By Secondary Controller Proxy Name Servers Hacker Victim of Crime TLD Domain Packer 35
36 Pause for Questions
37 OPSEC Community s Action Make SPAM Harder SPAM BOTNET Name Servers Disrupt the NS Infrastructure Drive-By Disrupt Drive- By Phishing Secondary Help your victimized customers Victim of Crime Controller Clean Violated Data Centers Disrupt Controllers Proxy We do not know how to lock this guy in jail! BOT Herder TLD Domain Packer Filter Based on TLD 37
38 Scary Consequences 1. Building Secure Operating Systems with Security Development Lifecycles and aggressive testing are not delivering to expectations. 2. Host Security Tools (anti-virus) are not delivering to expectations. 3. Application Security is not delivering and becoming more complicated. 4. Network Security tools (firewalls, IDP/IPS, etc) are not delivering as expected. 38
39 Scary Consequences 5. Defense in Depth are not delivering as expected. 6. Remediation is not working (i.e. how to clean up infections). 7. The Bad Guys follow economic equilibrium patterns finding optimization thresholds. 8. Law Enforcement is not in a position to act on International Crime where the laws are not in place. 9. The eco-system of the security industry is locked in a symbiotic relationship. 39
40 Understanding Today s Cyber-Criminal Behavior Drivers 40
41 Key Take Away The Good Guys are the Big Part of the Security Problem Who we need to Target This is nice to know Not understanding that our problem is a human problem leads to security solutions which get bought, deployed, and never used. 41
42 Our Traditional View of the World 42
43 The Reality of the Internet - No Borders How to project civic society and the rule of law where there is no way to enforce the law? 43
44 Four Major Threat Vectors Critical Infrastructure has four major threat drivers: Community #1 Criminal Threat Criminal who use critical infrastructure as a tools to commit crime. Their motivation is money. Community #2 War Fighting, Espionage and Terrorist Threat What most people think of when talking about threats to critical infrastructure. Community #3 P3 (Patriotic, Passion, & Principle) Threat Larges group of people motivated by cause be it national pride (i.e. Estonia & China) or a passion (i.e. Globalization is Wrong) aka Anonymous Community #4 Nation State 44
45 Essential Criminal Principles There are key essential principles to a successful miscreant (i.e. cyber criminal) These principles need to be understood by all Security Professionals Understanding allows one to cut to the core concerns during security incidents Attacking the dynamics behind these principles are the core ways we have to attempt a disruption of the Miscreant Economy* * The cyber-criminal economic cycles were first observed in 2001 by Rob Thomas (Team CYMRU) and Barry Greene during a postmortem investigation. This Miscreant Economy has been growing exponentially since that time. 45
46 Principles of Successful Cybercriminals 1. Don t Get Caught 2. Don t work too hard 3. Follow the money 4. If you cannot take out the target, move the attack to a coupled dependency of the target 5. Always build cross jurisdictional attack vectors 6. Attack people who will not prosecute 7. Stay below the pain threshold 46
47 Principle 1: Do Not Get Caught! The first principle is the most important it is no fun getting caught, prosecuted, and thrown in jail (or in organized crime getting killed) All threat vectors used by a miscreant will have an element of un-traceability to the source If a criminate activity can be traced, it is one of three things: 1. A violated computer/network resources used by the miscreant 2. A distraction to the real action 3. A really dumb newbie 47
48 Principle 2: Do Not Work Too Hard! Use the easiest attack/penetration vector available in the toolkit to achieve the job s objective Example: If your job is to take out a company s Internet access the day of the quarterly number s announcement, would you: 1. Penetrate the Site and Delete files? 2. Build a custom worm to create havoc in the company? 3. DOS the Internet connection? 4. DOS the SP supporting the connection? Why Use DNS Noisy Poisoning when it is easier to violate a cctld? 48
49 Principle 3: Follow the Money If there is no money in the crime then it is not worth the effort. Follow the money is the flow of money or exchanged value as one miscreant transfers value to another miscreant (or the victim transfers value to the criminal) A Cyber-Criminal Threat Vector opens when the miscreant finds a way to move stored value from the victim through the economy It is worse if the cyber stored value can cross over to normal economic exchange 49
50 Principle 4: If You Cannot Take Out The Target If you cannot take out the target, move the attack to a coupled dependency of the target There are lots of coupled dependencies in a system: The target s supporting PE router Control Plane DNS Servers State Devices (Firewalls, IPS, Load Balancers) Collateral Damage! 50
51 Principle 5: Always Build Cross Jurisdictional Attack Vectors Remember Don t get caught! Do make sure ever thing you do is cross jurisdictional. Even better cross the law systems (Constitutional, Tort, Statutory, Islamic, etc.) Even Better Make sure your gang is multi-national making it harder for Law Enforcement BOTNET LEAF Japan BOTNET LEAF Australia BOTNET LEAF Norway BOTNET LEAF US BOTNET LEAF China BOTNET HUB BOTNET LEAF Kuwait 51
52 Principle 6: Attack People Who Will NOT Prosecute If your activity is something that would not want everyone around you to know about, then you are a miscreant target Why? Cause when you become a victim, you are not motivated to call the authorities Examples: Someone addicted to gambling is targeted via a Phishing site Someone addicted to porn is targeted to get botted Someone addicted to chat is targeted to get botted Someone new to the Net is targeted and abused on the physical world Government, Finance, and Defense, Employees who lose face when they have to call INFOSEC 52
53 Principle 7: Stay below the Pain Threshold The Pain Threshold is the point where an SP or Law Enforcement would pay attention If you are below the pain threshold where you do not impact an SP s business, then the SP s Executive Management do not care to act If you are below the pain threshold where you do not have a lot of people calling the police, then the Law Enforcement and Elected Official do not care to act The Pain Threshold is a matter of QOS, Resource Management, and picking targets which will not trigger action 53
54 Criminal Trust Miscreants will guardedly trust each other They can be competitors They can be collaborators But when there is money on the table, criminal human behavior and greed take over. Cybercriminal cannibalize each other s infrastructure. Cybercriminals attack each other s infrastructure. DDOS Internet DDOS 54
55 Dire Consequences The Miscreant Economy is not a joke. It is not a game. It is not something to play with. PEOPLE DIE Once organized crime enter the world of the Miscreant Economy, the days of fun were over. Now that Cyber-Criminals will use any resource on the net to commit their crime, they don t worry about the collateral damage done. Think of computer resources at a hospital, power plant, or oil refinery infected and used to commit phishing and card jacking. What happens if someone gets mad at the phishing site, attacks it in retaliation, unintentionally knocking out a key systems. 55
56 Enduring Financial Opportunities 2007 Prediction: Strong, Enduring Criminal Financial Opportunities Will Motivate Participants in the Threat Economy to Innovate to Overcome New Technology Barriers Placed in Their Way Enduring criminal financial opportunities: Extortion Advertising Fraudulent sales Identity theft and financial fraud Theft of goods/services Espionage/theft of information 56
57 Threat Economy: In the Past Writers Asset End Value Tool and Toolkit Writers Writers Worms Viruses Trojans Compromise Individual Host or Application Compromise Environment Fame Theft Espionage (Corporate/ Government) 57
58 Threat Economy: Today Writers First Stage Abusers Middle Men Second Stage Abusers End Value Tool and Toolkit Writers Hacker/Direct Attack Compromised Host and Application Criminal Competition Theft Writers Worms Viruses Trojans Spyware Machine Harvesting Information Harvesting Bot-Net Creation Bot-Net Management: For Rent, for Lease, for Sale Personal Information Information Brokerage Extortionist/ DDoS-for-Hire Spammer Phisher Pharmer/DNS Poisoning Espionage (Corporate/ Government) Extorted Pay-Offs Commercial Sales Fraudulent Sales Click-Through Revenue Internal Theft: Abuse of Privilege Electronic IP Leakage Identity Theft Financial Fraud $$$ Flow of Money $$$ 58
59 Miscreant - Incident Economic Cycles Lots of Problems & Attacks Incidents Peak Resolve the Problem Recession Community Mitigation Drive the Post Mortem Miscreant & Criminal R&D Trough Survive the Next Attack These Cycles Repeat New Criminal Revenue Opportunities Expansion Drive the Preparation time 59
60 Miscreant Economic Cycles Expansion Recession Expansion Peak Total Incidents Trough Incident Growth Trend 0 Jan.- Mar Apr.- June July- Sept. Oct.- Dec. Jan.- Mar Apr.- June July- Sept. Oct.- Dec. Jan.- Mar Apr.- June 60
61 The dire trap the Chasm of No Action Peak The Chasm Incidents Recession Innovators Early Adopters Early Trough Majority No Pain No Business Justification for Action Expansion Late Majority time 61
62 Cyber Crime Cost are Huge! 2012 Data! Bigger than the illegal drug trade! Bigger then human trafficking trade! 62
63 Pause for Questions
64 Community Action Can Have an Impact Source: 64
65 But you cannot stop preparing.. New Attack Tools & Techniques Good Guys Whack Bad Guys Learn Back Guys Analyze This virtuous cycle drives cybercriminal IPv6 innovations. 65
66 What will we do when the Cyber-Criminals Retaliate! Historically, Organized Crime will retaliate against civic society to impose their will and influence on civic society. What will the today s organized crime do in a cyber equivalent world? How will the world respond when: We cannot as a global society investigate and prosecute International crime? Too much dependence on security vendors for protection. The Global Telecom s Civic Society has to step forward work with each other collectively to protect their interest. 66
67 Cyber Warfare Of the three threat vectors, cyber-warfare is a constrained threat. All cyber warfare is a constrained with in State Actors and Actions. There are Generals who are in charge giving orders. There are Government officials who are providing state policy. Espionage is part of state policy, a persistent threat, but not warfare. New State actors can make mistakes unintentionally creating collateral consequence. Michael Falco / The New York Times / Redux 67
68 Cyber Warfare s Consequences IXP-W Peer A A Peer B IXP- E Upstream A D Upstream A B C Upstream B E Upstream B Target F POP Target is taken out G NOC 68
69 Extend beyond the perceived Battle Space. IXP-W Peer A A Peer B IXP-E Upstream A D Upstream A B C Upstream B E Upstream B Target Customers F POP Attack causes Collateral Damage G NOC 69
70 Cyber Warfare s Reality Cyber Warfare is a threat to business, but not the threat to spend hours and money to protect. Protecting against Cyber-Crime and the P3 threat will mitigate many of the cyber warfare threats. 70
71 P3 Threat the Big Change The Dramatic Change over the past year has been the increasing security threat from individuals and groups that are not constrained. These groups are driven by motivations that are not money driven. They are not given orders. They do it based on self motivation. Patriotic They believe they have a right to stand up for their country, cause, or crusade. Passionate They attach to a cause and will work long hours to further that cause. Principled The base their actions on principles they passionately believe and will perform actions that they feel is within their Internet Rights. 71
72 Patriotic, Passion, & Principle Drivers The post-90 generation teens that run admin. com, wrote on their website, We are not Internet attackers, we are just a group of computer fans; we are not mentally handicapped kids, we are the real patriotic youth. We ll target anti-china websites across the nation and send it as a birthday gift to our country. The 500-word statement appeared over a red and black background decorated with a flying national flag. Zhang Yiwu, a professor at Peking University and a literary critic, said although many believe young people are not as patriotic as previous generations, there are exceptions. "The post-90s generation is undoubtedly passionate and patriotic, but their lifestyle and attitude is varied. The campaign of attacking anti-china websites shows their unstable and immature nature," Zhang said. "Although their behavior is not worthy of praise, the unfair reports about China coming from many foreign media will encourage the youngsters to fight back
73 Pause for Questions
74 DNS RPZ (aka DNS Firewall) 74
75 DNS Response Policy Zone (DNS RPZ) DNS RPZ is policy information inside a specially constructed DNS zone. This enables DNS reputation data producers and consumers to cooperate in the application of such policy to real time DNS responses. DNS RPZ turns the recursive DNS server into a security hammer Provide the same capabilities of an anti-spam DNSBL (DNS Block List, ne RBL) and RHSBL (Right Hand Side Block List). with greater degrees of scaling and speed. 75
76 Core DNS Principles.root Master/ Primary DNS Who is in charge of isc.org?.org isc.org AXFR TSIG IXFR TSIG sie.isc.org Slave/ Secondary DNS Caching Resolver DNS What is the IP for is AXFR - Full Zone Transfers IXFR - Incremental Zone Transfers TSIG - Transaction SIGnature used to secure the AXFR/IXFR 76
77 DNS RPZ Security Company Master DNS RPZ AXFR IXFR RPZ capability on the DNS Cashing Resolver allows zone transfers to be pushed out in seconds. Who is in charge of isc.org? RPZ Caching Resolver DNS What is the IP for isc.org sie.isc.org is
78 DNS RPZ in Action Security Company Master DNS RPZ Intel to find the badness xyzbadness.com AXFR IXFR RPZ Caching Resolver DNS What is the IP for xyzbadness.com? What is the IP for xyzbadness.com? SPAM Computer looks up Xyzbadness. com 78
79 How is DNSRPZ Different? Security Company Master DNS RPZ Push Once DNS RBL AXFR IXFR RPZ Caching Resolver DNS Some Security Device Query Every Domain 79
80 Demo - before 80
81 Demo - after 81
82 What it looks like 82
83 How is DNSRPZ Different? Security Company 1 Security Company 2 OPSEC Incident AXFR IXFR RPZ Caching Resolver DNS DNSRPZ allows for multiple providers building a richer list of bad actors Allows for industry incident feeds. Allows for local incident management feeds. INFOSEC or Security Team 83
84 Possible DNS RPZ Uses Block or redirect malicious drop sites (DNS used by URLs) Block ability of C&C to find its way back using DNS Walled garden notification for infected clients Services that use PTR lookups (IP reputation can map into here). 84
85 Possible Uses Examples Enterprise networks can us it to stop infections and let NOC know something is wrong. Hosting Provider can use it to block infected customer host and let NOC know something is wrong. Service Providers can use it to protect customers AND notify customer AND let the help desk know customers might be infected. 85
86 Pause for Questions
87 Links while you are thinking Discussion List Taking back the DNS, Paul Vixie, 29th July Google taking back the dns Draft Specification ftp://ftp.isc.org/isc/dnsrpz/isc-tn txt BIND ftp://ftp.isc.org/isc/bind9/9.8.1/ 87
88 Why We Need DNSRPZ? 88
89 Components of the Criminal Cloud SPAM BOTNET Drive-By Secondary Controller Proxy Payment Processors Name Servers! Avalanche: SPAM Cloud that you can lease time! Zeus: IPv6 Compliant Build your Own Criminal Cloud.! BlackHole: Metasploit Cloud you can lease Mule Operations BOT Herder Victim of Crime Packer TLD Domain 89
90 Stage Domain Name SPAM BOTNET Drive-By Secondary Controller Proxy Name Servers Stage on NS or FF NS Stage Domain Get Domain BOT Herder Victim of Crime Packer TLD Domain 90
91 Prepare Drive-By SPAM BOTNET Drive-By Secondary Controller Proxy Send Name Servers Load Hacker Victim of Crime TLD Domain Packer 91
92 Social Engineered SPAM to Get People to Click (Spear Phishing) SPAM BOTNET Send SPAM Drive-By Secondary Controller Proxy Click on me now Name Servers Hacker Victim of Crime TLD Domain Packer 92
93 Drive-By Violation Click on me now SPAM BOTNET Drive-By Secondary Controller Proxy Name Servers Hacker Victim of Crime TLD Domain Packer 93
94 Drive-By Violation SPAM BOTNET Drive-By Secondary Controller Proxy Name Servers Hacker Owned! Victim of Crime TLD Domain Packer 94
95 Poison Anti-Virus Updates SPAM BOTNET Drive-By Secondary Controller Proxy Name Servers Anti-Virus Vendor Poison the anti-virus updates All updates to Hacker Victim of Crime TLD Domain Packer 95
96 Prepare Violated Computer SPAM BOTNET Drive-By Secondary Controller Proxy Name Servers Anti-Virus Vendor Call to secondary site Load secondary package Hacker Victim of Crime TLD Domain Packer 96
97 Call Home SPAM BOTNET Drive-By Secondary Controller Proxy Name Servers Victim of Crime Call to Controller Report: " Operating System " Anti-Virus " Location on the Net " Software " Patch Level " Bandwidth " Capacity of the computer Hacker TLD Domain Packer 97
98 Load Custom SPAM BOTNET Drive-By Secondary Controller Proxy Name Servers Go get New Module Hacker Victim of Crime TLD Domain Packer 98
99 Start Worming, Scanning, & Spreading SPAM BOTNET Drive-By Secondary Controller Proxy Name Servers BOTNET Herder IPv6 Victims of Crime IPv6 Packer TLD Domain 99
100 The Domain names were Black Listed! We know the SPAM addresses SPAM BOTNET Drive-By Secondary Controller Proxy We can see this guy s DNS Activity! Name Servers We knew the NS used for the criminal activity! We knew the infrastructure addresses! Victim of Crime We knew the back end systems! We we knew the controller addresses! We needed to stop this computer from doing all the DNS lookups to bad domains! Packer BOT Herder TLD Domain 100
101 DNS RPZ would have stopped this attack! SPAM BOTNET Send SPAM Drive-By Name Servers Secondary Controller Proxy Blacklisted with DNSRPZ Hacker Victim of Crime NOC Alert! TLD Domain Packer 101
102 We need to look out of the Box Put things in context this illustrate was real. The computer was up to date with all the patches. The anti-virus was up to date. The users getting hit with MEBROOT/Torpig were all using Firefox and Noscipt Some of the users were security people. The network was locked down with firewalls, IDPs, and all the other BCP recommended. The zero day hit was orchestrated from the criminals known domains! 102
103 Pause for Questions 103
104 Next Steps 104
105 What should you do? 1. Act! Don t wait until there is a massive attack. The problem is NOT going to go away and will only get worse. 2. Start with the NSP-SEC Top Best Practices (BCPs). They have proven to work with a decade of experience. 3. Don t go out and buy expensive security products! 4. Build a community of cyber security white hats that you can trust! 5. Sign up for the Workshops.. 105
106 Security Workshops in Jakarta Understanding the Real Cyber Security Threat and what you can do to protect yourself. Top Security Best Practices that will not cost you millions of dollars. How to really protect yourself from DDOS DNS The security tool that will save your network. Internet Routing Manifesto Safe Practices that will protect your connection to the Internet. Build Cyber-Security Communities of Trust. Don t wait! Visibility knowing what is happening on your network and what the bad guys already know about your network. 106
107 What s Next? Connect & Follow via Linkedin: id.linkedin.com/in/barryrgreene/ Get added to the Workshop List Ask Questions.. [email protected] 107
DNS Response Policy Zone (DNSRPZ)
The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still
Information Security Threat Trends
Talk @ Microsoft Security Day Sep 2005 Information Security Threat Trends Mr. S.C. Leung 梁 兆 昌 Senior Consultant 高 級 顧 問 CISSP CISA CBCP M@PISA Email: [email protected] 香 港 電 腦 保 安 事 故 協 調 中 心 Introducing
Spyware. Michael Glenn Technology Management [email protected]. 2004 Qwest Communications International Inc.
Spyware Michael Glenn Technology Management [email protected] Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
Putting the Tools to Work DDOS Attack
Putting the Tools to Work DDOS Attack 1 DDOS = SLA Violation! Hacker ISP CPE Target What do you tell the Boss? SP s Operations Teams have found that they can express DDOS issues as SLA violations, which
Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall
Defeat Malware and Botnet Infections with a DNS Firewall By 2020, 30% of Global 2000 companies will have been directly compromised by an independent group of cyberactivists or cybercriminals. How to Select
Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall
Defeat Malware and Botnet Infections with a DNS Firewall By 2020, 30% of Global 2000 companies will have been directly compromised by an independent group of cyberactivists or cybercriminals. How to Select
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
Digital Evidence and Threat Intelligence
Digital Evidence and Threat Intelligence 09 November 2015 Mark Clancy CEO www.soltra.com @soltraedge External Threats Growing 117,339 incoming attacks every day The total number of security incidents detected
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Data Center security trends
Data Center security trends Tomislav Tucibat Major accounts Manager, Adriatic Copyright Fortinet Inc. All rights reserved. IT Security evolution How did threat market change over the recent years? Problem:
Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team
Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team The Internet is in the midst of a global network pandemic. Millions of computers
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
Microsoft Security Response Center (MSRC) Microsoft Malware Protection Center (MMPC)
Security@Microsoft Trustworthy Computing (TwC) Programs supporting security outreach and engagement Microsoft Active Protections Program (MAPP), Government Security Program (GSP) (was SCP) Microsoft Security
Whose IP Is It Anyways: Tales of IP Reputation Failures
Whose IP Is It Anyways: Tales of IP Reputation Failures SESSION ID: SPO-T07 Michael Hamelin Lead X-Force Security Architect IBM Security Systems @HackerJoe What is reputation? 2 House banners tell a story
Current counter-measures and responses by CERTs
Current counter-measures and responses by CERTs Jeong, Hyun Cheol [email protected] April. 2007 Contents I. Malware Trends in Korea II. Malware from compromised Web sites III. Case Study : Malware countermeasure
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
Innovations in Network Security
Innovations in Network Security Michael Singer April 18, 2012 AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies.
September 20, 2013 Senior IT Examiner Gene Lilienthal
Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank
Top 10 Tips to Keep Your Small Business Safe
Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013
Security workshop Belnet Aris Adamantiadis Brussels 18 th April 2013 Agenda What is a botnet? Symptoms How does it work? Life cycle How to fight against botnets? Proactive and reactive NIDS 2 What is a
Using big data analytics to identify malicious content: a case study on spam emails
Using big data analytics to identify malicious content: a case study on spam emails Mamoun Alazab & Roderic Broadhurst [email protected] http://cybercrime.anu.edu.au 2 Outline Background Cybercrime
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
Managing Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
isheriff CLOUD SECURITY
isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console
DNS Firewalls with BIND: ISC RPZ and the IID Approach. Tuesday, 26 June 2012
DNS Firewalls with BIND: ISC RPZ and the IID Approach Tuesday, 26 June 2012 1 About the Presenters»»» Paul Vixie Chairman and Founder Internet Systems Consortium Rod Rasmussen President and CTO IID (Internet
Response Policy Zones for the Domain Name System (DNS RPZ) By Paul Vixie, ISC (et.al.) 2010 World Tour
Response Policy Zones for the Domain Name System (DNS ) By Paul Vixie, ISC (et.al.) 2010 World Tour Overview Motivation for DNS Response Policy Zones Relationship to DNS RBL (DNSBL) Constraints and Goals
Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors. Microsoft Confidential for internal use only
Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors Microsoft Confidential for internal use only Wall Street Journal, JP Morgan, Lockheed, Bushehr nuclear
Fighting Cyber Crime in the Telecommunications Industry. Sachi Chakrabarty
Fighting Cyber Crime in the Telecommunications Industry Sachi Chakrabarty Agenda Cyber Crime What s all the fuss about CyberCrime? DoS Attacks Telco Solutions Cybercrime? Cybercrime Definition All criminal
Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks
White Paper Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks A Guide for CIOs, CFOs, and CISOs White Paper Contents The Problem 3 Why You Should Care 4 What You Can Do About It
How To Protect Your Online Banking From Fraud
DETECT MONITORING SERVICES AND DETECT SAFE BROWSING: Empowering Tools to Prevent Account Takeovers SUMMARY The Federal Financial Institutions Examination Council (FFIEC) is planning to update online transaction
DDoS Attacks Can Take Down Your Online Services
DDoS Attacks Can Take Down Your Online Services Dr. Bill Highleyman Managing Editor, Availability Digest Continuity Insights New York 2014 October 8, 2014 [email protected] Who Am I? Dr. Bill
Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY EXPLOIT KITS UP 75 PERCENT The Infoblox DNS Threat Index, powered by IID, stood at 122 in the third quarter of 2015, with exploit kits up 75 percent
WHITE PAPER. Using DNS RPZ to Protect Against Web Threats SPON. Published June 2015 SPONSORED BY. An Osterman Research White Paper.
WHITE PAPER Using DNS RPZ to Protect An Osterman Research White Paper Published June 2015 SPONSORED BY SPON sponsored by sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058
1 2013 Infoblox Inc. All Rights Reserved. Securing the critical service - DNS
1 2013 Infoblox Inc. All Rights Reserved. Securing the critical service - DNS Dominic Stahl Systems Engineer Central Europe 11.3.2014 Agenda Preface Advanced DNS Protection DDOS DNS Firewall dynamic Blacklisting
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
Availability Digest. www.availabilitydigest.com. Prolexic a DDoS Mitigation Service Provider April 2013
the Availability Digest Prolexic a DDoS Mitigation Service Provider April 2013 Prolexic (www.prolexic.com) is a firm that focuses solely on mitigating Distributed Denial of Service (DDoS) attacks. Headquartered
Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS
Software Engineering 4C03 Class Project Computer Networks and Computer Security COMBATING HACKERS Done By: Ratinder Ricky Gill Student Number: 0048973 E-Mail: [email protected] Due: Tuesday April 5, 2005
Cloud Security In Your Contingency Plans
Cloud Security In Your Contingency Plans Jerry Lock Security Sales Lead, Greater China Contingency Plans Avoid data theft and downtime by extending the security perimeter outside the data-center and protect
Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA
Emerging Network Security Threats and what they mean for internal auditors December 11, 2013 John Gagne, CISSP, CISA 0 Objectives Emerging Risks Distributed Denial of Service (DDoS) Attacks Social Engineering
Cybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510
TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME Haya Fetais & Mohammed Shabana Saint Leo University COM- 510 November 23, 2014 Introduction Globalization and technological developments have infiltrated
DENIAL OF SERVICE: HOW BUSINESSES EVALUATE THE THREAT OF DDOS ATTACKS IT SECURITY RISKS SPECIAL REPORT SERIES
DENIAL OF SERVICE: HOW BUSINESSES EVALUATE THE IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab 2 Corporate IT Security Risks Survey details: More than 5500 companies in 26 countries around the world
Response Policy Zones
Response Policy Zones Taking Back the DNS, V2.0 Paul Vixie Chairman and Chief Scientist Internet Systems Consortium Abstract DNS works as well for the bad guys (criminals, spammers, spies) as for respectable
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
If you know the enemy and know yourself, you need not fear the result of a hundred battles.
Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group [email protected] 1 (604) 961-0701 If you know the enemy and know yourself, you
Stopping zombies, botnets and other email- and web-borne threats
Stopping zombies, botnets and other email- and web-borne threats Hijacked computers, or zombies, hide inside networks where they send spam, steal company secrets, and enable other serious crimes. This
Network attack and defense
Network attack and defense CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration 2007, 2008 Robert H. Sloan 1 Outline 1. Overview
Modular Network Security. Tyler Carter, McAfee Network Security
Modular Network Security Tyler Carter, McAfee Network Security Surviving Today s IT Challenges DDos BOTS PCI SOX / J-SOX Data Exfiltration Shady RAT Malware Microsoft Patches Web Attacks No Single Solution
Introduction: 1. Daily 360 Website Scanning for Malware
Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover
TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark Villinski @markvillinski
TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY Mark Villinski @markvillinski Why do we have to educate employees about cybersecurity? 2014 Corporate Threats Survey 94% of business s suffered one
1 2014 2013 Infoblox Inc. All Rights Reserved. Talks about DNS: architectures & security
1 2014 2013 Infoblox Inc. All Rights Reserved. Talks about DNS: architectures & security Agenda Increasing DNS availability using DNS Anycast Opening the internal DNS Enhancing DNS security DNS traffic
Stop DDoS Attacks in Minutes
PREVENTIA Forward Thinking Security Solutions Stop DDoS Attacks in Minutes 1 On average there are more than 7,000 DDoS attacks observed daily. You ve seen the headlines. Distributed Denial of Service (DDoS)
Promoting Network Security (A Service Provider Perspective)
Promoting Network Security (A Service Provider Perspective) Prevention is the Foundation H S Gupta DGM (Technical) Data Networks, BSNL [email protected] DNW, BSNL 1 Agenda Importance of Network Security
DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest
DDoS Attacks: The Latest Threat to Availability Dr. Bill Highleyman Managing Editor Availability Digest The Anatomy of a DDoS Attack Sombers Associates, Inc. 2013 2 What is a Distributed Denial of Service
AVG AntiVirus. How does this benefit you?
AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
Property of Secure Network Technologies-Do Not Distribute or Post Without Written Permission-Copyrights and Trademark Apply
Malware - Mules & Money Mobile Edition v2.0 By Steve Stasiukonis What We Do Security Assessments & Penetration Tests Incident Response Digital Investigation & Forensic Services Technical Surveillance Countermeasure
Perspectives on Cybersecurity in Healthcare June 2015
SPONSORED BY Perspectives on Cybersecurity in Healthcare June 2015 Workgroup for Electronic Data Interchange 1984 Isaac Newton Square, Suite 304, Reston, VA. 20190 T: 202-618-8792/F: 202-684-7794 Copyright
Fraud and Phishing Scam Response Arrangements in Brazil
Fraud and Phishing Scam Response Arrangements in Brazil Marcelo H. P. C. Chaves [email protected] Computer Emergency Response Team Brazil CERT.br http://www.cert.br/ Brazilian Internet Steering Committee http://www.cgi.br/
Botnets: The Advanced Malware Threat in Kenya's Cyberspace
Botnets: The Advanced Malware Threat in Kenya's Cyberspace AfricaHackon 28 th February 2014 Who we Are! Paula Musuva-Kigen Research Associate Director, Centre for Informatics Research and Innovation (CIRI)
How To Protect Yourself Online
NetBank security guide Commonwealth Bank Personal 1 Contents Page 4 5 5 5 7 7 9 9 9 11 12 12 13 13 13 14 14 14 16 16 16 17 18 18 19 19 20 21 Section Peace of mind with NetBank What are the common online
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Zscaler Internet Security Frequently Asked Questions
Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall A FORTINET WHITE PAPER www.fortinet.com Introduction Denial of Service attacks are rapidly becoming a popular attack vector used
Email [email protected] Phone 847-467-5930 Fax 847-467-6000
Information Technology Information and Systems Security/Compliance Northwestern University 1800 Sherman Av Suite 209 Evanston, IL 60201 Email [email protected] Phone 847-467-5930 Fax 847-467-6000
Yahoo Attack. Is DDoS a Real Problem?
Is DDoS a Real Problem? Yes, attacks happen every day One study reported ~4,000 per week 1 On a wide variety of targets Tend to be highly successful There are few good existing mechanisms to stop them
WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware
WHITEPAPER How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware How a DNS Firewall Helps in the Battle against Advanced As more and more information becomes available
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community
Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community A Sampling of Cyber Security Solutions Designed for the
TLP WHITE. Denial of service attacks: what you need to know
Denial of service attacks: what you need to know Contents Introduction... 2 What is DOS and how does it work?... 2 DDOS... 4 Why are they used?... 5 Take action... 6 Firewalls, antivirus and updates...
FAQ (Frequently Asked Questions)
FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias
Denial of Service Attacks
(DoS) What Can be DoSed? First Internet DoS Attack The TCP State Diagram SYN Flooding Anti-Spoofing Better Data Structures Attacking Compact Data Structures Generic Solution SYN Cookies It s Not Perfect
Glasnost or Tyranny? You Can Have Secure and Open Networks!
AT&T is a proud sponsor of StaySafe Online Glasnost or Tyranny? You Can Have Secure and Open Networks! Steven Hurst CISSP Director - AT&T Security Services and Technology AT&T Chief Security Office 2009
+GAMES. Information Security Advisor. Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains
Information Security Advisor December 2015 Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains +GAMES Spot the insider & Human firewall Filtering EXerCISE Good
ZNetLive Malware Monitoring
Introduction The criminal ways of distributing malware or malicious software online have gone through a change in past years. In place of using USB drives, attachments or disks to distribute viruses, hackers
Securing Cloud-Based Email
White Paper Securing Cloud-Based Email A Guide for Government Agencies White Paper Contents Executive Summary 3 Introduction 3 The Risks Posed to Agencies Running Email in the Cloud 4 How FireEye Secures
