How to Protect against the Threat of Spearphishing Attacks
|
|
|
- Holly Miller
- 10 years ago
- Views:
Transcription
1 ANALYST BRIEF How to Protect against the Threat of Spearphishing Attacks Author Randy Abrams Overview NSS Labs researchers have identified spearphishing as the most common targeted method sophisticated attackers use to compromise high- value targets. Where classic phishing takes a net- casting approach in its use of not unlike a low- end spam campaign spearphishing uses social engineering techniques to create a more targeted invitation to click on a link or an attachment contained in a message. A recipient who follows the link may be invited to provide a user name and password or other personal information, or malware may be silently installed on the target s computer. Phishing and spearphishing attacks both begin with an and rely on end- user cooperation obtained via social engineering to advance the attack. The protections used to repel untargeted phishing attacks will repel the overwhelming majority of spearphishing attacks. The most effective defenses are user education and training that help end users avoid behaviors that enable successful phishing attacks. Technologies like antivirus tools and endpoint protection platforms (EPPs) have shown only mixed results in defending against exploits, and it is clear that a reliance on purely technological solutions is likely to be ineffective NSS Labs Findings Spearphishing has become the most common mode of targeted attack used by sophisticated attackers against high- value targets. User education is an essential component of spearphishing defensive strategies. The use of simulated phishing attacks is a useful tool to educate end users about appropriate security behaviors, measure the effectiveness of that education and identify knowledge gaps. Up- to- date web browsers and operating systems (OSs) represent a critical layer in defenses against spearphishing attacks, especially those that leverage exploit payloads. Recent NSS Labs tests have revealed that anti- phishing protections in later versions of browsers have improved detection of phishing attacks. However, these protections are not a significant obstacle for a determined spearphisher. Phishing attacks are platform- independent, and no OS creates users less likely to take the pro- offered bate in such attacks. Integrated protection can add protection against some attacks.
2 Reputation systems can decrease exposure to a wide range of phishing attacks. File reputation systems in particular make exploit- driven spearphishing attacks significantly more difficult for the attacker. Multifactor authentication systems can help to mitigate damages when spearphishing attacks succeed. NSS Labs Recommendations Educate users with an emphasis on behavioral practices that prevent successful phishing. Use simulated spearphishing attacks to educate end users about appropriate security behaviors and measure the success of the organization s education efforts. Make education a continuing habit in the workplace. Raise awareness amongst employees of spearphishing attacks in the news to help maintain vigilance. Ensure that the most current versions of web browsers are deployed. Leverage patch management tools where possible. Consider deploying endpoint protection tools. Consider deploying digital rights management (DRM) and/or data loss prevention (DLP) technologies to prevent sensitive data from leaking as a result of credential theft. Use Authenticated SMTP to prevent an attacker from spoofing the of internal users. Employ network access controls (NAC) to limit the amount of data to which a successful attacker will gain access. Deploy multifactor authentication for employees with access to highly sensitive data (which in some cases will be all employees). Disable unused or unneeded software (for example, disable Java when it is not required,) and consider alternative PDF viewers. Employ whitelisting and blacklisting solutions for web access where possible. 2
3 Table of Contents Overview... 1 NSS Labs Findings... 1 NSS Labs Recommendations... 2 Analysis... 4 The Deadliest Catch We re All Seafood... 4 Phishing and Spearphishing The Crucial Difference... 4 The Best Defenses Prevention and Education... 5 Behavioral Issues in Defending against Spearphishing... 6 Technological Issues in Defending against Spearphishing Attacks... 6 Glossary... 8 Reading List... 9 Contact Information
4 Analysis The Deadliest Catch We re All Seafood Spearphishing began to come into its own as far back as The timing is likely due in part to two significant events. Findings by the United States Military Academy that 80% of West Point cadets fell for spearphishing attacks were widely publicized in The Anti- Phishing Working Group included spearphishing in its agenda for the first time in 2004 as well. Spearphishing attacks are often the beachhead of a targeted persistent attack (TPA), a type of attack that NSS Labs has identified as the most serious threat to enterprises today. Spearphishing is also heavily implicated in the less common, but widely hyped and misidentified advanced persistent threat (APT) attack. A number of successful spearphishing attacks hit the headlines in the last year: In March 2011, an RSA employee succumbed to a spearphishing attack that exploited an Adobe Flash vulnerability and ultimately cost over 66 million dollars in replacement SecurID tokens alone. Data stolen in this attack was also subsequently used to launch attacks against other major corporations, such as Lockheed Martin. Also in March 2011, mass marketing company Epsilon, the victim of a TPA that lasted for months, was finally breached as the result of a spearphishing attack that included a link to a malicious website that installed malware on internal systems. Epsilon sends marketing s on behalf of several Fortune 500 enterprises, and the breach compromised millions of addresses belonging to customers of those companies. The s addresses were then used for commercial gain in spam runs, phishing, and spearphishing attacks. Over 400 Web domains hosted by GoDaddy were compromised in September Reportedly, the various domain logon credentials were stolen in spearphishing attacks directed at domain owners and admins who appear in registry listings. May 2012 saw the Industrial Control Systems Cyber Emergency Response Team (ICS- CERT) publish a warning concerning spearphishing attacks aimed at the natural gas pipeline industry. The advisory included information that the spearphishing attacks appeared to come from trusted internal sources. In June 2012, an unsuccessful spearphishing attack against industrial consulting firm Digital Bond revealed additional attacks against the Japan Network Information Center, the Hong Kong University of Science and Technology, various US defense contractors, and several others. Again, the Digital Bond received appeared to come from an employee. More recently in July 2012, 8 million addresses were leaked from Gamigo, including addresses from IBM, Allianz, Siemens, Deutsche Bank, and ExxonMobil. Massive data leaks from a variety of companies have resulted in both credential- and exploit- based spearphishing attacks. Phishing and Spearphishing The Crucial Difference Classic phishing attacks do not focus on the identity of a specific target. Instead, they try to acquire as much data as they can from as many users as they can. The attacker s goal is to acquire credential information that can be used to turn a profit, or to install malware that can capture credentials and other information. Credentials for online gaming accounts, for example, allow an attacker to sell virtual items for real cash, while access to and social networking accounts enable attackers to engage in a variety of profitable activities, ranging from spamming, to blackmail, to impersonation attacks. 4
5 Spearphishing attacks, by contrast, target specific companies, high- profile organizations, and high value individuals. As a result, they can be far more damaging, even devastating. The attacker prepares by collecting, aggregating and correlating information about the target organization and the people associated with it. The information that is publicly available on LinkedIn, Facebook, Google+ and Twitter profiles not only enables the attacker to identify an individual s contact information, but also offers a considerable amount of information about his or her role and responsibilities. The attacker can build extensive personal and professional profiles, including the targets likes and dislikes, social and professional contacts, preferred hangouts and daily routines. By correlating the data from several targets, the attacker can even build a map of the organization s structure. Spearphishing attacks follow two distinct methodologies: The standard method is to deceive the target into providing credentials, such as network login information or database, or social networking passwords. These types of attacks can be defended by educating end users and by deploying standard security products. The second, more dangerous, method is to deceive users into opening documents, applications or Web pages that exploit vulnerabilities in order to plant malware data stealers or backdoors on the user s endpoint, from where it can spread throughout the network. These attacks are much more difficult to protect against. Unlike the s used in standard phishing attacks, the s offer little more than the title of a document or application to suggest that something is wrong. An attachment containing malware may arrive from a legitimate source that has been hacked. A legitimate website may have been compromised and its usual content replaced with content designed to deliver a Trojan. The Best Defenses Prevention and Education The most effective defense against all manner of phishing attacks both standard phishing and spearphishing is prevention. Technical solutions typically are limited in effectiveness when dealing with social problems. The most effective defense against social engineering attacks is education, and most people learn best by doing. This makes the simulated phishing attack one of the most effective methods of education. When an end user falls victim to phishing even a fake one the attack stops being a hypothetical concern and becomes a teachable moment. Moreover, a simulated attack measures the effectiveness of an organization s efforts in security education, and identifies those end users who need additional instruction. Simulated phishing attacks can be extremely valuable tools for education and prevention, but only if some essential guidelines are followed: Never collect confidential data. Passwords, social security numbers and other personally identifiable information that an end user may have given away in a simulated attack are not necessary to confirm that the end user has engaged in risky behavior. Moreover, any such data that is collected becomes a liability, because the organization has an obligation to ensure the safety of the data, and the collection of some personal data in this way may in fact be illegal. Never embarrass the user who falls victim to the simulated attack. The objective of this exercise is not to shame end users, but to instill confidence and a sense of accomplishment as they learn that they can improve their security practices both on the job and in their personal lives. A better approach than shaming users who fall victim to the simulated attack is to praise those who don t, and patiently explain the mistakes or missed clues that contribute to failure. 5
6 Make it personal. As much as is economically feasible, personalize the attack s. Users need to understand how convincing and believable a targeted phishing attack really is. Behavioral Issues in Defending against Spearphishing The first aspect of user education is to teach users how to identify phishing attacks. This can include identifying bad URLs, grammatical and typographical errors ( typos ) in s, improper requests for information, and other giveaways. In a spearphishing attack, for example, something as innocuous- looking as an atypical salutation or signature may be the only identifying irregularity. A more important educational approach one that is used far too rarely involves the teaching of correct behavior. It is the user s response to a phishing that determines whether the phishing attack succeeds or fails. There are two simple rules that can be taught that will cause virtually every credential- oriented phishing attack, targeted or not, to fail: Never accept a request for a password via electronic communication (including messages and telephone calls). There is no such thing as a legitimate request for a password in an or a telephone call that has not been initiated by the end user. For this reason, it is crucial that internal IT departments do not unwittingly encourage the exact behavior they are trying to prevent. IT personnel should, for example always attempt to resolve problems without requiring the end user to provide their password. If it becomes necessary for IT support personnel to obtain a password, the best practice is to have the user change the password before providing it, and then change it as soon as tech support no longer needs it. In some cases, the IT person may need to ask for a password over the phone in response to a support request from a user. If this happens, the support person must explain to the user that he or she should never divulge password to anyone unless it was the user who initiated the call. In all cases, the user should be reminded to change the password when the support call is complete. Never log on to a website via a link in an (or a text message received on a mobile device). Most social networking services work hard to encourage their users to engage in precisely the types of behaviors that will result in successful phishing attacks. And well- constructed spearphishing attacks are extremely difficult for even highly skilled security professionals to detect. For this reason, opening links directly from s and text messages must be avoided. For example, a user who receives a notice from LinkedIn should be instructed to open a web browser separately, navigate to the LinkedIn site and log in. If the is legitimate, the contact request or other information will be in the LinkedIn /notification system. When end users learn to follow these two simple rules not to give up credentials in response to s or in response to links sent through electronic communications virtually all credential- based attacks will be foiled, whether they are identified as malicious or not. Technological Issues in Defending against Spearphishing Attacks Behavioral issues are the most important components of successful defenses against phishing and spearphishing but there are some technological issues that also need to be addressed. Web browsers: The need to use current versions of web browsers is or should be self- evident. Unfortunately, even today many organizations are unable to move away from Microsoft Internet Explorer (IE) 6, because they are still using business- critical legacy applications that are compatible only with the older browser. Analysis of the 6
7 2009 Operation Aurora attack showed that even Google and other major enterprises were still using IE 6, even though it was already long- obsolete. The companies using the obsolete browser not only lacked modern phishing protection, but also hosted vulnerable software that facilitated the dropping of backdoors on their networks. Ultimately the Operation Aurora attackers used spearphishing attacks to exploit vulnerabilities in the obsolete browser and unpatched applications. There was a time when Windows- based computers were the only ones that appeared to require endpoint security. In part, this was due to poorly implemented security in the Microsoft OS, as well as malware writers lack of interest and skill in attacking other OSs. However, Microsoft has dramatically improved the Windows security model, and as a result, the most common attacks are now against platform- independent third- party applications such as Java, Flash and Adobe Acrobat and Reader. It is important to note that credential- based attacks have never been platform- dependent, so the OS is not a factor in whether or not a user falls victim to a phishing attack. Additional layers of protection, such as EPPs, may be deployed to help defend against some exploit- based attacks. However, NSS Labs testing has shown that most EPP software is not effective enough to be relied upon completely in defending against exploit- based threats such as web- hosted drive- by attacks. Access controls: A broad range of network access control (NAC) strategies, ranging from user permissions to air gaps between networks containing critical data, can protect against phishing attacks. The appropriate strategy for any organization depends on variables such as the type and value of data being protected and the size and geographical diversity of the organization itself. DRM and DLP are complementary technologies that combine to limit access to data. DLP tends to focus on restricting access and detecting when sensitive data is leaving secured locations. DLP controls can prevent a successful attacker from accessing sensitive data to which the victim of the attack did not need access, as well as detect attempts to transfer sensitive data. DRM is designed to keep data encrypted when it is not being accessed on approved devices with proper credentials. Encrypting data at rest on the network can render it useless once it has left the network illegitimately. Multifactor authentication can add a significant obstacle to all kinds of phishing attacks. In effect, DRM is often an implementation of two- factor authentication combined with encryption. Using a second authentication mechanism for access to critical databases, financial accounts and data with legally protected status can significantly strengthen an organization s defenses. Authenticated SMTP and digital signatures can be used to make it far more difficult for an attacker to impersonate other employees in the organization. Digitally signed s can add another level of trust. However, it is a considerable investment in education to teach employees how to verify a digital certificate. Unused or unneeded software. Any software installed on an end user s computer even security software is a potential attack vector. Java, for example, has risen to the top of the exploited software list, a fact verified by NSS Labs own research. Many organizations install Java but do not actually use it for any business functions. Eliminating this and other unused software decreases the attack surface and reduces the burden of patch management. Although vulnerabilities in Microsoft Office products are still occasionally encountered, the PDF, once considered the safe alternative to Word, has been the more exploited format and the choice of attackers in recent years. Disabling JavaScript in Adobe Reader and Adobe Acrobat, using a different PDF renderer, and disabling thumbnail previews in Windows can all help organizations avoid common exploit- driven phishing attacks. 7
8 Blacklisting and whitelisting. File- based whitelisting is one of the most powerful defenses against exploit- driven attacks, but it can also be one of the most expensive options in terms of increased management and reduced flexibility. For equipment accessing highly sensitive data, application whitelisting should be considered. Deployment can be organization- wide or limited to critical systems. Traditional antimalware software is essentially a blacklisting solution that is affordable, but far less secure than whitelisting. For Internet access, whitelisting and blacklisting solutions can be useful complements to traditional security products. A variety of companies offer web filtering solutions that augment the protections offered by modern browsers. In specific situations, whitelisting websites can prove to be both manageable and cost- effective. Integrated spam filters (blacklisting) can significantly reduce the number of successful attacks. In the famous RSA breach, the spearphishing s had actually been deposited into the spam folders. Had this not been the case, the compromise could have been far worse. It did not, of course, prevent one employee from retrieving the malicious from the spam folder once again the focus is on user education. Reputational tools that block websites not meeting defined trust levels can add a level of security without the extreme limitations of a pure whitelisting model. Glossary Phishing: The use of electronic communications usually to trick computer users into giving up information they would not otherwise divulge Spearphishing: Phishing attacks in which the attackers focus on specific targets individuals or organizations and use exploits to compromise the target without being detected Whaling: Spearphishing attacks that target high- level decision- makers for example, corporate officers or senior executives of major organizations 8
9 Reading List The Targeted Persistent Attack (TPA) When the Thing That Goes Bump in the Night Really Is the Bogeyman targeted- persistent- attack.html 9
10 Contact Information NSS Labs, Inc. 206 Wild Basin Rd Building A, Suite 200 Austin, TX USA +1 (512) This analyst brief was produced as part of NSS Labs independent testing information services. Leading products were tested at no cost to the vendor, and NSS Labs received no vendor funding to produce this analyst brief NSS Labs, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express written consent of the authors. Please note that access to or use of this report is conditioned on the following: 1. The information in this report is subject to change by NSS Labs without notice. 2. The information in this report is believed by NSS Labs to be accurate and reliable at the time of publication, but is not guaranteed. All use of and reliance on this report are at the reader s sole risk. NSS Labs is not liable or responsible for any damages, losses, or expenses arising from any error or omission in this report. 3. NO WARRANTIES, EXPRESS OR IMPLIED ARE GIVEN BY NSS LABS. ALL IMPLIED WARRANTIES, INCLUDING IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON- INFRINGEMENT ARE DISCLAIMED AND EXCLUDED BY NSS LABS. IN NO EVENT SHALL NSS LABS BE LIABLE FOR ANY CONSEQUENTIAL, INCIDENTAL OR INDIRECT DAMAGES, OR FOR ANY LOSS OF PROFIT, REVENUE, DATA, COMPUTER PROGRAMS, OR OTHER ASSETS, EVEN IF ADVISED OF THE POSSIBILITY THEREOF. 4. This report does not constitute an endorsement, recommendation, or guarantee of any of the products (hardware or software) tested or the hardware and software used in testing the products. The testing does not guarantee that there are no errors or defects in the products or that the products will meet the reader s expectations, requirements, needs, or specifications, or that they will operate without interruption. 5. This report does not imply any endorsement, sponsorship, affiliation, or verification by or with any organizations mentioned in this report. 6. All trademarks, service marks, and trade names used in this report are the trademarks, service marks, and trade names of their respective owners. 10
Evolutions in Browser Security
ANALYST BRIEF Evolutions in Browser Security TRENDS IN BROWSER SECURITY PERFORMANCE Author Randy Abrams Overview This analyst brief aggregates results from NSS Labs tests conducted between 2009 and 2013
Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities?
ANALYST BRIEF Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? Author Randy Abrams Tested Products Avast Internet Security 7 AVG Internet Security 2012 Avira Internet Security
Internet Advertising: Is Your Browser Putting You at Risk?
ANALYST BRIEF Is Your Browser Putting You at Risk? PART 2: CLICK FRAUD Authors Francisco Artes, Stefan Frei, Ken Baylor, Jayendra Pathak, Bob Walder Overview The US online advertising market in 2011 was
SSL Performance Problems
ANALYST BRIEF SSL Performance Problems SIGNIFICANT SSL PERFORMANCE LOSS LEAVES MUCH ROOM FOR IMPROVEMENT Author John W. Pirc Overview In early 2013, NSS Labs released the results of its Next Generation
Breach Found. Did It Hurt?
ANALYST BRIEF Breach Found. Did It Hurt? INCIDENT RESPONSE PART 2: A PROCESS FOR ASSESSING LOSS Authors Christopher Morales, Jason Pappalexis Overview Malware infections impact every organization. Many
An Old Dog Had Better Learn Some New Tricks
ANALYST BRIEF An Old Dog Had Better Learn Some New Tricks PART 2: ANTIVIRUS EVOLUTION AND TECHNOLOGY ADOPTION Author Randy Abrams Overview Endpoint protection (EPP) products are ineffective against many
SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal
WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise
ENTERPRISE EPP COMPARATIVE REPORT
ENTERPRISE EPP COMPARATIVE REPORT Security Stack: Socially Engineered Malware Authors Bhaarath Venkateswaran, Randy Abrams, Thomas Skybakmoen Tested Products Bitdefender Endpoint Security v5.3.15.539 ESET
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
Multiple Drivers For Cyber Security Insurance
ANALYST BRIEF Multiple Drivers For Cyber Security Insurance EXPECTATIONS PLACED ON INSURANCE CARRIERS RISE WITH MARKET GROWTH Author Andrew Braunberg Overview There has been considerable good news for
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT TESTED PRODUCTS: AVG Internet Security Network Edition v8.0 Kaspersky Total Space Security v6.0 McAfee Total Protection for Endpoint Sophos
Spear Phishing Attacks Why They are Successful and How to Stop Them
White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear
CORPORATE AV / EPP COMPARATIVE ANALYSIS
CORPORATE AV / EPP COMPARATIVE ANALYSIS Exploit Evasion Defenses 2013 Randy Abrams, Dipti Ghimire, Joshua Smith Tested Vendors AVG, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Panda, Sophos,
DATA CENTER IPS COMPARATIVE ANALYSIS
DATA CENTER IPS COMPARATIVE ANALYSIS Security 2014 Thomas Skybakmoen, Jason Pappalexis Tested Products Fortinet FortiGate 5140B, Juniper SRX 5800, McAfee NS- 9300, Sourcefire 8290-2 Data Center Overview
BROWSER SECURITY COMPARATIVE ANALYSIS
BROWSER SECURITY COMPARATIVE ANALYSIS Privacy Settings 2013 Randy Abrams, Jayendra Pathak Tested Vendors Apple, Google, Microsoft, Mozilla Overview Privacy is an issue on the front lines of the browser
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Mobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
IBM Security re-defines enterprise endpoint protection against advanced malware
IBM Security re-defines enterprise endpoint protection against advanced malware Break the cyber attack chain to stop advanced persistent threats and targeted attacks Highlights IBM Security Trusteer Apex
SPEAR PHISHING AN ENTRY POINT FOR APTS
SPEAR PHISHING AN ENTRY POINT FOR APTS threattracksecurity.com 2015 ThreatTrack, Inc. All rights reserved worldwide. INTRODUCTION A number of industry and vendor studies support the fact that spear phishing
The Evolving Threat Landscape and New Best Practices for SSL
The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
DATA CENTER IPS COMPARATIVE ANALYSIS
DATA CENTER IPS COMPARATIVE ANALYSIS Security Value Map (SVM) 2014 Thomas Skybakmoen, Jason Pappalexis Tested Products Fortinet FortiGate 5140B, Juniper SRX 5800, McAfee NS- 9300, Sourcefire 8290-2 Overview
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
ENDPOINT SECURITY WHITE PAPER. Endpoint Security and Advanced Persistent Threats WWW.COMODO.COM
WHITE PAPER Endpoint Security and Advanced Persistent Threats The Invisible Threat They re out there waiting. Sitting at their computers hoping for you to make a mistake. And you will. Because no one is
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions
It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions Your home is your business and your farm is your network. But who has access to it? Can you protect
TEST METHODOLOGY. Endpoint Protection Evasion and Exploit. v4.0
TEST METHODOLOGY Endpoint Protection Evasion and Exploit v4.0 Table of Contents 1 Introduction... 3 1.1 Inclusion Criteria... 3 2 Product Guidance... 5 2.1 Recommended... 5 2.2 Neutral... 5 2.3 Caution...
Anti-exploit tools: The next wave of enterprise security
Anti-exploit tools: The next wave of enterprise security Intro From malware and ransomware to increasingly common state-sponsored attacks, organizations across industries are struggling to stay ahead of
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.
Employee Security Awareness Survey Trenton Bond [email protected] Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is
Streamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
Types of cyber-attacks. And how to prevent them
Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual
Malicious Email Mitigation Strategy Guide
CYBER SECURITY OPERATIONS CENTRE Malicious Email Mitigation Strategy Guide Introduction (UPDATED) SEPTEMBER 2012 1. Socially engineered emails containing malicious attachments and embedded links are commonly
Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
Anti-Phishing Best Practices for ISPs and Mailbox Providers
Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing
Why The Security You Bought Yesterday, Won t Save You Today
9th Annual Courts and Local Government Technology Conference Why The Security You Bought Yesterday, Won t Save You Today Ian Robertson Director of Information Security Michael Gough Sr. Risk Analyst About
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
Top five strategies for combating modern threats Is anti-virus dead?
Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
Top 10 Tips to Keep Your Small Business Safe
Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
PROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
2013 Thomas Skybakmoen, Francisco Artes, Bob Walder, Ryan Liles
FIREWALL COMPARATIVE ANALYSIS Total Cost of Ownership (TCO) 2013 Thomas Skybakmoen, Francisco Artes, Bob Walder, Ryan Liles Tested s Barracuda F800, Check Point 12600, Cyberoam CR2500iNG, Dell SonicWALL
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark Villinski @markvillinski
TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY Mark Villinski @markvillinski Why do we have to educate employees about cybersecurity? 2014 Corporate Threats Survey 94% of business s suffered one
Sophistication of attacks will keep improving, especially APT and zero-day exploits
FAQ Isla Q&A General What is Isla? Isla is an innovative, enterprise-class web malware isolation system that prevents all browser-borne malware from penetrating corporate networks and infecting endpoint
Advanced Biometric Technology
INC Internet Biometric Security Systems Internet Biometric Security System,Inc.White Papers Advanced Biometric Technology THE SIMPLE SOLUTION FOR IMPROVING ONLINE SECURITY Biometric Superiority Over Traditional
43% Figure 1: Targeted Attack Campaign Diagram
TrendLabs Data exfiltration is the final stage of a targeted attack campaign where threat actors steal valuable corporate information while remaining undetected. 1 43% of most serious threats to the company
2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security
2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security For 10 years, Microsoft has been studying and analyzing the threat landscape of exploits, vulnerabilities, and malware.
Microsoft Security Intelligence Report volume 7 (January through June 2009)
Microsoft Security Intelligence Report volume 7 (January through June 2009) Key Findings Summary Volume 7 of the Microsoft Security Intelligence Report provides an in-depth perspective on malicious and
How To Protect Your Organization From Insider Threats
Research Conducted by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security FINANCIAL SERVICES EDITION #2015InsiderThreat RESEARCH BRIEF US FINANCIAL SERVICES SPOTLIGHT ABOUT
Portal Administration. Administrator Guide
Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
Fighting Off an Advanced Persistent Threat & Defending Infrastructure and Data. Dave Shackleford February, 2012
Fighting Off an Advanced Persistent Threat & Defending Infrastructure and Data Dave Shackleford February, 2012 Agenda Attacks We ve Seen Advanced Threats what s that mean? A Simple Example What can we
How Do Threat Actors Move Deeper Into Your Network?
SECURITY IN CONTEXT LATERAL MOVEMENT: How Do Threat Actors Move Deeper Into Your Network? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is
Phishing Scams Security Update Best Practices for General User
Phishing Scams Security Update Best Practices for General User hishing refers to the malicious attack Pmethod by attackers who imitate legitimate companies in sending emails in order to entice people to
Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014
Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Lisa D. Traina, CPA, CITP, CGMA Lisa Traina utilizes her 30+ years of experience as a CPA, CITP and CGMA
Web Security. Discovering, Analyzing and Mitigating Web Security Threats
Web Security Discovering, Analyzing and Mitigating Web Security Threats Expectations and Outcomes Mitigation strategies from an infrastructure, architecture, and coding perspective Real-world implementations
How To Sell Security Products To A Network Security Company
Market Segment Definitions Author Joshua Mittler Overview In addition to product testing, NSS Labs quantitatively evaluates market size for each of the product categories tested. NSS provides metrics that
WEB APPLICATION FIREWALL COMPARATIVE ANALYSIS
WEB APPLICATION FIREWALL COMPARATIVE ANALYSIS Security Value Map (SVM) Author Thomas Skybakmoen Tested Products Barracuda Networks Web Application Firewall 960 Citrix NetScaler AppFirewall MPX 11520 Fortinet
Defending Against. Phishing Attacks
Defending Against Today s Targeted Phishing Attacks DeFending Against today s targeted phishing attacks 2 Introduction Is this email a phish or is it legitimate? That s the question that employees and
Targeted attacks: Tools and techniques
Targeted attacks: Tools and techniques Performing «red-team» penetration tests Lessons learned Presented on 17/03/2014 For JSSI OSSIR 2014 By Renaud Feil Agenda Objective: Present tools techniques that
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher
TrendLabs When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher Advanced persistent threats (APTs) refer to a category
Countering Insider Threats Jeremy Ho
Countering Insider Threats Jeremy Ho Strategic Sales Group (ASEAN) 1 CONFIDENTIAL Key Challenges Impacting Organization Today REGULATORY COMPLIANCE Rising Data Volumes Changing Requirements Prioritization
The evolution of virtual endpoint security. Comparing vsentry with traditional endpoint virtualization security solutions
The evolution of virtual endpoint security Comparing vsentry with traditional endpoint virtualization security solutions Executive Summary First generation endpoint virtualization based security solutions
OCT Training & Technology Solutions [email protected] (718) 997-4875
OCT Training & Technology Solutions [email protected] (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
Transaction Anomaly Protection Stopping Malware At The Door. White Paper
Transaction Anomaly Protection Stopping Malware At The Door White Paper Table of Contents Overview 3 Programmable Crime Logic Alter Web Application Flow & Content 3 Programmable Crime Logic Defeats Server-Side
Seven Strategies to Defend ICSs
INTRODUCTION Cyber intrusions into US Critical Infrastructure systems are happening with increased frequency. For many industrial control systems (ICSs), it s not a matter of if an intrusion will take
Active Directory was compromised, now what?
Need to know details for Administrators Active Directory was compromised, now what? Author Bob Bobel C a y o S o f t w a r e N e e d 2 K n o w. P a g e 2 About the Author As a Product Management Director,
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Advanced Persistent Threats
White Paper INTRODUCTION Although most business leaders and IT managers believe their security technologies adequately defend against low-level threats, instances of (APTs) have increased. APTs, which
Presented by: Mike Morris and Jim Rumph
Presented by: Mike Morris and Jim Rumph Introduction MICHAEL MORRIS, CISA Systems Partner JIM RUMPH, CISA Systems Manager Objectives To understand how layered security assists in securing your network
10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
Background. How much does EMET cost? What is the license fee? EMET is freely available from Microsoft without material cost.
Microsoft s Enhanced Mitigation Experience Toolkit (EMET) is an enhancement to the Windows operating system that stops broad classes of malware from executing. EMET implements a set of anti-exploitation
Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance
Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance Produced on behalf of New Net Technologies by STEVE BROADHEAD BROADBAND TESTING 2010 broadband testing and new net technologies
Cyber Advanced Warning System
TECHNICAL WHITE PAPER Cyber Advanced Warning System The Current Approach to Cybersecurity is Not Working In the face of a growing attack surface and mounting global losses from cybercrime and cyberespionage
How To Protect Your Online Banking From Fraud
DETECT MONITORING SERVICES AND DETECT SAFE BROWSING: Empowering Tools to Prevent Account Takeovers SUMMARY The Federal Financial Institutions Examination Council (FFIEC) is planning to update online transaction
Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services
Real World Healthcare Security Exposures Brian Selfridge, Partner, Meditology Services 2 Agenda Introduction Background and Industry Context Anatomy of a Pen Test Top 10 Healthcare Security Exposures Lessons
CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks Date: 16/05-2007
CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks Date: 16/05-2007 Written by Dennis Rand [email protected] http://www.csis.dk Table of contents Table of contents...
2013 Thomas Skybakmoen, Francisco Artes, Bob Walder, Ryan Liles
FIREWALL COMPARATIVE ANALYSIS Performance 2013 Thomas Skybakmoen, Francisco Artes, Bob Walder, Ryan Liles Tested Products Barracuda F800, Check Point 12600, Cyberoam CR2500iNG, Dell SonicWALL NSA 4500,
