Illuminating the Deep Dark Web with drugs, exploits, and zerodays CLE-R09. Jack Chan

Similar documents
One Minute in Cyber Security

Advanced Persistent Threats

Veranderende bedreigingen Security in het virtuele datacenter

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Cyber Security. Maintaining Your Identity on the Net

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

Advanced Persistent. From FUD to Facts. A Websense Brief By Patrick Murray, Senior Director of Product Management

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Unified Security Management and Open Threat Exchange

High Performance NGFW Extended

Controlling Web 2.0 Applications in the Enterprise SOLUTION GUIDE

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

3 day Workshop on Cyber Security & Ethical Hacking

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Threat Intelligence for Dummies. Karen Scarfone Scarfone Cybersecurity

Naujos kartos ugniasienės Next Generation Firewalls (NGFW) Mindaugas Kubilius, Fortinet sprendimų inžinierius

Dissecting the Recent Cyber Security Breaches. Yu Cai School of Technology Michigan Technological University

Proxy Blocking: Preventing Tunnels Around Your Web Filter. Information Paper August 2009

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Unit 3 Cyber security

ReadySpace Limited Unit J, 16/F Reason Group Tower, Castle PeakRoad, Kwai Chung, N.T.

Websense Data Security Solutions

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Cloud App Security. Tiberio Molino Sales Engineer

Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com

User Documentation Web Traffic Security. University of Stavanger

Cascadia Labs URL Filtering and Web Security

Managing Web Security in an Increasingly Challenging Threat Landscape

Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway

HACKER INTELLIGENCE INITIATIVE. The Secret Behind CryptoWall s Success

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

KEY STEPS FOLLOWING A DATA BREACH

Zscaler Internet Security Frequently Asked Questions

Internet threats: steps to security for your small business

The Benefits of SSL Content Inspection ABSTRACT

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Computer Security Literacy

Sophistication of attacks will keep improving, especially APT and zero-day exploits

Securing The Enterprise

Networking for Caribbean Development

Cyber Security for SCADA/ICS Networks

Content-ID. Content-ID URLS THREATS DATA

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Chapter 9: Network and Internet Security

Comprehensive real-time protection against Advanced Threats and data theft

Malware & Botnets. Botnets

WHITE PAPER: THREAT INTELLIGENCE RANKING

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

WHITE PAPER. Understanding How File Size Affects Malware Detection

Inspection of Encrypted HTTPS Traffic

Using big data analytics to identify malicious content: a case study on spam s

Cascadia Labs URL Filtering and Web Security

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

Perspectives on Cybersecurity in Healthcare June 2015

TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

The enemy within: Stop students from bypassing your defenses

Innovations in Network Security

3 Marketing Security Risks. How to combat the threats to the security of your Marketing Database

White Paper - Crypto Virus. A guide to protecting your IT

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

SafeNet Content Security Product Overview. Protecting the Network Edge

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

Who s Doing the Hacking?

RMAR Technologies Pvt. Ltd.

Malicious Network Traffic Analysis

Collateral Effects of Cyberwar

Fighting Advanced Threats

Ed Ferrara, MSIA, CISSP Fox School of Business

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Security Intelligence Services.

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Why it's time to upgrade to a Next Generation Firewall. Dickens Lee Technical Manager

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

Protecting Your Network Against Risky SSL Traffic ABSTRACT

Attacks from the Inside

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

U.S. DEPARTMENT OF STATE OVERSEAS SECURITY ADVISORY COUNCIL TRAVELING WITH MOBILE DEVICES: TRENDS & BEST PRACTICES JULY 2015

DDoS Attacks & Defenses

Internet Basics. Basic Terms and Concepts. Connecting to the Internet

Transcription:

Illuminating the Deep Dark Web with drugs, exploits, and zerodays CLE-R09 Jack Chan Security Strategist FortiGuard Advanced Labs, Fortinet @FortiGuardLabs

WARNING Presentation contains real world attacker methods and demos Some material is not suitable to all audiences Use common sense and ethical guidelines Don t be Homer Simpson 2

Who are we... Aamir Lakhani Researcher / Consultant Ninja / Pirate / Hacker Jack Chan Security Strategist, consultant Time Magazine s Person of the Year 2006

Person of the Year 2006 And so were...

Fortinet Advantage FortiGuard Labs Threat Research The FortiGuard Minute Per Minute 25,000 Spam emails intercepted 390,000 Network Intrusion Attempts resisted 83,000 Malware programs neutralized 160,000 Malicious Website accesses blocked 59,000 Botnet C&C attempts thwarted 39 million Website categorization requests Per Week 47 million New & updated spam rules 100 Intrusion prevention rules 2 million New & updated AV definitions 1.3 million New URL ratings 8,000 Hours of threat research globally Total Database 170 Terabytes of threat samples 17,500 Intrusion Prevention rules 5,800 Application Control rules 250 million Rated websites in 78 categories 173 Zero-day threats discovered Based on Q1 2015 data Image: threatmap.fortiguard.com

Deep Web Invisible web Hidden web

1994 Dr. Jill Ellsworth used the term Invisible Web 2001 The first use of the specific term Deep Web occurred in Michael Bergman study

Source: TOR Project

.Onion Works like a top-level domain Tor Hidden Services Can be hosted or Peer-to-Peer Can be found by search engines only if they want to be Must be on the TOR network or use a Web-to-TOR proxy to access Looks like this: http://3g2upl4pq6kufc4m.onion/ - DuckDuckGo Search Used for legitimate sites like Facebook and human right groups Used for illegal services and forums for illegal activity We are starting to see.onion sites with SSL but that may actually reduce anonymity

The Deep Web 1000X larger? 7Tb observed More than just WWW services Different levels of Deep Web

Why Search Engines Can t find them Private web Unlinked content Dynamic content Limited-access content Non-HTML content Hidden source code

Playing the Levels Level 0: Common Web Level 1: Surface Web Reddit Digg Temp Email Services Level 2: Bergie Web Google locked results Honeypots 4Chan, Newsgroups, FTP, other services Freehive, Bunny Tube, Streams Level 4: Charter Web Hacking Groups Shelling Networking AI Theorist Banned media Activist communications Level 5: Onion Sites Illegal Material Human Trafficking, Bounty Hunters, Rare Animal Trade Exploits, Black Markets, Drugs

Deep Web Level 8 What happened to levels 6 7? I have never seen it Conspiracy theories? I have heard them all Aliens, Illuminati, Controlling every computer in the world Specialized hardware coded devices to solve Quantum Computing Problems Needed??? Made up, BS, Fake?

Jumping On

Tor Hidden Wiki The First Place You will go to feel Dark Collection of hidden links and.onion sites How hard is it to find?

Ghost Markets Black Markets on the Dark Web They Change.onion addresses often Sometimes invite only Example: Silk Roads Nov. 6 th 2013 Silk Roads shutdown Nov. 13 th 2013 Silk Road 2.0 Nov 6 th 2014 Silk Roads 2.0 shutdown Nov 14 th 2014 Pablo Escobar posted Silk Roads 3.0 is coming Feb 4 th 2015 Ross Ulbricht convicted on charges Buy malware, exploits, social engineering expertise Social Security numbers, national identification cards Scammers, con artists, organized crime, drugs, guns

Good side of Dark Web Mind-reeling amount of information Powerful Secure Free of surveillance You can get anything

Agora Market

Crime is Thriving

The Real Secret of PayPal

Cyber Crime Sales

Special K

Credit Cards!

Cybercrime Marketing

Message Board Download RATs and Malware

Casting some light

Stopping TOR Application Protocols SSL Intercept IP Reputation-Based Filtering Sandbox Solutions DLP Solutions

Policies that make sense

Spoiled exit Nodes and being anonymous Exit nodes doing MitM Controlling both entry and exit nodes Using NON-Tor Services

MEMEX Deep Web Search Engine Deep Web Crawlers Indexers Threat Intelligence US Gov t Program

Want to play a game? Use a different system to test. Don t use VMs. Use Live CDs or USBs Use a VPN on top of TOR (I like Private Internet Service others? Tweet me @aamirlakhani) Don t connect back to your network Spend time building a offline image. Listen, surf, and don t participate Almost all newbie s will get scammed, hacked, or in some sort of illegal trouble (e.g.onion Twitter)

Apply Knowledge to Real World Educate + Learn = Apply Awareness Technology Risk Mitigation DarkNET can be a valuable tool for security professionals 39

How to Apply what I learned Darknet is a valuable tool for researchers to gauge the state of their cyber security program : Users need to be aware of the dark and dangerous groups of attackers. Reputation and Unified Threat Management Systems can help mitigate risks. Researchers need to understand traffic is not anonymous. Controlling entry and exit nodes may be able to reveal true identity of users. ISPs and law enforcement may monitor TOR and other protocols. Threat Intelligence can be gained by monitoring chatter on your employees and your organizations. 40

Reputation Filtering

Blastware Beware Recent destructive malware in the wild Disk Wipers Overwrites hard-drive and MBR Triggered by logic bomb/timer South Korea, March 2013 New 2014 FortiGuard Labs discovery: DorkBot Erases hard drive if analysis is detected New variations likely to destroy other targets 3 banks, 2 media companies 50,000 systems Ransomware Encrypts data Leaves hard drive intact Forensics unhampered

Shout Out RSA and RSA Asia Fortinet and FortiGuard Labs Singapore TOR Project Google Image Search (or this presentation would have no pictures) 43

www.fortiguard.com Thank You Thank you

Thank You Jack Chan Fortinet Blog: blog.fortinet.com FortiGuard Research: www.fortiguard.com Twitter: @FortiGuardLabs 45