Cyber Security Current Trends & Emerging Threats



Similar documents
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

CYBER SECURITY THREAT REPORT Q1

WRITTEN TESTIMONY OF

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Cyber liability threats, trends and pointers for the future

Advanced Persistent Threats

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Current Threat Scenario and Recent Attack Trends

The FBI and the Internet

Almost 400 million people 1 fall victim to cybercrime every year.

FBI CHALLENGES IN A CYBER-BASED WORLD

Defending Against Data Beaches: Internal Controls for Cybersecurity

INDUSTRY OVERVIEW: FINANCIAL

SPEAR-PHISHING ATTACKS

IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA

FERPA: Data & Transport Security Best Practices

Security and Privacy

Ed Ferrara, MSIA, CISSP Fox School of Business

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

10 Smart Ideas for. Keeping Data Safe. From Hackers

Detailed Description about course module wise:

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

September 20, 2013 Senior IT Examiner Gene Lilienthal

Global IT Security Risks

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

EY Cyber Security Hacktics Center of Excellence

Practical Steps To Securing Process Control Networks

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Internet threats: steps to security for your small business

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May TrustInAds.org. Keeping people safe from bad online ads

Defending Against Cyber Attacks with SessionLevel Network Security

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

Perspectives on Cybersecurity in Healthcare June 2015

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Middle Class Economics: Cybersecurity Updated August 7, 2015

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Federal Bureau of Investigation

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Using big data analytics to identify malicious content: a case study on spam s

Don t Fall Victim to Cybercrime:

CYBERTRON NETWORK SOLUTIONS

Breaking the Cyber Attack Lifecycle

Unknown threats in Sweden. Study publication August 27, 2014

Developing Secure Software in the Age of Advanced Persistent Threats

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Hunting for Indicators of Compromise

NEW ZEALAND S CYBER SECURITY STRATEGY

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and Advanced Persistent Threats

Malware & Botnets. Botnets

Beyond the Hype: Advanced Persistent Threats

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

The Impact of Cybercrime on Business

24/7 Visibility into Advanced Malware on Networks and Endpoints

What Do You Mean My Cloud Data Isn t Secure?

Mobile Banking. Secure Banking on the Go. Matt Hillary, Director of Information Security, MX

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

Protecting Your Organisation from Targeted Cyber Intrusion

Web 2.0 and Data Protection. Paul Tsang Security Consultant McAfee

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Identifying Cyber Risks and How they Impact Your Business

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Innovations in Network Security

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Property of Secure Network Technologies-Do Not Distribute or Post Without Written Permission-Copyrights and Trademark Apply

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)


Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Spear Phishing Attacks Why They are Successful and How to Stop Them

Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age


Into the cybersecurity breach

PREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO

Incident Response. Proactive Incident Management. Sean Curran Director

State of Security Survey GLOBAL FINDINGS

CyberArk Privileged Threat Analytics. Solution Brief

Transcription:

Cyber Security Current Trends & Emerging Threats Michael Saylor Executive Director Cyber Defense Labs Page 1

Michael Saylor, CISM, CISA Michael (Mike) possesses over 19 years of experience with both domestic and international companies in IT security and Cyber investigations, and IT operations. Specializing in: Technology Risk Management, Enterprise Security, Incident Response, Fraud Investigations, Digital Forensics, Project Management, Training, and Process and Policy Development. He is the Executive Director for Cyber Defense Labs located on the campus of UT Dallas, President Emeritus for the North Texas FBI Infragard, Cyber Crime Committee Member for the North Texas Crime Commission, and the CIO for the Texas Credit Union League. He was also a professor of Computer Science for the Dallas County Community College District where he served as the Chairman of the Technology Advisory Board. He has B.S. in Information Systems, and Masters (2013) Criminal Justice. Michael has worked with local and federal law enforcement in the identification and apprehension of perpetrators committing multi-million dollar fraud, embezzlement, identity theft, hacking, and racketeering crimes. Page 2

Recent Trends Industry Analysis (2011-2012, some 2013) Continuing and Emerging Threats Continued Convergence Drugs, Crime, and Terrorism Enterprise Best Practices Page 3

Recent Trends Almost all attacks in 2012 had a web component, where data was sent to or received from a target via http or https, and took advantage of a human element (Social Engineering, Phishing, etc). Mobile Devices and Mobile Applications Hacktivism / Cyber Protests Advanced Persistent Threat (APT) Lures Social Engineering & Social Media Search Engine Optimization Poisoning Spam and Spear Phishing Page 4

Mobile Devices 6 Billion Mobile Subscribers on the Planet (end of 2012) Mobile Apps increasingly rely on Internet browser Little to no patch management for mobile & Poor QA in the AppStore Few anti-virus / anti-malware solutions 51% of users circumvent or disable device passwords & security controls Increasing malicious mobile applications and mobile exploitation Page 5

Mobile Devices Recent attacks include: SMShing SMS texts asking for bank credentials / PIN, or to call 800 number Trojan / Malware key logger, malware propagation (facebook), remote control (e.g. ZitMo & EuroGrabber targeting mobile banking credentials), infecting trusted systems. Page 6

Recent Trends Malicious Android Apps up 580% (28k) Location Services? Mobile Threats will impact your organization eventually! CEO s Phone? Page 7

Malware 82% of malware sites are hosted on compromised systems 55% of data-stealing malware is web-based Page 8

Hacktivism / Cyber Protests Attacks in Response to Geo-Political issues Objectives are primarily to disrupt and / or voice the views of a particular group Website defacements Denial of Service attacks (US Banks) Automated exploit attempts Disclosure of sensitive information (The Truth) Page 9

Advanced Persistent Threats Any computer system connected to a communications medium will be compromised given enough time and the appropriate resources. 80% of attacks in 2012 required multi-stage defenses for protection. APT Attacks use: -Highly Customized Tools and Intrusion Techniques -Stealthy, Patient attack methods to reduce detection -Focus on high value targets (Mil, Pol, Eco, Intel) -Well funded & staffed, supported by Mil or State Intel -Organizations are targeted for strategic importance Page 10

APT APT Attackers worked with BotNet operators to determine if target systems have already been compromised. Use of polymorphic code that manifests differently on each system it infects. Cyber Criminals are becoming Information Brokers as a result of their Industrial Espionage schemes. Page 11

A Thousand Grains of Sand The Chinese continue to follow ancient book, "The Art of War, which advises the commission of espionage by "a thousand grains of sand"; meaning obtaining small but innumerable pieces of information by vast numbers of people acting as armies of spies sent against the enemy. This recruitment usually translates to ethnic, 1 st generation Chinese immigrants with cultural and familial ties to China. The Chinese government then reciprocates by helping their part-time spies create or proceed with commercial or business ventures in the United States. This is called guanxi. As a result, the Chinese coordinators do not offer money, and they do not accept walk-in cases, which may turn out to be "dangles" (double agents). Most espionage activities are coordinated by the Ministry of State Security (MSS) or the military intelligence arm of the People's Liberation Army (PLA). Dave Wise, Espionage Author Page 12

Espionage Mandiant s 2013 report on Chinese (APT1) attacks on 141 organizations since 2006 (115 were in the U.S.). The report presents substantial evidence of Chinese sponsored activities, including photos, forensics, communications, and profiles. Soon after Mandiant s report, the U.S. government publishes a 140 page strategy to combat the theft of U.S. trade secrets The U.S. government initially attempted to halt the attacks on U.S. organizations, but soon resorted to asking China to please stop stealing our stuff. China s response to the Mandiant report was that it was unprofessional to publish and make such claims. Page 13

Espionage According to the U.S. Justice Department, of 20 cases of economic espionage and trade secret criminal cases from January 2009 to January 2013, 16 involved Chinese nationals; i.e. organizations hired foreign nationals to work on national security level projects (DuPont, NASA, Google, Intel, DoD, etc.) 63% of impacted organizations learn they were breached from an external source, like law enforcement. Organizations are being targeted by more than one attack group, sometimes in succession. In 2012, 38% of targets were attacked again after the original incident was remediated, lodging more than one thousand attempts to regain entry to former victims. Feb 2013 report (Akamai) shows that 30% of all observed attacks came from China and 13% originated from within the U.S. March 2013 report (Solutionary) states that the majority of attacks on the U.S. are now originating in the U.S. Page 14

Espionage Page 15

Espionage Page 16

Exploit Toolkits & Malware In 2012, Exploit Toolkits cost between $40 and $4k 61% of all malware is based on pre-existing toolkits; upgrades are made to keep them current and provide additional capabilities Toolkits used for Targeted Attacks can create custom Blog entries, emails, Instant Messages, and web site templates to entice target organization personnel toward malicious links / content. (Blackhole >100k/day) Broadcast attacks will use toolkits to automate SQL Injection, web tools, or server exploits in an effort to inject a malicious link within target websites Page 17

Exploit Toolkits & Malware Traditional Attacks were loud, high volume attacks typically stopped by threat monitoring tools. Today s sniper attacks use specific exploits to get clear shots at the objective The convergence of Social Engineering, Social Profiling, and Geo-Location improve attack success Rogue software (anti-virus, registry cleaner, machine speed improvement, backup software, etc) Increase in MAC Malware (MACDefender) +50% attacks on Social Media sites were Malware Page 18

Lures Several attacks in 2012 were conducted by luring victims to accept malware or follow a link to an infected site. 92% of all email Spam contained a Link There are 6 stages of the attack: Page 19

Lures Page 20

Lures Facebook Specific Typo-Squatting Fake Facebook Applications Hidden Camera Video Lure Celebrity Deaths Fake Offers & Gifts Browser Plugin Scams Fake Profile Creeper Blog Spam Attack Page 21

Top5 Social Engineering Lures Page 22

Search Engine Poisoning 2012 saw an increase in malware infections as a result of SEP. Hackers crawling current news headlines, creating related malicious sites and conducting SEP Google Images links to source photo Using web analytics to determine what people are searching for Page 23

SPAM & Phishing 2012 Symantec Results Spam is at 66.8% of all global email Phishing attacks are 1 in every 467 emails Malware is in 1 out of every 316 emails Began to see combination of email and SMS for targeted attacks Page 24

Emerging Threats Page 25

Emerging Threats Mobile Internet will continue to increase as it eventually takes the place of desktop Internet. The illegal drug organizations are looking to Cyber Crime to facilitate their business and expand their operations. Your organization could be infiltrated by an insider, socially engineered for identities and social profiles, and potentially held hostage with ransomeware. Localized Nation State attacks on U.S. increase Page 26

Emerging Threats Terrorists are expected to continue to expand their technical capabilities which may lead to an increase in cyber crime and cyber terrorism. Domestic groups funded by foreign States to conduct US-based attacks Cyber crime as a funding vehicle for Terrorism Cyber as a facilitator / component for a Terrorist attack (Effects-based Operations) Page 27

Emerging Threats Malware embedded at the hardware / chip level of consumer products will continue to increase. Targeted Attacks and APT will continue to increase in number and sophistication. Sophistication from APT attacks will trickle down to black market malware toolkits. Mobile Phone attacks will increase in volume and type Insider Threat will continue to grow as new technology is introduced, especially non-company devices Thwarting attacks will require multi-stage defenses Page 28

Emerging Threats Attackers are increasingly using outsourced service providers (HR, Procurement, IT, Finance, etc.) as a means to gain access to their victims. Attackers are using comprehensive reconnaissance (network, physical, social) to help navigate victims organization and networks more effectively (e.g. network infrastructure, system administration guides, etc.) The use of Mercenary Cyber Commandos (Gangs / Cartels) will grow to support the organizational foot soldiers of Nation State actors. Page 29

Emerging Threats Web Sites Network Attacks Cloud Provider / Vendor NETWORK Company Data DMZ Social Engineering Phone Calls INTERNAL NETWORK Mobile Device / Media Internet Use Physical Security Breach Internet Wireless Home Networks CORE SYSTEMS Wireless Networks Malware Emails Internet WORMS Virus PERIMETER APT Emails Social Engineering Social Networking Remote Users Network Attacks Physical Breach Wireless Malware Networks Phishing Insiders Worms Virus Malware Page 30

Emerging Threats Growth of the Dark Web / Tor Network Law Enforcement has little understanding of these off the web networks, how to access them, and the types of activities being conducted there, including: CrimeWare Child Pornography Trafficking of Drugs, Weapons, Humans Child Exploitation Sex Tourism Without LE involvement and understanding in these networks, criminal activity will grow and evolve, and outpace legislative and procedural response to these crimes. Page 31

Emerging Threats Sophistication of Call-Home tactics of Malware will continue to grow, including the use of Twitter, DNS, VoIP, and other open communication channels for command and control. Recent and emerging Malware and Crimeware receive updates / patches and can be armed with various modules. Your Social Media Identity is or soon will be valued greater than your Credit Cards. Page 32

Best Practice Guidelines User Education and Awareness and Education and Awareness Containment is the new Prevention.Compromise is inevitable Monitoring Network, Vulnerabilities, and Brand Anti-Virus, Anti-Malware, Device Control Encryption Data Loss Prevention & Monitoring Removable Media Policy Mobile Device Policy Frequent Risk-Based Security Assessments and Updates Aggressive Patching and Software Polling Incident Response Procedures Social Media / Social Networking Policy Page 33

References Mandiant Report February 2013 Bit9 Cyber Security Report 2012 Symantec Intelligence Reports 2012 Georgia Tech - Emerging Cyber Threats Report 2012 WebSense Threat Report 2012 TrendLabs Security in the Age of Mobility 2012 LookOut Mobile Security Report 2012 Breakthrough Silicon Scanning Discovers Backdoor, University of Cambridge 2012 Kaspersky Labs report on Red October 2013 Tiger Trap, David Wise, 2012 TrendMicro, Peter the Great versus Sun Tzu, 2012 Page 34

Questions / Contact Info Questions? Mike Saylor Cyber Defense Labs Msaylor@CyberDefenseLabs.org 972-454-0227 Terry Quan Cyber Defense Labs TQuan@CyberDefenseLabs.org 214-563-5235 Page 35