Phishing Attacks Methodology and Response GridSecCon 2012



Similar documents
Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

Is security awareness a waste of time?

APT Advanced Persistent Threat Time to rethink?

Training Employees to Recognise & Avoid Advanced Threats

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

UNCLASSIFIED. Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC)

Spear Phishing Attacks Why They are Successful and How to Stop Them

SPEAR PHISHING UNDERSTANDING THE THREAT

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

How We're Getting Creamed

Defending Against Data Beaches: Internal Controls for Cybersecurity

5 Reasons Why Your Security Education Program isn t Working (and how to fix it)

5 Reasons Why Your Security Education Program isn t Working (and how to fix it)

Fighting Advanced Threats

Securing Cloud-Based

WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware

Developing a Successful Security Awareness Training Program. Shea Garber, Sr. Account Executive Wombat Security Technologies, Inc.

Defending Against Cyber Attacks with SessionLevel Network Security

Ty Miller. Director, Threat Intelligence Pty Ltd

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

UNCLASSIFIED. General Enquiries. Incidents Incidents

Data Center security trends

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Advanced Cyber Threats in State and Local Government

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

Into the cybersecurity breach

Social Engineering Toolkit

RSA Security Anatomy of an Attack Lessons learned

2012 Data Breach Investigations Report

Using SIEM for Real- Time Threat Detection

Penetration Testing Report. Client: xxxxxx Date: 19 th April 2014

Software that provides secure access to technology, everywhere.

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

SESA Securing with Cisco Security Appliance Parts 1 and 2

Targeted attacks: Tools and techniques

Secure Your Mobile Workplace

Protecting against cyber threats and security breaches

McAfee Phishing Quiz. Partner Enablement Guide

Performing Advanced Incident Response Interactive Exercise

Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge

SIMULATED ATTACKS. Evaluate Susceptibility Using PhishGuru, SmishGuru, and USBGuru MEASURE ASSESS

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

Networks and Security Lab. Network Forensics

How To Protect Your Mobile Device From Attack

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

We ve been hacked! We did it! Rick Grandy Lockheed Martin Hanford Site

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Advanced Persistent Threats

Check Point: Sandblast Zero-Day protection

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Evaluation Guide. eprism Messaging Security Suite V8.200

The Third Rail: New Stakeholders Tackle Security Threats and Solutions

WEB ATTACKS AND COUNTERMEASURES

CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY

The Role of Threat Intelligence and Layered Security for Intrusion Prevention in the Post-Target Breach Era

Jort Kollerie SonicWALL

Fighting Off an Advanced Persistent Threat & Defending Infrastructure and Data. Dave Shackleford February, 2012

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

Managing Web Security in an Increasingly Challenging Threat Landscape


How To Secure Your Store Data With Fortinet

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Cyber Security for your Connected Health Device

September 20, 2013 Senior IT Examiner Gene Lilienthal

FSOEP Web Banking & Fraud: Corporate Treasury Attacks

CryptoLocker la punta dell iceberg, impariamo a difenderci dagli attacchi mirati. Patrick Gada 18 March 2015 Senior Sales Engineer

ISO27032 Guidelines for Cyber Security

Lesson 13: DNS Security. Javier Osuna GMV Head of Security and Process Consulting Division

Detecting Unknown Malware: Security Analytics & Memory Forensics. Fahad Ehsan. Cyber Security #RSAC

Cybersecurity Awareness for Executives

How To Prevent Hacker Attacks With Network Behavior Analysis

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and Advanced Persistent Threats

GRC & Cyber Security Conference - Bringing the Silos Together ISACA Ireland 3 Oct 2014 Fahad Ehsan

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

Practical Steps To Securing Process Control Networks

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Global Security Report 2011

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Don t Spill Your Candy in the Lobby

Transcription:

Phishing Attacks Methodology and Response

Agenda Survey Questions Spear Phishing Current State Case Study - Methodology Countermeasures And Lessons Learned

Question 1 If you had to guess, what percentage of the staff at your organization would fall for a moderately sophisticated spear phishing email? 1. 100% 2. 95% 3. 75% 4. 50%

Question 2 If you had to guess, what percentage of the Executives at your organization would fall for a highly sophisticated spear phishing email? 1. 100% 2. 100% 3. 100% 4. 99%

PhishMe BlackHat Survey How frequently do you encounter phishing emails that are not caught by filters? Have any of your top level executives been compromised by a spear phishing attack in the past year? Note: an informal survey of 250 attendees at BlackHat 2012

Yet training is still a low priority! How often does your organization require users to undergo security training?

Most Important Question! I d rather have a drink with PhishMe at their pool cabana rather than sit around debating the meaning of APT?

What is PhishMe.com? Software-as-a-Service solution for training staff to avoid phishing attacks Administrators send fully customizable mock phishing exercises Scenarios can be simple or very sophisticated Recipients who are vulnerable are immediately provided training Full reporting of participation and results

Current Landscape

All this stuff and we still get phished! Anti-Virus Super Duper AV Single Sign-On Web filters IDS, IPS, SEM Vuln Management Pen Testing Site Takedown

Current State

Why? It is very, very, very effective It is a simple and low cost method It avoids (by-passes) most detection methods Zero chance of capture or retribution In our incident response efforts over 60% of the compromises we have seen start with a spear phishing attack

General Method Recon - Mine publicly available information Attack - Execute a well crafted spear phish Exploit Several routes Solicit sensitive data Push malware to the system Compromise IDs for further exploitation Low Cost / Low Detection Bypasses Anti-Spam/Anti-Phishing/Anti-Virus Difficult to detect limited footprint

Is it Effective? On Average 58% of the time First time test 1 million users Normal IT security

and within a few minutes

Case Study

Attack Methodology Case Study Identify a potential high $$ gain target Mining publicly available information Identify specific targets Phish Rinse Repeat Exploit

Case-Shiller Reports

What s Next? From: Major, Patricia (patricia_major@mcgraw-hill.com) To: Clarke, Sean Subject: Case-Schiller Report Error Urgency: High Sean, I noticed an anomaly in cell C11 in your home price history xls. Please find attached a modified version that reflects the corrected value. The update is based on the numbers found on the San Diego Realtors Association website (http://sd.realtor-assoc.realtydata.com/1987/homeprices.chm) Hope this helps, Trish Intrepidus Group, Inc. 2007

Current Countermeasures And A Better Approach

How To Reduce Risk Part 1 Technical Controls Gateway email filtering Gateway content filtering Domain SPF Host level filtering Host level execution controls

How To Reduce Risk Part 2 Employee Education Primarily static Annual CBT Lunch and Learns Security posters Newsletters Email blasts

A Better Method Mock Phishing Key Techniques Open and transparent Psychology of immediate training Frequent, short training events Maintain recipients interest Target efforts appropriately Change behavior over time This is not pen testing!!!

Sample Customer - Long Term Trend 24,000 employees 3 global exercises in a 12 month period Numerous departmental phishes Significant Improvement

Build a Program First Steps Get buy-in from Execs, Legal, HR, Corp Comms Identify any international privacy issues Understand how this process fits your corporate culture Coordinate with IS to ensure whitelisting Enable SPF Send all staff an introduction to the program

Build a Program - Launch Start with small, simple scenarios Increase difficulty over time Make them culturally and technically appropriate Be careful as you phish your Execs!! Monitor reporting of exercises and attacks Touch each staff member every other month Provide positive feedback to those that do not fall victim to the scenario

General results Vulnerability starts over 60% Phish and teach frequently with appropriate exercises Vulnerability drops below 10% 3.5 million recipients globally

Thanks! Jim Hansen jim@phishme.com