ediscovery 2014 market plan – h2 pogue - cybercrime1… · 13 october, 2014 copyright nuix 2014 4...

26
Cybercrime 101 Christopher Pogue SVP, Cyber Threat Analysis

Upload: others

Post on 15-Oct-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: eDiscovery 2014 Market Plan – H2 Pogue - cybercrime1… · 13 October, 2014 COPYRIGHT NUIX 2014 4 Threat Landscape. Threat Landscape • Dramatic increase in cyber attacks –Significant

Cybercrime 101Christopher Pogue

SVP, Cyber Threat Analysis

Page 2: eDiscovery 2014 Market Plan – H2 Pogue - cybercrime1… · 13 October, 2014 COPYRIGHT NUIX 2014 4 Threat Landscape. Threat Landscape • Dramatic increase in cyber attacks –Significant

Cybercrime 101 - Agenda

• Threat Landscape

• The Attacks

• Post Breach Steps

• Conclusion

Page 3: eDiscovery 2014 Market Plan – H2 Pogue - cybercrime1… · 13 October, 2014 COPYRIGHT NUIX 2014 4 Threat Landscape. Threat Landscape • Dramatic increase in cyber attacks –Significant

Threat Landscape

3

Page 4: eDiscovery 2014 Market Plan – H2 Pogue - cybercrime1… · 13 October, 2014 COPYRIGHT NUIX 2014 4 Threat Landscape. Threat Landscape • Dramatic increase in cyber attacks –Significant

COPYRIGHT NUIX 2014 413 October, 2014

Threat Landscape

Page 5: eDiscovery 2014 Market Plan – H2 Pogue - cybercrime1… · 13 October, 2014 COPYRIGHT NUIX 2014 4 Threat Landscape. Threat Landscape • Dramatic increase in cyber attacks –Significant

Threat Landscape

• Dramatic increase in cyber attacks

– Significant increase over 2013

– Legal Challenges

• Attribution

• Foreign cooperation

– Politics

– Diverse laws

• Positive financial impact

• Corruption

• MLAT process

– Robust shadow economy

– Lucrative and attractive lifestyle

Page 6: eDiscovery 2014 Market Plan – H2 Pogue - cybercrime1… · 13 October, 2014 COPYRIGHT NUIX 2014 4 Threat Landscape. Threat Landscape • Dramatic increase in cyber attacks –Significant

Threat Landscape

6

Page 7: eDiscovery 2014 Market Plan – H2 Pogue - cybercrime1… · 13 October, 2014 COPYRIGHT NUIX 2014 4 Threat Landscape. Threat Landscape • Dramatic increase in cyber attacks –Significant

Threat Landscape

7

Page 8: eDiscovery 2014 Market Plan – H2 Pogue - cybercrime1… · 13 October, 2014 COPYRIGHT NUIX 2014 4 Threat Landscape. Threat Landscape • Dramatic increase in cyber attacks –Significant

The Attacks

Page 9: eDiscovery 2014 Market Plan – H2 Pogue - cybercrime1… · 13 October, 2014 COPYRIGHT NUIX 2014 4 Threat Landscape. Threat Landscape • Dramatic increase in cyber attacks –Significant

The Attacks

• Marked increase in attack complexity

– Adapting to stringent security controls & improved security technologies

• Leverage arrogance

• Global coordination

• Motivation– Geopolitical

– Retaliation

– Financial

– Opportunity

– Custom malware

• Family based

• Unique to the victim location

– Commoditization of malware packages

– 0day equivalent

9

Page 10: eDiscovery 2014 Market Plan – H2 Pogue - cybercrime1… · 13 October, 2014 COPYRIGHT NUIX 2014 4 Threat Landscape. Threat Landscape • Dramatic increase in cyber attacks –Significant

Attack Sophistication

• Creativity– Taking what they’re given

• Finding ways in

• Finding ways out

– Indirect attacks

• Trusted partners

• Phishing

• Client Side

• BYOD

10

Page 11: eDiscovery 2014 Market Plan – H2 Pogue - cybercrime1… · 13 October, 2014 COPYRIGHT NUIX 2014 4 Threat Landscape. Threat Landscape • Dramatic increase in cyber attacks –Significant

Attack Sophistication

• Trusted partners– Legitimate access

– Assumption of security importance

• Measure of equivalence

– Difficult to test security controls

– No mechanism for enforcement

11

Page 12: eDiscovery 2014 Market Plan – H2 Pogue - cybercrime1… · 13 October, 2014 COPYRIGHT NUIX 2014 4 Threat Landscape. Threat Landscape • Dramatic increase in cyber attacks –Significant

Attack Sophistication

• Phishing attacks– Radically improved

– Topical and timely

• Holidays

• Vacations

• Benefits enrollment

• Consumer directed

– It only takes one

– Propagation can be extremely fast

12

Page 13: eDiscovery 2014 Market Plan – H2 Pogue - cybercrime1… · 13 October, 2014 COPYRIGHT NUIX 2014 4 Threat Landscape. Threat Landscape • Dramatic increase in cyber attacks –Significant

Attack Sophistication

• Traditional hacking vector

– Direct server-side attack: The most common and widely used method for external attacks

• Client-Side attacks

– Applications installed on your desktop are a potential targets (PDF readers, MS Office tools, etc…)

• Social Engineering

– An attack that exploits human interaction

– the goal is tricking the target into providing sensitive data or do something that should be prohibited by security policy

13

Page 14: eDiscovery 2014 Market Plan – H2 Pogue - cybercrime1… · 13 October, 2014 COPYRIGHT NUIX 2014 4 Threat Landscape. Threat Landscape • Dramatic increase in cyber attacks –Significant

Attack Sophistication

• Social Engineering may be used in different situations

– In person / physical approach with target

– Via telephone

– E-mail (phishing)

– Delivering potential gifts, etc. (baiting)

• There are variants that mix different approaches.

• Can be much easier for an attacker– Get targets to leak their credentials or to execute code on the client-side

– Circumvents the perimeter security and creates a channel from the inside out

14

Page 15: eDiscovery 2014 Market Plan – H2 Pogue - cybercrime1… · 13 October, 2014 COPYRIGHT NUIX 2014 4 Threat Landscape. Threat Landscape • Dramatic increase in cyber attacks –Significant

Post Breach Steps

Page 16: eDiscovery 2014 Market Plan – H2 Pogue - cybercrime1… · 13 October, 2014 COPYRIGHT NUIX 2014 4 Threat Landscape. Threat Landscape • Dramatic increase in cyber attacks –Significant

Post Breach Steps

• Four “Windows”

• Initial Breach

• Breach Identification

• Containment of the Breach

• Vulnerabilities are remediated

Breach Windows

Initial Breach Breach is identified

Breach is Contained

Vulnerabilities are remediated

Page 17: eDiscovery 2014 Market Plan – H2 Pogue - cybercrime1… · 13 October, 2014 COPYRIGHT NUIX 2014 4 Threat Landscape. Threat Landscape • Dramatic increase in cyber attacks –Significant

Post Breach Steps

• Breach to identification

– The most critical

– Organizations continue to struggle here

• Identification to containment

– Timeline

– Impact

• Containment to eradication– Correct deficiencies

– Implement additional security controls

• Business resumption– Back to business as usual

– Prepare for the next attack

Breach Windows

Page 18: eDiscovery 2014 Market Plan – H2 Pogue - cybercrime1… · 13 October, 2014 COPYRIGHT NUIX 2014 4 Threat Landscape. Threat Landscape • Dramatic increase in cyber attacks –Significant

Post Breach Steps

• White noise or trigger event• Who’s watching

• What are they watching

• Going Native• Legitimate credentials

• Usage differentiation

• Intelligence Integration• Current threat landscape and attack vectors

• Consider the unlikely and the improbable

• Blinding the target• Manipulate and/or disable security controls

• Create analysis paralysis

Detection

Page 19: eDiscovery 2014 Market Plan – H2 Pogue - cybercrime1… · 13 October, 2014 COPYRIGHT NUIX 2014 4 Threat Landscape. Threat Landscape • Dramatic increase in cyber attacks –Significant

Evolution

• Intelligence correlation

– A is OK

– B is OK

– A & B together are not OK

• Activity profiling

– What is “normal”

• Defense in Depth

– Layers

– Understand the threat

19

Where things are going to have to go

Page 20: eDiscovery 2014 Market Plan – H2 Pogue - cybercrime1… · 13 October, 2014 COPYRIGHT NUIX 2014 4 Threat Landscape. Threat Landscape • Dramatic increase in cyber attacks –Significant

Attack Sequencing

20

Page 21: eDiscovery 2014 Market Plan – H2 Pogue - cybercrime1… · 13 October, 2014 COPYRIGHT NUIX 2014 4 Threat Landscape. Threat Landscape • Dramatic increase in cyber attacks –Significant

Attack Sequencing

• Current attack patterns

– Actionable intelligence

• Public information

• Investigations

• Penetration tests

• Malware

• Expend your time, energy, and money appropriately

– Focus on current threat landscape

• Flexibility

– Follow the threat

• Tybalt cancels out Capafero

21

What are you defending against

Page 22: eDiscovery 2014 Market Plan – H2 Pogue - cybercrime1… · 13 October, 2014 COPYRIGHT NUIX 2014 4 Threat Landscape. Threat Landscape • Dramatic increase in cyber attacks –Significant

Conclusion

Page 23: eDiscovery 2014 Market Plan – H2 Pogue - cybercrime1… · 13 October, 2014 COPYRIGHT NUIX 2014 4 Threat Landscape. Threat Landscape • Dramatic increase in cyber attacks –Significant

Conclusion

• Increased focus on data breaches

• Hacker culture, fueled by profits, nationalism, or terrorism

• Creative, bold, and relentless

• Creativity in defense

• Actionable Intelligence

• Improve detection capabilities

• Ongoing efforts

23

Page 24: eDiscovery 2014 Market Plan – H2 Pogue - cybercrime1… · 13 October, 2014 COPYRIGHT NUIX 2014 4 Threat Landscape. Threat Landscape • Dramatic increase in cyber attacks –Significant

Conclusion

Closing Thought…

http://www.washingtonpost.com/world/national-security/report-cybercrime-and-espionage-costs-445-billion-annually/2014/06/08/8995291c-ecce-11e3-9f5c-9075d5508f0a_story.html

Page 25: eDiscovery 2014 Market Plan – H2 Pogue - cybercrime1… · 13 October, 2014 COPYRIGHT NUIX 2014 4 Threat Landscape. Threat Landscape • Dramatic increase in cyber attacks –Significant

References• http://www.dailydot.com/crime/organized-crime-cybercrime-obsolete/https://www.youtube.com/watch?v=9y4iijOXGeg

• http://www.politico.com/news/stories/0312/73670.html

• http://threatpost.com/hand-of-thief-trojan-not-ready-for-primetime

• http://www.ebook3000.com/Hacker-magazine-No-32_40893.html

• https://krypt3ia.wordpress.com/category/mil/page/6/

• http://betanews.com/2014/05/21/how-five-chinese-hackers-stole-secrets-from-some-of-americas-largest-companies/

• http://www.dailymail.co.uk/news/article-2649452/Computer-hackers-face-life-prison-new-Government-crackdown-cyber-terrorism.html

• http://venitism.blogspot.com/2012/11/religion-as-political-weapon.html

• http://fuzeseo.co/inbound-marketing-driven-data-creativity/

• http://www.auburncc.org/content.php?cid=231

• http://getbestitservices.wordpress.com/2013/05/15/it-outsourcing-decreasing-the-operational-cost-effectively/

• http://www.fortifiedsecurityservices.com/

• http://www.madsecurity.com/portfolio/social-engineering/

• http://www.clipartbest.com/skull-and-crossbones-pictures

• http://www.ucd.ie/cci/education/prospective_students/fcci_programmes.html

• http://www.lyricswow.com/cage/philadelphia-experiment/

• http://cleaningbusinesscourse.com/

• http://thecookingwritersblock.blogspot.com/2011/05/how-to-spice-up-tuna-fish.html

• http://blog.hawaii.edu/uhmednow/events/breast-cancer-awareness-day-at-jabsom-ice-cream-sundaes/

• http://www.experienceproject.com/stories/Love-Ice-Cream/618797

• http://garydavidstratton.com/2014/02/20/two-handed-warriors-at-three-years-a-promising-start-to-a-common-language-friendship/

• http://superradnow.wordpress.com/2012/09/19/spy-vs-spy/

• https://twitter.com/MalSec

• http://scraping.pro/anonymous-scraping-visual-web-ripper/

• http://www.threatmetrix.com/tag/lulzsec/

• http://legalinsurrection.com/2013/10/syrian-electronic-army-hits-obama-group-disrupts-social-media-links/

• http://www.washingtonpost.com/world/national-security/report-cybercrime-and-espionage-costs-445-billion-annually/2014/06/08/8995291c-ecce-11e3-9f5c-9075d5508f0a_story.html

Page 26: eDiscovery 2014 Market Plan – H2 Pogue - cybercrime1… · 13 October, 2014 COPYRIGHT NUIX 2014 4 Threat Landscape. Threat Landscape • Dramatic increase in cyber attacks –Significant

Questions?