exploring the darknets - himss365 · stephen heath, vp –security, intrinium. 2 stephen heath has...

39
1 Exploring the Darknets Session 186, March 7, 2018 Stephen Heath, VP Security, Intrinium

Upload: others

Post on 17-Oct-2020

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

1

Exploring the DarknetsSession 186, March 7, 2018

Stephen Heath, VP – Security, Intrinium

Page 2: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

2

Stephen Heath

Has no real or apparent conflicts of interest to report.

Conflict of Interest

Page 3: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

3

Agenda• What is the Darknet?

• How do you get on the Darknet?

• What can you find on the Darknet?

• How do Darknet criminals get caught?

• Q&A

Page 4: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

4

Learning Objectives• Recognize how cyber-criminals operate within the marketplaces of

the darknet

• Contrast the reality of the darknet versus the urban legend created by sensationalized headlines

• Evaluate the risk of darknet usage within your organization

• Illustrate how stolen PHI and other PII is bought and sold

Page 5: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

5

Page 6: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

6

Page 7: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

7

Tor• “The Onion Router”

• Distributed Network of relays around the world

• Encrypts communications

• Protects against surveillance and analysis

Page 8: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

8

Page 9: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

9

Page 10: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

10

Page 11: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

11

Page 12: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

12

Page 13: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

13

Disclaimer• This is the part where I start talking about criminal activity

• HIMSS actively discourages, and its employees are prohibited from, engaging in any illegal activity

• I (nor my employer/sponsors/etc.) do not condone this activity

• Topics discussed may be offensive to some people

• If you go on the darknet, you may see things you never wanted to see

• Do not do illegal stuff

Page 14: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

14

Page 15: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

15

Page 16: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

16

Page 17: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

17

Page 18: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

18

Page 19: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

19

Page 20: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

20

Page 21: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

21

Page 22: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

22

Page 23: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

23

Page 24: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

24

Page 25: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

25

Page 26: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

26

Page 27: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

27

Page 28: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

28

Page 29: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

29

Page 30: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

30

Page 31: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

31

How to criminals get caught?• Attacks against Tor

• 0-day attacks

• Bad OpSec / Metadata leaks

Page 32: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

32

Page 33: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

33

Page 34: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

34

Page 35: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

35

Page 36: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

36

Page 37: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

37

Page 38: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

38

Protecting your networks• NextGen Firewalls

– Application control

– SSL Decrypt

• If you detect Tor activate Incident Reponse

– Employee is doing something they shouldn’t, or…

– Something/someone is in your network

Page 39: Exploring the Darknets - HIMSS365 · Stephen Heath, VP –Security, Intrinium. 2 Stephen Heath Has no real or apparent conflicts of interest to report. Conflict of Interest. 3 Agenda

39

Questions• Stephen Heath, VP, Security

• Intrinium.com

• Email: [email protected]

• Twitter: @hackerhiker