phishing and ransomware peter wood · • steal your passwords, pins, email addresses • infect...

38
Peter Wood Chief Executive Officer First Base Technologies LLP Personal Cyber Security Phishing and Ransomware

Upload: others

Post on 02-Oct-2020

9 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Peter WoodChief Executive Officer

First Base Technologies LLP

Personal Cyber Security

Phishing and Ransomware

Page 2: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 2 © First Base Technologies 2017

Founder and CEO - First Base Technologies LLP

• Engineer, IT and information security professional since 1969

• Fellow of the BCS

• Chartered IT Professional

• CISSP

• Member of the Institute of Information Security Professionals

• 15 Year+ Member of ISACA, Member of the ISACA Security Advisory Group

• Senior Member of the Information Systems Security Association (ISSA)

• Member of the BCS Information Risk Management and Assurance Group

• Chair of white-hats.co.uk

• Chair of OTIS (Operational Technology and IoT Security)

• Member of ACM, IEEE, First Forensic Forum, Institute of Directors

• Member of Mensa

Peter Wood

Page 3: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 3 © First Base Technologies 2017

Page 4: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 4 © First Base Technologies 2017

go.symantec.com/norton-report-2013

Page 5: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 5 © First Base Technologies 2017

go.symantec.com/norton-report-2013

Page 6: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 6 © First Base Technologies 2017

What is phishing?

• Emails that look as if they are from a bank, a retailer,

eBay, or even a friend

• The email sender information has been faked

• Can include a malicious attachment

• Or a link to a fake website

• Or a link to a compromised website

• Or a website with malicious adverts

• Or invite simple form filling to capture your details

Page 7: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 7 © First Base Technologies 2017

Why phishing?

• Steal your passwords, PINs, email addresses

• Infect your computer with a banking Trojan

• Infect your computer with ransomware

• Steal your address book (contact list)

• Add your computer to a botnet

• Install spyware, keyloggers or Trojan software

Page 8: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 8 © First Base Technologies 2017

What are botnets?

• Botnets are large groups of computers controlled by

criminals

• Each computer has been infected by malicious

software

• The computers’ owners have no idea that they’ve been

infected

• The criminals control the computers remotely and

silently

Page 9: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 9 © First Base Technologies 2017

How big is this problem?

• Millions and millions of computers around the world are

unwittingly part of botnets

• In 2009 a botnet of 1.9 million computers was found

Page 10: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 10 © First Base Technologies 2017

Who are these criminals?

There are all kinds of criminals working together in an

underground economy: hackers, spammers, money

launderers, even web mafia

Page 11: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 11 © First Base Technologies 2017

Why do botnets exist?

• Send out e-mail spam

• Conduct distributed denial-of-service attacks

• Send out banking Trojans and keyloggers

• Commit click fraud

• Host phishing websites

• Infect more computers and make more botnets

Page 12: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 12 © First Base Technologies 2017

Phishing attacks against companies

• 3,066 employees clicked on a link in a phishing email, and2,398 users entered their username and password

• An analysis of the compromised passwords from emailphishing campaigns revealed single word-based passwordsand 72% of passwords being 10 characters or less inlength

• Email phishing is the most prevalent cyber security threatto organisations. Passwords harvested grant the attackeraccess to external services, such as VPNs and OWA

• Gaining access to these services can provide an attackerwith full remote access into the network

Page 13: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 13 © First Base Technologies 2017

How to spot a phishing email

Page 14: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 14 © First Base Technologies 2017

Trojan software invitation

Page 15: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 15 © First Base Technologies 2017

How do I know a site is safe?

Page 16: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 16 © First Base Technologies 2017

How do I know a site is safe?

Page 17: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 17 © First Base Technologies 2017

How do I know a site is safe?

Page 18: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 18 © First Base Technologies 2017

How do I know a site is safe?

Page 19: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 19 © First Base Technologies 2017

How do I know a site is safe?

Page 20: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 20 © First Base Technologies 2017

How does Chrome protect me?

Page 21: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 21 © First Base Technologies 2017

How does Firefox protect me?

Page 22: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 22 © First Base Technologies 2017

How does Internet Explorer protect me?

Page 23: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 23 © First Base Technologies 2017

Tips to avoid email attacks

• Never reveal personal or sensitive information in response to

an email, no matter who appears to have sent it

• If you receive a suspicious email, call the person or

organisation before you respond or open any attached files

• Never click links in an email that requests personal or

sensitive information. Enter a known web address into your

browser instead

• Report any suspicious email to the spoofed organisation (for

example your bank)

Page 24: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 24 © First Base Technologies 2017

Ransomware

Page 25: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 25 © First Base Technologies 2017

What is ransomware?

Page 26: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 26 © First Base Technologies 2017

The scale of ransomware

Page 27: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 27 © First Base Technologies 2017

Evolution

Page 28: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 28 © First Base Technologies 2017

RaaS

Page 29: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 29 © First Base Technologies 2017

Tips to defend against ransomware

• Secure, encrypted backups on write-once media

(DVD, Blu-ray)

• Multiple backups (local, cloud and off-line)

• Regular software patching (ref Secunia)

• Ad blocking software for browsers

• Secure home networks

• Anti-phishing training for all friends and family

• Keep up to date on the evolution of ransomware

Page 30: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 30 © First Base Technologies 2017

Password Fun

Page 31: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 31 © First Base Technologies 2017

People hate passwords

Page 32: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 32 © First Base Technologies 2017

A secure password?

• Maggie1

• !J3r3my

• 6k5&R*Gz

• I.love.green.tomatoes

• Password1

• P@ssw0rd1

• Oxford1984

Page 33: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 33 © First Base Technologies 2017

Brute force crack(using a medium-sized botnet)

1. Maggie1 unsafe: brute force instantly

2. !J3r3my unsafe: brute force in 1 second

3. 6k5&R*Gz unsafe: brute force in 1 minute

4. Password1 unsafe: brute force in 2 minutes

5. Oxford1984 unsafe: brute force in 2 hours

6. P@ssw0rd1 unsafe: brute force in 6 days

7. I.love.green.tomatoes 99 quintillion years (99x1030)

http://password-checker.online-domain-tools.com/

Page 34: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 34 © First Base Technologies 2017

Intelligent dictionary crack

1. Maggie1 unsafe: dictionary word + one or two digits

2. !J3r3my unsafe: leet speech + one character

3. Password1 unsafe: dictionary word + one or two digits

4. Oxford1984 unsafe: dictionary word + year

5. P@ssw0rd1 unsafe: leet speech + or two digits

6. 6k5&R*Gz unsafe: brute force in 1 minute

7. I.love.green.tomatoes 99 quintillion years (99x1030)

http://password-checker.online-domain-tools.com/

Page 35: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 35 © First Base Technologies 2017

What about websites?

Page 36: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 36 © First Base Technologies 2017

Automatic password generator

Page 37: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Slide 37 © First Base Technologies 2017

Tips to avoid password theft

• Don’t use passwords based on dictionary words and names

• Use passphrases whenever you can

• Never re-use passwords: “one password to rule them all”

• Use a ‘password safe’ like Password Agent to make it easy

(http://passwordsafe.sourceforge.net/)

Page 38: Phishing and Ransomware Peter Wood · • Steal your passwords, PINs, email addresses • Infect your computer with a banking Trojan • Infect your computer with ransomware • Steal

Peter WoodChief Executive Officer

First Base Technologies LLP

[email protected]

http://firstbase.co.ukhttp://white-hats.co.ukhttp://peterwood.com

Twitter: @peterwoodx

Need more information?