project cumulus: how hacks unfold

15
webinar project cumulus: how hacks unfold

Upload: bitglass

Post on 22-Mar-2017

135 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Project Cumulus: How Hacks Unfold

webinar

project cumulus:

how hacks unfold

Page 2: Project Cumulus: How Hacks Unfold

the experiment

■ complete online identity for a fictitious bank employee

■ created seemingly real files for Google Drive

■ convincing retail bank web portal

■ username + password leaked onto the dark web

Page 3: Project Cumulus: How Hacks Unfold

hackers move fast

■ 8 attempted logins in 24 hours

■ first file downloaded in 48 hours

■ a third of total views and logins in week one

Page 4: Project Cumulus: How Hacks Unfold

hacked once, hacked everywhere

■ victim used the same password across the web

■ 94% of hackers uncovered other accounts

■ 36% of Drive hackers successfully accessed the victim’s bank account

Page 5: Project Cumulus: How Hacks Unfold

tor usage on the rise

■ hackers came from over 30 countries

■ logins recorded from the US, Austria, Netherlands, Philippines, and Turkey

■ 68% of hackers logged into Google Drive via Tor

Page 6: Project Cumulus: How Hacks Unfold

hacker tactics

■ Tor + VPN + cryptocurrency

■ bank trojans■ card writers■ “disposable” computers

Page 7: Project Cumulus: How Hacks Unfold

a look back at “where’s your data”

Page 8: Project Cumulus: How Hacks Unfold

preventing similar breaches with a CASB

identity data-centric securitydiscovery

Page 9: Project Cumulus: How Hacks Unfold

casb identity:avoid reusing passwords, implement better authentication

■ cloud app identity management should maintain the best practices of on-prem identity

■ SSO enables cross-app visibility into suspicious access activity

■ contextual multi-factor authentication mitigates risk

Page 10: Project Cumulus: How Hacks Unfold

casb discovery:set up alerts for unusual activity

■ analyze outbound data flows to learn what SaaS apps your organization is using

■ understand risk profiles of different apps

■ essential in process of enabling secure cloud app usage

Page 11: Project Cumulus: How Hacks Unfold

casb security:granular access control and DLP

the new data reality requires a new security architecture

■ cross-device, cross-platform agentless data protection

■ granular DLP for data at rest and in motion

■ contextual access control

■ detailed logging for compliance and audit

Page 12: Project Cumulus: How Hacks Unfold

about bitglass

total data

protectionoutside the

firewall est. jan 2013

CA, NY, MA,

IL, NC12

Page 14: Project Cumulus: How Hacks Unfold

download the full project cumulus report

the bitglass research team leaked a fictitious bank employee’s credentials onto the dark web and tracked the activity that followed

download the report

Page 15: Project Cumulus: How Hacks Unfold

bitglass.com@bitglass