a look into a hackers mind · 5 smaller, more targeted phishing the phishing kits are more advanced...

39
REST ASSURED A look into a hackers mind DIRF, September 2018 www.csis.dk

Upload: vothuy

Post on 02-May-2019

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

REST ASSURED

A look into a hackers mindDIRF, September 2018

www.csis.dk

Page 2: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

Agenda 1.00 Trends2.00 Live hacking3.00 Case studies4.00 Recommendations

A look into a hackers mind

Page 3: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

1.00Trends

A look into a hackers mind

Page 4: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

4

Identity theftCould this happen to you?

Page 5: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

5

Smaller, more targeted phishingThe phishing kits are more advanced than ever and the IT criminals are fast and effect full

Page 6: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

6

CEO and VENDOR fraudOne of the largest financial threat against companies

Page 7: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

7

Smaller, more targeted phishingPhishing works on all platforms

Page 8: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

8

Smaller, more targeted spear phishing e-mailsDistributing malware such as Trickbot

Page 9: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

9

Ransomware expanding and evolvingDifferent types of strategies and motivation…

Page 10: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

10

Threat actors becoming more patient, more professionalMalware: Carbanak

Page 11: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

11

More resources required by both organisations and vendorsRussian interference in the US presidential election witness this

Source: CSIS

Page 12: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

12

Data breaches constantly increasingHave you remembered to change your password recently?

Page 13: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

13

Mobile malware quieter than expectedMost mobile malware is only advanced phishing attacks (overlay attacks)

Page 14: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

14

DarknetEasy to find easy to use

Page 15: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

15© CSIS Security Group A/S, 2018

Increasing DDoS activityThe largest DDoS attack ever seen with Mirai botnet: 1 TB+ traffic

Page 16: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

2.00Live hacking

A look into a hackers mind

Page 17: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

17

Find your targetEx: Company + job description + linkedin

Page 18: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

18

Find e-mail addressE-mails typical follows a syntax

Page 19: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

19

Find e-mail addressE-mails typical follows a syntax

Page 20: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

20

Find e-mail addressUse darknet to check syntax (and compromised passwords)

Page 21: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

21

Find e-mail addressUse darknet to check syntax (and compromised passwords)

Page 22: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

22

Find e-mail addressOr use WWW…

Page 23: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

23

Find software you can exploitMeta data in documents (Maltego)

Page 24: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

24

Find software you can exploitMeta data in documents (Maltego)

Page 25: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

25

Adobe PDF Library timelineInconsistency patch management

Page 26: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

26

Make your spear phishing e-mailIs it possible to spoof the e-mail FROM field?

Page 27: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

27

Make your spear phishing e-mailNow we are ready to make the e-mail

From: [email protected]: [email protected]

Pia Valentin ErichsenPlesner A/S

Page 28: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

28

Make your spear phishing e-mailExcel Macro Attack

LIVE DEMO

Page 29: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

29

Avoid Antivirus detectionGoogle: “antivirus + company name + linkedin”

Page 30: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

30

Avoid Antivirus detectionEncrypt you malware and avoid AV detection

Page 31: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

3.00Case study: Maersk

A look into a hackers mind

Page 32: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

32

Maersk caseNotPetya

Step 1: Software update (outside)- Patient-0 difficult to protect against

Step 2: Auto-spreading (inside network)- Exploit- Credential harvesting

Page 33: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

33

Maersk caseSetup

Security systems

Internet

Evil hacker

Patient 0

TARGET 2+

Malicious Medoc software update (auto)

Using Microsoft OS exploit and

Credential harvesting

Page 34: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

3.00Case study: Circumvent two-factor authentication

A look into a hackers mind

Page 35: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

08080808

*******

08080808

*******

1234

Circumvent two-factor authenticationCitadel, ZeuS, Ramnit, Trickbot, etc.

Page 36: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

4.00Recommendations

A look into a hackers mind

Page 37: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

37© CSIS Security Group A/S, 2015

Page 38: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

38

What can I do / Learn more?Antivirus is not enough!

Company:

Be aware and prepared: “Not if, but when

you get a security incident!”

Have a documented and tested ”Incident

response procedure”, that is applied for

every IOC/IOA

Keep an alliance with security speicalists

Keep your software up-to-date (Java JRE,

Acrobat Reader, Adobe Flash, etc.)

Use your employees as IDS sensors

Privately:

Use individual and strong passwords (use a

password manager such as Lastpass)

Learn about cyber security threats and how

to protect against it:

https://heimdalsecurity.com/

Use an updated Anti Virus program

Use a program to automatically keep your

software up-to-date (Java JRE, Acrobat

Reader, Adobe Flash, etc.), (use a free tool

such as Heimdal Security Agent)

Page 39: A look into a hackers mind · 5 Smaller, more targeted phishing The phishing kits are more advanced than ever and the IT criminals are fast and effect full 6 CEO and VENDOR fraud

Thank you!

[email protected]

www.csis.dk

REST ASSURED