targeted attack on enterprise - hong kong | home · consulting systems engineer, fireeye targeted...
TRANSCRIPT
![Page 1: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic](https://reader034.vdocument.in/reader034/viewer/2022052103/603de35026687377416c962e/html5/thumbnails/1.jpg)
Matthew WONG
Consulting Systems Engineer, FireEye
Targeted Attack on
Enterprise
![Page 2: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic](https://reader034.vdocument.in/reader034/viewer/2022052103/603de35026687377416c962e/html5/thumbnails/2.jpg)
Evolution of Cyber-Defense Strategies
Cyber Crime Economic Lost increased
27x in six years and up to HKD 1.2 Billion in 2014
![Page 3: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic](https://reader034.vdocument.in/reader034/viewer/2022052103/603de35026687377416c962e/html5/thumbnails/3.jpg)
The Number of Industries Targeted by Advanced Attackers continues to Expand and Evolve
![Page 4: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic](https://reader034.vdocument.in/reader034/viewer/2022052103/603de35026687377416c962e/html5/thumbnails/4.jpg)
![Page 5: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic](https://reader034.vdocument.in/reader034/viewer/2022052103/603de35026687377416c962e/html5/thumbnails/5.jpg)
CTB locker ransomware still very active
Every company is facing this problem
![Page 6: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic](https://reader034.vdocument.in/reader034/viewer/2022052103/603de35026687377416c962e/html5/thumbnails/6.jpg)
The basics
Attacker’s Goal: Issue instructions on the victim PC
![Page 7: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic](https://reader034.vdocument.in/reader034/viewer/2022052103/603de35026687377416c962e/html5/thumbnails/7.jpg)
The basics
Application Document
![Page 8: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic](https://reader034.vdocument.in/reader034/viewer/2022052103/603de35026687377416c962e/html5/thumbnails/8.jpg)
Types of attack
Fool the Human: Fool the Computer: Social Engineering Exploitation
![Page 9: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic](https://reader034.vdocument.in/reader034/viewer/2022052103/603de35026687377416c962e/html5/thumbnails/9.jpg)
Types of attack: End User Social Engineering
Fool the Human: Social Engineering
![Page 10: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic](https://reader034.vdocument.in/reader034/viewer/2022052103/603de35026687377416c962e/html5/thumbnails/10.jpg)
Types of attack: Vulnerability Exploitation
Fool the Computer: Exploitation
![Page 11: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic](https://reader034.vdocument.in/reader034/viewer/2022052103/603de35026687377416c962e/html5/thumbnails/11.jpg)
How do you “fool the computer”
Not meant to issue instructions, but can if a vulnerability exists in the app
which uses this document / data
![Page 12: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic](https://reader034.vdocument.in/reader034/viewer/2022052103/603de35026687377416c962e/html5/thumbnails/12.jpg)
For example…
Microsoft security advisory: Vulnerability in Internet Explorer could allow remote code execution
![Page 13: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic](https://reader034.vdocument.in/reader034/viewer/2022052103/603de35026687377416c962e/html5/thumbnails/13.jpg)
Importance of patching
![Page 14: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic](https://reader034.vdocument.in/reader034/viewer/2022052103/603de35026687377416c962e/html5/thumbnails/14.jpg)
BEHIND THE
WHEEL 10010
0101
1110
0100 10010
0011
1101
0010
111
0
010
0