why they want your digital devices · verizon 2012 data breach investigations report . 1 to 10. 11...

17
Stephen Cobb, CISSP Security Evangelist Why THEY want your digital devices

Upload: others

Post on 06-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100

Stephen Cobb, CISSP Security Evangelist

Why THEY want your digital devices

Page 2: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100

To own your network?

Page 3: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100

36 ways to abuse hacked devices • Spam zombie • DDoS extortion zombie • Click fraud zombie • Anonymization proxy • CAPTCHA solving zombie

• eBay/PayPal fake auctions • Online gaming credentials • Website FTP credentials • Skype/VoIP credentials • Encryption certificates

• Fake antivirus • Ransomware • Email account ransom • Webcam image extortion

• Bank account data • Credit card data • Stock and 401K accounts • Wire transfer data

• Phishing site • Malware download site • Warez piracy server • Child porn server • Spam site

• Harvest email contacts • Harvest associated accounts • Access to corporate email • Webmail spam • Stranded abroad scams

• Facebook • Twitter • LinkedIn • Google+

• Online gaming characters • Online gaming goods/$$$ • PC game license keys • OS license key

Based on original work by Brian Krebs: krebsonsecurity.com

Web server

Botnet activity

Email attacks

Virtual goods

Reputation hijacking

Financial credentials

Hostage attacks

Account credentials

Page 4: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100

IMPACT

ADVANTAGE

MONEY

CREDENTIALS

Page 5: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100

Verizon 2012 Data Breach Investigations Report

1 to 10

11 to 100

101 to 1,000

1,001 to 10,000

10,001 to 100,000

Over 100,000

0 100 200 300 400 500 600

720 breaches by size of organization (employees)

SMBs

Page 6: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100

The SMB sweet spot for the cyber-criminally inclined

Assets worth looting

Level of protection

Big enterprise SMB “sweet spot” Consumers

Page 7: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100

How do they get to your devices?

1. Malware involved in 69% of breaches 2. Hacking* used in 81% of breaches Breaches combining malware and hacking: 61%

Verizon 2012 Data Breach Investigations Report

*80% of hacking is passwords: default, missing, guessed, stolen, cracked

Page 8: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100

Tools of the trade

Page 9: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100
Page 10: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100

Thriving markets for credentials

Page 11: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100

Hot markets for hacked devices

Page 12: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100

All driven by proven business strategies

Page 13: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100

So how do you defend your devices?

Two main attacks…. …and defenses

Scanning

Authentication

Malware

Hacking

Page 14: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100

Scanning requires proper implementation

0% 20% 40%

Scan devices while connected

Scan devices prior to connection

Require AV on mobile devices

Measures in use at a sample of healthcare facilities

Ponemon Institute Third Annual Benchmark Study on Patient Privacy & Data Security

Page 15: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100

Authentication requires more than passwords

Passwords exposed in 2012: 75,000,000 And those are just the ones we know about Need to add a second factor to authentication

Page 16: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100

The defenses you need

SMART Scanning

STRONG Authentication

Malware

Hacking

Plus polices and training to implement effectively

Page 17: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100

Stephen Cobb [email protected] WeLiveSecurity.com

Thank you!