why do they want your digital devices?

Post on 12-Jan-2015

125 Views

Category:

Technology

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

Security expert Stephen Cobb looks at the goals and motives of criminal hackers, and how to mitigate the two main avenues of attack using smart scanning and strong authentication.

TRANSCRIPT

Stephen Cobb, CISSPSecurity Evangelist

Why THEY wantyour digital devices

To own your network?

36 ways to abuse hacked devices• Spam zombie• DDoS extortion zombie• Click fraud zombie• Anonymization proxy• CAPTCHA solving zombie

• eBay/PayPal fake auctions• Online gaming credentials• Website FTP credentials• Skype/VoIP credentials• Encryption certificates

• Fake antivirus• Ransomware• Email account ransom• Webcam image extortion

• Bank account data• Credit card data• Stock and 401K accounts• Wire transfer data

• Phishing site• Malware download site• Warez piracy server• Child porn server• Spam site

• Harvest email contacts• Harvest associated accounts• Access to corporate email• Webmail spam• Stranded abroad scams

• Facebook• Twitter• LinkedIn • Google+

• Online gaming characters• Online gaming goods/$$$• PC game license keys• OS license key

Based on original work by Brian Krebs: krebsonsecurity.com

Webserver

Botnetactivity

Email attacks

Virtualgoods

Reputationhijacking

Financial credentials

Hostage attacks

Account credentials

IMPACTADVANTAGEMONEY

CREDENTIALS

Verizon 2012 Data Breach Investigations Report

1 to 10

101 to 1,000

10,001 to 100,000

0 100 200 300 400 500 600

720 breaches by size of organization (em-ployees)

SMBs

The SMB sweet spot for the cyber-criminally inclined

Assets worthlooting

Level of protection

Big enterprise

SMB “sweet

spot”

Consumers

How do they get to your devices?

1. Malware involved in 69% of breaches2. Hacking* used in 81% of breaches

Breaches combining malware and hacking: 61%

Verizon 2012 Data Breach Investigations Report

*80% of hacking is passwords: default, missing, guessed, stolen, cracked

Tools of the trade

Thriving markets for credentials

Hot markets for hacked devices

All driven by proven business strategies

Specialization Modularity

Division of labor Standards

Markets

So how do you defend your devices?

Two main attacks…. …and defenses

Scanning

Authentication

Malware

Hacking

Scanning requires proper implementation

Scan devices while connected

Scan devices prior to connection

Require AV on mobile devices

0% 5% 10% 15% 20% 25% 30% 35% 40%

Measures in use at a sample of healthcare facili-ties

Ponemon Institute Third Annual Benchmark Study on Patient Privacy & Data Security

Authentication requires more than passwords

Passwords exposed in 2012: 75,000,000And those are just the ones we know aboutNeed to add a second factor to authentication

The defenses you need

SMART Scanning

STRONG Authentication

Malware

Hacking

Plus polices and training to implement effectively

Stephen Cobb stephen.cobb@eset.comWeLiveSecurity.com

Thank you!

top related