Transcript
Page 1: Why do THEY want your digital devices?

Stephen Cobb, CISSPSecurity Evangelist

Why THEY wantyour digital devices

Page 2: Why do THEY want your digital devices?

To own your network?

Page 3: Why do THEY want your digital devices?

36 ways to abuse hacked devices• Spam zombie• DDoS extortion zombie• Click fraud zombie• Anonymization proxy• CAPTCHA solving zombie

• eBay/PayPal fake auctions• Online gaming credentials• Website FTP credentials• Skype/VoIP credentials• Encryption certificates

• Fake antivirus• Ransomware• Email account ransom• Webcam image extortion

• Bank account data• Credit card data• Stock and 401K accounts• Wire transfer data

• Phishing site• Malware download site• Warez piracy server• Child porn server• Spam site

• Harvest email contacts• Harvest associated accounts• Access to corporate email• Webmail spam• Stranded abroad scams

• Facebook• Twitter• LinkedIn • Google+

• Online gaming characters• Online gaming goods/$$$• PC game license keys• OS license key

Based on original work by Brian Krebs: krebsonsecurity.com

Webserver

Botnetactivity

Email attacks

Virtualgoods

Reputationhijacking

Financial credentials

Hostage attacks

Account credentials

Page 4: Why do THEY want your digital devices?

IMPACTADVANTAGEMONEY

CREDENTIALS

Page 5: Why do THEY want your digital devices?

Verizon 2012 Data Breach Investigations Report

1 to 10

101 to 1,000

10,001 to 100,000

0 100 200 300 400 500 600

720 breaches by size of organization (em-ployees)

SMBs

Page 6: Why do THEY want your digital devices?

The SMB sweet spot for the cyber-criminally inclined

Assets worthlooting

Level of protection

Big enterprise

SMB “sweet

spot”

Consumers

Page 7: Why do THEY want your digital devices?

How do they get to your devices?

1. Malware involved in 69% of breaches2. Hacking* used in 81% of breaches

Breaches combining malware and hacking: 61%

Verizon 2012 Data Breach Investigations Report

*80% of hacking is passwords: default, missing, guessed, stolen, cracked

Page 8: Why do THEY want your digital devices?

Tools of the trade

Page 9: Why do THEY want your digital devices?
Page 10: Why do THEY want your digital devices?

Thriving markets for credentials

Page 11: Why do THEY want your digital devices?

Hot markets for hacked devices

Page 12: Why do THEY want your digital devices?

All driven by proven business strategies

Specialization Modularity

Division of labor Standards

Markets

Page 13: Why do THEY want your digital devices?

So how do you defend your devices?

Two main attacks…. …and defenses

Scanning

Authentication

Malware

Hacking

Page 14: Why do THEY want your digital devices?

Scanning requires proper implementation

Scan devices while connected

Scan devices prior to connection

Require AV on mobile devices

0% 5% 10% 15% 20% 25% 30% 35% 40%

Measures in use at a sample of healthcare facili-ties

Ponemon Institute Third Annual Benchmark Study on Patient Privacy & Data Security

Page 15: Why do THEY want your digital devices?

Authentication requires more than passwords

Passwords exposed in 2012: 75,000,000And those are just the ones we know aboutNeed to add a second factor to authentication

Page 16: Why do THEY want your digital devices?

The defenses you need

SMART Scanning

STRONG Authentication

Malware

Hacking

Plus polices and training to implement effectively

Page 17: Why do THEY want your digital devices?

Stephen Cobb [email protected]

Thank you!


Top Related