SlideShare a Scribd company logo
1 of 38
Download to read offline
Information Systems Division and Technical Services Unit
                Digital Deadly Force
                Narrative of a Digital Life Destroyed




Matthew Jett Hall         Kevin Williams                         26 Oct 2012
Assistant Director, ISD   SAC, TSU
The Victim: Matt Honan

             “In the space of one
              hour, my entire
              digital life was
              destroyed.”
Who is Matt Honan

            Tech Journalist
            Highly cloud
             dependent
            Astute
            Tech Savvy
            Knows the rules of
             the road
The Harm
         Google account deleted.

         Twitter account
          compromised, and used to
          broadcast racist and
          homophobic messages.

         AppleID account was seized.
The Harm
         Wiped from existence

             iPhone
             MacBook Pro
             iPad
             Two years of baby pictures
Timeline: 3 Aug 12 @ 1633

          “… according to Apple’s
           tech support records,
           someone called
           AppleCare claiming to be
           me.”

          Apple issued the hacker a
           temporary password
Timeline: 3 Aug 12 @ 1650

          “password reset
           confirmation arrived in my
           inbox. … the hackers ….
           permanently reset my
           AppleID password.”
Timeline: 3 Aug 12 @ 1652

          “Gmail password …
           password had changed.
Timeline: 3 Aug 12 @ 1700

          “… they used iCloud’s
           “Find My” tool to remotely
           wipe my iPhone.”
Timeline: 3 Aug 12 @ 1700

          “my iPhone suddenly
           powered down.”

          “When I opened my
           laptop … my Gmail
           account information was
           wrong.”
Timeline: 3 Aug 12 @ 1702

          “they reset my Twitter
           password…”
Timeline: 3 Aug 12 @ 1705

          “they remotely wiped my
           MacBook.…”
Timeline: 3 Aug 12 @ 1705

          “they remotely wiped my
           MacBook.…”


          “… they deleted my
           Google account. “
Timeline: 3 Aug 12 @ 1710

          “I placed the call to
           AppleCare.”
Timeline: 3 Aug 12 @ 1712

          “attackers posted a
           message to my account
           on Twitter taking credit for
           the hack.”
Why Matt Honan

        "I asked him why. Was I targeted
        specifically? Was this just to get to
        Gizmodo's Twitter account [that had been
        linked to mine]?

        No, Phobia said, they hadn't even been
        aware that my account was linked to
        Gizmodo's, that the Gizmodo linkage was
        just gravy.

        He said the hack was simply a grab for
        my three-character Twitter handle.
        That's all they wanted.

        They just wanted to take it, and [mess it]
        up, and watch it burn. It wasn't personal.”
Social Engineering

              “the art of
               manipulating people
               into performing
               actions or divulging
               confidential
               information”
The Sequence of Social
       1.   Amazon
       2.   Apple
       3.   Google
       4.   Twitter
Sara Palin 2008

         •   September 16, 2008
         •   Yahoo! Mail account of
             Sarah Palin
         •   Cracked by “Rubico”
         •   Social Engineering
         •   From Date of Birth Info
             on Wikipedia
TBI’s CIA

   Confidentiality
   Integrity
   Availability
Identity

              Non-repudiation

              Access

              Factors of Identification
                 Something you know
                 Something you have
                 Something you are
Password and PIN

   “Something you know”

   “a secret word or string of characters that is
    used for authentication, to prove identity or
    gain access to a resource”
Password Fatigue

        •   Excessive amount of
            passwords

        •   Leads to careless
            password or pin
            construction
PIN Formulation
         PIN       Freq
#1    1234     10.713%    •   Usually 4 digits
#2    1111      6.016%    •   Don’t use common
#3    0000      1.881%
#4    1212      1.197%
                              PINs
#5    7777      0.745%    •   Don’t use personal
#6    1004      0.616%
#7    2000      0.613%
                              information
#8    4444      0.526%        • SSN
#9    2222      0.516%
                              • Birthdate
#10   6969      0.512%
                              • Birth year
Password Formulation
•   A`?KUJ'j
•   47k0O#qt
•   4'vn1iSA   •   Passwords must contain
•   nwDSB/OL       characters from three of the
•   5*vFXggx
•   tF0ylI59       these categories:
•   PvmYk^k
•   $;T+qha2
•
•
    UnJJ:8c8
    bU4DuwUM
               •   Password generator in KeePass
•   bU1H&@56   •   Upper Case Character
•
•
    BeU;i$X;
    4q+!kkgg
               •   Lower Case Character
•   $qDsrT35   •   Base 10 Digit (0 through 9)
•   %:WbFlzk
•   HRvqt9j9   •   Non-alphanumeric characters:
•   RcgR^cMt       • ~!@#$%^&*_-+=`|(){}[]:;"'<>,.?/
•   dM/`nxR
Password Formulation
•   A`?KUJ'j
•   47k0O#qt
•   4'vn1iSA   •   Since these are tough
•   nwDSB/OL
•   5*vFXggx
•   tF0ylI59   •   Try a PassPhrase:
•   PvmYk^k
•   $;T+qha2
•
•
    UnJJ:8c8
    bU4DuwUM
               •   SteveFound4ApplesAndAFlute@hischair
•   bU1H&@56   •   6TacosAreDelicious@YourLocalTacoMart
•   BeU;i$X;
•   4q+!kkgg
•   $qDsrT35
•   %:WbFlzk
•   HRvqt9j9
•   RcgR^cMt
•   dM/`nxR
Where to Store Passwords

                 •   Password
                     Vault

                 •   In your
                     mind!
Password Commandments

Thou shalt …
1. construct a complex
   password
2. Use a password vault
3. Use dual factor
   authentication
4. Protect thy mobile
   devices
Password Commandments

       Thou Shalt Not ….
       1. Share thy Password
       2. Use thy dog’s name
       3. Write passwords on
          sticky notes
       4. Use common words
       5. Keep passwords in
          word documents
Before you lose a device ….

        Learn if the device has “find
         me” features
        Encrypt critical data at rest
        Think carefully about what
         goes on the device
        Don’t let unauthorized
         personnel utilize your device
        Lock your device whenever
         you step away
If you lose a device ….

   Report it immediately

   BAD NEWS DOES NOT AGE WELL!
   FASTER RESPONSE THE BETTER

   Consumer in Control
      Apple: iCloud.com
      Microsoft Exchange
      Blackberry: No self service
Example: iCloud
If you lose a device ….

   Locate it
If you lose a device ….

   If you can’t retrieve it, wipe it!
Data Classification Concept

   Impact to the TBI Mission
      High
      Medium
      Low


   High
      Reputation and Credibility
      Exposing Personal Information
      Exposing Sensitive Operations Information
On cloud computing

           It’s here
           It’s not going away

               Windows 8
               SkyDrive
               DropBox
               Google Drive
               Google Applications
               iCloud
On cloud computing

         Guidance

             No PII
             Nothing Mission Sensitive
             Experiment and learn
             Preserve CIA
             REALLY read terms of
              service
References

   “How Apple and Amazon Security Flaws Led to My Epic Hacking” Wired Magazine August 6, 2012
    http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/
   Flickr Baby Photo: http://goo.gl/q2hSO
   Datagenetics.com PIN Anlaysis: http://goo.gl/bCGGW
   Security Now Episode 364: Twit.tv
   Security Now Episode 364: Transcript from grc.com
   Apple iCloud How to: http://www.apple.com/icloud/setup/ios.html
   Apple iCloud: icloud.com
   Sara Palin Email Hack: http://en.wikipedia.org/wiki/Sarah_Palin_email_hack
   Clipart: openclipart.org
   Social Engineering: http://en.wikipedia.org/wiki/Social_engineering_(security)
   Password: http://en.wikipedia.org/wiki/Password

More Related Content

What's hot

Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerAnonDownload
 
Protecting your privacy online county leadership conference
Protecting your privacy online  county leadership conferenceProtecting your privacy online  county leadership conference
Protecting your privacy online county leadership conferenceMolly Immendorf
 
Internet use issues
Internet use issues Internet use issues
Internet use issues computers 11
 
Protecting your privacy online
Protecting your privacy onlineProtecting your privacy online
Protecting your privacy onlineMolly Immendorf
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsMarian Merritt
 
Molly protecting your privacy online county leadership conference
Molly protecting your privacy online  county leadership conferenceMolly protecting your privacy online  county leadership conference
Molly protecting your privacy online county leadership conferencecetechservices
 
McAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalists
McAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalistsMcAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalists
McAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalistsMcAfee_UK
 
Online Security & Privacy: Updated
Online Security & Privacy: UpdatedOnline Security & Privacy: Updated
Online Security & Privacy: UpdatedAmanda L. Goodman
 
11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe onlineScott Schober
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and securityDjTechs
 
online spying tools
online spying toolsonline spying tools
online spying toolsDeepa Jacob
 
Pii2012 jim adler_may15_lightningtalk
Pii2012 jim adler_may15_lightningtalkPii2012 jim adler_may15_lightningtalk
Pii2012 jim adler_may15_lightningtalkpii2011
 
Using Social networks for Recruiting
Using Social networks for RecruitingUsing Social networks for Recruiting
Using Social networks for RecruitingJason Frostholm
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationJeff Zahn
 
WCC 2012: General security introduction for non-security students
WCC 2012: General security introduction for non-security studentsWCC 2012: General security introduction for non-security students
WCC 2012: General security introduction for non-security studentsJoel Cardella
 

What's hot (17)

Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messenger
 
Protecting your privacy online county leadership conference
Protecting your privacy online  county leadership conferenceProtecting your privacy online  county leadership conference
Protecting your privacy online county leadership conference
 
Internet use issues
Internet use issues Internet use issues
Internet use issues
 
Protecting your privacy online
Protecting your privacy onlineProtecting your privacy online
Protecting your privacy online
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwords
 
Molly protecting your privacy online county leadership conference
Molly protecting your privacy online  county leadership conferenceMolly protecting your privacy online  county leadership conference
Molly protecting your privacy online county leadership conference
 
McAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalists
McAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalistsMcAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalists
McAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalists
 
Online Security & Privacy: Updated
Online Security & Privacy: UpdatedOnline Security & Privacy: Updated
Online Security & Privacy: Updated
 
11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
online spying tools
online spying toolsonline spying tools
online spying tools
 
Pii2012 jim adler_may15_lightningtalk
Pii2012 jim adler_may15_lightningtalkPii2012 jim adler_may15_lightningtalk
Pii2012 jim adler_may15_lightningtalk
 
Using Social networks for Recruiting
Using Social networks for RecruitingUsing Social networks for Recruiting
Using Social networks for Recruiting
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
 
WCC 2012: General security introduction for non-security students
WCC 2012: General security introduction for non-security studentsWCC 2012: General security introduction for non-security students
WCC 2012: General security introduction for non-security students
 

Similar to Digital Deadly Force: How A Tech Expert Lost his Digital Life to a Hacker

Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Luis Grangeia
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidErnest Staats
 
Personal Data Security in a Digital World
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital Worldalxdvs
 
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Reining in the Data   ITAG tech360 Penn State Great Valley 2015 Reining in the Data   ITAG tech360 Penn State Great Valley 2015
Reining in the Data ITAG tech360 Penn State Great Valley 2015 Andrew Schwabe
 
Pragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebPragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebJamie Reffell
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulAndrew Schwabe
 
Technology in a global society presentation
Technology in a global society presentationTechnology in a global society presentation
Technology in a global society presentationdelmount
 
(Ab)using Identifiers: Indiscernibility of Identity
(Ab)using Identifiers: Indiscernibility of Identity(Ab)using Identifiers: Indiscernibility of Identity
(Ab)using Identifiers: Indiscernibility of IdentityBayCHI
 
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?Garland Technology
 
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?Mark Fisher
 
Protecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency KeysProtecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency Keysdimitrist
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoJohn Bambenek
 
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWVA HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWVAdam Compton
 
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Andrew Schwabe
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleJarrod Overson
 

Similar to Digital Deadly Force: How A Tech Expert Lost his Digital Life to a Hacker (20)

Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...
 
Do it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 PresentationDo it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 Presentation
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
IT Security Awareness Posters
IT Security Awareness PostersIT Security Awareness Posters
IT Security Awareness Posters
 
Personal Data Security in a Digital World
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital World
 
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Reining in the Data   ITAG tech360 Penn State Great Valley 2015 Reining in the Data   ITAG tech360 Penn State Great Valley 2015
Reining in the Data ITAG tech360 Penn State Great Valley 2015
 
Pragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebPragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the Web
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech Mogul
 
Technology in a global society presentation
Technology in a global society presentationTechnology in a global society presentation
Technology in a global society presentation
 
(Ab)using Identifiers: Indiscernibility of Identity
(Ab)using Identifiers: Indiscernibility of Identity(Ab)using Identifiers: Indiscernibility of Identity
(Ab)using Identifiers: Indiscernibility of Identity
 
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?
 
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?
 
Protecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency KeysProtecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency Keys
 
Social Engineering : To Err is Human...
Social Engineering : To Err is Human...Social Engineering : To Err is Human...
Social Engineering : To Err is Human...
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
 
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWVA HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
 
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycle
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 

More from Tennessee Bureau of Investigation

More from Tennessee Bureau of Investigation (20)

Darius Dwayne Hyde
Darius Dwayne HydeDarius Dwayne Hyde
Darius Dwayne Hyde
 
Rodney Jennings Jr.
Rodney Jennings Jr.Rodney Jennings Jr.
Rodney Jennings Jr.
 
Keith Jamar Thomas
Keith Jamar ThomasKeith Jamar Thomas
Keith Jamar Thomas
 
Rico Derell Sterling
Rico Derell SterlingRico Derell Sterling
Rico Derell Sterling
 
Stephen Daryl Melton
Stephen Daryl MeltonStephen Daryl Melton
Stephen Daryl Melton
 
Albert Jones Smith Jr.
Albert Jones Smith Jr.Albert Jones Smith Jr.
Albert Jones Smith Jr.
 
Deterines Cortae Cathey aka "Weeda"
Deterines Cortae Cathey aka "Weeda"Deterines Cortae Cathey aka "Weeda"
Deterines Cortae Cathey aka "Weeda"
 
Tiffany Lynne Jordan-Johnson
Tiffany Lynne Jordan-JohnsonTiffany Lynne Jordan-Johnson
Tiffany Lynne Jordan-Johnson
 
Dequan Bertrand
Dequan BertrandDequan Bertrand
Dequan Bertrand
 
Kevin Cooper Jr.
Kevin Cooper Jr.Kevin Cooper Jr.
Kevin Cooper Jr.
 
Tevin Mantez Harris aka Tevin "
Tevin Mantez Harris aka Tevin "Tevin Mantez Harris aka Tevin "
Tevin Mantez Harris aka Tevin "
 
Cedric Dion Laster Jr.
Cedric Dion Laster Jr.Cedric Dion Laster Jr.
Cedric Dion Laster Jr.
 
Top Ten Most Wanted Fugitive Alonso Howard
Top Ten Most Wanted Fugitive Alonso HowardTop Ten Most Wanted Fugitive Alonso Howard
Top Ten Most Wanted Fugitive Alonso Howard
 
Derrick Carr and Shawn Betty
Derrick Carr and Shawn BettyDerrick Carr and Shawn Betty
Derrick Carr and Shawn Betty
 
Jeffrey Lynn Carter Jr.
Jeffrey Lynn Carter Jr.Jeffrey Lynn Carter Jr.
Jeffrey Lynn Carter Jr.
 
Bounthavy Mickey Mouthouta
Bounthavy Mickey MouthoutaBounthavy Mickey Mouthouta
Bounthavy Mickey Mouthouta
 
Anthony Dean Blackwell
Anthony Dean BlackwellAnthony Dean Blackwell
Anthony Dean Blackwell
 
Tyler Raybon-Tate
Tyler Raybon-TateTyler Raybon-Tate
Tyler Raybon-Tate
 
Terrace Dewayne Shaw
Terrace Dewayne ShawTerrace Dewayne Shaw
Terrace Dewayne Shaw
 
David gordon jenkins
David gordon jenkinsDavid gordon jenkins
David gordon jenkins
 

Recently uploaded

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

Digital Deadly Force: How A Tech Expert Lost his Digital Life to a Hacker

  • 1. Information Systems Division and Technical Services Unit Digital Deadly Force Narrative of a Digital Life Destroyed Matthew Jett Hall Kevin Williams 26 Oct 2012 Assistant Director, ISD SAC, TSU
  • 2. The Victim: Matt Honan  “In the space of one hour, my entire digital life was destroyed.”
  • 3. Who is Matt Honan  Tech Journalist  Highly cloud dependent  Astute  Tech Savvy  Knows the rules of the road
  • 4. The Harm  Google account deleted.  Twitter account compromised, and used to broadcast racist and homophobic messages.  AppleID account was seized.
  • 5. The Harm  Wiped from existence  iPhone  MacBook Pro  iPad  Two years of baby pictures
  • 6. Timeline: 3 Aug 12 @ 1633  “… according to Apple’s tech support records, someone called AppleCare claiming to be me.”  Apple issued the hacker a temporary password
  • 7. Timeline: 3 Aug 12 @ 1650  “password reset confirmation arrived in my inbox. … the hackers …. permanently reset my AppleID password.”
  • 8. Timeline: 3 Aug 12 @ 1652  “Gmail password … password had changed.
  • 9. Timeline: 3 Aug 12 @ 1700  “… they used iCloud’s “Find My” tool to remotely wipe my iPhone.”
  • 10. Timeline: 3 Aug 12 @ 1700  “my iPhone suddenly powered down.”  “When I opened my laptop … my Gmail account information was wrong.”
  • 11. Timeline: 3 Aug 12 @ 1702  “they reset my Twitter password…”
  • 12. Timeline: 3 Aug 12 @ 1705  “they remotely wiped my MacBook.…”
  • 13. Timeline: 3 Aug 12 @ 1705  “they remotely wiped my MacBook.…”  “… they deleted my Google account. “
  • 14. Timeline: 3 Aug 12 @ 1710  “I placed the call to AppleCare.”
  • 15. Timeline: 3 Aug 12 @ 1712  “attackers posted a message to my account on Twitter taking credit for the hack.”
  • 16. Why Matt Honan "I asked him why. Was I targeted specifically? Was this just to get to Gizmodo's Twitter account [that had been linked to mine]? No, Phobia said, they hadn't even been aware that my account was linked to Gizmodo's, that the Gizmodo linkage was just gravy. He said the hack was simply a grab for my three-character Twitter handle. That's all they wanted. They just wanted to take it, and [mess it] up, and watch it burn. It wasn't personal.”
  • 17. Social Engineering  “the art of manipulating people into performing actions or divulging confidential information”
  • 18. The Sequence of Social 1. Amazon 2. Apple 3. Google 4. Twitter
  • 19. Sara Palin 2008 • September 16, 2008 • Yahoo! Mail account of Sarah Palin • Cracked by “Rubico” • Social Engineering • From Date of Birth Info on Wikipedia
  • 20. TBI’s CIA  Confidentiality  Integrity  Availability
  • 21. Identity  Non-repudiation  Access  Factors of Identification  Something you know  Something you have  Something you are
  • 22. Password and PIN  “Something you know”  “a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource”
  • 23. Password Fatigue • Excessive amount of passwords • Leads to careless password or pin construction
  • 24. PIN Formulation PIN Freq #1 1234 10.713% • Usually 4 digits #2 1111 6.016% • Don’t use common #3 0000 1.881% #4 1212 1.197% PINs #5 7777 0.745% • Don’t use personal #6 1004 0.616% #7 2000 0.613% information #8 4444 0.526% • SSN #9 2222 0.516% • Birthdate #10 6969 0.512% • Birth year
  • 25. Password Formulation • A`?KUJ'j • 47k0O#qt • 4'vn1iSA • Passwords must contain • nwDSB/OL characters from three of the • 5*vFXggx • tF0ylI59 these categories: • PvmYk^k • $;T+qha2 • • UnJJ:8c8 bU4DuwUM • Password generator in KeePass • bU1H&@56 • Upper Case Character • • BeU;i$X; 4q+!kkgg • Lower Case Character • $qDsrT35 • Base 10 Digit (0 through 9) • %:WbFlzk • HRvqt9j9 • Non-alphanumeric characters: • RcgR^cMt • ~!@#$%^&*_-+=`|(){}[]:;"'<>,.?/ • dM/`nxR
  • 26. Password Formulation • A`?KUJ'j • 47k0O#qt • 4'vn1iSA • Since these are tough • nwDSB/OL • 5*vFXggx • tF0ylI59 • Try a PassPhrase: • PvmYk^k • $;T+qha2 • • UnJJ:8c8 bU4DuwUM • SteveFound4ApplesAndAFlute@hischair • bU1H&@56 • 6TacosAreDelicious@YourLocalTacoMart • BeU;i$X; • 4q+!kkgg • $qDsrT35 • %:WbFlzk • HRvqt9j9 • RcgR^cMt • dM/`nxR
  • 27. Where to Store Passwords • Password Vault • In your mind!
  • 28. Password Commandments Thou shalt … 1. construct a complex password 2. Use a password vault 3. Use dual factor authentication 4. Protect thy mobile devices
  • 29. Password Commandments Thou Shalt Not …. 1. Share thy Password 2. Use thy dog’s name 3. Write passwords on sticky notes 4. Use common words 5. Keep passwords in word documents
  • 30. Before you lose a device ….  Learn if the device has “find me” features  Encrypt critical data at rest  Think carefully about what goes on the device  Don’t let unauthorized personnel utilize your device  Lock your device whenever you step away
  • 31. If you lose a device ….  Report it immediately  BAD NEWS DOES NOT AGE WELL!  FASTER RESPONSE THE BETTER  Consumer in Control  Apple: iCloud.com  Microsoft Exchange  Blackberry: No self service
  • 33. If you lose a device ….  Locate it
  • 34. If you lose a device ….  If you can’t retrieve it, wipe it!
  • 35. Data Classification Concept  Impact to the TBI Mission  High  Medium  Low  High  Reputation and Credibility  Exposing Personal Information  Exposing Sensitive Operations Information
  • 36. On cloud computing  It’s here  It’s not going away  Windows 8  SkyDrive  DropBox  Google Drive  Google Applications  iCloud
  • 37. On cloud computing  Guidance  No PII  Nothing Mission Sensitive  Experiment and learn  Preserve CIA  REALLY read terms of service
  • 38. References  “How Apple and Amazon Security Flaws Led to My Epic Hacking” Wired Magazine August 6, 2012 http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/  Flickr Baby Photo: http://goo.gl/q2hSO  Datagenetics.com PIN Anlaysis: http://goo.gl/bCGGW  Security Now Episode 364: Twit.tv  Security Now Episode 364: Transcript from grc.com  Apple iCloud How to: http://www.apple.com/icloud/setup/ios.html  Apple iCloud: icloud.com  Sara Palin Email Hack: http://en.wikipedia.org/wiki/Sarah_Palin_email_hack  Clipart: openclipart.org  Social Engineering: http://en.wikipedia.org/wiki/Social_engineering_(security)  Password: http://en.wikipedia.org/wiki/Password

Editor's Notes

  1. amazon: Call the customer service to add a credit card to his file.Amazon: hang up and call back. My account is locked out. Here is my credit card last four digits and billing address. Please add a new email address. Send account recovery to new email address.Amazon: log in with recovery info and reset password. Can see all the Credit Card numbers on file last 4 digits.Apple: Use original credit card last 4 digits and billing address after claiming amnesia on the security questions.Apple: He gets the mobile me accountGoogle: He goes to google. He resets the google mhonan@gmail.com and the reset is sent to the comprosomised apple mobile me EMAIL account.Twitter: Password reset to the compromised google account.