SlideShare una empresa de Scribd logo
1 de 21
Descargar para leer sin conexión
Anatomy of a

Cyber Attack
Understanding how the bad guys break into
your network and wreak havoc

Created by Mark Silver

Bringing Fortune 20 experience to you
Why should
you care?
Cyber criminals and
some State-sponsored
agencies want your
information assets as a
shortcut to creating
wealth
Who is this presentation for?
Boards of directors
Executive Management
Professionals interested
in understanding cyber
crime
Agenda
Overview of “Anatomy of a Cyber Attack”
Insight to each major step of the attack
Principles of security that you can apply
References
About the author
Attack
Overview
5 Steps
1. Reconnaissance
2. Infiltration, intrusion and advanced attacks
3. Malware deployment
4. Data extraction
5. Cleanup
Reconnaissance
Attacker will focus on “who”, or the network:
“Who” will likely focus on privileged individuals (either
for system access, or access to confidential data
“Network” will focus on architecture and layout; tools,
devices and protocols; and critical infrastructure
It’s like a military operation: attackers want to understand
their target, it’s operations, processes and flaws.
Infiltration — The Targets
Typical Case Study

Who are the board members and
executives?
Can the individual access company
secrets that have commercial value?
Where do they work?
What information and systems do they
have access to?
Where do they hang out?
Are they on the speaking circuit, or an
occasional panelist?

Attackers will focus on high-value targets and their
activities. They will want to know if executives have access
to company strategies, legal strategies, or high-value
intellectual property, or critical company systems.
Then they will focus on where can the target be accessed?
For example, some executives are regular members of
certain business or country clubs, providing motivated
attackers with physical access to the target. Objectives can
range from befriending them to start a relationship, to a
sales call with a free market report on a USB drive that also
contents malware (quite feasible), to an abduction for
ransom (rarer, and depends on country).
USB drives with malware, or simply an email with the
attacker’s URL that also contains malware, are particularly
dangerous as such malware can be custom-written, thus
not being detected by today’s antivirus software. With this
custom malware implemented, attackers now have access
to the corporate network in a way that is difficult to detect
or correct.
Infiltration — The Network
Attackers want to know the trust relationships in the
network, and then how to exploit them
Who can make changes (system administrators) to
critical business applications? Think CRM, ERP, HR
What is the security like? Which tools are in use? How
often? On which systems? How to compromise trust?
Preparing the attack
Once people and networks have been researched, the attacker prepares
custom malware
Attackers use software development life cycles to develop custom code
to achieve objectives undetected
Attackers test, refine, retest etc to make sure attack is long-lasting,
undetected, effective and efficient
It’s naive to assume attackers are disaffected teens. Crime syndicates
pay hackers better than corporations do. Attackers are well resourced,
funded and highly organized.
There is now evidence of a sophisticated hacker economy.
Malware testing
Attackers know corporations deploy security software
that scans for known malware
So they download known malware, change it by adding
new code or changing existing code
Attackers create virtual copies or the target environment
and test their malware to see if it escapes company
security software
Year on year, malware threat alerts grew by 14%
Malware deployment
Security experts say 80% of malware is uniquely
present in one company (i.e. 20% of malware uses
known “signatures”; 80% is custom malware)
99% of mobile malware targets Android smartphones
Java comprises 90% of all web-based threats
Watering hole traps being used to target vertical
industry sectors
Extraction
Once malware deployed, evidence for many corporations
shows
99% of corporations are not aware of malware
communication
99% of corporations did not detect malware on their own
Malware now targets critical information assets (business
strategies, IP, patents, emails, legal strategies, product design,
customer lists etc.) encrypts the content and sends it outside
the network
Cleanup
Once the attacker has the information they want, they
may consider cleaning up evidence of their presence
(log files, accounts, permissions etc)
However, in many cases, attacks are persistent,
avoiding attention and detection and remain on the
network for years, continuing to siphon valuable data.
Effective security strategies
Strong focus on risk management. As risk to the business increases, more
rigor around consistent application of process and policy should be
implemented.
Information Security leadership needs business savvy, strong risk
understanding, and ability to communicate across organizational boundaries
to build trust, understanding and consensus with business partners.
Information Security requires executive management focus, funding and
support. Information Security should not be “buried” in the organization, but
understood by the board and senior management.
Information Security processes should be embedded in all IT and business
processes (not regarded as an afterthought).
Security strategies (2)
Rigorously document the network, servers, applications,
protocols, endpoints and trusts.
Assume a breach will occur, but build a program for steady
state operations, during the attack, and post-attack activity.
Principles of least trust for accounts (trust users and
systems enough to do their work, but no more).
Continue with the basics: patching and correct
configuration of networked devices
Security strategies (3)
Defense in depth using information security infrastructures critical.
Attributes include:
Implement tools that provide integrated solutions, not point of
activity analysis
Rigorous validation of network trust relationships
Typical components include: antivirus, firewalls, intrusion detection
systems (IDS), intrusion protection system (IPS), encryption,
automated patch management, mobile device management,
strong user authentication, and end-user security training
Big data analytics to catch and aggregate multiple separate
security events for correlation and meaningful analysis
Benefits
Secure product brings commercial advantage
Demonstrating security as part of supply chain brings
commercial advantage
Limits risk to the organization, it’s business partners
and its employees
It’s more cost effective to protect information than to
litigate after its compromise. (Once the horse is bolted..
Reference
In preparing this presentation, I used my own 20 years of IT experience, security work and the following as reference material. I’ve
provided dates when I secured the documentation, and web addresses when I had them:
The 7 best habits of effective security pros, CSO Online, Jan 9, 2014, http://www.csoonline.com/article/print/745655
Anatomy of a Cyber Attack, The Strategies and Tools of Cyber Criminals and how to stop them, Dell Software, January 8, 2014 at
12:57 PM, http://resources.idgenterprise.com/original/AST-0100349_EB_Anatomy_of_a_CyberAttack.pdf
Four Keys to Effective 'Next-Generation' Security, October 17, 2013 at 4:35 PM, Source Fire web publication
InfoSec Defense in Depth, CDW.com, Jan 8, 2014, http://resources.idgenterprise.com/original/
AST-0104557_NC_DefenseInDepth_0508.pdf
Nine Critical Threats Against Mobile Workers, Marble, December 19, 2013 at 5:01 PM, http://resources.idgenterprise.com/
original/AST-0105397_MS_Nine_Threats_2013_0212.pdf
NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations
Predictions and Protection Capabilities to Consider While Preparing for Advanced Malware in 2014
Securing Executives and Highly Sensitive Documents of Corporations Globally, December 6, 2013 at 11:23 PM, http://
f6ce14d4647f05e937f4-4d6abce208e5e17c2085b466b98c2083.r3.cf1.rackcdn.com/securing-executives-highly-sensitivedocuments-corporations-globally-pdf-w-871.pdf
Taking a Proactive Approach to Today’s Cyber Threats - Deloitte CIO - WSJ, http://deloitte.wsj.com/cio/2013/05/14/taking-aproactive-approach-to-todays-cyber-threats/
The author: Mark Silver
Mark is an international business executive who
understands business, process, and using
technology to drive business value while managing
risk. Mark holds a Master of Business degree from
the Queensland University of Technology, from
Queensland Australia. He has worked in 16
countries (much of Europe, Americas, AsiaPac)
and speaks two languages (English and German).
Having worked for a Fortune 20 company,
governments, and medium sized businesses,
Mark's focus for the past 30 years has been on
building profitable business processes leveraging
enterprise IT systems and infrastructure as both a
CIO, CISO, Compliance Officer and Privacy Officer.
Mark can be contacted through Linked In at
www.linkedin.com/in/markasilver/ and is happy to
provide executive briefings and discuss managing
risk as either a keynote speaker or panelist.
Anatomy of a cyber attack

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
cyber security
cyber security cyber security
cyber security
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Cyber security
Cyber securityCyber security
Cyber security
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar a Anatomy of a cyber attack

Information Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfInformation Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdf
forladies
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System

Similar a Anatomy of a cyber attack (20)

Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Information Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfInformation Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdf
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
 
Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptx
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of CompromiseInsight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
185
185185
185
 
What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVault
 
Contending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security ModelContending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security Model
 
Application security testing an integrated approach
Application security testing   an integrated approachApplication security testing   an integrated approach
Application security testing an integrated approach
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptx
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Corporate threat vector and landscape
Corporate threat vector and landscapeCorporate threat vector and landscape
Corporate threat vector and landscape
 
Cyber.pptx
Cyber.pptxCyber.pptx
Cyber.pptx
 
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
 

Último

FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Dipal Arora
 

Último (20)

VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Phases of negotiation .pptx
 Phases of negotiation .pptx Phases of negotiation .pptx
Phases of negotiation .pptx
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 

Anatomy of a cyber attack

  • 1. Anatomy of a Cyber Attack Understanding how the bad guys break into your network and wreak havoc Created by Mark Silver
 Bringing Fortune 20 experience to you
  • 2. Why should you care? Cyber criminals and some State-sponsored agencies want your information assets as a shortcut to creating wealth
  • 3. Who is this presentation for? Boards of directors Executive Management Professionals interested in understanding cyber crime
  • 4. Agenda Overview of “Anatomy of a Cyber Attack” Insight to each major step of the attack Principles of security that you can apply References About the author
  • 6. 5 Steps 1. Reconnaissance 2. Infiltration, intrusion and advanced attacks 3. Malware deployment 4. Data extraction 5. Cleanup
  • 7. Reconnaissance Attacker will focus on “who”, or the network: “Who” will likely focus on privileged individuals (either for system access, or access to confidential data “Network” will focus on architecture and layout; tools, devices and protocols; and critical infrastructure It’s like a military operation: attackers want to understand their target, it’s operations, processes and flaws.
  • 8. Infiltration — The Targets Typical Case Study Who are the board members and executives? Can the individual access company secrets that have commercial value? Where do they work? What information and systems do they have access to? Where do they hang out? Are they on the speaking circuit, or an occasional panelist? Attackers will focus on high-value targets and their activities. They will want to know if executives have access to company strategies, legal strategies, or high-value intellectual property, or critical company systems. Then they will focus on where can the target be accessed? For example, some executives are regular members of certain business or country clubs, providing motivated attackers with physical access to the target. Objectives can range from befriending them to start a relationship, to a sales call with a free market report on a USB drive that also contents malware (quite feasible), to an abduction for ransom (rarer, and depends on country). USB drives with malware, or simply an email with the attacker’s URL that also contains malware, are particularly dangerous as such malware can be custom-written, thus not being detected by today’s antivirus software. With this custom malware implemented, attackers now have access to the corporate network in a way that is difficult to detect or correct.
  • 9. Infiltration — The Network Attackers want to know the trust relationships in the network, and then how to exploit them Who can make changes (system administrators) to critical business applications? Think CRM, ERP, HR What is the security like? Which tools are in use? How often? On which systems? How to compromise trust?
  • 10. Preparing the attack Once people and networks have been researched, the attacker prepares custom malware Attackers use software development life cycles to develop custom code to achieve objectives undetected Attackers test, refine, retest etc to make sure attack is long-lasting, undetected, effective and efficient It’s naive to assume attackers are disaffected teens. Crime syndicates pay hackers better than corporations do. Attackers are well resourced, funded and highly organized. There is now evidence of a sophisticated hacker economy.
  • 11. Malware testing Attackers know corporations deploy security software that scans for known malware So they download known malware, change it by adding new code or changing existing code Attackers create virtual copies or the target environment and test their malware to see if it escapes company security software Year on year, malware threat alerts grew by 14%
  • 12. Malware deployment Security experts say 80% of malware is uniquely present in one company (i.e. 20% of malware uses known “signatures”; 80% is custom malware) 99% of mobile malware targets Android smartphones Java comprises 90% of all web-based threats Watering hole traps being used to target vertical industry sectors
  • 13. Extraction Once malware deployed, evidence for many corporations shows 99% of corporations are not aware of malware communication 99% of corporations did not detect malware on their own Malware now targets critical information assets (business strategies, IP, patents, emails, legal strategies, product design, customer lists etc.) encrypts the content and sends it outside the network
  • 14. Cleanup Once the attacker has the information they want, they may consider cleaning up evidence of their presence (log files, accounts, permissions etc) However, in many cases, attacks are persistent, avoiding attention and detection and remain on the network for years, continuing to siphon valuable data.
  • 15. Effective security strategies Strong focus on risk management. As risk to the business increases, more rigor around consistent application of process and policy should be implemented. Information Security leadership needs business savvy, strong risk understanding, and ability to communicate across organizational boundaries to build trust, understanding and consensus with business partners. Information Security requires executive management focus, funding and support. Information Security should not be “buried” in the organization, but understood by the board and senior management. Information Security processes should be embedded in all IT and business processes (not regarded as an afterthought).
  • 16. Security strategies (2) Rigorously document the network, servers, applications, protocols, endpoints and trusts. Assume a breach will occur, but build a program for steady state operations, during the attack, and post-attack activity. Principles of least trust for accounts (trust users and systems enough to do their work, but no more). Continue with the basics: patching and correct configuration of networked devices
  • 17. Security strategies (3) Defense in depth using information security infrastructures critical. Attributes include: Implement tools that provide integrated solutions, not point of activity analysis Rigorous validation of network trust relationships Typical components include: antivirus, firewalls, intrusion detection systems (IDS), intrusion protection system (IPS), encryption, automated patch management, mobile device management, strong user authentication, and end-user security training Big data analytics to catch and aggregate multiple separate security events for correlation and meaningful analysis
  • 18. Benefits Secure product brings commercial advantage Demonstrating security as part of supply chain brings commercial advantage Limits risk to the organization, it’s business partners and its employees It’s more cost effective to protect information than to litigate after its compromise. (Once the horse is bolted..
  • 19. Reference In preparing this presentation, I used my own 20 years of IT experience, security work and the following as reference material. I’ve provided dates when I secured the documentation, and web addresses when I had them: The 7 best habits of effective security pros, CSO Online, Jan 9, 2014, http://www.csoonline.com/article/print/745655 Anatomy of a Cyber Attack, The Strategies and Tools of Cyber Criminals and how to stop them, Dell Software, January 8, 2014 at 12:57 PM, http://resources.idgenterprise.com/original/AST-0100349_EB_Anatomy_of_a_CyberAttack.pdf Four Keys to Effective 'Next-Generation' Security, October 17, 2013 at 4:35 PM, Source Fire web publication InfoSec Defense in Depth, CDW.com, Jan 8, 2014, http://resources.idgenterprise.com/original/ AST-0104557_NC_DefenseInDepth_0508.pdf Nine Critical Threats Against Mobile Workers, Marble, December 19, 2013 at 5:01 PM, http://resources.idgenterprise.com/ original/AST-0105397_MS_Nine_Threats_2013_0212.pdf NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations Predictions and Protection Capabilities to Consider While Preparing for Advanced Malware in 2014 Securing Executives and Highly Sensitive Documents of Corporations Globally, December 6, 2013 at 11:23 PM, http:// f6ce14d4647f05e937f4-4d6abce208e5e17c2085b466b98c2083.r3.cf1.rackcdn.com/securing-executives-highly-sensitivedocuments-corporations-globally-pdf-w-871.pdf Taking a Proactive Approach to Today’s Cyber Threats - Deloitte CIO - WSJ, http://deloitte.wsj.com/cio/2013/05/14/taking-aproactive-approach-to-todays-cyber-threats/
  • 20. The author: Mark Silver Mark is an international business executive who understands business, process, and using technology to drive business value while managing risk. Mark holds a Master of Business degree from the Queensland University of Technology, from Queensland Australia. He has worked in 16 countries (much of Europe, Americas, AsiaPac) and speaks two languages (English and German). Having worked for a Fortune 20 company, governments, and medium sized businesses, Mark's focus for the past 30 years has been on building profitable business processes leveraging enterprise IT systems and infrastructure as both a CIO, CISO, Compliance Officer and Privacy Officer. Mark can be contacted through Linked In at www.linkedin.com/in/markasilver/ and is happy to provide executive briefings and discuss managing risk as either a keynote speaker or panelist.