SlideShare una empresa de Scribd logo
1 de 29
Copyright © 2013. Accuvant, Inc. All Rights Reserved
Copyright © 2013. Accuvant, Inc. All Rights Reserved
Not Sci ence Fi ct i on
The Need f or a Secur i t y Al l y




             Copyright © 2013. Accuvant, Inc. All Rights Reserved
Agenda

Accuvant:
   •   Who am I?
   •   Operation: High Roller
   •   Debrief
   •   Soldiers win the Battles, Allies win the wars
Tactics & techniques:
   •   Issues currently seen from the field
   •   Prediction time!
Conclusions




                           Copyright © 2013. Accuvant, Inc. All Rights Reserved
Jef f Dani el son

Computer Forensics specialist since 2003 and is a Security
Evangelist for a large national research-driven security partner. 

Previously, Jeff was a Principal Solutions Consultant for a
leading Computer Forensics/eDiscovery and Cybersecurity
software solutions corporation as well as a lead investigator at a
Large financial services organization. 



Certifications

•SANS GIAC Certified Forensic Analyst (GCFA)

•GIAC Certified Incident Handler (GCIH)

•EnCase certified Forensic Examiner (EnCE)

•EnCase certified eDiscovery Practitioner (EnCEP).



                         Copyright © 2013. Accuvant, Inc. All Rights Reserved
I n t he bl i nk of an eye
Oper at i on Hi gh- Rol l er




          Copyright © 2013. Accuvant, Inc. All Rights Reserved
Ol d Tr i cks

The usual suspects:
                                                               Definition Spyeye: A proxyhorse A
                                                                Definition Zues: A Trojan Trojan
                                                                       Definition Spear Phishing:
                                                                            Man-in-the-Browser:
   •   Multiple Attack Strategies                             thattype that infectsinformationon a
                                                               Process of banking credentials for
                                                                 horse to attack thatweb browser
                                                                    steals harvest a focuses by
   •   Phish/Spear Phishing email                               online accounts and also initiateof
                                                                Man-in-the-browser keystroke
                                                                         single user oradvantage
                                                                             by taking department
                                                             logging and Form Grabbing. security
                                                               transactionswithin an organization,
                                                                vulnerabilities in person is logged
                                                                              as a browser Zeus is
   •   Utilization of Past Malware
                                                             into their mainly through drive-by it
                                                                spread account, literally someone
                                                                      to modify web pages, modify
                                                                          addressed from making
       •   Zeus                                                downloadswithin content or insert
                                                                  possible to watch their bank in a
                                                                      transaction the company
                                                                            and phishing schemes.
       •   SpyEye                                             First identified in by the second. inita
                                                                  balance drop July 2007 of all
                                                                     additional transactions, trust.
                                                                                   position when
                                                              was used to steal information from
                                                               completely covert fashion invisible
   •   Man-in-the-browser
                                                               the to bothStates Departmentweb
                                                                    United the user and host of
                                                                         Transportation   application.


   Non-patched systems was
   the biggest culprit.



                            Copyright © 2013. Accuvant, Inc. All Rights Reserved
New Skewl

New and Improved:
                                                                    Fraudulent Server: A server
                                                                      Automation allowed repeated  The
  •   Server-side components                                    that interacts with the has been
                                                                   client-side malware kills banking
                                                                   thefts once the system the links
  •   Heavy automation                                            launched at a portal to process
                                                                                   given bank or for a
                                                                      to printable statements. It also
                                                                    banking searches for and erases
                                                                            the actual The account
                                                                              platform. transaction
  •   Targeted to Large accounts (1M+                           data is always updated confirmation
                                                                                          and current
      balance) with heavy utilization.                                                     (including
                                                                       emails and email copies of the
  •   Automated Bypass of Two-Factor
                                                                        account login). Normally
                                                                  statement. Finally, it also changes
      Physical Authentication                                   located in a crime-friendly ISP,
                                                                        the transactions, transaction
                                                                           and moved frequently.
                                                                                               values,
  •   Links and code are obfuscated
                                             and account balance in the
  •   Small Population               statement displayed on the victim’s
  •   Avoid Fraud Detection and Hide    screen so the amounts are what
      Evidence                                                       the
                                         account holder expects to see.


                           Copyright © 2013. Accuvant, Inc. All Rights Reserved
Debr i ef

Fast Moving

Highly Knowledgeable of Banking processes

Focused and targeted

Hybrid Automation
   •   Spear Phishing
   •   Bank Account Usage Analysis

Highly Creative techniques, no new code.




The Focus is on small to medium-sized businesses and wealthy
consumers



                         Copyright © 2013. Accuvant, Inc. All Rights Reserved
A St or m I s Her e
W Secur i t y Consul t ant s?
      hy




15             Copyright © 2013. Accuvant, Inc. All Rights Reserved
Sol di er s W n Bat t l es
             i

  •   Specialists are key.
  •   Tools and Weapons
  •   “Thin and wide” vs “Deep and Narrow”
  •   Internal Battles should not be overlooked.




       “Soldiers win the battle, the generals get the credit for
                                                         them”
                                         -Napoleon Bonaparte

                             Copyright © 2013. Accuvant, Inc. All Rights Reserved
Al l i es W n The W
           i       ar

 •   Cyber Threat Intelligence
      •   Attribution “Who is attacking you”
      •   Regional and Vertical Partners
 •   Maturity of Weapons
      •   Can you
          •   Communicate Risk?
          •   Value of Weapons?
 •   Free or Commercial Intelligence?
 •   Be open to Trusted Advisors
 •   Get a good understanding of what is working, and what is
     not in the industry
 •   Build a good relationship with local, state, and federal Law
     Enforcement.
                           Copyright © 2013. Accuvant, Inc. All Rights Reserved
Debr i ef

Targeted Attacks increasing
   •   Red October                                      Made popularin inthe 2012, Focused
                                                        Operation started2010, yetand was
                                                         First detected June recent believe
                                                         Discovered by in 2007 attacks
                                                        foundbe middle-eastInfiltrated over
                                                         on Twitter, Facebook andStuxnet
                                                           toon Dec 2012. 2009*, banking
                                                                in older than online Apple.
   •   Stuxnet                                          records, capablefocused on nucleur
                                                             This attack of stealing
                                                                 1K+ High level government
                                                        was aimed at Iran’s Natanz specific
   •   Watering Hole attacks                               datacomputers and likelyfocused
                                                             users browser habits and were
                                                                     plant. Most was from a
                                                                  such as passwords, banking
                                                          infected by malware Nation/State
                                                            credentials, cookiesdownloaded
                                                                   specifically on government
                                                                                    and specific
   •   Gauss
                                                        when the user clicked on normally
                                                                 esponiage, most likely from
                                                                                 configurations.
                                                              Hactivist groups, trusted links.
                                                                                   but could be
                                                              supported by a private firm or
                                                                                  rogue nation.
   Current Global IT Security spend is 60 Billion

   Visibility and Maturity of IT Security programs is necessary.

   Everyone is now a target, not just highly visible targets.




                         Copyright © 2013. Accuvant, Inc. All Rights Reserved
Toget her a W W n*
Or have      e i
             Chance
I ss ues Seen i n t he Fi el d
I ssues

 •   Time
     •   Vet Security Partner (s)
         •   References
             •   External Vendors
             •   Vertical Professionals
         •   Why only one?
     •   Daily security vs Security projects
         •   Vice-versa
 •   Money
     •   Talk to the Asset owner
     •   Executive Buy-In program
     •   Threat Intelligence Report
                                Copyright © 2013. Accuvant, Inc. All Rights Reserved
Pr edi ct i ons f or 2013

 •   Legal will be put on “notice”
     •   IT Security will be brought under the Legal umbrella
 •   Fundamental Shifting
     •   The Bad Actors
     •   Containment
     •   Push to Pull




 •   Security is a Critical Business Function

     2015 The Int ernet w l l no l onger be a ri ght , i t w l l
                         i                                  i
                           be a pri vi l ege

                          Copyright © 2013. Accuvant, Inc. All Rights Reserved
Questions & Answers




      Copyright © 2013. Accuvant, Inc. All Rights Reserved
Thank You




              Jef f Dani el s on

          Sec uri t y Evangel i s t

        GCIH GCFA, EnCE, EnCEP
            ,

                 970- 407- 8307

       j dani el s on@ Ac c uvant . c om


              Copyright © 2013. Accuvant, Inc. All Rights Reserved
Copyright © 2013. Accuvant, Inc. All Rights Reserved
Copyright © 2013. Accuvant, Inc. All Rights Reserved
Copyright © 2013. Accuvant, Inc. All Rights Reserved
Copyright © 2013. Accuvant, Inc. All Rights Reserved
Copyright © 2013. Accuvant, Inc. All Rights Reserved

Más contenido relacionado

La actualidad más candente

Do You Write Secure Code? by Erez Metula
Do You Write Secure Code? by Erez MetulaDo You Write Secure Code? by Erez Metula
Do You Write Secure Code? by Erez MetulaAlphageeks
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Systems, Inc.
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4OracleIDM
 
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Systems, Inc.
 
Cisco Social Media
Cisco Social MediaCisco Social Media
Cisco Social MediaMona Westrum
 
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Systems, Inc.
 
Hitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Systems, Inc.
 
Monitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring OptionsMonitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring OptionsIBM India Smarter Computing
 
Fy09 Sask Tel Learn It Ie7 And Ie8 Joel Semeniuk
Fy09 Sask Tel Learn It   Ie7 And Ie8   Joel SemeniukFy09 Sask Tel Learn It   Ie7 And Ie8   Joel Semeniuk
Fy09 Sask Tel Learn It Ie7 And Ie8 Joel Semeniuksim100
 
Hp Fortify Pillar
Hp Fortify PillarHp Fortify Pillar
Hp Fortify PillarEd Wong
 

La actualidad más candente (12)

Do You Write Secure Code? by Erez Metula
Do You Write Secure Code? by Erez MetulaDo You Write Secure Code? by Erez Metula
Do You Write Secure Code? by Erez Metula
 
Soc july-2012-dmitri-botvich
Soc july-2012-dmitri-botvichSoc july-2012-dmitri-botvich
Soc july-2012-dmitri-botvich
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4
 
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
 
Cisco Social Media
Cisco Social MediaCisco Social Media
Cisco Social Media
 
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
 
Hitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioning
 
Defining Enterprise Identity Management
Defining Enterprise Identity ManagementDefining Enterprise Identity Management
Defining Enterprise Identity Management
 
Monitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring OptionsMonitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring Options
 
Fy09 Sask Tel Learn It Ie7 And Ie8 Joel Semeniuk
Fy09 Sask Tel Learn It   Ie7 And Ie8   Joel SemeniukFy09 Sask Tel Learn It   Ie7 And Ie8   Joel Semeniuk
Fy09 Sask Tel Learn It Ie7 And Ie8 Joel Semeniuk
 
Hp Fortify Pillar
Hp Fortify PillarHp Fortify Pillar
Hp Fortify Pillar
 

Destacado

Spelling Week 8
Spelling Week 8Spelling Week 8
Spelling Week 8petproject
 
conference presentation
conference presentationconference presentation
conference presentationAreeb Javed
 
Violence in videogames presentation
Violence in videogames presentationViolence in videogames presentation
Violence in videogames presentationpw93
 
Versionfinal publicacionmapa2002 (1)
Versionfinal publicacionmapa2002 (1)Versionfinal publicacionmapa2002 (1)
Versionfinal publicacionmapa2002 (1)Ajlher AJ
 
Orchnii himi
Orchnii himiOrchnii himi
Orchnii himishartai
 
الترم الثانى المحولات الكهربية
الترم الثانى المحولات الكهربيةالترم الثانى المحولات الكهربية
الترم الثانى المحولات الكهربيةeng_tamer
 
How To Sell More Stuff. 10 Must-read Social Selling Infographics
How To Sell More Stuff. 10 Must-read Social Selling InfographicsHow To Sell More Stuff. 10 Must-read Social Selling Infographics
How To Sell More Stuff. 10 Must-read Social Selling InfographicsGerry Moran
 

Destacado (10)

Spelling Week 8
Spelling Week 8Spelling Week 8
Spelling Week 8
 
Ch1
Ch1Ch1
Ch1
 
conference presentation
conference presentationconference presentation
conference presentation
 
Violence in videogames presentation
Violence in videogames presentationViolence in videogames presentation
Violence in videogames presentation
 
Versionfinal publicacionmapa2002 (1)
Versionfinal publicacionmapa2002 (1)Versionfinal publicacionmapa2002 (1)
Versionfinal publicacionmapa2002 (1)
 
SINGER; Rihanna
SINGER; RihannaSINGER; Rihanna
SINGER; Rihanna
 
Pla financer DreamRest
Pla financer DreamRestPla financer DreamRest
Pla financer DreamRest
 
Orchnii himi
Orchnii himiOrchnii himi
Orchnii himi
 
الترم الثانى المحولات الكهربية
الترم الثانى المحولات الكهربيةالترم الثانى المحولات الكهربية
الترم الثانى المحولات الكهربية
 
How To Sell More Stuff. 10 Must-read Social Selling Infographics
How To Sell More Stuff. 10 Must-read Social Selling InfographicsHow To Sell More Stuff. 10 Must-read Social Selling Infographics
How To Sell More Stuff. 10 Must-read Social Selling Infographics
 

Similar a Operation High Roller: The need for a security ally!

Spiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout sessionSpiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout sessionShane Rice
 
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBMUndgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBMIBM Danmark
 
Hitachi ID Solutions Support GLB Compliance
Hitachi ID Solutions Support GLB ComplianceHitachi ID Solutions Support GLB Compliance
Hitachi ID Solutions Support GLB ComplianceHitachi ID Systems, Inc.
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formulaOracleIDM
 
NetAuthority Brochure
NetAuthority BrochureNetAuthority Brochure
NetAuthority BrochureVivastream
 
Hitachi ID Solutions Supporting SOX Compliance
Hitachi ID Solutions Supporting SOX ComplianceHitachi ID Solutions Supporting SOX Compliance
Hitachi ID Solutions Supporting SOX ComplianceHitachi ID Systems, Inc.
 
OpenFlow, the Android of Networking?
OpenFlow, the Android of Networking?OpenFlow, the Android of Networking?
OpenFlow, the Android of Networking?jasonlackey
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYjmical
 
Modern Lessons in Security Monitoring
Modern Lessons in Security MonitoringModern Lessons in Security Monitoring
Modern Lessons in Security MonitoringAnton Goncharov
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityJon Bultmeyer
 
How to Stop Man in the Browser Attacks
How to Stop Man in the Browser AttacksHow to Stop Man in the Browser Attacks
How to Stop Man in the Browser AttacksImperva
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Managementjustinkallhoff
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012Nicolai Henriksen
 
VMware - Snapshot sessions - Deploy and manage tomorrow's applications today
VMware - Snapshot sessions  - Deploy and manage tomorrow's applications todayVMware - Snapshot sessions  - Deploy and manage tomorrow's applications today
VMware - Snapshot sessions - Deploy and manage tomorrow's applications todayAnnSteyaert_vmware
 

Similar a Operation High Roller: The need for a security ally! (20)

Intro to Identity Management
Intro to Identity ManagementIntro to Identity Management
Intro to Identity Management
 
Spiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout sessionSpiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout session
 
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBMUndgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
 
Hitachi ID Solutions Support GLB Compliance
Hitachi ID Solutions Support GLB ComplianceHitachi ID Solutions Support GLB Compliance
Hitachi ID Solutions Support GLB Compliance
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formula
 
NetAuthority Brochure
NetAuthority BrochureNetAuthority Brochure
NetAuthority Brochure
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
Hitachi ID Solutions Supporting SOX Compliance
Hitachi ID Solutions Supporting SOX ComplianceHitachi ID Solutions Supporting SOX Compliance
Hitachi ID Solutions Supporting SOX Compliance
 
Jon ppoint
Jon ppointJon ppoint
Jon ppoint
 
One of 2 protect your business
One of 2 protect your businessOne of 2 protect your business
One of 2 protect your business
 
OpenFlow, the Android of Networking?
OpenFlow, the Android of Networking?OpenFlow, the Android of Networking?
OpenFlow, the Android of Networking?
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
 
Software newsletter
Software newsletterSoftware newsletter
Software newsletter
 
Cloud security
Cloud securityCloud security
Cloud security
 
Modern Lessons in Security Monitoring
Modern Lessons in Security MonitoringModern Lessons in Security Monitoring
Modern Lessons in Security Monitoring
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile Identity
 
How to Stop Man in the Browser Attacks
How to Stop Man in the Browser AttacksHow to Stop Man in the Browser Attacks
How to Stop Man in the Browser Attacks
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012
 
VMware - Snapshot sessions - Deploy and manage tomorrow's applications today
VMware - Snapshot sessions  - Deploy and manage tomorrow's applications todayVMware - Snapshot sessions  - Deploy and manage tomorrow's applications today
VMware - Snapshot sessions - Deploy and manage tomorrow's applications today
 

Operation High Roller: The need for a security ally!

  • 1. Copyright © 2013. Accuvant, Inc. All Rights Reserved
  • 2. Copyright © 2013. Accuvant, Inc. All Rights Reserved
  • 3. Not Sci ence Fi ct i on
  • 4. The Need f or a Secur i t y Al l y Copyright © 2013. Accuvant, Inc. All Rights Reserved
  • 5. Agenda Accuvant: • Who am I? • Operation: High Roller • Debrief • Soldiers win the Battles, Allies win the wars Tactics & techniques: • Issues currently seen from the field • Prediction time! Conclusions Copyright © 2013. Accuvant, Inc. All Rights Reserved
  • 6. Jef f Dani el son Computer Forensics specialist since 2003 and is a Security Evangelist for a large national research-driven security partner.  Previously, Jeff was a Principal Solutions Consultant for a leading Computer Forensics/eDiscovery and Cybersecurity software solutions corporation as well as a lead investigator at a Large financial services organization.  Certifications •SANS GIAC Certified Forensic Analyst (GCFA) •GIAC Certified Incident Handler (GCIH) •EnCase certified Forensic Examiner (EnCE) •EnCase certified eDiscovery Practitioner (EnCEP). Copyright © 2013. Accuvant, Inc. All Rights Reserved
  • 7. I n t he bl i nk of an eye
  • 8. Oper at i on Hi gh- Rol l er Copyright © 2013. Accuvant, Inc. All Rights Reserved
  • 9. Ol d Tr i cks The usual suspects: Definition Spyeye: A proxyhorse A Definition Zues: A Trojan Trojan Definition Spear Phishing: Man-in-the-Browser: • Multiple Attack Strategies thattype that infectsinformationon a Process of banking credentials for horse to attack thatweb browser steals harvest a focuses by • Phish/Spear Phishing email online accounts and also initiateof Man-in-the-browser keystroke single user oradvantage by taking department logging and Form Grabbing. security transactionswithin an organization, vulnerabilities in person is logged as a browser Zeus is • Utilization of Past Malware into their mainly through drive-by it spread account, literally someone to modify web pages, modify addressed from making • Zeus downloadswithin content or insert possible to watch their bank in a transaction the company and phishing schemes. • SpyEye First identified in by the second. inita balance drop July 2007 of all additional transactions, trust. position when was used to steal information from completely covert fashion invisible • Man-in-the-browser the to bothStates Departmentweb United the user and host of Transportation application. Non-patched systems was the biggest culprit. Copyright © 2013. Accuvant, Inc. All Rights Reserved
  • 10.
  • 11. New Skewl New and Improved: Fraudulent Server: A server Automation allowed repeated The • Server-side components that interacts with the has been client-side malware kills banking thefts once the system the links • Heavy automation launched at a portal to process given bank or for a to printable statements. It also banking searches for and erases the actual The account platform. transaction • Targeted to Large accounts (1M+ data is always updated confirmation and current balance) with heavy utilization. (including emails and email copies of the • Automated Bypass of Two-Factor account login). Normally statement. Finally, it also changes Physical Authentication located in a crime-friendly ISP, the transactions, transaction and moved frequently. values, • Links and code are obfuscated and account balance in the • Small Population statement displayed on the victim’s • Avoid Fraud Detection and Hide screen so the amounts are what Evidence the account holder expects to see. Copyright © 2013. Accuvant, Inc. All Rights Reserved
  • 12.
  • 13. Debr i ef Fast Moving Highly Knowledgeable of Banking processes Focused and targeted Hybrid Automation • Spear Phishing • Bank Account Usage Analysis Highly Creative techniques, no new code. The Focus is on small to medium-sized businesses and wealthy consumers Copyright © 2013. Accuvant, Inc. All Rights Reserved
  • 14. A St or m I s Her e
  • 15. W Secur i t y Consul t ant s? hy 15 Copyright © 2013. Accuvant, Inc. All Rights Reserved
  • 16. Sol di er s W n Bat t l es i • Specialists are key. • Tools and Weapons • “Thin and wide” vs “Deep and Narrow” • Internal Battles should not be overlooked. “Soldiers win the battle, the generals get the credit for them” -Napoleon Bonaparte Copyright © 2013. Accuvant, Inc. All Rights Reserved
  • 17. Al l i es W n The W i ar • Cyber Threat Intelligence • Attribution “Who is attacking you” • Regional and Vertical Partners • Maturity of Weapons • Can you • Communicate Risk? • Value of Weapons? • Free or Commercial Intelligence? • Be open to Trusted Advisors • Get a good understanding of what is working, and what is not in the industry • Build a good relationship with local, state, and federal Law Enforcement. Copyright © 2013. Accuvant, Inc. All Rights Reserved
  • 18. Debr i ef Targeted Attacks increasing • Red October Made popularin inthe 2012, Focused Operation started2010, yetand was First detected June recent believe Discovered by in 2007 attacks foundbe middle-eastInfiltrated over on Twitter, Facebook andStuxnet toon Dec 2012. 2009*, banking in older than online Apple. • Stuxnet records, capablefocused on nucleur This attack of stealing 1K+ High level government was aimed at Iran’s Natanz specific • Watering Hole attacks datacomputers and likelyfocused users browser habits and were plant. Most was from a such as passwords, banking infected by malware Nation/State credentials, cookiesdownloaded specifically on government and specific • Gauss when the user clicked on normally esponiage, most likely from configurations. Hactivist groups, trusted links. but could be supported by a private firm or rogue nation. Current Global IT Security spend is 60 Billion Visibility and Maturity of IT Security programs is necessary. Everyone is now a target, not just highly visible targets. Copyright © 2013. Accuvant, Inc. All Rights Reserved
  • 19. Toget her a W W n* Or have e i Chance
  • 20. I ss ues Seen i n t he Fi el d
  • 21. I ssues • Time • Vet Security Partner (s) • References • External Vendors • Vertical Professionals • Why only one? • Daily security vs Security projects • Vice-versa • Money • Talk to the Asset owner • Executive Buy-In program • Threat Intelligence Report Copyright © 2013. Accuvant, Inc. All Rights Reserved
  • 22. Pr edi ct i ons f or 2013 • Legal will be put on “notice” • IT Security will be brought under the Legal umbrella • Fundamental Shifting • The Bad Actors • Containment • Push to Pull • Security is a Critical Business Function 2015 The Int ernet w l l no l onger be a ri ght , i t w l l i i be a pri vi l ege Copyright © 2013. Accuvant, Inc. All Rights Reserved
  • 23. Questions & Answers Copyright © 2013. Accuvant, Inc. All Rights Reserved
  • 24. Thank You Jef f Dani el s on Sec uri t y Evangel i s t GCIH GCFA, EnCE, EnCEP , 970- 407- 8307 j dani el s on@ Ac c uvant . c om Copyright © 2013. Accuvant, Inc. All Rights Reserved
  • 25. Copyright © 2013. Accuvant, Inc. All Rights Reserved
  • 26. Copyright © 2013. Accuvant, Inc. All Rights Reserved
  • 27. Copyright © 2013. Accuvant, Inc. All Rights Reserved
  • 28. Copyright © 2013. Accuvant, Inc. All Rights Reserved
  • 29. Copyright © 2013. Accuvant, Inc. All Rights Reserved

Notas del editor

  1. The marketplace is crowded with companies offering assessment services under various names. But while they all claim to do roughly the same thing, not all security assessments are created equal. Accuvant has built a successful assessment practice by employing the best assessment team in the industry. Accuvant’s assessment resources are security industry thought leaders, several are published authors, all have years of information security experience, and all have benefited from a broad exposure to different client environments, consulting methodologies, assessment techniques, and security technologies. Accuvant combines this talent and experience with an innovative approach to produce the most cost-effective and comprehensive assessment offerings in the industry