6. Interfering on Precedential
Election 2016
A group of Hackers have exposed Countless private e-
mails from the Democratic National Committee at the
time of precedential election 2016.
6
14. 75% don’t have cyber security
response plan
66% are not confident in their
organization’s ability to recover
from an attack
15.
16. 16
Hacker Groups of the World
Fancy Bear
• Rival Agency
of Russian Spy
service
• Exposed
private emails
of Democratic
National
Committee.
Lazarus Group
• Associated with
North Korea.
• Stolen money
from Bangladesh
Bank account
• Hacked Sony
picture
Entertainment.
Equation Group
• Associated with
National Security
Agency
• The name was
given by kaspersky
antivirus firm.
Comment Crew
• A part of People’s
liberation army.
• Habit of hide in
comment.
Sandworm
• Believed to
associated with
Russians.
• Shut down a
power Ukraine last
year.
17. In 2014, Uber was breached and
the information of 1,00,00 drivers
was leaked
18. Playing
Defense In 2017, an Uber employee reported
suspicious E-mail
Similar type of information was
flooding into the company
29. An Industry is Born
29
❑Darktrace uses artificial intelligence to detect aberrant activity on
clients network
❑Hackers captured the microphone remotely and were using it to
spy on every board meeting
30. An Industry is Born
30
• Tanium let the company know who is on their network
• Palo Alto Networks makes a kind intelligent firewall
Newcomers
31. 31
With all of firepower arrayed against it, how
can cybercrime continue to grow so fast?
32. 32
Breaking the defense
• One answer is that glitzy defense systems don’t work as
advertised
• Poor process of implementation
33. There will always be someone who clicks
on a message like, “Uh-oh. Did you see
these pictures from office party?”
33
Breaking the defense
36. 36
- Cyber security experts.
- Established in 2009 but officially announced in 2014.
37. “Project Zero”
- “Zero day”.
- Companies and peoples have had no time
- Fixing immediately
37
38. Reporting bugs
Activity of ”Project Zero”
38
Testing & Bug finding
Online Advertising “Protecting internet users from
threats means protecting the
ability of company to serve
those users”
Report without any public
announcement
Software code testing
39. 39
- Error, failure, faults.
- “Vulnerabilities”
- Giving access.
- By using bugs, hacker may hack.
Bug !
40. Former Head of Google Chrome Security: Chris Evans
“The foundations for Project Zero were laid across years of thoughtful lunchtime
conversations and years of observing the evolution of attacks”
40
Origin of
Project Zero
41. Operation Aurora
Simple timeline
Chinese Government Fault in Microsoft Patching fault
Targeted tech titans Reported to Microsoft
41
Sponsored hackers
Attacked, breached,
steal and attempted to
spy
In order to fix
Internet Explorer 6 After waiting seven
months
42. Bug in Oracle
In 2010, Ormandy find bugs in Oracle’s Java software
42