information security - may 2019...harvest email addresses, contact information, etc. delivery...

63
Information Security May 2019

Upload: others

Post on 22-Jun-2020

14 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

Information Security May 2019

Page 2: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 2

Michael ReynoldsChief Information Security Officer

Banking and Financial Services (BFS)

IntroductionsWith you today is…

Scott SchwartzInformation Security Manager

Banking and Financial Services (BFS)

Page 3: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 3

Information Security…It’s a challenge for everyone.

Government Business Individuals

Page 4: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 4

We must not and will not wait for

a catastrophic cyber incident

before we act to prevent future

attacks.Malcolm Turnbull, Former Prime Minster of Australia

January 2017

https://www.abc.net.au/news/2017-01-24/turnbull-declares-cyber-security-the-new-frontier-of-warfare/8207494

Government

Page 5: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 5

I don’t know that much about

cyber, but I do think that it’s the

number one problem with

mankind.Warren Buffett, Berkshire Hathaway CEO

July 2017

https://www.businessinsider.com.au/warren-buffett-cybersecurity-berkshire-hathaway-meeting-2017-5?r=US&IR=T

Business

Page 6: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 6

BusinessLandMark White data breach (2019)

Source: ComputerWorld (2019) https://www.computerworld.com.au/article/658758/landmark-white-ceo-exits-after-data-breach

LMW last month entered an indefinite

trading halt while it assessed the impact

of the data breach, which led to client

data being posted on a darkweb forum.

Page 7: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 7

BusinessLandMark White data breach (2019)

Source: ComputerWorld (2019) https://www.computerworld.com.au/article/658758/landmark-white-ceo-exits-after-data-breach

LandMark White’s chief executive officer

has left the property valuation firm after a

decade and a half with the company.“

Page 8: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 8

BusinessLandMark White data breach (2019)

Source: ComputerWorld (2019) https://www.computerworld.com.au/article/658758/landmark-white-ceo-exits-after-data-breach

Australia’s major banks suspended their

use of LMW in the wake of the breach.“

Page 9: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 9Source: ASX. Date Accessed: 3rd May 2019

Indefinite trading halt

– still in effect now.

LandMark White data breach (2019)Business

Page 10: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 10

When the hacking thing happened,

it was so unbelievably violating

that you can’t even put it into

words.Jennifer Lawrence – Speaking about her 2014 iCloud Hack.

November 2017

“https://www.allure.com/story/jennifer-lawrence-calls-nude-photo-hack-unbelievably-violating?verso=true

Individuals

Page 11: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 11

I lost some money to the internets.

This man from Telstra told me my

computer was infected with viruses.

I paid him to fix it but he lied.Anonymous elderly citizen, actress’ photo.

2018

“Individuals

Someone’s Nanna, Christmas Lunch, within the last few years.

Page 12: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 12

What is the

threat

landscape?

Page 13: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 13

Threats affecting business securitySecurity faces threats both inside and out of your business.

External

Threats

Internal

Threats

Page 14: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 14

Threats affecting business securitySecurity faces threats both inside and out of your business.

External

Threats

Internal

Threats

Insiders

Page 15: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 15

Threats affecting business securitySecurity faces threats both inside and out of your business.

External

Threats

Internal

Threats

Insiders

Change

Page 16: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 16

Threats affecting business securitySecurity faces threats both inside and out of your business.

External

Threats

Internal

Threats

Insiders

Change

Legacy

Tech

Page 17: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 17

Threats affecting business securitySecurity faces threats both inside and out of your business.

Hackers

External

Threats

Internal

Threats

Insiders

Change

Legacy

Tech

Page 18: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 18

Threats affecting business securitySecurity faces threats both inside and out of your business.

Laws

Hackers

External

Threats

Internal

Threats

Insiders

Change

Legacy

Tech

Page 19: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 19

Threats affecting business securitySecurity faces threats both inside and out of your business.

Digital Supply

Chain

Laws

Hackers

External

Threats

Internal

Threats

Insiders

Change

Legacy

Tech

Page 20: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 20

Why are medium sized

businesses a target?

Private

Investors

Medium sized

businesses

Banks and

Big Corporations

Too small Too big Just right.

Page 21: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 21

Who is

attacking us?

Page 22: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 22

Where are we being attacked from?Attacks come from everywhere but there are countries worse than others.

OriginBy volume, based on current attribution. Top

12 countries. Jul – Sept 2018.

Source: Akamai

Page 23: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 23

When you think of a hacker, you probably think of this?*

Page 24: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 24

Who is attacking us?The four most common hacker types and their motivation?

SCRIPT

KIDDIESHACKTIVIST

ORGANISED

CRIME

STATE

SPONSORED

Increasing resources and sophistication

Page 25: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 25

Who is attacking us?Hackers are not who you’d think, and come from a wide variety of backgrounds.

34%have been hacking for more than 10

years

How long have you been hacking?

1-3 years 10%

4-6 years 19%

7-10 years 16%

11-13 years 10%

14-17 years 9%

17+ years 15%

NUIX (2018) The Black Report: Decoding the mind of hackers.

Page 26: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 26

Who is attacking us?Hackers are not who you’d think, and come from a wide variety of backgrounds.

What is your highest level of traditions education?

43%College graduate

32%Postgraduate

14%Highschool

graduate6%

Formal

education is

for suckers

5%Other

NUIX (2018) The Black Report: Decoding the mind of hackers.

Page 27: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 27NUIX (2018) The Black Report: Decoding the mind of hackers.

Who is attacking us?Hackers are not who you’d think, and come from a wide variety of backgrounds.

Why do you hack?

86% 35% 21% 6%I like the

challenge –

I hack to learn

I hack for

the lulz

I hack for

financial gainI hack for social

or political moves

Page 28: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 28

How are they

attacking us?

Page 29: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 29

How are they doing it?Hackers chain exploit and attacks together to target an organisation.

In Security communities, this is known as the “Cyber Kill Chain”.

Weaponisation

Setting up web server to

download and run ransomware

on users computer.

Example of a Ransomware Kill Chain

Exploitation

Utilising an security vulnerability

within Windows to run

ransomware.

Command and Control (C2)

Confirm connection to control

server for remote decryption once

ransom is paid.

Reconnaissance

Harvest email addresses, contact

information, etc.

Delivery

Sending the email to a mailing list

of compromised email addresses.

Installation

Installs relevant files and control

kit to encrypt data on machine.

Actions on Objectives

Only decrypt files once ransom

has been paid to bitcoin wallet.

Lockheed Martin (2013)

Page 30: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 30

How are they doing it?Hackers use and combine many different vectors to attack a company,

ranging from simple to the most complicated.

Phishing,

“Sms-ishing”

and Extortion

Malware RansomwareSupply Chain

AttacksEmail

Compromise

Page 31: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

Phishing, “SMS-ishing” and ExtortionThe easiest way to get something done. Ask nicely and convincingly.

Page 32: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

Phishing

Compromised LinkedIn account sending phishing

messages to their network.

Phishing comes in all forms, such as sending messages on social media.

Page 33: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 33

PhishingPhishing is most common via emails.

Page 34: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 34

Page 35: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

SMS-ishing

SMS with a phishing link with

approximate location of target to

build trust.

Putting a phish right into your hand with fewer red flags to spot.

Page 36: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

Link redirects to a Coles site asking

for your details to redeem a “gift”…

in French.

SMS-ishingPutting a phish right into your hand with fewer red flags to spot.

Page 37: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 37

SMS-ishingSMS-ishing can also be downright dumb sometimes though.

Page 38: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 38

Extortion Phishing

Phishing email

purporting to have the

users password.

Creating panic to get action using your own breached credentials against you.

Page 39: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 39

Phisher threatens to

leak video of user

viewing adult content.

Extortion Phishing

Phishing email

purporting to have the

users password.

Creating panic to get action using your own breached credentials against you.

Page 40: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 40

Phisher threatens to

leak video of user

viewing adult content.

Phisher demands a

ransom paid via

Bitcoin.

Extortion Phishing

Phishing email

purporting to have the

users password.

Creating panic to get action using your own breached credentials against you.

Page 41: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 41

Email CompromiseWant to look convincing? Take over someone’s digital identifier.

Page 42: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 42

Email CompromiseTaking over an email account gives a wealth of information on a person, their

business and their finances.

Page 43: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 43

Email CompromiseWhat would happen if your vendor was compromised and requested a change to

their bank account details?

Page 44: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 44

Email CompromiseSmart hackers will use what they find in your email inbox to add legitimacy to their

scams. Some don’t do it as well as others.

Page 45: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 45

MalwareNasty computer software with a long list of uses.

Page 46: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 46

MalwareIt’s a catch all term for malicious computer software.

Viruses Worms Spyware

Adware Hijackers Trojans

Page 47: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 47

MalwareWhat can it do?

Download malicious software, files to your computer or

steal your data.

FireEye (2014) Poison Ivy: Assessing Damage and Extracting Intelligence

Attackers NetworkMalware and

malicious files

Your sensitive files

Your computers

and servers

Page 48: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 48

MalwareWhat can it do?

Hand over your passwords and take control of your computer.

FireEye (2014) Poison Ivy: Assessing Damage and Extracting Intelligence

Big Brother is

always watching

and listening.

Page 49: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 49

RansomwarePay or your data gets it.

Page 50: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 50

RansomwarePay or your data gets it.

Page 51: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 51

RansomwareThe things we learnt from calling a ransomware helpline

#1 – They don’t normally negotiate

Martin, A. (2016) Here are 11 things we learned from a ransomware helpline https://www.crn.com.au/news/here-are-11-things-we-learned-from-a-ransomware-help-line-453078

Page 52: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 52Martin, A. (2016) Here are 11 things we learned from a ransomware helpline https://www.crn.com.au/news/here-are-11-things-we-learned-from-a-ransomware-help-line-453078

RansomwareThe things we learnt from calling a ransomware helpline

#2 - … except when Bitcoin rates move

Page 53: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 53

RansomwareThe things we learnt from talking to a ransomware helpline

Martin, A. (2016) Here are 11 things we learned from a ransomware helpline https://www.crn.com.au/news/here-are-11-things-we-learned-from-a-ransomware-help-line-453078

#3 – Customer service is important to them.

Page 54: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 54

RansomwareThe things we learnt from talking to a ransomware helpline

#4 – Oddly, they recommend installing anti-virus

Martin, A. (2016) Here are 11 things we learned from a ransomware helpline https://www.crn.com.au/news/here-are-11-things-we-learned-from-a-ransomware-help-line-453078

Page 55: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 55

Supply Chain AttacksIf we can’t get you directly, let’s use your third parties.

Page 56: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 56

Supply Chain AttacksTechnology doesn’t just stop at the walls of your office.

Using third parties adds additional risks to your organisation.

Typical setup of a Software-as-a-Service (SaaS) offering

Vendor(develops software)

Cloud Hosting Provider(app server, database)

App Support Service(helps your team with

issues)

Data Centre

Manager

Web Application

Firewall Provider

Your businessInternet Service

Providers

Page 57: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

PAGE 57

How can you

build a cyber

smart business?

Page 58: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

1Remember, bad actors

are everywhere.

Page 59: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

2Get your people set up

for successGeneral Staff

Build Awareness

Technology Staff

Train on Security

Security Staff

Get Certified in

Security

Page 60: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

3Define your risk appetite and

align your investment to a framework.

Cyber Security Framework

Page 61: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

4Invest in securing crown jewels,

not just everything.

Page 62: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

What can we do about it?5Be sceptical. Don’t take

everything on face value.

Page 63: Information Security - May 2019...Harvest email addresses, contact information, etc. Delivery Sending the email to a mailing list of compromised email addresses. Installation Installs

Questions?Thank you.