33
The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity Education & Awareness KeyBank

The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity

The Hacking AgeDestruction, Profiting, and Stealing in the Cyber-Era

David Kennedy Founder TrustedSec / Binary Defense@HackingDave

Tammy GedetsisCybersecurity Education & AwarenessKeyBank

Page 2: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity
Page 3: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity

Tammy Gedetsis is a Senior Information Security Consultant at KeyBank. She has been at KeyBank for 21 years doing a variety of roles focused on business clients and their digital experience. She recently started a new role where she’ll be responsible for the Cybersecurity Education & Awareness programs for employees, consumer and business clients. Prior to this role, Tammy was the Senior Digital Product Manager for Key’s corporate digital platform, KeyNavigator where she was responsible for strategy and delivery of commercial products and services. Her focus in that role was on security and the client experience.

For Placement Only.See ‘Applying a Brand Photo to a Title Slide Layout’ in the B2B presentation

guidelines document for instructions on adding an image from the Key

photo library to a Title Slide Master.

Page 4: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity
Page 5: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity
Page 6: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity
Page 7: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity
Page 8: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity

Introduction

Page 9: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity

Breakout Timeframe

• Binary Defense analyzed over 3,912 breakout methods over a span of a year of 2018.

• Average attacker broke out of initial compromise and established foothold in under 2 hours (1.43 hours on average).

• Primary method for lateral movement was through lower level protocols.

• Majority of initial compromises (81%) was due to macros and attachments. Malicious websites and links in e-mail was the second highest percentage (11%).

Page 10: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity

Password Usage• Users using the same password across multiple

systems.• Password patterns – Summer2017, Summer2018.

Business Email Compromises• Compromising victims through password harvesting

then changing wire information.• Claiming to be an executive on a super secret M&A.• 314% increase from last year.

Ransomware• Holding computers hostage for monetary gain.• Spawned out of the credit carder (carder) market.

Data Theft• Centric around intellectual property or monetary

gain.

Main Attacks Today

What individuals have to face is a fraction of what an organization has to deal with on a daily basis.

Page 11: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity

Sophistication of Attackers

Continue to Progress.

Getting caught remains an

extremely low percentage.

Page 12: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity

People become one of the hardest challenges

in cyber security.

Page 13: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity
Page 14: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity

Demographics of Hackers

State Sponsored• Depends on the originating country.• Ranges from intelligence gathering to military

preparedness.

Organized Crime• PII/PHI has increased in cost in underground

(identity fraud).• Credit cards (albeit a bit more difficult).• IP theft and selling.• Selling compromised accounts.• Ransomware (huge boom).

General Hacking • Selling services such as customized malware.• Compromised accounts.

Page 15: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity

Detection has to become our biggest priority.

Page 16: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity

What can you do at home and at the office

to protect yourself?

Page 17: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity
Page 18: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity

Two-Factor Authentication

Probably one of the most important steps you can do right now, as I’m sitting here talking.

• Two-Step/Two-Factor Authentication is priority.

• Supported by almost all sites, Apple, Twitter, Banking, Facebook.

• If passwords are compromised – it doesn’t lead to the compromise of the account.

Page 19: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity

Two-Factor Authentication for Business

Page 20: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity

Same Password Usage

• Great site to see if your password/email address has been compromised or exposed in a breach:

• https://haveibeenpwned.com/

• Consider password vaults.

• Has to be different on each webpage.

Page 21: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity

Recommended Password Vaults

• 1Password - https://1password.com/

• KeePass (free) - https://keepass.info/

• LastPass - https://www.lastpass.com/

• Dashlane - https://www.dashlane.com/

Page 22: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity

Stay Up-To-Date with Patches

• This includes your mobile phones (Android, iPhone, etc.) as well as your Mac (OS X), and Windows.

• Updates fix very specific flaws that hackers have found or will develop soon.

• This includes Java, Adobe, Office products.

Page 23: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity

Stay Up-To-Date with Patches

• I’m going on vacation this week! It’s going to be awesome. Home empty.

• I’m waiting for this package, dang it!

• Daily rituals, patterns of behavior.

Page 24: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity

Personal Information

• Leaving personal information online can snag you in trouble.

• When a breach occurs, make sure to change your password.

• Consider services that monitor your credit activity and lock credit with credit providers.

Page 25: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity

Other Tips

• Wi-Fi Passwords and WPA2• Passphrases – not passwords:

• Think: I love running it’s awesome!• Think before you click.• Be careful with kids online.• iPhone better on security except for Pixel line of devices (Android).• Minimal operating systems such as Chromebooks/iPads are much more

difficult to compromise.

Page 26: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity

Some Are Difficult to Spot

Page 27: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity

Indicators of Bad Stuff

Image: Dropsuite.com

Page 28: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity

Look Where You Are Going

Image: Mabzickle.com

Page 29: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity

Attachments and Links #1 Delivery Method

Page 30: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity

Online Safety

• Safe and Secure Online• Free resources available for

learning more about cyber security.

• Kids can learn as well – Garfield sponsored.

• Great resource to learn more about cyber security:• https://safeandsecureonline.org/

Page 31: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity

Lots of Opportunity

• Third-party software on top of traditional email security is paramount.• Two-Factor Authentication• Email Security• Protection against Phishing.

• Email continues to be a driving force for attack with hackers.

• Reducing the attack surface on email reduces the risk for organizations.

• It’s never been more important to protect the user population and the enterprise.

Page 32: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity

Moving Forward

• Companies and individuals need to focus on their highest probabilities for attack.

• Normal protections aren’t going to cut it for even average attackers.

Page 33: The Hacking Age · The Hacking Age Destruction, Profiting, and Stealing in the Cyber-Era David Kennedy Founder TrustedSec / Binary Defense @HackingDave Tammy Gedetsis Cybersecurity

Resources

• https://haveibeenpwned.com/• https://safeandsecureonline.org/• https://programs.online.utica.edu/articles/TenWaysToProtectYourIdentity• https://www.theguardian.com/technology/2016/dec/15/protect-passwords-

two-step-verification-encryption-digital-life-privacy• https://www.pcmag.com/article2/0,2817,2407168,00.asp• http://www.businessinsider.com/author/david-kennedy