33
APT1 IN THE FINANCIAL SECTOR ONDREJ KREHEL

APT in the Financial Sector

Embed Size (px)

Citation preview

Page 1: APT in the Financial Sector

APT1 IN THE FINANCIAL SECTOR

ONDREJ KREHEL

Page 2: APT in the Financial Sector

ONDREJ KREHEL

CISSP, CEH, CEI

MANAGING DIRECTOR

LIFARS LLC

Twitter: @LIFARSLLC

Page 3: APT in the Financial Sector

Digital Firefighter

Page 4: APT in the Financial Sector

Talk Agenda

1 Introduction

2 Today’s APT Threat Landscape

3 Attacks and Stories

4 Questions & Answers

Page 5: APT in the Financial Sector

There are only two types of companies in the world: The ones that have been

hacked, and those that will be.

-FBI Director Robert Mueller

Page 6: APT in the Financial Sector

If you had to bet a $100 on someone to protect your private data, who would it

be?

Page 7: APT in the Financial Sector

I hope you weren’t thinking of betting on any of these …

Page 8: APT in the Financial Sector

D

A

T

A

B

R

E

A

C

H

Page 9: APT in the Financial Sector

Total cost of cybercrime is

on the rise across the

globe.0%

$3.67

$4.72

$5.19

$6.73

$7.56

$11.56

$3.33

$3.99

$5.93

$6.38

$6.91

$8.13

$12.69

Russia

Australia

United Kingdom

France

Japan

Germany

United States

Total cost of cybercrime in seven countries.In millions of US dollars. Based on results collected from 257 companies.

FY 2014 FY 2013No info on Russia in FY 2013

Data from the 2014 Global Report on the Cost of Cyber Crime by the Ponemon Institute

Page 10: APT in the Financial Sector

How often

cybersecurity

crosses one’s

mind…

Page 11: APT in the Financial Sector

THE CYBER EVENT HORIZON

Page 12: APT in the Financial Sector

The types of attacks

companies face.

35%

49%

49%

51%

52%

58%

59%

97%

98%

0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%

Malicious Insiders

Stolen Devices

Denial of Service

Malicious Code

Phishing & SE

Web-based Attacks

Botnets

Malware

Viruses, Worms, Trojans

Types of cyberattacks experiencedBased on results collected from 257 companies.

Percentage of experienced attacks

Data from the 2014 Global Report on the Cost of Cyber Crime by the Ponemon Institute

Page 13: APT in the Financial Sector

The black market price of your data

Page 14: APT in the Financial Sector

The usual APT suspects

Page 15: APT in the Financial Sector

Getting from point A to point B is only a click away. So is the danger.

Page 16: APT in the Financial Sector

Alarming Advanced Persistent

Threat survey results

22%

69%

9%

YES NO DON'T KNOW

Data from the Palo Alto Networks APT Report 2014

In the past year, has your organization experienced a security incident as a result of advanced threat or

advanced persistent threat (APT)?

Page 17: APT in the Financial Sector

What is APT?

Advanced Persistent Threat

AdvancedAttacker, not attack

Persistent Attacker won’t give up after a failurw

ThreatAttacker has a particular target

Page 18: APT in the Financial Sector

What are the typical

entry points of an APT

attack?

Human Itself

Social engineering• Phishing & whaling emails• Message with malicious

-URL-Attachment

• Malicious web pages-Drive by download of malicious code

• Free stuff (USB keys, software, music, movies)

Vulnerability of the client machine• Message with malicious content• Malicious web pages

-Redirection to malicious code/exploit

Vulnerable public facing service

Page 19: APT in the Financial Sector

What are the typical

attack goals?

Information • Blueprints • Research• Financial information• Plans, contracts • Classified information• PII

Control of system• SCADA / PLC

-Critical information providers-Vendors of technology-Research and development facilities

Disruption of services• Critical infrastructure• Competitor’s services

Research

Page 20: APT in the Financial Sector

Important facts about APT attacks

An APT attack is typically discovered after 6-9 months

Exploitation of vulnerabilities • not known (zero-days)• not considered as threat(social engineering, physical

access, employee)

APT produce not imminent losses • Loss not seen in the moment

“The fact, that you have not discovered a breach does not mean that you are not compromised.”

Page 21: APT in the Financial Sector

Principles of defense

Least privilege for the most specific people• Assign only necessary privileges and only for those

who need them

Divide “et impera”• Do proper classification on every information• Know who is (and can be) owner, consumer, and

holder of information• Where and how can it be stored, processed, and used

Defense in Depth

• Multiple layers of security

4 eyes principle• Every possible attack vector should be addressed by

at least two different controls • At least one should be technical• At least one should include human supervision

Page 22: APT in the Financial Sector

Technical controls

Defense of known perimeters

Malicious code protection

Network behavioral analysis

Intrusion protection

Internal network defense

Hardening of systems

Data Loss Prevention

Page 23: APT in the Financial Sector

Known high-profile

APTs

Ghostnet (2009)•103 countries, cyber espionage

Aurora (2009)•High-tech, security and defense companies•Modification of source code, cyber espionage

Stuxnet (2010)•IRAN, nuclear devices

Aramco (2012)•Kingdom of Saudi Arabia•30 000 workstations and servers compromised

Page 24: APT in the Financial Sector

James Bond of yesterday…

Page 25: APT in the Financial Sector

…Meet the James Bond of today!

Page 26: APT in the Financial Sector

The APT Lifecycle

Page 27: APT in the Financial Sector

When breached, follow these three steps…

Page 28: APT in the Financial Sector

Step 0 - UPDATE YOUR RESUME

Step 1 - CONFIRM INCIDENT

Step 2 - PROVIDE RESPONSE

Step 3 - IMPROVE

Page 29: APT in the Financial Sector

NO ONE SAID IT WOULD BE EASY

Page 30: APT in the Financial Sector

Cybersecurity CasinoWelcome to the cybersecurity casino! (Whether you like it or not)

Page 31: APT in the Financial Sector

To shun this approach is to meddle with the primary forces of the Internet, Mr. Beale. The hackers won’t have it. They’ll take millions out of your business and put nothing back in. It is ebb and flow, tidal gravity. It is the new cyber ecological balance. -movie

NETWORK, 1976

SIDE NOTE

Page 32: APT in the Financial Sector

Q&A

PART FOUR

Page 33: APT in the Financial Sector

THANK YOU!