15
Compliance & Controls: A Hacker’s Perspective Tony Gambacorta, VP of Security Operations at Synack [email protected]

HIMSS Summit of the Southeast: Compliance and Controls

Embed Size (px)

Citation preview

Page 1: HIMSS Summit of the Southeast: Compliance and Controls

Compliance & Controls: A Hacker’s PerspectiveTony Gambacorta, VP of Security Operations at [email protected]

Page 2: HIMSS Summit of the Southeast: Compliance and Controls

Let’s: (continue to) borrow from healthcareA Hacker’s Perspective

• Ability is fostered by understanding

• No need to quit your day job• Enables positive outcomes

• All of the above, plus…• The stakes are lower• Knowledge makes people harder targets• Who doesn’t want to learn how to hack?

Page 3: HIMSS Summit of the Southeast: Compliance and Controls

Mr. Robot ClipA Hacker’s Perspective

Page 4: HIMSS Summit of the Southeast: Compliance and Controls

Signature-Based DefensesA Hacker’s Perspective

Signature-Based Defenses

Vulnerable to novelty, they only catch the low-hanging fruit.

Your EnvironmentDefenses must be

“working” “did work” or “should work” don’t cut it.

Attacker

Attack

Attack

Attack

Attack

Attack

Page 5: HIMSS Summit of the Southeast: Compliance and Controls

Lessons from Other VerticalsA Hacker’s Perspective

There’s a market: EHRs are worth 10x more than credit card

numbers1

Target diversification is a consequence of the innovation arms race

If you’re in the stolen data business, why wouldn’t you target

healthcare?

(1) http://www.reuters.com/article/2014/09/24/us-cybersecurity-hospitals-idUSKCN0HJ21I20140924

Page 6: HIMSS Summit of the Southeast: Compliance and Controls

Selection & ExploitationA Hacker’s Perspective

Targeted AttackWhen no one but that special

someone will do...

Opportunistic AttackWhatever falls into the

net, I’m not picky...

Page 7: HIMSS Summit of the Southeast: Compliance and Controls

Hacking the Brady BunchA Hacker’s Perspective

123456

password

12345

12345678

qwerty

Nope.

Nope.

Nope.

Nope.

Nope.

Nope.

Nope.

Nope.

Nope.

We’re in!

Nope.

Nope.

Nope.

Nope.

Nope.

We’re in!

Nope.

Nope.

Nope.

Nope.

123456789 LOCKED.

Common Passwords

P@ssw0rd! is totally compliant, and in my dictionary. Plan accordingly.

Page 8: HIMSS Summit of the Southeast: Compliance and Controls

Lessons from the BradysA Hacker’s Perspective

Opportunistic attackers love it when we say:

1.“I don’t have sensitive data, why would they target me?”2.“My password is my dog’s name and the year, how would anyone guess that?”3.“Whatever, I don’t have anything that secret anyway.”

Opportunistic attackers hate it when we use:

•Multifactor authentication•Password vaults•Different passwords on different sites

1

2

Perfect is the enemy of good here. Just being tougher than the average bear helps a lot.

Page 9: HIMSS Summit of the Southeast: Compliance and Controls

Targeted AttacksA Hacker’s Perspective

The term “Must-have target” or is nothing you want to be on the

business end of.

Page 10: HIMSS Summit of the Southeast: Compliance and Controls

Introduction to Radio CommunicationA Hacker’s Perspective

Radio station broadcasts on a set frequency of

radiowave

Music is encoded in changes to the carrier

wave

Your radio decodes the changes, you rock out

Page 11: HIMSS Summit of the Southeast: Compliance and Controls

Assumptions have consequencesA Hacker’s Perspective

Buzzer sends out a signal the door is listening for

SDR reads the spike

Unlocked Door

SDR replays radio wave spike

The “key” is just a simple spike

Page 12: HIMSS Summit of the Southeast: Compliance and Controls

Practical application: Key fobsA Hacker’s Perspective

Key fob broadcasts a

passcode

Passcodes are rotated to make things interesting

Most cars still listen for the right passcode, not the right

senderNo one wants compliance training, but everyone wants to learn how to hack. Plan accordingly.

Page 13: HIMSS Summit of the Southeast: Compliance and Controls

Hospital Pager HackA Hacker’s Perspective

SDR Hacker sits outside, passively intercepting radio

signals

Hospital staff assume too much about their pagers

and communicate sensitive information

Intercepted credentials are used to steal corporate,

patient, and employee data

Page 14: HIMSS Summit of the Southeast: Compliance and Controls

Wrap UpA Hacker’s Perspective

“We’re 100% compliant” is the battle cry of the already hacked.1

Most folks love this stuff- education should never kill curiosity.

2

If we can teach people to save a life, we can teach them this too3

Page 15: HIMSS Summit of the Southeast: Compliance and Controls

Thank YouCompliance and Controls: A Hacker’s Perspective