15
© 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015 Hacktivism Summit November 6, 2015 Hacktivism Motivations, Tactics, and Threats Eric Vanderburg Director of Cybersecurity, JURINOV [email protected] @evanderburg (216) 664-1100

Hacktivism: Motivations, Tactics and Threats

Embed Size (px)

Citation preview

Page 1: Hacktivism: Motivations, Tactics and Threats

© 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015

Hacktivism SummitNovember 6, 2015

HacktivismMotivations, Tactics, and Threats

Eric VanderburgDirector of Cybersecurity, [email protected]@evanderburg(216) 664-1100

Page 2: Hacktivism: Motivations, Tactics and Threats

© 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015

Where are we and how did we get here?

• Technology makes it easier to disseminate a wide variety of ideologies– Some have caught on:• Freedom of information• Government and organizational distrust

• Anonymity of the Internet• Disparity between resources required to attack

vs defend

Page 3: Hacktivism: Motivations, Tactics and Threats

© 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015

How did we get here?

• Dark web – skills now optional

Image above retrieved from Deepdotweb.com today

Page 4: Hacktivism: Motivations, Tactics and Threats

© 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015

Hacktivism defined

• Hacking to promote a political agenda, religious belief or social ideology. – Political– Religious– Social ideology

• Human rights• Free speech• Freedom of information

• Hacking “clothed” in moral attire• The morality is subjective

Page 5: Hacktivism: Motivations, Tactics and Threats

© 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015

Real world comparisons

Cyber• Website defacement and

redirection• Negative SEO• Denial of Service• Information disclosure

Real world (AFK*)• Graffiti on corporate

building• Picketing• Sit in / occupy protest• Whistleblowing

*Peter Sunde interview for Pirate Bay AFK film

Page 6: Hacktivism: Motivations, Tactics and Threats

© 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015

How is hacktivism different?

• It’s not about monetization– Defense cannot be based on cost to exploit

• Hacktivists are willing to spend months on a hack

Page 7: Hacktivism: Motivations, Tactics and Threats

© 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015

LulzSec (Lulz Security)

• Infragard• US Senate• CIA• FBI Cybercrime conference call• Group retired in 2011• Some members arrested

Page 8: Hacktivism: Motivations, Tactics and Threats

© 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015

Anonymous

• International network of hacktivists• Originated in 2003 • No Leadership• Released names of supposed KKK members to

pastebin yesterday

Page 9: Hacktivism: Motivations, Tactics and Threats

© 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015

Edward Snowden

• Published NSA files on phone record collection in 2013

• Charged with espionage

Who is your Snowden?

Page 10: Hacktivism: Motivations, Tactics and Threats

© 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015

Wikileaks

• Site that publishes secret information, classified files, and news leaks from anonymous sources

Page 11: Hacktivism: Motivations, Tactics and Threats

© 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015

Pastebin• Public data repository• Anonymous posting allowed• Commonly find hacker loot and malicious code or copyright

infringement source code

Page 12: Hacktivism: Motivations, Tactics and Threats

© 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015

Stratfor• “Freedom of Information” hack• Hacktivists upset that makes some information public but

other information available only to specific clients• Published emails on wikileaks• Result to Stratfor:– PR cost and effort– Rebuild customer relationships

Page 13: Hacktivism: Motivations, Tactics and Threats

© 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015

Tactics

• DDoS• Most common hacking methods• Negative SEO– Google bombing – associate negative keywords with

your name– Utilize penalized SEO tactics on your sites / social media

• Email flooding• Fax spam• Phishing, Spam and SPIM

Page 14: Hacktivism: Motivations, Tactics and Threats

© 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015

Action items

• Assess PR statements for hacktivism risk• FBI warns law enforcement to limit social media use• You can’t throw money at this problem -- it requires cultural change– Assess your culture

• Background checks and personality profiling• Pen test including social engineering

Page 15: Hacktivism: Motivations, Tactics and Threats

© 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015

Q&A

Don’t be shy…