Phishing, Spear Phishing, and what to do about it.

Slides:



Advertisements
Similar presentations
Web Content Control Application Providing Secure & Reliable Internet Access December 2010.
Advertisements

Account HIGHJACKING & IDENTITY THEFT GPCE Credit Union has prepared a slide show presentation to examine the most prevalent financial crimes at work today.
K-State IT Security Training Ken Stafford CIO and Vice Provost for IT Services Harvard Townsend Chief Information Security Officer
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
Social Engineering J Nivethan. Social Engineering The process of deceiving people into giving away access or confidential information Onlinne Phone Offline.
Fòmasyon Itilizatè Ayiti Office 365 Fòmasyon. Why the Change? Partners in Health's new hosted Microsoft Office 365 solution allows users to access their.
Network security policy: best practices
Norman SecureSurf Protect your users when surfing the Internet.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Phishing Rising to the challenge Amy Marasco Microsoft.
Web Spoofing John D. Cook Andrew Linn. Web huh? Spoof: A hoax, trick, or deception Spoof: A hoax, trick, or deception Discussed among academics in the.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
IT security By Tilly Gerlack.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Project Management Methodology Project Closing. Project closing stage Must be performed for all projects, successfully completed or shut off by management.
Phone: Mega AS Consulting Ltd © 2007  CAT – the problem & the solution  Using the CAT - Administrator  Mega.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Google Apps (Education Edition) A step guide to a successful deployment January 10 th, 2008 California Technology Assistance Project
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Internet2 Abilene & REN-ISAC Arbor Networks Peakflow SP Identification and Response to DoS Joint Techs Winter 2006 Albuquerque Doug Pearson.
Staff addresses Availability tradeoffs December 13, 2012.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Swiss NREN protection with DNS RPZ
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
Take the Quiz and find out more!
Important Information Provided by Information Technology Center
An Introduction to Phishing and Viruses
Information Security Awareness Campaign
Phishing, Spear Phishing, and what to do about it.
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
CYBER SECURITY PANDEMIC
Learn how to protect yourself against common attacks
Identity theft vector of the electronic age
Cyber Security Awareness Workshop
Phishing is a form of social engineering that attempts to steal sensitive information.
Project Overview Visit Now:
Call Outlook customer support toll free number Ireland.
Multi-Factor Authentication (MFA)
Gmail Customer Service Online Chat. Gmail Technical Support Number Gmail technical support number is a 24/7 active service which provides the best technical.
Presented by: Brendan Walsh Manager, Security and Access Management
What’s New in Fireware v12.1.1
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Call AVG Antivirus Support | Fix Your PC
4 ways to stay safe online 1. Avoid viruses and phishing scams
Information Security Session October 24, 2005
Intro to Ethical Hacking
Phishing.
Intro to Ethical Hacking
Home Internet Vulnerabilities
Information Security Awareness Campaign
Security Hardening through Awareness August 2018
Qiyu chen, Xiaomin Dong, Chenhui Lai, Xinteng Chen, Vittorio DiPentino
Incident response and intrusion detection
Vendor Management: New Vendor Request Processing
Cybersecurity and Cyberhygiene
Spear Phishing Awareness
Dark Web Domain Status Report
Cybersecurity Simplified: Phishing
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Phishing, Spear Phishing, and what to do about it. Mark Berman | Angelo Santabarbara March 13, 2013 What Are We DOING About it? Technical Solutions, Timely Notifications, & Awareness Training Abstract There has been a dramatic increase in phishing and other hacker attacks this year. Many in our communities have fallen prey to identity theft attacks, have had their e-mail accounts compromised, or have been tricked into downloading malware onto their machines, which has spurred a great deal of discussion among security professionals trying to figure out how to handle the problem. Siena College has taken a multipronged strategy, educational as well as technical. This session will present Siena's approach, detail how successful we have been, and survey approaches used by other institutions. Traditional Phishing Response/Prevention Not proactive Collected phishing samples, analyzed, blocked at firewall by blocking domain/site (such as Google form) Monitored e-mail queues for suspicious activities to identify compromised accounts to disable Notify user and informally educate user on prevention RESULT: Number of compromised accounts continued to grow and hit an all time high in September 2012. Sophisticated spear phishing attacks were harder for users to identify as malicious content and increasing in number. Evolving Phishing Response/Prevention Main Objectives Formal notifications and preliminary education Proactive technical prevention Participation in phishing identification systems to bring known phishing attacks to light in the security community Education during detected/intercepted activity Formal education requirement for re-enabling compromised accounts Proactive Technical Prevention Update DNS forwarders on Active Directory DNS servers to OpenDNS Blocks known phishing hosts, botnets, and typosquatters at no cost based on constantly updated security community definitions as well as community driven PhishTank service. Faster DNS response than most ISP DNS servers Customizable intercept pages Reporting on DNS requests, phishing requests, and botnet requests OpenDNS is the largest and most reliable recursive DNS service available providing a better Internet experience to more than 50 million Internet users around the world. Utilize new methodologies to eradicate malware, botnets and phishing through DNS, and use the system to intelligently route our users around it. OpenDNS uses PhishTank to identify phishing sites. Participation in Phishing Identification Process in place for help desk and system admins to report phishing/spear phishing attacks to PhishTank and Google’s Report Phishing PhishTank is community driven and used by many of the biggest security providers as well as OpenDNS Having multiple reports and verification of phishing sites aids in getting phishing sites blocked and taken offline Reporting to Google will increase timely marking of delivered phishing e-mails to be labeled as such in Gmail.

Phishing, Spear Phishing, and what to do about it. Mark Berman | Angelo Santabarbara March 13, 2013 Education During Phishing Activity In the event the user falls for a phishing scam and that phishing site is blocked by OpenDNS: Utilize custom page to also educate about what was blocked Provide ITS help desk contact information for concerned user assistance/clarification Provide some type of self test such as the OpenDNS Phishing Quiz or SonicWALL Phishing IQ Test If a user DOES get compromised User’s Account is immediately DISABLED! In order to have a compromised account re-enabled, require formal completion of phishing training Acquired SANS Securing the Human training that provides quick security training modules that are tracked by our training management system On site completion of training module required to re-enable account New Phishing Prevention/Education Model Results 9/12-10/12 Email from CIO educating community Started New Hire Orientation Malware/Phishing training 11/12 Implemented OpenDNS 12/12 Began using PhishTank submissions All Users required to change passwords for Google Apps migration (Population expecting change more apt to fall for phishing attacks) Started intercepting BotNet pages w/internal warning and education page 1/13 Migrated students to Google Very well crafted e-mail asking for user to follow link displayed as actual Siena e-mail login to prepare for migration to Google (as we were) Page setup on Google forms to look exactly like our OWA login page Only indication of phishing was page was hosted on Google Form. It Doesn’t End Here… Unfortunately this is a cat and mouse game Users forget, make mistakes, and continue to get tricked by very realistic looking spear phishing attempts customized to include actual Siena elements so continuous education is required. Look at the very well created spear phishing attack we received in December that fooled many in our population. Participate in anti-phishing efforts and information sharing to foster a community that helps security vendors block and take down these criminal operations