Explaining Bitcoins will be the easy part: Email Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.

Slides:



Advertisements
Similar presentations
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Advertisements

 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail.
Norman SecureSurf Protect your users when surfing the Internet.
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
Sky Advanced Threat Prevention
Computer Security By Duncan Hall.
January 07 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
Washington State Auditor’s Office Cybersecurity Preparing for the Inevitable Washington State Auditor’s Office Peg Bodin, CISA, Local IS Audit Manager.
Are you the Next Cybercrime Headline?
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Karsten Chearis Sales Engineer.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Exchange Online Advanced Threat Protection
3 Do you monitor for unauthorized intrusion activity?
Threat Scan (ETS) for Office 365
Threat Scan (ETS) for Office 365
There Will be Attacks – Improve Your Defenses
[Internal Use] for Check Point employees​
Critical Security Controls
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Burke.
Lesson 3 Safe Computing.
Cyber Security: State of the Nation
Active Cyber Security, OnDemand
Trends in Ransomware Distribution
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them David Hood Director of Technology Marketing.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Bird Team Lead, Account Executive.
Encryption Ransomware
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Vanderhoff.
Jon Peppler, Menlo Security Channels
Exchange Online Advanced Threat Protection
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Cybersecurity Awareness
IT Security awareness Training.
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Robert Leonard Information Security Manager Hamilton
Mary Kummer Jim McNall PRIMA Spring Training 2018
4 ways to stay safe online 1. Avoid viruses and phishing scams
Risk of the Internet At Home
Intercept X for Server Early Access Program Sophos Tester
How to build a defense-in-depth
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Andrew Cotton.
There Will be Attacks – Improve Your Defenses
There Will be Attacks – Improve Your Defenses
Home Internet Vulnerabilities
DON’T GET HOOKED! YOU MAY BE UNAWARE BUT YOU ARE A PHISHING TARGET FOR CYBER CRIMINALS. A. Unknown sender address B. Offer too good to be true &
Symantec Web Isolation Secure Access to Uncategorized and Risky Sites Protect Your Most Privileged Users Prevent Phishing and Ransomware Attacks John Moore.
Epic Introduction Basics
Keeping your data, money & reputation safe
Anatomy of a Large Scale Attack
Qiyu chen, Xiaomin Dong, Chenhui Lai, Xinteng Chen, Vittorio DiPentino
Epic Introduction Basics
Unit 1 Fundamentals of IT
Information Protection
Spear Phishing Awareness
Dark Web Domain Status Report
Phishing 101.
Introduction to Symantec Security Service
Information Protection
Cybersecurity Simplified: Phishing
Cybersecurity Simplified: Ransomware
Dr. Matthew Canham Dr. Clay Posey Institute for Simulation & UCF
“Workplace Behaviour: Activating your greatest security asset”
Presentation transcript:

Explaining Bitcoins will be the easy part: Email Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing

91% of all incidents start with a phish WHATS WORSE, WE KNOW… 95% For the purposes of this talk, we’ll use the phrase phish To mean spear-phishing, whaling and phishing But in a business context Wired 2015

Think Your Employees are Alert Enough to Stop Them? The second layer of defense is employee awareness and vigilance. The aim here is to a create herd alertness in your organization. The intention is not to make everyone suspicious of everything, or make everyone a security pro, but make them alert enough to linger over a link or attachment. The Mimecast security awareness tools help in this mission to compliment the other tactics you should use like training and perhaps simulated exercises. Confidential |

a phish: median time-to-first-click 1 minute 22 seconds a phish: median time-to-first-click 1M 22 SECONDS THE MEDIAN TIME FOR SOMEONE TO CLICK on a phishing link That’s the Median, imagine what the lower outliers are. And.. 50% of those people who do click the link will do it within the first hour. Verizon 2015 Data Breach Investigations Report (DBIR)

How Do The Attackers Do It?

Do You Have a Page Like This On Your Website? How do Attackers get their information? An easy way to find out about a company is visit their website. Most companies have information about their executive teams. What better way to entice a user to open an email than having it look like it’s from the CEO, the CFO or some other senior leader? Remember that it only takes one employee to “click before they think” to compromise an entire organization.

SOC. ENG. THE NEW MALWARE-LESS DANGER. Lifetime study, useful outside of work too. Train tickets. BUT Attackers know we have the technology. They know, we know their tactics So they try to stay ahead of us and our scanners. They’re increasingly turning to social engineering to exploit users. MAKING THEIR ATTACKS MALWARE-LESS AND HARDER TO DETECT Test your own staff. Social engineering toolkit by Dave kennedy.

You are susceptible to email-borne attacks if…. You have certain letters in your domain name You accept resumes on your website You have a team of people in finance You have a profile Your life is deemed interesting enough to be on You are susceptible to email-borne attacks if….

Another way to gather information is to use a program that will harvest email addresses. These are cheap and easy to use. Just type in a domain and you’ll get a list of email addresses for that organization.

You don’t even need to know how to code Attackers don’t have to know how to code, they don’t even have to be smart. They can download TOX, a ransomware construction tool that provides an easy to use graphical interface that allows attackers to track how many folks have been infected and track the ransom paid Source: Forbes.com - "Ransomware As A Service Being Offered For $39 On The Dark Net" 7/15/16

FUD (Fully Undetectable) Crypting Services to avoid AV detection   If you’re an attacker and can code but don’t know how to evade sandbox detection, that’s not a problem there’s an online service that can help. FUD- fully undetectable crypting services uses obfuscation, encryption and code manipulation.

Real life examples

Vector: Phishing attack with malicious URL Threat: Entering credentials Target: Random mass-mailing

Vector: Phishing email with attachment Threat: Opening the document and activating malicious code Target: Targeted mailing

Business Email Compromise Whaling Wire transfer W-2 Fraud Who Says Attacks Need to Involve Malware? Business Email Compromise Whaling Wire transfer W-2 Fraud These attacks are often called Business Email Compromise, wire transfer fraud, W-2 fraud or whaling What’s sets these attacks apart is that they don’t use malware to achieve their goal They rely purely on the power of social engineering and the inherent trust in email Impersonation attacks are a huge threat because Traditional security systems like AV cannot detect this type of attack. Even solutions that scan URLs and detonates attachments in a sandbox are powerless in preventing these attacks Defending against these attacks requires specialised tools that monitor multiple indicators of potential compromise.

Vector: Spear phishing attack Threat: Impersonating senior staff Target: An employee with authority

Vector: Spear phishing attack Threat: Impersonating senior staff Target: An employee with authority

Herd alertness helps, but… The second layer of defense is employee awareness and vigilance. The aim here is to a create herd alertness in your organization. The intention is not to make everyone suspicious of everything, or make everyone a security pro, but make them alert enough to linger over a link or attachment. The Mimecast security awareness tools help in this mission to compliment the other tactics you should use like training and perhaps simulated exercises. Confidential |

Are Users Part of the Solution or Part of the Problem? The Compromised Insider The Careless Insider The Malicious Insider

Can we do more with technology? - YES! Layer one is of course the technology Can we do more with technology? - YES! Confidential |

Mimecast Cloud Service Inspects >650M Inbound, Outbound, & Internal Emails/Day for Both Opportunistic & Targeted Attacks

Confidential | Protect You need the technology that provides the best possible multi-layered protection Continue You need to continue to work while the issue is resolved Remediate You need to get back to the last known good state Cyber Resilience