Stopping Live Threats Ken Swain SE TN, GA, AL, MS Jan 18 2017.

Slides:



Advertisements
Similar presentations
Intrusion Prevention anno 2012: Widening the IPS concept.
Advertisements

Laptop Security in the current IT world W3 group.
A look into Bullet Proof Hosting November DefCamp 5 Silviu Sofronie – Head of Forensics
The Threat Landscape Jan Threat Report 2.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
TAX-AIDE Computer Security Chris Hughes Chairman NTC 1 NLT Meeting Aug 2014.
TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail.
Threats To A Computer Network
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
MIRAGE CPSC 620 Project By Neeraj Jain Hiranmayi Pai.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Presentation by Kathleen Stoeckle All Your iFRAMEs Point to Us 17th USENIX Security Symposium (Security'08), San Jose, CA, 2008 Google Technical Report.
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Click to edit Master title style Click to edit Master text styles Second level Third level Fourth level Fifth level June 10 th, 2009Event details (title,
(Electronic Mail) Most popular use of Internet technology Advantages Disadvantages Setting up an account Your account –User id and password.
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
Sky Advanced Threat Prevention
© 2008 IBM Corporation A/NZ Operational Scorecard Monthly Review June 2015 Results Review date: 10 July 2015.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
2012 Malnet Report: Breaking the Vicious Cycle Grant Asplund Senior Technology Evangelist.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Securing Privileged Identities Joseph Dadzie, Principal PM Manager, Microsoft 2016 Redmond Summit | Identity Without Boundaries May 26, 2016 James Cowling,
R ANSOMWARE CAN ORIGINATE FROM A MALICIOUS WEBSITE THAT EXPLOITS A KNOWN VULNERABILITY, PHISHING CAMPAIGNS,
An Anatomy of a Targeted Cyberattack
Blocking ransomware with Cisco AMP and Cisco Umbrella Jordan Gackowski
Our Services & Packages
Understanding Cyber Attacks: Technical Aspects of Cyber Kill Chain
BUILD SECURE PRODUCTS AND SERVICES
How Secure Is Our Power Grid?
A Virtual Tour of SophosLabs Building next-generation protection
Exchange Online Advanced Threat Protection
Sophos Intercept Next-Gen Endpoint Protection
Ilija Jovičić Sophos Consultant.
TMG Client Protection 6NPS – Session 7.
2016 Data Breach Investigations Report
Intercept X Early Access Program Root Cause Analysis
Macros and malware spooky.
The next frontier in Endpoint security
Intelligence Driven Defense, The Next Generation SOC
Sophos Intercept Next-Gen Endpoint Protection
How to Block Threats Before, During, & After an Attack
Trends in Ransomware Distribution
Analyzing Exploit Kit Traffic with Wireshark
Encryption Ransomware
Dissecting the Cyber Security Threat Landscape
Intercepting Advanced Threats
Jon Peppler, Menlo Security Channels
Exchange Online Advanced Threat Protection
Unit 1.6 Systems security Lesson 3
“CYBER SPACE” - THE UNDERGROUND ECONOMY
4 ways to stay safe online 1. Avoid viruses and phishing scams
Ransomware: What is it, How to avoid it and How to protect your data
Intercept X Early Access Program Root Cause Analysis
Ransomware in Web Apps OWASP Singapore.
Security Use Case Description Public charter schools serving grades K-12. Operates 40 schools and serves over 16,000 students and over 2,000 teachers.
Anatomy of a Large Scale Attack
Information Security – July 18
Tom Murphy Chief Information Security Officer
Information Security – Sep 18
Securing web applications Externally
Doxing Phishers: Analyzing Phishing Attacks from Lure to Attribution
Presentation transcript:

Stopping Live Threats Ken Swain SE TN, GA, AL, MS Jan 18 2017

Top Threats in Australia Exploits Industrialized attacks Flash, Downloader, JS redirect, Malvertising Ransomware 59.3% of ANZ businesses have been hit Dropper, Phish, Shortcut, Doc Macro Successful attacker can earn up to $394,000 in a single month Phishing 79.6% of ANZ businesses have received (and recognised) phishing attacks 93% of phishing emails have a ransomware payload (CSO Online)

HD Phishing Data stolen from breach being used in phishing campaign.

Locally targeted

Exploits As a Service Gateway Servers Exploit Kit Customers Victims Initial Request Exploit Kit Customers Redirection Get Current Domain Tor Exploit Kit Admin Malicious Payloads Landing Page Exploits Stats Management Panel Malware Distribution Servers Payloads Get Stats Update payloads Sophisticated/Coordinated

Malvertising Threat Chain You won a gift certificate AD NETWORK RTB THIRD PARTY

No site is immune

Document malware

Ransomware Prevalence CryptoWall AU, GB, US, CA, DE, FR TorrentLocker AU, GB, IT, ES CTBLocker EU, NA TeslaCrypt UK, US, CA, SG, TH

What Can We Do About It?

Live Demo

Stop By And See Us At The Booth!