Anatomy of a Large Scale Attack

Slides:



Advertisements
Similar presentations
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
Advertisements

Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Threats to I.T Internet security By Cameron Mundy.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Security A Payments Perspective Terry Dooley EVP & CIO SHAZAM Network.
Computer Security By Duncan Hall.
January 07 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Safe Computing Practices. What is behind a cyber attack? 1.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Washington State Auditor’s Office Cybersecurity Preparing for the Inevitable Washington State Auditor’s Office Peg Bodin, CISA, Local IS Audit Manager.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
November 14, 2016 bit.ly/nercomp_defendingyourdata16
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Karsten Chearis Sales Engineer.
Your Partner for Superior Cybersecurity
An Introduction to Phishing and Viruses
Your security risk is higher than ever.
Threat Scan (ETS) for Office 365
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
There Will be Attacks – Improve Your Defenses
[Internal Use] for Check Point employees​
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Burke.
Data Compromises: A Tax Practitioners “Nightmare”
Report Phishing Forward phishing s to
Protecting our institutional and your personal data
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them David Hood Director of Technology Marketing.
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Bird Team Lead, Account Executive.
Encryption Ransomware
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Vanderhoff.
Forensics Week 11.
Jon Peppler, Menlo Security Channels
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Today’s Risk. Today’s Solutions. Cyber security and
Cybersecurity Awareness
Agenda Consumer ID theft issues Data breach trends Laws and regulations Assessing and mitigating your risk.
Robert Leonard Information Security Manager Hamilton
4 ways to stay safe online 1. Avoid viruses and phishing scams
Cyber Issues Facing Medical Practice Managers
Threat Landscape for Data Security
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Andrew Cotton.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
There Will be Attacks – Improve Your Defenses
There Will be Attacks – Improve Your Defenses
David J. Carter, CISO Commonwealth Office of Technology
Report Phishing Forward phishing s to
Symantec Web Isolation Secure Access to Uncategorized and Risky Sites Protect Your Most Privileged Users Prevent Phishing and Ransomware Attacks John Moore.
Keeping your data, money & reputation safe
Ransomware and Data breaches in public libraries
Security Hardening through Awareness August 2018
Steppa Cyber Security Training Tips Your Business Was Seeking For With Cyber Security Training!
Incident response and intrusion detection
Business Compromise and Cyber Threat
Information Security – Sep 18
Information Protection
Marcial Quinones-Cardona
Introduction to Symantec Security Service
Information Protection
Cybersecurity Simplified: Phishing
Cybersecurity Simplified: Ransomware
“Workplace Behaviour: Activating your greatest security asset”
Presentation transcript:

Anatomy of a Large Scale Email Attack Bob Adams - Cybersecurity Strategist

91% of all incidents start with a phish Wired

Countdown to a breach 100 Seconds median time-to-first-click* Verizon 2016 Data Breach Investigations Report (DBIR)

Targeted attacks are well researched Confidential |

Malware – Wreaking Havoc

Steals or encrypts data Deletes sensitive data Alters or hijacks core computing functions Unknowingly monitors users' activity

Ransomware – Holding Data Hostage

Malware Ransomware ‘as a business’ Ransomware = $1B “Business” in 2016 Malware Ransomware ‘as a business’

Source: F-Secure

“It takes an attacker longer to organize your data than it takes them to get it” -Bob Adams, Mimecast

Email Hunter Hacker’s Toolbox

Your Company Website & Email Hunter Your Executive Team Will Be Found Your Company Website & Email Hunter

Email Hunter Rapportive Rapportive

Email Hunter Rapportive FreeERISA Hacker’s Toolbox

What about other countries?

Real life examples with email

Vector: Phishing attack Threat: Password grab Target: Random mass-mailing

Vector: Phishing attack Threat: Password grab Target: Random mass-mailing

Vector: Phishing attack Threat: Password grab Target: Random mass-mailing

Vector: Phishing email with attachment Threat: Document with malicious code Target: Targeted mailing

Vector: Phishing email with attachment Threat: Document with malicious code Target: Targeted mailing

Vector: Phishing email with attachment Threat: Document with malicious code Target: Targeted mailing

Who Says Attacks Need to Involve Malware? Business Email Compromise Whaling Wire transfer or W-2/P60 Fraud

“…are also charging ransoms based on the number of hosts infected…suggested ransom amounts that vary depending on the geographic location of the victim.”

Vector: Spear phishing attack Threat: Impersonating senior staff Target: An employee with authority

Let’s examine this attack closer and how it could have been prevented by fixing the Human Firewall

Perform User Name Checks – Attackers Know Your Leadership Team And Will Impersonate Them! Remember: Everyone Is A Potential Target!!!

Check For Common Keywords Used By Attackers – e. g Check For Common Keywords Used By Attackers – e.g.: Wire Transfer, Wire Payment, W2, P60, etc

Check For Similar Domains – Not Your Spoofed Domain, But A Slight Variation

Examine the Domain Age – How often do you work with new domains?

Are Users part of the solution or part of the problem? Compromised Accounts Stolen User Credentials Utilize Corp Web mail to spread attack internally or externally to partners/customers Mimecast - First to Market delivering: Internal Email Protect Careless Users Sending sensitive data internally such as projects and PII “Oops, sent it to the wrong Michael…” Malicious Insiders Purposely distributing malware or malicious URLs

Can you confidently say you have done everything possible to protect your organization from cyberattacks? Do you have a Cyber Resilience Strategy in place?

Cyber Resilience Strategy Confidential | Protect You need the technology that provides the best possible multi-layered protection Continue You need to continue to work while the issue is resolved Remediate You need to get back to the last known good state Cyber Resilience Strategy

Our Next Steps Together Security Archiving Continuity Another Presentation: Who needs to hear this? Higher authority? Demo: Getting the technical teams together for a demo on how we help? Conversation Challenges Business drivers – internal and external

Email Security Risk Assessment

But if you just want the deck? Just lonely? Drop me a line at: badams@mimecast.com @IAmTheBobAdams