New trends on cyber security - Cyber Espionage & Identity theft By K S Yash, CRO 1.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Working with the Internet
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
By Hiranmayi Pai Neeraj Jain
Parameter Tampering. Attacking the Ecommerce Shopping Cart In the above image we see that a user who wants to purchase a Television visits an online Store.
How Secure Are Your On-Line Payments? Brad Rand V.P. Information Technology Infrastructure Manager Information Security Officer.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
7 Effective Habits when using the Internet Philip O’Kane 1.
TAX-AIDE Computer Security Chris Hughes Chairman NTC 1 NLT Meeting Aug 2014.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Protection from Internet Theft By James Seegars. What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Trojan Horse Program Presented by : Lori Agrawal.
FIT3105 Security and Identity Management Lecture 1.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Information Security Information Technology and Computing Services Information Technology and Computing Services
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Course 201 – Administration, Content Inspection and SSL VPN
Database Security Yuli Stremovsky. Agenda Database Security What is GreenSQL ? Management Console Demo GreenSQL Roadmap.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crimes.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Internet Security for Small & Medium Business Week 6
IT security By Tilly Gerlack.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
Honeypot and Intrusion Detection System
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Types of Electronic Infection
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
Ch9QQ T F 1.Hacking is an example of unauthorized access. T F 2.A Trojan horse is a type of malware that masquerades as another type of program. T F 3.A.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Information Security Sharon Welna Information Security Officer.
Topic 5: Basic Security.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Sniper Corporation. Sniper Corporation is an IT security solution company that has introduced security products for the comprehensive protection related.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Main Features of iSafe All-in-One Keylogger Universal keylogger of isafe, Inc. Suitable for home parental control,corporate employee monitoring and cheating.
Technical Implementation: Security Risks
Chapter 40 Internet Security.
Introduction-Cyber Safety
Presentation transcript:

New trends on cyber security - Cyber Espionage & Identity theft By K S Yash, CRO 1

Cyber Espionage Espionage has gone from Physical world into Cyber world. Black hat around world breaking into networks and stealing important corporate information. 2

Recent attacks on corporate Stealing of sensitive information in corporate leads to loss of 8 million $ contract to a Bangalore based company (source DNA newspaper) Is it true? 3

Are you in danger? Investment Required Information Worthiness(IRIW) What is worth of information for black hat to steal Is it only black hat or a competitor hiring a black hat who want information Your business turnover is 20 crores, profit is 5 crores Are you at risk with crucial information getting stolen? Cyber espionage contracts start above 10 lakhs. 4

Protection in corporate Gateway antivirus Corporate firewall Personal Antivirus and Firewall Some have RSA secure ID token! 5

Is this enough? No. Not all type of attacks can be prevented by these programs. Social Engineering Tunnel Remote Admin Tools with Proxy kernel level key logger (undetectable) delivery using MS office, PDF undetected vulnerability. 6

Type of attack Social engineering: Getting a from a friend or colleague with a attachment or weblink The weblink could clicked to read the article. The key logger or Trojan will be installed In case of net banking, phishing attack is nothing but social engineering. 7

Social engineering could come which looks like coming from friend as a greeting, web admin writing to you, picture file coming from a stranger or known person when you are on messenger. The threat need not come as attachment which is a program file. 8

Remote tunnel Trojan (proxy) Black hats use Trojans which can be deployed to a victim computer. The Trojan connects back to an intermediate server usually in china or Russia(RBN. St. Petersburg). These intermediate server are usually illegal networks and don’t co-operate for tracking the actual black hat hacker. The Trojan injects into victim machine IE or Explorer and connects using port HTTP or HTTPS Usually these programs cannot be detected even with an Intrusion Prevention System that detect anomaly. 9

Kernel Keylogger Advanced key loggers – Capture keystrokes, – Identify specific sites using windows title – Post logs using port 80(http), load through ftp, send via SMTP injection – Firewall bypassing feature working on windows kernel. 10

Undetectable Vulnerability Black hat discover new vulnerabilities in acrobat PDF and MS office files. These vulnerabilities are usually like adding a weblink inside the pdf or the doc In ms office files, black hat discover buffer overflows. When the office document is opened, the buffer overflow happens and control transfers to the trojan which is inside the ms office file. 11

Identity Theft Stealing of some one credentials making use of that credential privilege and doing transactions. Areas common for identity theft Net banking (web based) Identity theft of internal network credentials 12

Common tools used Phishing Key logger Trojans 13

Phishing from bank, provider asking for personal details credentials are stolen Sample s offering to return £ worth of tax to "every man aged between 30 and 55 years" From: UK Government & Ministry of Finance Age, marital status and number of children personal info can used to construct data for credit card forms and other online transactions As the UK Government is expected to make announcements relating to recession-busting tax cuts 14

Identity theft tools Advanced key loggers : – Capture keystrokes, – Identify specific sites using windows title – Post logs using port 80(http), load into ftp, send via SMTP use injection – Firewall bypassing feature working on windows kernel. Trojans: – Windows kernel level – Tunnel Trojan uses intermediate server(to ensure no trace) Like a proxy – Work on port 80, 443 (bypassing most firewall) – Can work at kernel level to avoid detection by antivirus 15

Netbanking Total of 80 cases on average pending in various law enforcement agencies relating to net banking per state Total of 2 crores for 80 cases per state on average. average money stolen is 2.5 lakh per case Banks pay? no? it is a consumer problem Bank protects the transmission, back end server not consumer desktop. It is a consumer, end point risk. 16

Netbanking Virtual keyboard in most banking sites are not safe The logic of virtual keyboard can broken by advanced researcher in a few minutes and a mouse logger tuned for specific bank can be written by black hat hackers In Europe two years back a mouse logger appeared that could almost intercept 121 different banks virtual keyboard. 17

Can Antivirus & Firewall Help? Antivirus works with signature and some with heuristics. Black hats normally write tools and test their tools against all antivirus, firewall before they deploy. They find way around heuristics, signature scans, anomaly and behavior blocking technologies. 18

Identity theft protector Consumer can protect themselves from netbanking, web based s passwords from getting stolen. Keyboard driver level encryption with browser plug-in Safe browser without a BHO Program that changes windows title bars 19

How can this be prevented Banks can hire white hat hackers and specifically research on writing an anti-identity theft program. This program can be signed by banks digital certificate. Customer can click on secure login button, signed Active-x can download this authenticated & signed anti-identity theft program. Making this process simple for end customer. 20

Thanking you Q&A Contact : 21