© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Matthijs van der Wel MBA CISSP® CISA® RON® QSA® QFI® Managing Principle Forensics EMEA Data breaches.

Slides:



Advertisements
Similar presentations
SIEM Based Intrusion Detection Jim Beechey May 2010 GSEC, GCIA, GCIH, GCFA, GCWN twitter: jim_beechey.
Advertisements

1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is.
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Chris Berninger, Sr. Solutions.
Confidential and proprietary material for authorized Verizon Business personnel only. Use, disclosure or distribution of this material is not permitted.
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
Security for Today’s Threat Landscape Kat Pelak 1.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Confidential and proprietary material for authorized Verizon Business personnel only. Use, disclosure or distribution of this material is not permitted.
Confidential and proprietary material for authorized Verizon Business personnel only. Use, disclosure or distribution of this material is not permitted.
Computer Security: Principles and Practice
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Website Hardening HUIT IT Security | Sep
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
1 Title ECI: Anatomy of a Cyber Investigation Who Are the Actors.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
What is FORENSICS? Why do we need Network Forensics?
Dell Connected Security Solutions Simplify & unify.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
© 2010 Verizon. All Rights Reserved. PTE / DBIR.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Consistency in Reporting Data Breaches
Security for Online Games Austin GDC, September 2009 Tim Ray, CISSP.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
Role Of Network IDS in Network Perimeter Defense.
Health Information Delivery Services and Solutions Peter Tippett, MD, PhD, Chairman Information Risk & Security in Healthcare Data Breach Investigation.
Chapter 1 Real World Incidents Spring Incident Response & Computer Forensics.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
How to Make Cyber Threat Intelligence Actionable
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
Unit 2 Personal Cyber Security and Social Engineering Part 2.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Defining your requirements for a successful security (and compliance
Proactive Incident Response
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Six Steps to Secure Access for Privileged Insiders and Vendors
Cybersecurity - What’s Next? June 2017
2016 Data Breach Investigations Report
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Six Steps to Secure Access for Privileged Insiders and Vendors
Determined Human Adversaries: Mitigations
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Information Security Awareness
Incident response and intrusion detection
Strategic threat assessment
Determined Human Adversaries: Mitigations
Microsoft Data Insights Summit
Data Security and Privacy Techniques for Modern Databases
6. Application Software Security
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Matthijs van der Wel MBA CISSP® CISA® RON® QSA® QFI® Managing Principle Forensics EMEA Data breaches Shocking numbers from the 2009 Data Breach Report

© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 2

7 types of intel External Threat & Vulnerability Data - We continuously track new vulnerabilities and related attacks to assess how they impact information risk. Underground Intelligence - Surveillance of numerous online groups help us know what the bad guys are discussing, sharing, planning and doing. Net Intelligence - Over one million sensors are dispersed throughout our Internet backbone, enabling us to gather information on nefarious activity around the globe. Managed Security Services - Verizon Business manages and monitors firewalls, IDS, IPS, and other network devices for many of the world’s largest companies. Global Services - Internal data collection across Verizon’s extensive range of IT and security services. This is “real-world” data harvested as a byproduct of delivery. Investigative Response – Forensics & computer crime Investigations. Extensive metrics are systematically recorded on hundreds of data breach cases per year. ICSA Labs - ICSA Labs, an independent division of Verizon Business, performs vendor- neutral testing of hundreds of security products.

© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 WARNING: This is a true story. Based upon actual events. URL - Blog -

IR Case Data All data collected during cases worked by the Verizon Business Investigative Response team during 2008 Objective, credible, first-hand information on actual breaches 2008 Caseload: 90 confirmed breaches (>150 total engagements) 285 million compromised records (confirmed – not “data-at-risk”) 1/3 of these cases have been publicly disclosed (so far) About 50% of caseload comprised of sets of interrelated incidents –Same attacker(s), shared connections, identical circumstances, etc 15 arrests (and counting) 31% Retail, 30% Financial, 14% Food & Bev, remaining mixed Over 1/3 of investigations conducted outside the US

2009 DBIR: What’s New? Periodic data collection allowed for more detail –Much more info within the Hacking and Malware sections Responded to public requests and questions –Results also shown in % of records (was just % of breaches) New lines of study –PCI, Incident detection and response practices More thorough treatment and analysis More mature presentation –Better charts and graphs –No more pastel colors Plus, the bad guys were really busy (and, unfortunately, really successful) After a 4-year study of 500 breaches, what makes the 1-year sequel interesting?

Breach Sources External sources –Most breaches, nearly all records –90+% of breached records attributed to organized crime activity Internal sources –Roughly equal between end-users and admins Partner sources –Mostly hijacked third-party accounts/connections Impact Likelihood

Threats and Attacks Similar to previous 4 years for breach percentages Most breaches and records linked to Hacking & Malware Misuse is fairly common –Mostly admin abuse Deceit and social attacks –Involved a range of methods, vectors, and targets Physical attacks –Represent minority of caseload –Portable media in one case (but not essential to breach) Error is extremely common –Rarely the direct cause –Usually contributing factor (67%)

Breakdown of Hacking (64% of breaches) Default credentials and SQL injection most common Few and old vulnerabilities exploited Web Apps & Remote Access are main vectors Techniques Vectors Vulnerability Exploits

Breakdown of Malware (38% of breaches) Most malware installed by remote attacker Malware captures data or provides access/control Increasingly customized

Malcode: focus on softer targets Data in running memory: RAM scrapers. Created well after initial point of entry. Filter out string patterns & sequences within memory. Dump to file, encrypt and exfiltrate. Difficult to locate without forensic tools. Data in-transit: Simple packet-capture utilities. Exploit compliance-driven encryption requirements (ie. PCI:DSS, HIPAA). Footprint always unique. Undetectable by current anti-virus. Found only by searching for output data. Data in unallocated space: Capture data patterns from unused portion of disk. Example – expanding / contracting pagefiles. Windows particularly vulnerable. Sidesteps encryption of data at-rest & in-transit.

Attack Vectors & Targeting Directed attacks are last major evolution Cases seen in clearly related “groupings” Attacks leverage human staging point - “the insider” and ‘the vendor” Increasing at almost 1:1 rate with Partner sources More simultaneous attack vectors from 2008 than ever before. What’s next??

Unknown Unknowns Unknown data lower than ’04-’07 rates, but still accounts for 2/3 of compromised records –Discovery and classification Unknown privileges up –Account review An asset unknown to the organization Data unknowingly stored on an asset Unknown or forgotten external IT connections Accounts and Privileges not known to exist

Recommendations Recap from previous report (They still apply) Align process with policy Achieve “Essential” then worry about “Excellent” Secure Business Partner Connections Create a Data Retention Plan Control data with transaction zones Monitor event logs Create an Incident Response Plan Increase awareness Engage in mock incident testing

Recommendations, Cont’d New recommendations (Based on 2008 cases) Changing default credentials is key Avoid shared credentials User Account Review Application Testing and Code Review Smarter Patch Management Strategies Human Resources Termination Procedures Enable Application Logs and Monitor Define “Suspicious” and “Anomalous” (then look for whatever “It” is)

Summary 2008 saw much of the same, but new twists and trends were observed Sources: Similar distribution; organized crime behind most large breaches –Organized criminal groups driving evolution of cybercrime Attacks: Criminals exploit errors, hack into systems, install malware –2008 saw more targeted attacks, especially against orgs processing or storing large volumes of desirable data –Highly difficult attacks not common but very damaging –Large increase in customized, intelligent malware Assets and Data: Focus is online cashable data –Nearly all breached from servers & apps –New data types (PIN data) sought which requires new techniques and targets Discovery: Takes months and is accomplished by 3 rd parties Prevention: The basics–if done consistently–are effective in most cases –Increasing divergence between Targets of Opportunity and Targets of Choice »ToO: Remove blatant opportunities through basic controls »ToC: Same as above but prepare for very determined, very skilled attacks –Initial hack appears the easiest point of control

Questions?

18 In case of an incident, please call our worldwide 24/7 Incident Response Hotline: