©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Modern Day Attacks and a Silent Security Audit Kierk.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Modern Day Attacks and a Silent Security Audit Kierk.
7 Effective Habits when using the Internet Philip O’Kane 1.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Security for Today’s Threat Landscape Kat Pelak 1.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
#AVeSPresents AVeS Cyber Security Confidence in your Digital Information 2014/09/25 Charl Ueckermann Managing Director AVeS Cyber Security Lex Informatica.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals What’s Hiding on Your Network? Kevin Jones.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
1 1©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |
E - Safety What is it?. When do we need to be e-safe?
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Threats to I.T Internet security By Cameron Mundy.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Data Security GCSE ICT.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
Staying Safe Online Keep your Information Secure.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
©2015 Check Point Software Technologies Ltd. 1 Rich Comber SME, Threat Prevention Check Point Software Technologies Moving to a Prevent Based Security.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
A Growing Threat Debbie Russ 1/28/2015. What is Ransomware? A type of malware which restricts access to the computer system that it infects, and demands.
The Changing World of Endpoint Protection

1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
Secure . is a means of exchanging digital messages from an author to one or more recipients – it is instant with no delay or postal costs.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Cybersecurity Test Review Introduction to Digital Technology.
NADAV PELEG HEAD OF MOBILE SECURITY The Mobile Threat: Consumer Devices Business Risks David Parkinson MOBILE SECURITY SPECIALIST, NER.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Check Point & Security Market June 2013.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Android and IOS Permissions Why are they here and what do they want from me?
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
©2014 Check Point Software Technologies Ltd Security Report “Critical Security Trends and What You Need to Know Today” Nick Hampson Security Engineering.
Technical Implementation: Security Risks
An Introduction to Phishing and Viruses
A Project on CYBER SECURITY
4 ways to stay safe online 1. Avoid viruses and phishing scams
Threat Landscape for Data Security
Understanding Browsers
Presentation transcript:

©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Modern Day Attacks and a Silent Security Audit Kierk Sanderlin

2 2©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Monkey See, Monkey Do

3 3©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Monkey see, Monkey do, Monkey sell Black hole exploit kit

4 4©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Case Study – the EuroGrabber EuroGrabber

5 5©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Mission Objectives: Infect PC with Zeus Trojan Infect Mobile with Zeus Trojan Bypass two-factor authentication Goal: Steal money from banks

6 6©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | User Visit an infected website Infected with a Zeus variant Infect PC with Zeus Trojan

7 7©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Zeus in action

8 8©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Zeus in action cont. C&C Trojan sends Phone Number to C&C C&C sends the victim an SMS with a link to the mobile Zeus

9 9©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Mission Objectives: Infect PC with Zeus Trojan Infect Mobile with Zeus Trojan Bypass two-factor authentication Goal: Steal money from banks

10 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Bypassing Two-Factor Authentication C&C Trojan initiate a transaction behind the scene Mobile Trojan intercept the TAN Send TAN to C&C Bank sends a TAN to the mobile C&C sends TAN back to the PC Trojan Trojan complete the transaction using the TAN

11 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Mission Objectives: Infect PC with Zeus Trojan Infect Mobile with Zeus Trojan Bypass two-factor authentication Goal: Steal money from banks

12 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Constantly changing environment Just as water retains no constant shape, so in warfare there are no constant conditions - Sun Tzu, The Art of War “ ”

13 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | There is a lot going on in 2012

14 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Looking back and forward Main security threats & risks Security architecture Recommendations and beyond

15 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Multiple sources of data SensorNet 3D Reports Threat Cloud

16 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | A comprehensive survey 888companies 1,494gateways 120,000Monitoring hours 112,000,000security events

17 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | A comprehensive survey % of companies Americas EMEA APAC Industrial Finance Government Telco Consulting Other By geographyBy sector

18 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | The Check Point Security Report 2013 About the research Key findings Security strategy Summary

19 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | We will talk about 3 issues Threats to the organization Risky enterprise applications Data loss incidents in the network

20 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Another day, another major hack HACKED

21 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | 2012: the year of hacktivism Arab Spring Political freedom Foxcon Working conditions Justice Department Anti-corruption Vatican Unhealthy transmitters UN ITU Internet deep packet inspection

22 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | This does not affect me, right?

23 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | The majority of companies are infected 63% 100% = 888 companies of the organizations in the research were infected with bots

24 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Once in … always on Communicating with command & control every 21 minutes

25 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Top 2012 Bots

26 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Exploit kits are easy to buy Rental costs One day – 50$ Up to 1 month – 500$ 3 month – 700$ Rental costs One day – 50$ Up to 1 month – 500$ 3 month – 700$ Available online

27 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | But there is more than Bots, right? Malware INSIDE How does malware get to my network?

28 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Going to the wrong places…

29 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Downloading malware all the time 53% of organizations saw malware downloads

30 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Most attacks originate in the US Top malware locations, % US 71% Canada 8% Czech Rep 2% Slovakia 2% France 2% UK 2% Germany 2% Israel 3% Turkey 3% China 3%

31 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Anatomy of an attack Recon Exploit Toolkit Backdoor Damage BOT Virus RAT

32 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Two major trends BOT Virus Damage Profit drivenA Ideological driven B 4 RAT

33 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | We will talk about 3 issues Threats to the organization Risky enterprise applications Data loss incidents in the network

34 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | No longer a game

35 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | What are risky applications? Bypassing security or hiding identity Do harm without the user knowing it P2P file sharing Anonymizers File sharing / storage Social networks

36 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Risky applications Anonymizers

37 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | What is an anonymizer? UserProxySite

38 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | History of Anonymizers Began as “The Onion Router” Officially sponsored by the US Navy 80% of 2012 budget from US Government Used widely during Arab Spring

39 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | The risk of anonymizers Bypasses security infrastructure Used by botnets to communicate Hide criminal, illegal activity

40 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Anonymizers inside the corporation 47% of organizations had users of Anonymizers (80% were not aware that their employees use Anonymizers) 100% = 888 companies

41 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Risky applications P2P file sharing

42 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | The Risk of P2P Applications Downloading the latest “Walking Dead” episode right now Pirated content liability Malware downloads “Back door” network access

43 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | P2P inside the corporation 61% of organizations had a P2P file sharing app in use 100% = 888 companies

44 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Case example: P2P 3,800 personal details shared on P2P 95,000 personal details shared on P2P Fines for information disclosers

45 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Main takeaways… 61% 47% of organizations had users of anonymizers

46 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | We will talk about 3 issues Threats to the organization Risky enterprise applications Data loss incidents in the network

47 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | How common is it? 54% of organizations experienced data loss

48 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Many types of data leaked 24% Source Code 7% marked as confidential 14% Password protected file 29% Credit card information 13% Salary compensation information 7% Bank accounts numbers 6% Business data record 21% Other

49 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | PCI compliance can be improved36% Of financial organizations sent credit card data outside the organization

50 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Case examples: oops, wrong address 11 s for a lawyer to the wrong address Worker fired for sending sensitive information to the wrong people GPAs of all students leaked to hundreds of unintended recipients Accidentally leaked 4,000 student social security numbers Oct 2012 Oct 2012 Apr 2012 Apr 2012

51 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | We have all had this problem Error 552: sorry, that message exceeds my maximum message size limit Dropbox? YouSendIt? Windows Live?

52 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Storing and Sharing applications 80% of organizations use file storage and sharing applications 100% = 888 companies

53 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Top sharing and storage apps % of organizations But sharing is not always caring…

54 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | The Security Report 2013 About the research Key findings Security strategy Summary

55 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | We talked about three issues Threats to the organization Risky enterprise applications Data loss incidents in the network

56 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Anatomy of an attack Recon Exploit Toolkit Backdoor Damage BOT Virus RAT

57 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Addressing external threats FW AV IPS Anti Bot URLF Emulation

58 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Enabling secure application use URLF Antivirus Application Control Endpoint

59 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Preventing data loss Doc Sec DLP Data End Point Application Control User check

60 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Seeing attacks and protections SmartEvent SmartLog SmartDashboard

61 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | infected with bots Remember……. Threats to the organization Risky enterprise applications Data loss incidents in the network used Anonymizers had a data loss event 63%47%54%

62 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Thank You!