1 Title ECI: Anatomy of a Cyber Investigation Who Are the Actors
2 Title Who is Doing it? 70% of breaches involved External agents 48% of breaches involved Internalagents 11% of breaches involved Partner agents Any breach can involve multiple individuals E.g. An employee of a subcontractors steals Credit Card numbers and delivers the Credit Card Numbers to an external 3 rd party
3 Title Who is Doing it? External Agents (70% breaches, 98% of lost data) 24%Organized Criminal Group 21%Unaffiliated Person(s) 3%External Systems or Sites 5%Others (Former Employee, Partner, Competitor, Customer) 45% Unknown
4 Title Who is Doing it? Internal Agents (48% of Breaches, 3% of records) Demographics (90% Deliberate ) 51% Regular Employees / end user 12% Finance / Accounting 12% System Admin 7%Upper management 8%Other ( Help desk, Software Dev, Auditor) 9% Unknown
5 Title Who is Doing it? Partner Agent (11% of Breaches, 1% of records) 3 rd party “hijack” Partner, Deliberate act of Partner “Organization that outsource their IT management and support also outsource a great deal of trust to these partners. … poor governance, lax security, and too much trust is often the rule “ Verizon Data Breach Investigation Report (p. 19)
6 Title How Are They Doing it?
7 Title How did insiders do it? Inter-connected factors and events 48% of breaches included Misuse of privilege 40% of breaches were by Hackers 38% of breaches used of Malware 28% of breaches used Social Engineering 15% of breaches were Physical attacks A single attack can may combine multiple vulnerabilities.
8 Title How did Outsiders do it? Hackers methods Web Applications 54% Remote Access 34% Backdoors 23% Network file sharing 4% Others (physical access, Wireless Network, unk)
9 Title Top 5 Methods of Attack Webpage Access Un / Improperly Secured Access Trusted network connections Trojans / Malware / Spyware Employee Malfeasance
10 Title Top 5 Methods of Attack Web Pages Unsecured web pages access SQL Injection Improperly designed website Oops - errors
11 Title Top 5 Methods of Attack Un / Improperly Secured Access Abandoned / Unguarded computers. Computers with too many connections Brute Force Backdoors
12 Title Top 5 Methods of Attack Trusted network connections Sub contractor / Sister company or agency
13 Title Top 5 Methods of Attack Trojans / Malware / Spyware of a Trojan Social Engineering Telephone Contact Contact Internet contact (Chat, IM, etc) Customized Malware (Largest attacks) Back doors
14 Title Top 5 Methods of Attack Employee Malfeasance Abuse of system access Use of un-approved hardware / device Rogue networks Improperly handled data
15 Title Timelines facts How long To Compromise Data Most took days to months 31% took only Minutes Time to Discovery Most took weeks or months 5% took minutes Time to Containment Most took days to weeks *some even months
16 Title Some thoughts 98% came from servers (duh) 85% an not very difficult 61% Discovered by a 3 rd party 86% had evidence in log files about attack