January 07 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
Security for Today’s Threat Landscape Kat Pelak 1.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
INTERNET SAFETY FOR EVERYONE
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
eScan Total Security Suite with Cloud Security
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
1.1 System Performance Security Module 1 Version 5.
IT security By Tilly Gerlack.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
Effective Restrictions on Internet Usage What is our responsibility? & What can I do?
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
December 4 th 2015 Intelligence Briefing NOT PROTECTIVELY MARKED.
December 11 th 2015 Intelligence Briefing NOT PROTECTIVELY MARKED.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
January 21 st 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.
January 15 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Safe Computing Practices. Outline Objective Safe Computing Defined Safe Computing Methods Summary List of References.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
A Quick and Easy Crash Course Internet Safety for Everyone.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Information Systems Design and Development Security Precautions Computing Science.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Ransomware BISD Technology Department. Ransomware Ransomware is a type of malicious software (malware) that infects a computer and/or mobile device and.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
INTERNET SAFETY FOR EVERYONE
Managing Windows Security
What they are and how to protect against them
Cyber Security Awareness Workshop
Data Compromises: A Tax Practitioners “Nightmare”
Cybersecurity Awareness
Robert Leonard Information Security Manager Hamilton
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Presentation transcript:

January 07 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED

Current Threats  Teenage Cyber Crime Awareness  Investigation Update  Malware  Ransom32 Action Fraud Reports from the South West Region  PBX/Dial Through Attack Miscellaneous  CiSP  New non-protectively marked briefing NOT PROTECTIVELY MARKED

 The SWRCCU are dealing with increased incidents in relation to teenage cyber crime. Help your children make the right choice and stay clear of cyber crime.  Please full screen to watch the video. NOT PROTECTIVELY MARKED

Investigation Updates: Ransomware  We are currently investigating a ransomware attack against an organisation in which a laptop holding sensitive information was infected.  This attack may be linked to the new Ransom32 malware. NOT PROTECTIVELY MARKED

Malware: Ransom32  New easy-to-use ransomware code has been discovered – it has been named Ransom32 and is believed to be a first of its kind. It is known to affect Windows, Mac and Linux.  The malicious code and administration system are written in the web languages HTML, CSS and JavaScript, which are commonly used on mainstream websites. It manipulates the JavaScript framework to infiltrate the victim’s computer.  The Ransom32 code is freely downloadable from one dark web site and can be downloaded by anyone who pays with Bitcoin.  Ransom32 has been designed for users who lack technical skills to create their own brand of ransomware. NOT PROTECTIVELY MARKED

Malware: Ransom32 (continued…) Infection:  The main method of distribution is currently via , though it is also possible to unknowingly download the malware from a compromised website.  The malware arrives embedded in a self-extracting RAR (compressed) file.  Ransom32 will connect to a command-and-control (C&C) server over the TOR anonymised network.  Once the malware has infected a system, victims can be locked out of their computer and asked to pay a ransom via Bitcoin currency to regain access.  The malware looks for and scrambles a huge variety of files including images, movies, documents and data archives.  It is highly unlikely that any encrypted files will be recoverable. Paying the ransom is no guarantee of getting the files back. NOT PROTECTIVELY MARKED

Malware: Ransom32 (continued…) Prevention:  Make sure anti-virus and malware scanners are running and up-to-date.  Be very cautious of unexpected s in your inbox and do not open any attachments from unknown sources.  Keep your web browsers and Java installations up-to-date.  Do not open an executable files that may appear randomly on your computer, unless you are familiar to it.  Make regular backups. Backup all sensitive data and personal files and store them offline on a different media such as an external hard drive.  Avoid surfing “questionable” sites. NOT PROTECTIVELY MARKED

Hacking PBX/ Dial Through We have received a report of a PBX/Dial Through attack on a dental lab based in Devon. The telephone system was compromised and calls were placed to premium rate numbers resulting in a financial loss of £343. In order to prevent yourselves becoming the next victim:  Use strong pin/passwords for your voic system, ensuring they are changed regularly.  If you still have your voic on a default pin/ password change it immediately.  Disable access to your voice mail system from outside lines. If this is business critical, ensure the access is restricted to essential users and they regularly update their pin/ passwords.  If you do not need to call international/ premium rate numbers, ask your network provider to place a restriction on your line.  Consider asking your network provider to block outbound calls at certain times eg when your business is closed.  Ensure you regularly review available call logging and call reporting options.  Regularly monitor for increased or suspect call traffic.  Secure your exchange and communications system, use a strong PBX firewall and if you don’t need the function, close it down!  Speak to your maintenance provider to understand the threats and ask them to correct any identified security defects. NOT PROTECTIVELY MARKED

CiSP - Cyber Crime Threats Shared The Cyber Security Information Sharing Partnership (CiSP), which is run by Cert-UK, is an information sharing platform used to share and publish cyber crime threat information. The aim of the platform is to allow members to take remedial action and modify their organisations to prevent cyber attacks. If you would like to join the CiSP then please sign up at and contact us as we can sponsor you. A regional South West CiSP is in place and will formally launched in March 2016; more details will be shared in due course. NOT PROTECTIVELY MARKED

Additional Briefing Dissemination This document has been given the protective marking of NOT PROTECTIVELY MARKED and may be disseminated outside law enforcement with no restriction. If you know anyone else who would like to receive this, please send us their address and we will add them to the distribution list. Any comments or queries please South West Regional Cyber Crime Unit at: NOT PROTECTIVELY MARKED