vandals, burglars, thugs, spies and saboteurs · vandals, burglars, thugs, spies, and saboteurs....

43
Vandals, Burglars, Thugs, Spies and Saboteurs The Politics and Economics of Cyber Crime

Upload: others

Post on 14-Mar-2020

11 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Vandals, Burglars, Thugs, Spies and SaboteursThe Politics and Economics of Cyber Crime

Page 2: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that
Page 3: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Who is Behind the Cyber Attacks?

Not Him

Page 4: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Who is Behind the Cyber Attacks?

“I bucket [cyber] threats into vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that we’re concerned about.

Dr. Andy OzmentCISO, Goldman Sachs

Page 5: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

CERRID #######PAGE 5

UNCLASSIFIED

5

Cyber Threat Actors and Motivations

Page 6: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Vandals: Anonymous Website Attacks

Page 7: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Vandals: Ashley Madison Data Breach

Page 8: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Burglars: Phishing [email protected]

We notice Suspicious login attemptsNot personalized

http://kancelariabrylka.eu/templates/system/Amex.php

Action required:-

Page 9: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Burglars: Ransomware

Page 10: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Burglars: Saks, Lord & Taylor Breach

Page 11: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Thugs: North Korean Attack on Sony Pictures

Page 12: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Thugs: Mirai DDOS Attacks

Page 13: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Spies: PLA Unit 61398

• APT1 compromised: - 141 companies - 20 major industries

• Created 40 malware families

• Operated 2006 to 2014• Targeted industries that

China identified as strategic to its growth

Page 14: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Saboteurs: The Stuxnet Worm

• July, 2010: Stuxnet worm was discovered attacking Siemens industrial control systems

• Intended target was the centrifuges operating Iran’s nuclear enrichment program at Natanz

• Highly likely that Stuxnet was designed and deployed by a joint US/Israeli government effort

Page 15: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Saboteurs: Not Petya (How to Sink a Shipping Company)

Page 16: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

VandalsHacktivists & EnthusiastsIndividuals/Small Teams

Low CapabilityIdeology Focused

BurglarsOrganized Crime

Multiple Small TeamsModerate CapabilityFinancial Focused

ThugsOrganized Crime & Nation States

Varying CapabilitiesCoercion or Financial

SpiesNation States

Economic or Political FocusHighly Professional Teams

SaboteursNation States

Military or Political FocusHighly Professional Teams

Page 17: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

The Business of Cyber Crime

Page 18: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Criminal Motivation

Page 19: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

How People Think ID Theft Works

1 2 3 4

Source: Gemini Advisory, Jan 5, 2018

Page 20: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

How ID Theft Actually Works

321 4

Source: Gemini Advisory, Jan 5, 2018

Page 21: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Dark Web Bazaars

Page 22: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Carding Shops - McDumpals

Page 23: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Payment Cards Available for Sale – Nov 2018

45.80

4.60

14.20 11.30

41.60

4.30

- 5.00

10.00 15.00

20.00 25.00

30.00 35.00

40.00

45.00 50.00

USA World

Mill

ions

of C

ards

CP CNP EMV CP CNP EMV

Source: Gemini Advisory, Nov 5, 2018

Page 24: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

What is Your Credit Card Worth?

Cards available for sale: 490,000 Average Price: $16

Source: Gemini Advisory, Nov 5, 2018

Page 25: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

The Characteristics of Modern Cyber Crime

• 80% of cyber crime is the result of organized activity• Typically involves multiple independent groups, each

delivering a “service”• ROI for sophisticated

services is very high

Page 26: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

The Art of Cyber Espionage and Warfare

Page 27: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

State Motivations for Cyber Activity

Page 28: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

An APT Attack Life Cycle

Page 29: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Dragonfly – The TimeLine

29

ExecutiveSpear Phishing

Jan2013

Mar Jun Sep Jan2014

Mar Jun

ICS Integrator“Watering Hole” Attacks

Trus

ted

Softw

are

Dow

nloa

d At

tack

#1

Trus

ted

Softw

are

Dow

nloa

d At

tack

#2

Trus

ted

Softw

are

Dow

nloa

d At

tack

#3

Detection Tools Released

Page 30: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Dragonfly - Exploiting Supplier-User Trust

Vendor Website Industrial Facility

IndustrialTechnician

CyberAttacker

Page 31: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

2015 Ukraine Power Outages

Source: E-ISAC | Analysis of the Cyber Attack on the Ukrainian Power Grid | March 18, 2016

Page 32: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

What Can I Do?

Page 33: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Passwords are like Toilet Paper

Never use it twice

Page 34: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

The Anatomy of a Password Reuse Attack

Source: Gemini Advisory, April 1, 2018

Page 35: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

The Anatomy of a Password Reuse Attack

Page 36: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Why I Don’t Care

Page 37: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Password Managers: One Password to Rule Them All

Page 38: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Password Managers: One Password to Rule Them All

Page 39: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Multifactor Authentication

Page 40: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Multifactor Authentication

Page 41: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Insist on Usable Security

Being secure must be easier than not being secure

Page 42: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Put the Pressure On

Page 43: Vandals, Burglars, Thugs, Spies and Saboteurs · vandals, burglars, thugs, spies, and saboteurs. The first three categories aren’t as dangerous. It’s the spies and saboteurs that

Questions