14
Iain Campbell [email protected] Cyber Crime Trends

Cyber Crime Trends

Embed Size (px)

DESCRIPTION

Cyber Crime Trends. The New Landscape. Deperimeterisation Social Media: Miracle or Menace? Where is my data? The Rise of the Targeted attack. www.criticalid.net. Types of Cyber Attacks. www.criticalid.net. 2013 Data Breach Investigations Report. - PowerPoint PPT Presentation

Citation preview

Page 1: Cyber Crime Trends

Iain Campbell

[email protected]

Cyber Crime Trends

Page 2: Cyber Crime Trends

The New Landscape• Deperimeterisation

• Social Media:Miracle or Menace?

• Where is my data?

The Rise of the Targeted attack

www.criticalid.net

Page 3: Cyber Crime Trends

Types of Cyber Attacks

www.criticalid.net

Nuisance Economic Espionage

Organised Crime

Hacktivists

Objective Launch Points,

nuisance

Economic Advantage, theft of IP

Financial Gain Defamation, Publicity

Example Botnet, Spam Advance Persistent

Threat

Credit Card Theft

Anonymous

Targeted X √ √ √Persistent X √ √ X

Page 4: Cyber Crime Trends

2013 Data Breach Investigations Report

http://www.verizonenterprise.com/DBIR/2013/

www.criticalid.net

Page 5: Cyber Crime Trends

2013 Data Breach Investigations Report

http://www.verizonenterprise.com/DBIR/2013/

www.criticalid.net

Page 6: Cyber Crime Trends

Who wants my data?

www.criticalid.net

Unit 61398 of the People’s Liberation Army, tasked with ”computer network operations”.

19th February 2013: APT1: Exposing One of China's Cyber Espionage Units

the volume and sophistication of the attacks so intense that they threaten the fundamental relationship between Washington and Beijing.

Mandiant tracked Comment Crew for 6yrs identifying 141 attacks called APT 1

3000 indicators (domain, IP, MD5) to identify attack source all led to Pudong district of Shanghai, outside HQ of unit 61398

Comment Crew launched RSA attack

http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf

Page 7: Cyber Crime Trends

Who else wants my data?

www.criticalid.net

• Every cell phone call in Bahamas “archived”

• Call records of almost everyone inside the United States “collected”

• Gmail “backdoor access”, Microsoft encryption weakened, denies data center access

• RSA received $10 million to weaken encryption

• Truecrypt mysteriously goes offline

Utah Data Center

Page 8: Cyber Crime Trends

Next Generation attacks

www.criticalid.net

Google's security team reported Heartbleed on April 1Affects OpenSSL

17% of the Internet's secure web servers were vulnerable, at time of disclosure on 7th April

Bug deemed as catastrophic, and incidents included: Canada Revenue Agency, Community Health Systems (US),

Massive password changes required including Akamai, Ars Technica, Bitbucket, BrandVerity, Freenode, GitHub, Mojang, Mumsnet, Pinterest, Reddit, SourceForge, Tumblr, etc...

Shellshock: 'bigger than Heartbleed' 25 September 2014!

April 2014

Page 9: Cyber Crime Trends

What about South Africa?

November 9 2012“There are indications at this stage that only a limited number of card details have been accessed by outside organisations, and as a result limited fraud has been perpetrated" – Payment Association of South Africa, CEO Walter Volke

“The card data emanating from these online transactions seems to have been stored in a manner which does not meet the stringent security standards expected by PASA”

There was no need for “undue concern”

www.criticalid.net

www.iol.co.za/news/south-africa/bank-card-details-leaked-pasa-1.1420656

Bank card details leaked - PASA

Page 10: Cyber Crime Trends

What about South Africa?

October 15 2013

PASA, card schemes and SA’s major banks have taken immediate steps to prevent a further leakage of card details because of a security lapse at a company processing transactions.

“All the fast-food retailers have been cleaned out as far as possible, and certainly no one will be out of pocket [as the banks will honour losses].”

Unique variant used in SA, original emerged in December 2012.

How did the data get out? & who is liable?

www.criticalid.net

http://www.techcentral.co.za/sa-banks-in-massive-data-breach/44338/

Dexter infects Point of Sale terminals

Page 11: Cyber Crime Trends

http://www.sec.gov/divisions/corpfin/guidance/cfguidance-topic2.htm

Designed to elicit disclosure of timely, comprehensive, and accurate information about risks and events that a reasonable investor would consider important to an investment decision.

Should review, the adequacy of their disclosure relating to cybersecurity risks and cyber incidents, if the costs or consequences with one or more known incidents or the risk of potential incidents represent a material event

(i.e. may reasonably be expected to affect the company's stock price)

Estimate the impact of cyber incidents and the consequences of failing to implement adequate security. Go beyond privacy, to key operational issues

www.criticalid.net

Page 12: Cyber Crime Trends

Where is the Risk?

www.criticalid.net

Market risk: Dealstream collapse in 2008 VOX telecom exposure of R30 million Single Stock Futures gives ABSA R1.4 billion liability

Credit Risk: Standard Bank vehicle finance: R504m impairment loss in

FY to June 2014 African Bank: R6.4 billion

What about cyber crime losses and risk exposure? SABRIC estimates R480 million card fraud losses in 2013http://www.iol.co.za/dailynews/news/sa-lost-r480m-to-card-fraud-1.1610443

Page 13: Cyber Crime Trends

Conclusion• Payment systems are top target of attacks• New threat environment:

• Next generation systemic vulnerabilities• Shellshock: 'bigger than Heartbleed'

25 September 2014!• Encryption is no longer safe? • Changing legal framework

• New legal implications for data breaches

Are you ready for a Security Breach?

www.criticalid.net

Page 14: Cyber Crime Trends

Iain Campbell

[email protected]

THANK YOU

079 015 1905