45
1 Dragos Stavarache Business Developer End-to-end security

Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

1

Dragos StavaracheBusiness Developer

End-to-end security

Page 2: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Agenda

2

2013: The Year of Mega Breach1

Targeted Attack Campaigns on the Rise2

The Evolution of Malware

3

4

Vulnerabilities Continue to Facilitate Attacks

5

Future Trend: Internet of Things6

Mobile = Danger

Page 3: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Global Intelligence NetworkIdentifies more threats, takes action faster & prevents impact

Information ProtectionPreemptive Security Alerts Threat Triggered Actions

Global Scope and ScaleWorldwide Coverage 24x7 Event Logging

Rapid Detection

Attack Activity• 240,000 sensors

• 200+ countries

and territories

Malware Intelligence• 133M

client, server, gateways

monitored

• Global coverage

Vulnerabilities• 35,000+ vulnerabilities

• 11,000 vendors

• 80,000 technologies

Spam/Phishing• 5M decoy accounts

• 8B+ email messages/day

• 1B+ web requests/day

Austin, TXMountain View, CA

Culver City, CA

San Francisco, CA

Taipei, Taiwan

Tokyo, Japan

Dublin, IrelandCalgary, Alberta

Chengdu, China

Chennai, India

Pune, India

3

Page 4: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Threat Landscape in 2013

4

CyberespionagePrivacy

Malicious Insider

Ransomware

Data Breaches

Mobile

Internet of Things

Page 5: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Timeline of Mega Breaches

5

Timeline of Data Breaches, 2013Source: Symantec

43

123

53

23

6 80.3 0.8

159

113

130

24

1719

15 15 15

37

17

22

26

20

26

0

20

40

60

80

100

120

140

160

0

5

10

15

20

25

30

35

40

J F M A M J J A S O N D

IDEN

TITI

ES E

XP

OSE

D (

Mill

ion

s)

NU

MB

ER O

F IN

CID

NET

S

INCIDENTS IDENTITIES EXPOSED (Millions)

8 of the top 10 breaches were of

more than 10 million identities

Number of identities exposed

were 4 times greaterthan 2012

Page 6: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Causes of Breaches

6

Top Causes of Data Breach, 2013Source: Symantec

Hackers

Accidentally Made Public

Theft or Loss of Computer or Drive

Insider Theft

Unknown

Fraud

34%

29%27%

6%

2%2%

87

72

69

15

6

4

253TOTAL

Numberof Incidents

Average number of identities exposed per data breach for hacking incidents was approximately

4.7 million

Theft or loss + accidental breaches accounted for

56% of data breach incidents

Page 7: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Breaches by Sector

7

Data Breaches by Sector, 2013Source: Symantec

Data Breaches by Sector, Percent of Identities Exposed, 2013Source: Symantec

Healthcare, education and the public sectors accounted for 58% of all data breaches

But, the retail, computer software and financial sectors accounted for 77% of all identities exposed in 2013

9% Government

7% Retail

5% Accounting

5% ComputerSoftware

Healthcare

37%

Education

12%

4% Financial

4%

4%

13%

Hospitality

Insurance

Other

Retail

30%

ComputerSoftware

28% InformationTechnology

Financial

19%

Hospitality

Telecom

AccountingHealthcareOther

4%

4%

1%1%

2%

2%

SocialNetworking

9%

Page 8: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Breaches: What Was Lost?

8

Real Names

Birth Dates

Government ID Numbers (Social Security)

Home Address

Medical Records

Phone Numbers

Financial Information

Email Addresses

User Names & Passwords

Insurance

01

02

03

0405

06

07

08

09

10

Page 9: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Targeted Attacks

9

Page 10: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Increase in Targeted Attacks

10

+91%

Increase in targeted attack campaigns

2012

2013

Page 11: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Targeted Attack Campaigns

11

2011 2012 2013

Email per Campaign

Recipient/Campaign

78

122

29

61

111

23

Campaigns

Duration of Campaign

165

408

779

4 days 3 days 8.3 days

Page 12: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Targeted Industries

12

Top 10 Industries Targetedin Spear-Phishing Attacks, 2013Source: Symantec

Public Administration (Gov.)

Services – Professional

Services – Non-Traditional

Manufacturing

Finance, Insurance & Real Estate

Transportation, Gas, Communications, Electric

Wholesale

Retail

Mining

Construction

16%15

141313

65

211

Page 13: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Targeted Organization by Size

13

Spear Phishing Attacks by Size of Targeted Organization, 2011 - 2013Source: Symantec

50% 50%39%

18%31% 30%

100%

0

2011 2012 2013

1,501 to 2,500

1,001 to 1,500

501 to 1,000

251 to 500

1 to 250

2,501+Employees

50% 50%61%

Page 14: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Most Likely to be Targeted

14

Executive Assistant at a large company

[email protected]

Re: Order Payment

Please click on this executable to see your order information.

Page 15: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Risk of Being Targeted by Job Role

15

Personal Assistant (Executive Assistant)High

Medium

Low

Media

Senior Management

Sales

C-Level

Recruitment

R&D

Risk

Risk of Job Role Impact by Targeted AttackSent by Spear-Phishing EmailSource: Symantec

Page 16: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Risk of Being Targeted by Industry

16

Ratio of Organization in an IndustryImpacted by Target AttackSent by Spear-Phishing EmailSource: Symantec

High

Medium

Low

Risk

Mining

Public Administration (Government)

Manufacturing

Wholesale

Transportation, Communications,Electric, Gas & Sanitary Services

Finance, Insurance & Real Estate

Services – Non-Traditional

Construction

Agriculture, Forestry & Fishing

2.7

3.1

3.2

3.4

3.9

4.8

6.6

11.3

12.0

1 in

Page 17: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Word Cloud: Spear Phishing Attacks

17

Most frequently occurring words used in targeted spear phishing email attacks throughout 2013

Page 18: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Vulnerabilities

18

Page 19: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Zero-Day Vulnerabilities

19

1315

912

14

8

14

23

0

5

10

15

20

25

30

2006 2007 2008 2009 2010 2011 2012 2013

Zero-Day Vulnerabilities, Annual Total,2006 - 2013Source: Symantec

23 zero-day vulnerabilities discovered in 2013

Increase from 14 in 2012

More zero-day vulnerabilities discovered in 2013 than in any year since we started tracking

More zero-days in 2013 than in past two years combined

Page 20: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Website Vulnerabilities

20

Scanned Websites With Vulnerabilities

53% 78%

+25%pts

2012 2013

1 IN 8 sites had critical unpatched vulnerabilities

Page 21: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Malicious Websites

With so many vulnerable websites, cybercriminals don’t need to set up own websites to host malware

21

New Unique Malicious Web Domains

56,158

74,001

55,000

-24%2013

2012

2011

Page 22: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Web-based Attacks

Web-based attacks continue to grow

22

Web Attacks Blocked Per Day

568,700

464,100

190,000

+23%2013

2012

2011

Page 23: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Evolution of Malware

23

Page 24: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

FakeAV depended on fear to work

When everyone knows it’s fake, there is no fear and the scam fails.

24

Precursor to Ransomware

Page 25: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

25

Cybercriminalsmoved to ransomware

Fear of arrest

Simple and (for bad guys) safe method of receiving “fine”

At $100-$400 a victim, it’s very profitable

From FakeAV to Ransomware

Page 26: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

26

Page 27: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Ransomware’s Growth

27

in Ransomwareattacks in 2013

112 107 138 141178 189

286

421

625

419

861

660

0

100

200

300

400

500

600

700

800

900

1000

J F M A M J J A S O N D

Ransomeware Over Time, 2013Source: Symantec

500%increase

Page 28: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Ransomware Turns Vicious

When people stop fearing ransomware?

Cryptolocker happens!

Cryptolocker most prevalent in threat category called ransomcrypt

No pretense of a fine

Must pay to get your files back

28

Page 29: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Mobile = Danger

29

Page 30: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Mobile Threats

Android remains the platform of choice for malware authors

30

Android

Symbian

Windows

Number of Threats

57

1

1

Percent of Threats

97%

2%

2%

0 0%

Platform

iOS

Mobile Threats: Malicious Code by Platform, 2013Source: Symantec

Page 31: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Mobile Malware

Creation of new mobile

malware slowed as

malware authors focused

on improving existing

malware

Average number of

variants per family in

2012 was 1:38

Increased to 1:57 in 2013

31

Android MobileMalware Families

Average Number of Variant Per Family

57 57

103 38

2013 2013

-45% +50%

2012 2012

Page 32: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Mobile Users at Risk

32

50%

38%

Source: 2013 Norton Report

Don’t use basic precautions such as passwords, security software or back up files for their mobile device

Of smartphone users have experienced mobile cybercrime in past 12 months

Page 33: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

72%90% 78%

56% 48%33%

DELETE SUSPICIOUS EMAILS FROM PEOPLE

THEY DON’T KNOW

HAVE AT LEAST A BASIC FREE ANTIVIRUS

SOLUTION

AVOID STORING SENSITIVE FILES

ONLINE

Mobile Security IQ

33

Source: 2013 Norton Report

Page 34: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Future Trend: Internet of Things

34

Page 35: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Future Trend: Internet of Things

35

Confirmed: Real world attacks against security cameras and baby monitors

Demonstrated: Hacking attacks against televisions, cars and medical equipment

Exaggerated: Reports of refrigerators sending spam messages

Page 36: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

36

With NAT router all devices appear to have a single IP address

A Refrigerator and a PC look like the same IP address

But spam was sent by W32.Waledac (Kelihos)

• W32 means a Windows OS

NAT Router

Internet of Things: Busting Refrigerator Myth

Page 37: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Internet of Things: What’s Next?

Wearable DevicesThey will be measuring and transmitting:

• Pulse

• Weight

• Time slept

• Glucose levels

• Blood pressure

• Exposure to sunlight

• Teeth brushing habits

• And more…

As more of our personal information travels the

Internet what will become of it?

Page 38: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

38

Download: symantec.com/threatreport

Follow: @threatintel

Stay Informed

Page 39: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Solutions

39

Page 40: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Avoiding Data Breaches

40

Data Classification

Data Loss Prevention

Host-based Intrusion Detection and Prevention

Email & Web Gateway Security

Encryption

Strong Authentication

• Determine what sensitive information exists in your organization

• Categorize it appropriately and protect it according to its classification level

• Detect and prevent exfiltration of sensitive information that is targeted by attackers

• Enforce rules prohibiting access of confidential data using applications

• Locks down key systems that contain confidential information

• Prevents any unauthorized code to run — independent of AV signatures

• Scan & block email with potentially malicious URLs, attachments or content.

• Monitor inbound/outbound web traffic and block accordingly

• Create and enforce security policy so all confidential information is encrypted

• Use two-factor authentication to protect against credential theft

Page 41: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Protection Against Targeted Attacks

41

Reputational & Behavioral Protection

Host-based Intrusion Detection and Prevention

Removable Media Device Control

Email & Web Gateway Security

Encryption

Endpoint & Network Data Correlation

Network Threat and Vulnerability Monitoring

• Detect and block new and unknown threats based on global reputation and behavior of files

• Locks down key systems that contain confidential information

• Prevents any unauthorized code to run — independent of AV signatures

• Restrict removable devices and functions to prevent malware infection

• Scan & block email with potentially malicious URLs, attachments or content.

• Monitor inbound/outbound web traffic and block accordingly

• Discover data spills of confidential information that are targeted by attackers

• Detect and prevent exfiltration of confidential information that are targeted by attackers

• Create and enforce security policies so all confidential information is encrypted

• Prioritize threat information detected at the network through security intelligence and information coming from endpoint security devices

Page 42: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Defending Against Malware

42

Reputational & Behavioral Protection

Host-based Intrusion Detection and Prevention

Removable Media Device Control

Email & Web Gateway Security

Endpoint & Network Data Correlation

Security Awareness Program

• Detect and block new and unknown threats based on global reputation and behavior of files

• Locks down key systems that contain confidential information

• Prevents any unauthorized code to run — independent of AV signatures

• Restrict removable devices and functions to prevent malware infection

• Scan & block email with potentially malicious URLs, attachments or content.

• Monitor inbound/outbound web traffic and block according

• Prioritize threat information detected at the network through security intelligence and information coming from endpoint security devices

• Ensure employees become the first line of defense against socially engineered attacks, such as phishing, spear phishing, and other types of attacks

Page 43: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Mitigating Mobile Attacks

43

Application Management

Device Management

Device Security

Identity & Access Control

Secure File Sharing

• Secure data in corporate applications regardless of device ownership

• Remotely wipe devices in case of theft or loss, control password policies

• Update devices with applications as needed without physical access

• Guard mobile device against malware

• Prevent the device from becoming a vulnerability

• Provide strong authentication and authorization for access to enterprise applications and resources

• Ensure safe access to enterprise resources from right devices with right postures

• Enable encrypted file sharing to ensure security as users share information

Page 44: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Vulnerability Security

44

Vulnerability Management Program

Configuration & Patch Management Program

Application Virtualization

Reputational & Behavioral Protection

Removable Media Device Control

• Routine, frequent vulnerability assessments and penetrations tests to identify vulnerabilities in applications, systems, and mobile devices

• Formal process for addressing identified vulnerabilities

• Ensure all operating system and application patches are evaluated and deployed in a timely manner

• Ensure adherence to formal, secure configuration standards

• Leverage application virtualization technologies to reduce risk when legacy web browsers and older versions of 3rd party applications like JAVA or Adobe Reader must be used for compatibility reasons

• Detect and block new and unknown threats based on global reputation and behavior of files

• Restrict removable devices and functions to prevent malware infection

Page 45: Speaker Training for ISTR19 - Cyber Security Day · •Detect and prevent exfiltration of sensitive information that is targeted by attackers •Enforce rules prohibiting access of

Thank you!

Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

45

Dragos Stavarache