14
Matthew WONG Consulting Systems Engineer, FireEye Targeted Attack on Enterprise

Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic

Matthew WONG

Consulting Systems Engineer, FireEye

Targeted Attack on

Enterprise

Page 2: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic

Evolution of Cyber-Defense Strategies

Cyber Crime Economic Lost increased

27x in six years and up to HKD 1.2 Billion in 2014

Page 3: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic

The Number of Industries Targeted by Advanced Attackers continues to Expand and Evolve

Page 4: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic
Page 5: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic

CTB locker ransomware still very active

Every company is facing this problem

Page 6: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic

The basics

Attacker’s Goal: Issue instructions on the victim PC

Page 7: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic

The basics

Application Document

Page 8: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic

Types of attack

Fool the Human: Fool the Computer: Social Engineering Exploitation

Page 9: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic

Types of attack: End User Social Engineering

Fool the Human: Social Engineering

Page 10: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic

Types of attack: Vulnerability Exploitation

Fool the Computer: Exploitation

Page 11: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic

How do you “fool the computer”

Not meant to issue instructions, but can if a vulnerability exists in the app

which uses this document / data

Page 12: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic

For example…

Microsoft security advisory: Vulnerability in Internet Explorer could allow remote code execution

Page 13: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic

Importance of patching

Page 14: Targeted Attack on Enterprise - Hong Kong | Home · Consulting Systems Engineer, FireEye Targeted Attack on Enterprise . Evolution of Cyber-Defense Strategies Cyber Crime Economic

BEHIND THE

WHEEL 10010

0101

1110

0100 10010

0011

1101

0010

111

0

010

0