31
The 2016 Internet Security Threat Report: The Good (not much). The Bad (way more of that). And The Ugly (the aDacks conGnue to outpace healthcare) David S. Finn CISA, CISM, CRISC Health IT Officer, Symantec

The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

The  2016  Internet  Security  Threat  Report:      The  Good  (not  much).  The  Bad  (way  more  of  that).  And  The  Ugly  (the  aDacks  conGnue  to  outpace  healthcare)  

David  S.  Finn  CISA,  CISM,  CRISC  Health  IT  Officer,  Symantec  

Page 2: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

Agenda  

2  

1   The  2016  Internet  Security  Threat  Report  

2   The  Healthcare  Internet  Security  Threat  Report  

3   HHS  Healthcare  Industry  Cybersecurity  Task  Force  update  

Page 3: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

One  of  the  most  comprehensive  sources  of  Internet  threat  data  in  the  world  

•  63.8  million  aEack  sensors  –  Records  thousands  of  events  per  second  

•  Monitors  threat  acIvity  in  over  157  countries/territories  

•  Coupled  with  one  of  the  most  comprehensive  vulnerability  data  bases  –  74,180  recorded  vulnerabiliIes  (20+  years)  –  Over  23,980  vendors  represenIng  71,470  products  

•  Over  9  billion  emails  are  processed  each  month  

•  Over  1.8  billion  web  requests  filtered  each  day  •  Phishing  informaIon  collected  through  an  extensive  anI-­‐fraud  community  of  enterprises,  security  vendors  and  more  than  52  million  consumers  on  175  million  endpoints  

•  Symantec  secures  more  than  1  million  web  servers  

3  2016  Internet  Security  Threat  Report  Volume  21  

Page 4: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

Highlights  from  the  21st  Internet  Security  Threat  Report  1.  On  Average,  One  Zero-­‐day  was  

discovered  every  week  in  2015  

2.  Over  Half  a  Billion  Personal  InformaIon  Records  Lost  to  Breach  

3.  Three  out  of  Every  Four  Websites  Put  You  at  Risk  

4.  EncrypIon  Now  Used  as  a  Cyber  Weapon  to  Hold  Companies  and  Individuals’  CriIcal  Data  Hostage    

5.  Don’t  Call  Us,  We’ll  Call  You:  Cyber  Scammers  Now  Make  You  Call  Them  to  Hand  Over  Your  Cash  

 

4  

In  2009  there  were    2,361,414    

new  piece  of  malware  created.    

In  2015  that  number  was      430,555,582  

 

That’s    1  Million  179  Thousand  

a  day.  

2016  Internet  Security  Threat  Report  Volume  21  

Page 5: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

2006  

14  

2007   2008   2009   2010   2011   2012  0  

2  

4  

6  

8  

10  

12  

14  

16  

13  

15  

9  

12  

14  

8  

       Zero-­‐Day  VulnerabiliGes  

2013   2014  

24  23  

2015  

54  

2016  Internet  Security  Threat  Report  Volume  21  5  

Copyright  2016,  Symantec  CorporaIon    

Page 6: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

Targeted  ADacks  

6  

2012   2013   2014  

•  Recipients  per    Campaign  

•  Average  Number    of  Email  ADacks    Per  Campaign  

•  Campaigns  

2015  

300  

600  

900  

1,200  

1,500  

150  

120  

90  

60  

30  12  

25  29  

122  

111  

23  18  

11  

1,305  

841  77

9  

408  

55%  increase    

2016  Internet  Security  Threat  Report  Volume  21   Copyright  2016,  Symantec  CorporaIon    

Page 7: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

Spear-­‐Phishing  ADacks  by  Size  of  Targeted  OrganizaGon  

7  

Org  Size  

2015    Risk  RaGo  

2015    Risk  RaGo  

as  Percentag

e  

ADacks    per  Org  

Large  Enterpris

es  2,500+  

Employees  

1  in  2.7   38%   3.6  

Medium  Business  251–2,500  

Employees  

1  in  6.8   15%   2.2  

Small    Business  (SMB)    1–250  

Employees  

1  in  40.5   3%   2.1  2011   2012   2013   2014   2015  

2016  Internet  Security  Threat  Report  Volume  21   Copyright  2016,  Symantec  CorporaIon    

Page 8: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

       Total  IdenGGes  Exposed  

232  

93  

552  

348  429  

0  

100  

200  

300  

400  

500  

600  

2011   2012   2013   2014   2015  

MILLION   +23%  

500  

+30%  

ESTIMATED  

8  2016  Internet  Security  Threat  Report  Volume  21   Copyright  2016,  Symantec  CorporaIon    

Page 9: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

Mega  Breaches  2015  

9  2016  Internet  Security  Threat  Report  Volume  21   Copyright  2016,  Symantec  CorporaIon    

Page 10: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

VulnerabiliGes  

10  2016  Internet  Security  Threat  Report  Volume  21   Copyright  2016,  Symantec  CorporaIon    

Page 11: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

11  

ProfessionalizaGon  of  Cybercrime  

Page 12: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

Hacktool.MulGPurpose  

12  2016  Internet  Security  Threat  Report  Volume  21   Copyright  2016,  Symantec  CorporaIon    

Page 13: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

13  

Tech  Support  Scams  –  Outbound  Call  Centers  (Boiler  Rooms)  to  Support  the  Scam  

Hello  sir,  Your  computer  is  infected.  Please  purchase  a  support  plan  for  $75  so  we  can  help  you…  

2016  Internet  Security  Threat  Report  Volume  21   Copyright  2016,  Symantec  CorporaIon    

Page 14: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

TeslaCrypt  Ransomware  –  Technical  Support  Available  

14  2016  Internet  Security  Threat  Report  Volume  21   Copyright  2016,  Symantec  CorporaIon    

Page 15: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

Dridex  Gang  -­‐  Number  of  Known  Spam  Runs  Per  Day    

15  2016  Internet  Security  Threat  Report  Volume  21   Copyright  2016,  Symantec  CorporaIon    

Page 16: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

When  Cyber  Criminals  .  .  .    

Work  in  Call  Centers,  Write  DocumentaGon  

and  Take  the  Weekends  Off    

You  Know  its  a  Profession  

16  

Page 17: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

17  

Ransomware  The  biggest  news  in  Healthcare  in  2016  

Page 18: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

It  is  not  new  

18  

CRYPTO  RANSOMWARE  

“FEE”  

LOCKER  RANSOMWARE  

“FINE”  

FAKE  AV  

“CLEAN”  

MISLEADING  APP  

“FIX”  

           2014-­‐2015                  2012-­‐2013              2010-­‐2011                  2005-­‐2009  

LOCKER  RANSOMWARE  

2016  Internet  Security  Threat  Report  Volume  21   Copyright  2016,  Symantec  CorporaIon    

Page 19: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

Growing  Dominance  of  Crypto-­‐Ransomware  

19  

MISLEADING  APP   FAKE  AV   LOCKER  RANSOMWARE  

CRYPTO  RANSOMWARE  

‘05   ‘06   ‘07   ‘08   ‘09   ‘10   ‘11   ‘12   ‘13   ‘14   ‘15  

2016  Internet  Security  Threat  Report  Volume  21   Copyright  2016,  Symantec  CorporaIon    

Page 20: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

35%  Increase  in  Crypto-­‐Ransomware  ADacks  

20  

35%  

2016  Internet  Security  Threat  Report  Volume  21   Copyright  2016,  Symantec  CorporaIon    

Page 21: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

Ransomware  Families  

21  

•  Android  •  Linux  •  OSX  

2016  Internet  Security  Threat  Report  Volume  21   Copyright  2016,  Symantec  CorporaIon    

Page 22: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

Healthcare  Cybersecurity  -­‐  -­‐  Not  Business  as  Usual  Anymore    

22  

Page 23: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

Healthcare  Issues  

•  Compliance  versus  Security  

•  Phishing  ADacks  and  Ransomware  

•  Medical  Device  Security  Risks  

•  Resource  Challenges  

23  2016  Internet  Security  Threat  Report  Volume  21   Copyright  2016,  Symantec  CorporaIon    

Page 24: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

Sectors  Breached  by  Number  of  Incidents  Healthcare  is  denoted  as  a  sub-­‐sector  within  the  Services  industry,  and  120  of  the  200  breaches  that  occurred  within  the  Services  sector  were  a;ributed  to  Healthcare.    

Sector/Sub-­‐Sector  

Number  of  

Incidents  

%  of  Incidents  

IdenGGes  Exposed  

%  of  IDs  Exposed  

Services   200  (1)   65.6%   259,893,565  (1)   60.6%  

Health  Services  

120  (1)   39.3%   4,154,226  (10)   1.0%  

24  2016  Internet  Security  Threat  Report  Volume  21   Copyright  2016,  Symantec  CorporaIon    

Page 25: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

Healthcare  v.  Overall  

Percentage  of  Spam  in  Email  by  Industry  Group  

Health  Services   54.1  

Phishing  RaGo  in  Email  by  Industry  Group  

Phish:Email  RaGo  

Healthcare/Health  Svcs  

1  in  2,711  

25  

Virus  RaGo  in  Email  by  Industry  Group  

RaGo  of  Malware:Email  

Healthcare/Health  Svcs.  

1  in  396  

Overall  Email  Spam  RaGo  

2013   2014   2015  

66%   60%   53%  

-­‐6  pts.   -­‐7  pts.  

Email  Phishing  Rate  Rate  (Overall)  

2013   2014   2015  

1  in  392   1  in  965   1  in  1,846  

Email  Malware  Rate  (Overall)  

2013   2014   2015  

1  in  196   1  in  244   1  in  220  2016  Internet  Security  Threat  Report  Volume  21   Copyright  2016,  Symantec  CorporaIon    

Page 26: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

26  

HHS  Healthcare  Industry  Cybersecurity  Task  Force  

Page 27: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

Purpose  Charged  under  Title  IV,  SecIon  405  of  Cybersecurity  InformaIon  Sharing  Act  of  2015  (CISA)  

 

•  How  industries  other  than  the  healthcare  industry  have  implemented  strategies/safeguards  for  addressing  cybersecurity  threats  in  their  respecIve  industries  

•  Challenges  &  Barriers  private  enIIes  in  the  healthcare  industry  faces  securing  themselves  against  cyber  aEacks  

•  Challenges  that  HIPAA  Covered  EnIIes  and  Business  Associates  face  in  securing  networked  medical  devices  and  other  soiware  or  systems  that  connect  to  an  Electronic  Health  Record  

27  

Page 28: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

Make-­‐up  

•  21  members  –  Providers,  Payers  –  Data  Journalist,  Consumer  Advocate  

–  Security  companies  –  EHR-­‐support,  Med  Device  makers  –  Pharma,  Labs  

–  UL  –  HHS,  DHS,  NIST,  DoD  

•  Ability  to  reach  back  to  partners  in  the  broader  Healthcare/Public  Health  Sector  

•  Developers/Vendors  called  out  specifically  in  the  CISA  legislaIon  

 28  

Page 29: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

Schedule  

•  Eight  2-­‐hour  calls  

•  Four  face-­‐to-­‐face  meeIngs  –  April,  July,  September,  December  

•  ~5  hours  month  in  addiIon  to  meeIngs  (Ha!)  

•  A  report  to  Congress  describing  the  state  of  cybersecurity  within  the  Healthcare  and  Public  Health  (HPH)  Sector  

•  Materials  to  assist  healthcare  industry  partners  in  implemenIng  the  NIST  Cybersecurity  Framework  

29  

Page 30: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

&  Q   A  

30  

Internet  Security  Threat  Report:  hEp://www.symantec.com/security-­‐center/threat-­‐report    Healthcare  Internet  Security  Threat  Report:  hEps://www.symantec.com/soluIons/healthcare    

Page 31: The$2016$Internet$Security$Threat$Report:$ …...Agenda$ 2 1 The’2016’InternetSecurity’Threat Report 2 The’Healthcare’InternetSecurity’ ThreatReport 3 HHS’Healthcare’Industry’Cybersecurity’

Thank  you!  

Copyright  ©  2015  Symantec  CorporaGon.  All  rights  reserved.  Symantec  and  the  Symantec  Logo  are  trademarks  or  registered  trademarks  of  Symantec  CorporaIon  or  its  affiliates  in  the  U.S.  and  other  countries.  Other  names  may  be  trademarks  of  their  respecIve  owners.  

This  document  is  provided  for  informaIonal  purposes  only  and  is  not  intended  as  adverIsing.  All  warranIes  relaIng  to  the  informaIon  in  this  document,  either  express  or  implied,  are  disclaimed  to  the  maximum  extent  allowed  by  law.  The  informaIon  in  this  document  is  subject  to  change  without  noIce.  

David  S.  Finn,  CISA,  CISM,  CRISC      [email protected]  

@DavidSFinn  

832.816.2206