37
Threat Landscape John Shier Sr. Security Advisor @john_shier November 2016

IT Security landscape and the latest threats and trends

Embed Size (px)

Citation preview

Page 1: IT Security landscape and the latest threats and trends

Threat Landscape

John Shier Sr. Security Advisor @john_shier

November 2016

Page 2: IT Security landscape and the latest threats and trends

Phishing

Page 3: IT Security landscape and the latest threats and trends

How not to phish

3

Page 4: IT Security landscape and the latest threats and trends

How not to phish

4

http://[IP ADDRESS]/fcid/6a6f686e2e736869657240736f70686f732e636f6d/

Page 5: IT Security landscape and the latest threats and trends

Modern phishing

5

Page 6: IT Security landscape and the latest threats and trends

Modern phishing

6

Page 7: IT Security landscape and the latest threats and trends

HD phishing

7

Page 8: IT Security landscape and the latest threats and trends

Locally targeted

8

Page 9: IT Security landscape and the latest threats and trends

Malvertising

Page 10: IT Security landscape and the latest threats and trends

10

Page 11: IT Security landscape and the latest threats and trends

RTB Ad network Third party

Malvertising threat chain

Page 12: IT Security landscape and the latest threats and trends

No site is immune

12

Page 13: IT Security landscape and the latest threats and trends

Exploit kits

13

Page 14: IT Security landscape and the latest threats and trends

A decade of misery

14

2006 2013 2016

Page 15: IT Security landscape and the latest threats and trends

Exploits as a Service

15

Initial Request

Victims

Exploit Kit Customers Redirection

Malicious Payloads

Stats

Landing Page

Exploits

Payloads

Get Current Domain

Get Stats

Update payloads

Management Panel Malware Distribution Servers

Gateway Servers

VPN

Exploit Kit Admin Spammer/Malvertiser Exploit merchant

Ransomware author

Page 16: IT Security landscape and the latest threats and trends

EK prominence – October 2016

16

RIG

Nuclear

Chinese EK

Da Gong/Gondad

Angler

Fiesta

Neutrino v2

Other

Page 17: IT Security landscape and the latest threats and trends

Document malware

17

Page 18: IT Security landscape and the latest threats and trends

Why does document malware work?

18

•Out of the spotlight

•Familiarity and trust

•Email as file transfer protocol

•Patching failure

•Call to action

Page 19: IT Security landscape and the latest threats and trends

Curiosity infected the cat

19

Page 20: IT Security landscape and the latest threats and trends

Build Your Own

20

Page 21: IT Security landscape and the latest threats and trends

How to protect against document malware?

21

•Email filtering

•Sandbox

•Cloud services

•Document viewers

•Share files differently

Page 22: IT Security landscape and the latest threats and trends

Data stealing malware

22

Page 23: IT Security landscape and the latest threats and trends

Why does data stealing malware work?

23

•Multiple security failures

•Needs a human actor

•Poor network segregation

•Over privileged users

•Poor outbound filtering

•Unknown baseline

Page 24: IT Security landscape and the latest threats and trends

How does data stealing malware work?

24

Page 25: IT Security landscape and the latest threats and trends

Target(ed) exfiltration

25

Page 26: IT Security landscape and the latest threats and trends

How to protect against data stealing malware?

26

•Multiple security failures

•Needs a human actor

•Poor network segregation

•Over privileged users

•Poor outbound filtering

•Unknown baseline

Page 27: IT Security landscape and the latest threats and trends

Ransomware

27

Page 28: IT Security landscape and the latest threats and trends

Why does ransomware work?

28

•Complex threat chain

•Social Engineering

•No need for persistence

•Uses existing tools

•Geographically targeted, locally customized

•It ’s your data

Page 29: IT Security landscape and the latest threats and trends

Locky/Zepto/Odin

29

Page 30: IT Security landscape and the latest threats and trends

CryptoWall 4.0

30

Page 31: IT Security landscape and the latest threats and trends

Zcrypt

31

Page 32: IT Security landscape and the latest threats and trends

Stampado/Philadelphia

32

Page 33: IT Security landscape and the latest threats and trends

6 tips for preventing ransomware

33

1. Back up your files regularly and keep them offline

2. Don’t enable m acros in em ailed docs

3. Tell Windows to show file extensions

4. Don’t open script or shortcut files sent by em ail

5. Don’t give yourself m ore login power than necessary

6. Patch early, patch often

Page 34: IT Security landscape and the latest threats and trends

34

Page 35: IT Security landscape and the latest threats and trends

Users

35

Page 36: IT Security landscape and the latest threats and trends

It ’s n o t a ll b a d n e w s

36

•Social engineering works •People like to help •Stop worrying about the

Nigerians •OSINT •Training isn’t alw ays the

answer •Create a security culture •Use your remote sensors

Page 37: IT Security landscape and the latest threats and trends