32
“Menschenkenntnis ” and Cyber Security Thomas George International Business Manager - cyscon GmbH

OWASP Ukraine Thomas George presentation

Embed Size (px)

DESCRIPTION

OWASP Ukraine Thomas George presentation

Citation preview

Page 1: OWASP Ukraine Thomas George presentation

“Menschenkenntnis” and Cyber

SecurityThomas George

International Business Manager - cyscon GmbH

Page 2: OWASP Ukraine Thomas George presentation

Who are Cyscon?• Founded 2001 by Thorsten Kraft

• Cyber Security Consulting

• Founding Member of Botfrei and ACDC Project.

• Official Partner of BSI - German Federal Office for Information Security

• 2010 - Conficker Takedown

• 2013 - Check & Secure - Private User Initiative

Page 3: OWASP Ukraine Thomas George presentation

Working Relationshipscyscon works with a variety of partners in the IT

Security world. These include:

• Internet Service Providers, including Vodafone and 1&1 Telecom

• Banks, such as Deutsche Bank and Postbank

• Law enforcement, including FBI and Europol

• NGOs, including Stop.Think.Connect - Funded by the Department of Homeland Security

Page 4: OWASP Ukraine Thomas George presentation

Knowing your Enemy

How cyscon gets its data.

Page 5: OWASP Ukraine Thomas George presentation

Sinkholing

• 80 Million Events per day

• 42 Different Types of Malware recognised

Page 6: OWASP Ukraine Thomas George presentation

Honeypots and Spam Traps

• 3.5 Million Spam Emails Per Day

• Honeypots installed on real systems by our customers

• 40,000 New Malicious URLs Each Day

Page 7: OWASP Ukraine Thomas George presentation

Web Crawling

• Systems Continually Crawling the Web

• 16 Different Settings - Chilled to Paranoia

• Analysing Behaviour and AV Detection

Page 8: OWASP Ukraine Thomas George presentation

The Data Toilet• Gathering Data since 2006

• Enriching Data with Meta Data

• More than 20,000 Sensors

• More than 50 Partners

• WHOIS, SSH HOSTKEY, DNS details, etc.

Page 9: OWASP Ukraine Thomas George presentation

What goes in?

Page 10: OWASP Ukraine Thomas George presentation

Where Does it All Go?• Data is sent to ISPs

• AND / OR

• Anonymised and Sent to Law Enforcement, Research or Industry

Page 11: OWASP Ukraine Thomas George presentation

Internet Service Providers

Sensor

Sensor

Concentrator

ConcentratorSensor

SensorSensor

SensorSensor

Sensor

Anonymisation

Law Enforcement Agencies

Research

Industry

Detection Supporting

Page 12: OWASP Ukraine Thomas George presentation

Flushing the Toilet

• Okay…we have the data.

• Let’s Make Some Money!

Page 13: OWASP Ukraine Thomas George presentation

Menschenkenntnis in Business

Wer keine Menschenkenntnis hat, hat als Kaufmann bereits verloren

Page 14: OWASP Ukraine Thomas George presentation

Flexibility

• Knowing what customers want

• Using trust and Existing Relationships

• Knowing when to work for free

Page 15: OWASP Ukraine Thomas George presentation

BanksIts All About the Money

Page 16: OWASP Ukraine Thomas George presentation

What is Hurting?

• Losing Money

• Losing More Money

• Losing Even More Money

• Losing Reputation

Page 17: OWASP Ukraine Thomas George presentation

How do Banks (and their customers) lose money?

• Redirection of Payment

• Identity Theft through Trojan Infection

• Direct Phishing Scams

Page 18: OWASP Ukraine Thomas George presentation

Technical Overview - Banking Services

Threat Detection, Mitigation, Prevention

Page 19: OWASP Ukraine Thomas George presentation

Malware Detection• Identification of infected customers

• More than 40 Trojan Families - 4000 events per second.

• JSON Format - Easy to implement and process

• Can be combined with sales of Malware Deletion Product.

Page 20: OWASP Ukraine Thomas George presentation

Malicious Traffic Mitigation

• Access to C-SIRT Database and Cyber Threat Detection Cloud

• Database fed by Worldwide sensors of Malicious Traffic

• Eliminates Cyber Attacks against banking platforms.

Page 21: OWASP Ukraine Thomas George presentation

Brand Protection• Fully automated takedown service

• Detection, Blocking, Blacklisting

• Normal process time, 2 hours

• Excellent contacts to ISPs for quick takedowns

Page 22: OWASP Ukraine Thomas George presentation

Menschenkenntnis in the Community

“Love thy Neighbour”

Page 23: OWASP Ukraine Thomas George presentation

Two Sides of the Story

• How much can experts do without end users?

• GameOver Zeus Takedown - Pointless?

• “Slipping through the net”

Page 24: OWASP Ukraine Thomas George presentation

The Cyber Vaccination

• Appears as analysis system from AV industry.

• Protection against MITB attacks and identity theft.

• Works on 10 different browsers.

• Free to use - One time installation.

• Attack interception - Malicious code cannot be executed.

• “Panic Switch” when intruder is detected.

Page 25: OWASP Ukraine Thomas George presentation
Page 26: OWASP Ukraine Thomas George presentation

HitmanPro: A Second Opinion Scanner

• Behavioural analysis - not signature based.

• 10MB file, can boot from USB.

• Complement to existing AV programs

• 30 Day free trial for emergency cases.

Page 27: OWASP Ukraine Thomas George presentation
Page 28: OWASP Ukraine Thomas George presentation
Page 29: OWASP Ukraine Thomas George presentation

Case Study:Cyber Alliance of

Switzerland

How can the “Check & Secure” Technology be Implemented by Banks?

Page 30: OWASP Ukraine Thomas George presentation

Concept and Goals• Making Switzerland into the “Cleanest

Internet Country in the World

• Identification and Help for Infected End Users

• Support for the deletion of malware and securing of end user systems with Check & Secure and End User Products.

Page 31: OWASP Ukraine Thomas George presentation

Realisation• Banking Partners: Credit Suisse, Raffeisen,

Postfinance and UBS.

• Internet Service Partners: Swisscom, Sunrise, UPC

• Creation of a shared Malware database.

• Planned Launch 1.8.2014.

Page 32: OWASP Ukraine Thomas George presentation

Thank you for Listening• [email protected]

• +491733853804