46
R U Hacked? You website has gone? Sumedt Jitpukdebodin Senior Security Researcher CompTIA Security+, LPIC-1 , NCLA, C|EHv6, eCPPT, eWPT, IWSS, CPTE , GIAC GPEN

R u hacked

Embed Size (px)

Citation preview

Page 1: R u hacked

R U Hacked? You website has gone?Sumedt Jitpukdebodin Senior Security Researcher CompTIA Security+, LPIC-1 , NCLA, C|EHv6, eCPPT, eWPT, IWSS, CPTE, GIAC GPEN

Page 2: R u hacked

Whoami

Name: Sumedt Jitpukdebodin

Jobs: Senior Security Researcher

Nonprofit jobs: OWASP Thailand - Leader Technical Part, admin of 2600Thailand

Hobby: Hacking stuff, Malware analysis, Python programming, read the security news, etc.

Page 3: R u hacked

#redpill 2016

Page 4: R u hacked

#redpill 2016

Page 5: R u hacked

AgendaThe rise of cybersecurity

Internet of things

Ransomware

DDoS

Web Application Attack

Conclusion

Page 6: R u hacked

The rise of cybersecurity

Page 7: R u hacked

Trend of technology 2015Computing Everywhere

Internet of things

3D Printing

Advanced, Pervasive and Invisible Analytics

Context-Rich Systems

Smart Machines

Cloud/Client Computing

Software-Defined Applications and Infrastructure

Web-Scale IT

Risk-Based Security and Self-Protection • Reference:: http://www.itbusinessedge.com/slideshows/top-10-strategic-technology-trends-for-2015-02.html

Page 8: R u hacked

Internet of things around the world

Page 9: R u hacked

Internet of things in Thailand

Page 10: R u hacked

More detail of Internet of Things

Page 11: R u hacked

Easy to hack, right?

Page 12: R u hacked

Ransomware

Page 13: R u hacked

Well-known ransomware

TorrentLocker (CryptoLocker)

CryptoWall (Crowti)

CTB-Locker

Page 14: R u hacked

Top 10 Ransomware By Microsoft

Page 15: R u hacked

CryptoWall

Page 16: R u hacked

CrytoLocker

Page 17: R u hacked

Android/Lockerpin.A

Page 18: R u hacked

iOS Ransomware

Page 19: R u hacked

Why it’s so famous?

Page 20: R u hacked

Attacking with Ransomware

Phishing Attack with attachment file

Website Attack (Exploit Kit)

(New) Mobile Application Attack

Page 21: R u hacked

Demo for simple phishing

Page 22: R u hacked

Demo with WINRAR exploit

Page 23: R u hacked

What can I do about it?Backup your data

Show hidden file-extension

Filters EXE in email

Disable files running from AppData/LocalAppData folders

Use the CryptoLocker Prevention Kit(http://community.spiceworks.com/topic/396103-cryptolocker-prevention-kit-updated)

Disable RDP

Patch or update software

Use a AntiVirus

Scan the file with many online scanner (http://www.virustotal.com, https://malwr.com)

Use System Restore to get back to a known-clean state

Page 24: R u hacked

Denial of Service (DoS)

By VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VOLUME 2, ISSUE 3 – 3RD QUARTER 2015

Page 25: R u hacked

Attack Size BPS

By ATLAS Q2 2015 Global DDoS Attack Trends (http://www.slideshare.net/Arbor_Networks/atlas-q2-2015final)

Page 26: R u hacked

Largest Attack Sizes Year on Year by Arbor

Page 27: R u hacked

Top source of DDoS

Page 28: R u hacked

DDoS in Thailand

Page 29: R u hacked

Attacking with DDoS

Cybercrime-as-a-service

Zombie or Botnet

Tools

Page 30: R u hacked

Cybercrime as a service

Page 31: R u hacked

DDoS as a service

Page 32: R u hacked

DDoS by Tool

Page 33: R u hacked

DDoS by Tool (2)

Page 34: R u hacked

Logstalgia Analysis

Page 35: R u hacked

What can I do about it?Black-Holing

Firewall ACL

Intrusion Detection/Prevention Systems

Servers tuning

DDoS Mitigating Appliances + Scrubbing Centre

Buy more link

Page 36: R u hacked

Web Application Attack

Page 37: R u hacked

Web Application Attack

Page 38: R u hacked

Hosting service Attack

Page 39: R u hacked

When will you get hack?

Digital Ocean Incident

Try to attack the VPS after 10 minutes

Got root in 2 days

Use the host to be the botnet in 1 days after got root.

Page 40: R u hacked

Brute forcing Log

Page 41: R u hacked

Got root Log

Page 42: R u hacked

Using VPS to be a DDoS Tool

Page 43: R u hacked

Damage of website got hack

Defame the company [Defacement]

Stealing information

Stealing internal information

Use as DDoS Tool

Spread the malware

Page 44: R u hacked

Web Application Defending

Secure Coding

Web Application Firewall

Penetration Testing

Page 45: R u hacked

Conclusion

More awareness, more security

Don’t have anything secure 100%, we just want to closely 100%

Always think like an attacker perspective.

Risk Management

Page 46: R u hacked

Question and answer time.