attackers, attacks and security strategies · credentials. 11. 12. 13 •new breed of highly...

22
1 Cybersecurity 2020 Attackers, Attacks and Security Strategies

Upload: others

Post on 21-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Attackers, Attacks and Security Strategies · Credentials. 11. 12. 13 •New breed of highly persistent and stealthy malware. •Rise in fileless malware and droppers. •Using highly

1

Cybersecurity 2020Attackers, Attacks and Security Strategies

Page 2: Attackers, Attacks and Security Strategies · Credentials. 11. 12. 13 •New breed of highly persistent and stealthy malware. •Rise in fileless malware and droppers. •Using highly

2

Cybersecurity Challenge

Open and Accessible

IoT Adoption

Budget

ConstraintsExpertise

Page 3: Attackers, Attacks and Security Strategies · Credentials. 11. 12. 13 •New breed of highly persistent and stealthy malware. •Rise in fileless malware and droppers. •Using highly

3

Attack Process

Identification Enumeration Arm UpInitial

ContactCompromise Persistence

Lateral Movement

Exfiltration/ Exploitation

Reuse / Resell / Recycle

Page 4: Attackers, Attacks and Security Strategies · Credentials. 11. 12. 13 •New breed of highly persistent and stealthy malware. •Rise in fileless malware and droppers. •Using highly

4

People Centric Targets

Page 5: Attackers, Attacks and Security Strategies · Credentials. 11. 12. 13 •New breed of highly persistent and stealthy malware. •Rise in fileless malware and droppers. •Using highly

5

Device Centric Targets

Page 6: Attackers, Attacks and Security Strategies · Credentials. 11. 12. 13 •New breed of highly persistent and stealthy malware. •Rise in fileless malware and droppers. •Using highly

6

ncreased sophistication and targeted.

• Successful attacks often lead to password compromise, malware infection, corporate/personal data loss and financial fraud.

Page 7: Attackers, Attacks and Security Strategies · Credentials. 11. 12. 13 •New breed of highly persistent and stealthy malware. •Rise in fileless malware and droppers. •Using highly

7

Page 8: Attackers, Attacks and Security Strategies · Credentials. 11. 12. 13 •New breed of highly persistent and stealthy malware. •Rise in fileless malware and droppers. •Using highly

8

Page 9: Attackers, Attacks and Security Strategies · Credentials. 11. 12. 13 •New breed of highly persistent and stealthy malware. •Rise in fileless malware and droppers. •Using highly

Getting to Know You!

Page 10: Attackers, Attacks and Security Strategies · Credentials. 11. 12. 13 •New breed of highly persistent and stealthy malware. •Rise in fileless malware and droppers. •Using highly

10

Get your Credentials

Hack You

Hack a Site

Buy Them.

Re-engineer your credentials

01 – 02

Password –Pa55W0rD

Facebook PW with FB

Use your Credentials

Social Media

Email

Banking / Financial

Anything else

Credentials

Page 11: Attackers, Attacks and Security Strategies · Credentials. 11. 12. 13 •New breed of highly persistent and stealthy malware. •Rise in fileless malware and droppers. •Using highly

11

Page 12: Attackers, Attacks and Security Strategies · Credentials. 11. 12. 13 •New breed of highly persistent and stealthy malware. •Rise in fileless malware and droppers. •Using highly

12

Page 13: Attackers, Attacks and Security Strategies · Credentials. 11. 12. 13 •New breed of highly persistent and stealthy malware. •Rise in fileless malware and droppers. •Using highly

13

• New breed of highly persistent and stealthy malware.

• Rise in fileless malware and droppers.

• Using highly sophisticated exploits for delivery. No longer need to be in a nation states crosshair to be impacted by their advance cyber weapons.

• Ransomware still common but also seeing increase in stealthier crypto-mining malware.

• Rise in ease of use and availability of cyber crime platforms, Malware/Ransomware as a Service.

Page 14: Attackers, Attacks and Security Strategies · Credentials. 11. 12. 13 •New breed of highly persistent and stealthy malware. •Rise in fileless malware and droppers. •Using highly

14

Ransomware

Page 15: Attackers, Attacks and Security Strategies · Credentials. 11. 12. 13 •New breed of highly persistent and stealthy malware. •Rise in fileless malware and droppers. •Using highly

15

0-Days

Page 16: Attackers, Attacks and Security Strategies · Credentials. 11. 12. 13 •New breed of highly persistent and stealthy malware. •Rise in fileless malware and droppers. •Using highly

Supply Chain Attacks

Page 17: Attackers, Attacks and Security Strategies · Credentials. 11. 12. 13 •New breed of highly persistent and stealthy malware. •Rise in fileless malware and droppers. •Using highly

17

Device

Vulnerability

Target On-Site

Remote Access

Firmware

Remote Access

Company

Credential Theft

Firmware Manipulation

Direct Access

IoT Supply Chain Attacks

Page 18: Attackers, Attacks and Security Strategies · Credentials. 11. 12. 13 •New breed of highly persistent and stealthy malware. •Rise in fileless malware and droppers. •Using highly

18

What Next for Security?

Page 19: Attackers, Attacks and Security Strategies · Credentials. 11. 12. 13 •New breed of highly persistent and stealthy malware. •Rise in fileless malware and droppers. •Using highly

19

Security As A Process

• Visibility

• Detection

• Control

• Reporting

• Measurement

Page 20: Attackers, Attacks and Security Strategies · Credentials. 11. 12. 13 •New breed of highly persistent and stealthy malware. •Rise in fileless malware and droppers. •Using highly

20

Hacking 101 –Phishing to Credential Theft

Page 21: Attackers, Attacks and Security Strategies · Credentials. 11. 12. 13 •New breed of highly persistent and stealthy malware. •Rise in fileless malware and droppers. •Using highly

21

Cybersecurity 2020

Hacking is a process.

Defense should also be a process.

You can be easily targeted.

Network Segmentation is key for IoT.

Passwords are weak use 2FA.

Integrated and automated gives the highest security.

Page 22: Attackers, Attacks and Security Strategies · Credentials. 11. 12. 13 •New breed of highly persistent and stealthy malware. •Rise in fileless malware and droppers. •Using highly