why they want your digital devices · verizon 2012 data breach investigations report . 1 to 10. 11...
TRANSCRIPT
![Page 1: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100](https://reader033.vdocuments.mx/reader033/viewer/2022052017/60307725a21cf93819497ef9/html5/thumbnails/1.jpg)
Stephen Cobb, CISSP Security Evangelist
Why THEY want your digital devices
![Page 2: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100](https://reader033.vdocuments.mx/reader033/viewer/2022052017/60307725a21cf93819497ef9/html5/thumbnails/2.jpg)
To own your network?
![Page 3: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100](https://reader033.vdocuments.mx/reader033/viewer/2022052017/60307725a21cf93819497ef9/html5/thumbnails/3.jpg)
36 ways to abuse hacked devices • Spam zombie • DDoS extortion zombie • Click fraud zombie • Anonymization proxy • CAPTCHA solving zombie
• eBay/PayPal fake auctions • Online gaming credentials • Website FTP credentials • Skype/VoIP credentials • Encryption certificates
• Fake antivirus • Ransomware • Email account ransom • Webcam image extortion
• Bank account data • Credit card data • Stock and 401K accounts • Wire transfer data
• Phishing site • Malware download site • Warez piracy server • Child porn server • Spam site
• Harvest email contacts • Harvest associated accounts • Access to corporate email • Webmail spam • Stranded abroad scams
• Facebook • Twitter • LinkedIn • Google+
• Online gaming characters • Online gaming goods/$$$ • PC game license keys • OS license key
Based on original work by Brian Krebs: krebsonsecurity.com
Web server
Botnet activity
Email attacks
Virtual goods
Reputation hijacking
Financial credentials
Hostage attacks
Account credentials
![Page 4: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100](https://reader033.vdocuments.mx/reader033/viewer/2022052017/60307725a21cf93819497ef9/html5/thumbnails/4.jpg)
IMPACT
ADVANTAGE
MONEY
CREDENTIALS
![Page 5: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100](https://reader033.vdocuments.mx/reader033/viewer/2022052017/60307725a21cf93819497ef9/html5/thumbnails/5.jpg)
Verizon 2012 Data Breach Investigations Report
1 to 10
11 to 100
101 to 1,000
1,001 to 10,000
10,001 to 100,000
Over 100,000
0 100 200 300 400 500 600
720 breaches by size of organization (employees)
SMBs
![Page 6: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100](https://reader033.vdocuments.mx/reader033/viewer/2022052017/60307725a21cf93819497ef9/html5/thumbnails/6.jpg)
The SMB sweet spot for the cyber-criminally inclined
Assets worth looting
Level of protection
Big enterprise SMB “sweet spot” Consumers
![Page 7: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100](https://reader033.vdocuments.mx/reader033/viewer/2022052017/60307725a21cf93819497ef9/html5/thumbnails/7.jpg)
How do they get to your devices?
1. Malware involved in 69% of breaches 2. Hacking* used in 81% of breaches Breaches combining malware and hacking: 61%
Verizon 2012 Data Breach Investigations Report
*80% of hacking is passwords: default, missing, guessed, stolen, cracked
![Page 8: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100](https://reader033.vdocuments.mx/reader033/viewer/2022052017/60307725a21cf93819497ef9/html5/thumbnails/8.jpg)
Tools of the trade
![Page 9: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100](https://reader033.vdocuments.mx/reader033/viewer/2022052017/60307725a21cf93819497ef9/html5/thumbnails/9.jpg)
![Page 10: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100](https://reader033.vdocuments.mx/reader033/viewer/2022052017/60307725a21cf93819497ef9/html5/thumbnails/10.jpg)
Thriving markets for credentials
![Page 11: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100](https://reader033.vdocuments.mx/reader033/viewer/2022052017/60307725a21cf93819497ef9/html5/thumbnails/11.jpg)
Hot markets for hacked devices
![Page 12: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100](https://reader033.vdocuments.mx/reader033/viewer/2022052017/60307725a21cf93819497ef9/html5/thumbnails/12.jpg)
All driven by proven business strategies
![Page 13: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100](https://reader033.vdocuments.mx/reader033/viewer/2022052017/60307725a21cf93819497ef9/html5/thumbnails/13.jpg)
So how do you defend your devices?
Two main attacks…. …and defenses
Scanning
Authentication
Malware
Hacking
![Page 14: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100](https://reader033.vdocuments.mx/reader033/viewer/2022052017/60307725a21cf93819497ef9/html5/thumbnails/14.jpg)
Scanning requires proper implementation
0% 20% 40%
Scan devices while connected
Scan devices prior to connection
Require AV on mobile devices
Measures in use at a sample of healthcare facilities
Ponemon Institute Third Annual Benchmark Study on Patient Privacy & Data Security
![Page 15: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100](https://reader033.vdocuments.mx/reader033/viewer/2022052017/60307725a21cf93819497ef9/html5/thumbnails/15.jpg)
Authentication requires more than passwords
Passwords exposed in 2012: 75,000,000 And those are just the ones we know about Need to add a second factor to authentication
![Page 16: Why THEY want your digital devices · Verizon 2012 Data Breach Investigations Report . 1 to 10. 11 to 100. 101 to 1,000. 1,001 to 10,000. 10,001 to 100,000. Over 100,000. 0. 100](https://reader033.vdocuments.mx/reader033/viewer/2022052017/60307725a21cf93819497ef9/html5/thumbnails/16.jpg)
The defenses you need
SMART Scanning
STRONG Authentication
Malware
Hacking
Plus polices and training to implement effectively