Explaining Bitcoins will be the easy part: Email Borne Attacks and How You Can Defend Against Them Michael Burke.

Slides:



Advertisements
Similar presentations
 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail.
Advertisements

Norman SecureSurf Protect your users when surfing the Internet.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
Computer Security By Duncan Hall.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Are you the Next Cybercrime Headline?
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Karsten Chearis Sales Engineer.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Your Partner for Superior Cybersecurity
BUILD SECURE PRODUCTS AND SERVICES
Exchange Online Advanced Threat Protection
3 Do you monitor for unauthorized intrusion activity?
Ilija Jovičić Sophos Consultant.
Your security risk is higher than ever.
Threat Scan (ETS) for Office 365
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Threat Scan (ETS) for Office 365
There Will be Attacks – Improve Your Defenses
Cybersecurity - What’s Next? June 2017
[Internal Use] for Check Point employees​
Unit 4 IT Security.
Ways to protect yourself against hackers
Lesson 3 Safe Computing.
Cyber Security: State of the Nation
Active Cyber Security, OnDemand
Lesson Objectives Aims You should be able to:
Cyber Security By: Pratik Gandhi.
Trends in Ransomware Distribution
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them David Hood Director of Technology Marketing.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Bird Team Lead, Account Executive.
Encryption Ransomware
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Vanderhoff.
Jon Peppler, Menlo Security Channels
Exchange Online Advanced Threat Protection
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Cybersecurity Awareness
IT Security awareness Training.
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Robert Leonard Information Security Manager Hamilton
Mary Kummer Jim McNall PRIMA Spring Training 2018
4 ways to stay safe online 1. Avoid viruses and phishing scams
Risk of the Internet At Home
Social Engineering No class today! Dr. X.
How to build a defense-in-depth
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Andrew Cotton.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
There Will be Attacks – Improve Your Defenses
There Will be Attacks – Improve Your Defenses
Home Internet Vulnerabilities
Symantec Web Isolation Secure Access to Uncategorized and Risky Sites Protect Your Most Privileged Users Prevent Phishing and Ransomware Attacks John Moore.
Anatomy of a Large Scale Attack
Qiyu chen, Xiaomin Dong, Chenhui Lai, Xinteng Chen, Vittorio DiPentino
Unit 1 Fundamentals of IT
Information Protection
Spear Phishing Awareness
Dark Web Domain Status Report
Marcial Quinones-Cardona
Introduction to Symantec Security Service
Cybersecurity: Don’t Be Scared; Be Prepared Dean Choudhri, CISSP, CISM, CRISC Assistant Vice President, Cybersecurity and Information Assurance Alloya.
Information Protection
Cybersecurity Simplified: Phishing
Cybersecurity Simplified: Ransomware
“Workplace Behaviour: Activating your greatest security asset”
Presentation transcript:

Explaining Bitcoins will be the easy part: Email Borne Attacks and How You Can Defend Against Them Michael Burke

median time-to-open malicious email 1 minute 40 seconds median time-to-open malicious email 1M 22 SECONDS THE MEDIAN TIME FOR SOMEONE TO CLICK on a phishing link That’s the Median, imagine what the lower outliers are. And.. 50% of those people who do click the link will do it within the first hour. Verizon 2016 Data Breach Investigations Report (DBIR)

91% of all incidents start with a phish WHATS WORSE, WE KNOW… 95% For the purposes of this talk, we’ll use the phrase phish To mean spear-phishing, whaling and phishing But in a business context Wired 2015

Think Your Employees are Alert Enough to Stop Them? The second layer of defense is employee awareness and vigilance. The aim here is to a create herd alertness in your organization. The intention is not to make everyone suspicious of everything, or make everyone a security pro, but make them alert enough to linger over a link or attachment. The Mimecast security awareness tools help in this mission to compliment the other tactics you should use like training and perhaps simulated exercises. Confidential |

You are susceptible to email-borne attacks if…. You use email as a key business application You have certain letters in your domain name You accept resumes on your website You have a team of people in finance You have a profile Your life is deemed interesting enough to be on You run Windows…or any other OS You are susceptible to email-borne attacks if….

How Do The Attackers Do It?

Do You Have a Page Like This On Your Website? How do Attackers get their information? An easy way to find out about a company is visit their website. Most companies have information about their executive teams. What better way to entice a user to open an email than having it look like it’s from the CEO, the CFO or some other senior leader? Remember that it only takes one employee to “click before they think” to compromise an entire organization.

SOC. ENG. THE NEW MALWARE-LESS DANGER. Lifetime study, useful outside of work too. Train tickets. BUT Attackers know we have the technology. They know, we know their tactics So they try to stay ahead of us and our scanners. They’re increasingly turning to social engineering to exploit users. MAKING THEIR ATTACKS MALWARE-LESS AND HARDER TO DETECT Test your own staff. Social engineering toolkit by Dave kennedy.

Another way to gather information is to use a program that will harvest email addresses. These are cheap and easy to use. Just type in a domain and you’ll get a list of email addresses for that organization.

You don’t even need to know how to code… Crimeware as a Service - CaaS Attackers don’t have to know how to code, they don’t even have to be smart. They can download TOX, a ransomware construction tool that provides an easy to use graphical interface that allows attackers to track how many folks have been infected and track the ransom paid

Cybercriminals Operate Like Any Other Business   If you’re an attacker and can code but don’t know how to evade sandbox detection, that’s not a problem there’s an online service that can help. FUD- fully undetectable crypting services uses obfuscation, encryption and code manipulation.

Occasionally the Attacks Hit the General Media WannaCry? But usually they don’t   If you’re an attacker and can code but don’t know how to evade sandbox detection, that’s not a problem there’s an online service that can help. FUD- fully undetectable crypting services uses obfuscation, encryption and code manipulation.

Real life examples with Email

Vector: Phishing attack with malicious URL Threat: Entering credentials Target: Random mass-mailing

Vector: Phishing email with attachment Threat: Opening the document and activating malicious code Target: Targeted mailing

Business Email Compromise Whaling Wire transfer W-2 Fraud Who Says Attacks Need to Involve Malware? Business Email Compromise Whaling Wire transfer W-2 Fraud These attacks are often called Business Email Compromise, wire transfer fraud, W-2 fraud or whaling What’s sets these attacks apart is that they don’t use malware to achieve their goal They rely purely on the power of social engineering and the inherent trust in email Impersonation attacks are a huge threat because Traditional security systems like AV cannot detect this type of attack. Even solutions that scan URLs and detonates attachments in a sandbox are powerless in preventing these attacks Defending against these attacks requires specialised tools that monitor multiple indicators of potential compromise.

Vector: Spear phishing attack Threat: Impersonating senior staff Target: An employee with authority

Vector: Spear phishing attack Threat: Impersonating senior staff Target: An employee with authority

Vector: Email attack from the inside using a hacked email account Threat: Impersonating employees Target: Spreading the attack internally

Are Users Part of the Solution or Part of the Problem? The Compromised Insider The Careless Insider The Malicious Insider

Herd alertness helps, but… The second layer of defense is employee awareness and vigilance. The aim here is to a create herd alertness in your organization. The intention is not to make everyone suspicious of everything, or make everyone a security pro, but make them alert enough to linger over a link or attachment. The Mimecast security awareness tools help in this mission to compliment the other tactics you should use like training and perhaps simulated exercises. Confidential |

Can we do more with technology? - YES! Layer one is of course the technology Can we do more with technology? - YES! Confidential |

Mimecast Email Security Suite Cyber Resiliency Mimecast Email Security Suite Secure Gateway - Anti-virus / malware - Anti-spam - Reputation analysis - Continuity - Independent Archive - Backup & Recovery Comprehensive protection, simply achieved in the cloud Targeted Threat Protection URL Attachment Impersonation Internal Emails

Confidential | Protect You need the technology that provides the best possible multi-layered protection Continue You need to continue to work while the issue is resolved Remediate You need to get back to the last known good state Cyber Resilience