EMERGING CYBER RISKS FACING FINANCIAL SERVICES Presented by The Risk Management Group.

Slides:



Advertisements
Similar presentations
Its a new digital world with new digital dangers….
Advertisements

Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Thank you to IT Training at Indiana University Computer Malware.
7 Effective Habits when using the Internet Philip O’Kane 1.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Network and Internet Security and Privacy.  Explain network and Internet security concerns  Identify online threats.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Threats To A Computer Network
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
1 Title ECI: Anatomy of a Cyber Investigation Who Are the Actors.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crimes.
Viruses.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Cyber crime & Security Prepared by : Rughani Zarana.
Trend Micro Confidential 9/23/2015 Threat Rules Sharing Advanced Threats Research.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Security at NCAR David Mitchell February 20th, 2007.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Topic 5: Basic Security.
Malicious Software.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Understand Malware LESSON Security Fundamentals.
Information Systems Week 7 Securing Information Systems.
Cybersecurity Test Review Introduction to Digital Technology.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
City of London 1 Understanding Cybercrime Risk 21 April 2016 Chris Keesing.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
R ANSOMWARE CAN ORIGINATE FROM A MALICIOUS WEBSITE THAT EXPLOITS A KNOWN VULNERABILITY, PHISHING CAMPAIGNS,
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Botnets A collection of compromised machines
Cyber Security Zafar Sadik
3.6 Fundamentals of cyber security
Instructor Materials Chapter 7 Network Security
Public Facilities and Cyber Security
Botnets A collection of compromised machines
Securing Information Systems
“CYBER SPACE” - THE UNDERGROUND ECONOMY
Risk of the Internet At Home
Home Internet Vulnerabilities
How to keep the bad guys out and your data safe
WJEC GCSE Computer Science
Presentation transcript:

EMERGING CYBER RISKS FACING FINANCIAL SERVICES Presented by The Risk Management Group

Scope Cybercrime explained Key implications for financial services A short Cyber Security overview Conclusions Q&A

Risk in one simple image Threat factors Threat agents Vulnerabilities Exploit Controls Designed to correct Risks Lead to Assets Impact so as to reduce and protect

Cybercrime is …committed via the Internet when… 1 …the target is digital material on a connected device, or… 2 …the aim is to disrupt systems or services. 3

Cyber threats PC viruses Key- loggers Worm Rootkits MSDOS virus Spy ware Phishing DoS DDoS Spam Session hijack SQL Worm Large Botnet virus SQL injection XSS virus Cloud attack Cyber weapon Malnet The 1980s threats are still challenges today, but attackers sophistication is increasing APT War dialling Digit grabbers Man-in- middle

Threat actors Hackers Malware developers Anarchists Negligent employees Spies Fraudsters and organised criminals Plus many others…

Cybercrime is evolving From one-to-one Through one-to-many To many-to-one Plus hybrid, multi-stage attacks

Attacker exfiltrates empty directories Victim removes data from known compromised systems Victim removes malware Case study: attack timeline Day 1 Day 32 Day 34 Day 37 Day 38 Day 39 Day 41 Attacker installs malware on target machines & creates backdoor Attacker installs new malware via backdoor Attacker pushes Day 1 malware to new systems Attacker pushes Day 34 malware to new systems Source: Mandiant

Malware is a key vector Attacker Infected Website User User action required Automatically

PC viruses Key- loggers Worm Rootkits MSDOS virus Spy ware Phishing DoS DDoS Spam Session hijack SQL Worm Large Botnet virus SQL injection XSS virus Man-in- middle Cyber weapon APT War dialling Digit grabbers Cloud attack Malnet Selected examples

Rootkits PC viruses Key- loggers Worm MSDOS virus Spy ware Phishing DoS DDoS Spam Session hijack SQL Worm Large Botnet virus SQL injection XSS virus Cloud attack Cyber weapon Malnet APT War dialling Digit grabbers Man-in- middle

Rootkits Applications (Word, Outlook, Explorer, games etc.) Data (Docs, contacts, saved game files...) Operating System (Windows, Mac OS...) Rootkits attack the lowest level of the operating system so that they execute on start up and avoid detection.

DOGMA Millions Rootkit Offers payment to partners who download their App. Similar model to Google toolbar etc. Then offers crime-as-a- service. User $ $ $ dogmamillions.com

Spyware PC viruses Key- loggers Worm Rootkit MSDOS virus Spy ware Phishing DoS DDoS Spam Session hijack SQL Worm Large Botnet virus SQL injection XSS virus Cloud attack Cyber weapon Malnet APT War dialling Digit grabbers Man-in- middle

Spyware Sits on infected device and captures: –Passwords and usernames –Visited URLs –Keystrokes –Credit card and bank details –Other personal data May also change device settings Can turn off Firewall and Anti-virus

Keylogger software This particular Keylogger needs to be installed directly on the target machine

SerialGhost key logger

KeyGrabber hardware

Pwn Plug hacking tool Network hacking toolkit With inbuilt WiFi Remote command and control Would your users or security staff remove this if they saw it?

DDoS PC viruses Key- loggers Worm Rootkit MSDOS virus DDoS Phishing Spyware DoS Spam Session hijack SQL Worm Large Botnet virus SQL injection XSS virus Cloud attack Cyber weapon Malnet APT War dialling Digit grabbers Man-in- middle

Flooding example 2. Targeted device responds & assigns capacity to deal with the expected traffic SYN Packet SYN-ACK Packet Final ACK Packet X 3. Final ACK Packet is not sent and process is repeated in high volume, flooding the target with incomplete requests. 1. Attacker sends communication requests 1 2 3

Distributed denial of service Botnet Herder or Agitator Infected network of Bot machines or volunteers Target(s) Command & Control Multiple attacks 1 3 2

The Low Orbit Ion Cannon The Low Orbit Ion Cannon is an open source application designed to launch what is known as a denial of service attack. It does this by flooding a target server with messages. The Met Police report 34,000 UK downloads in only 3 days during the 2012 attacks on the US financial services sector and videos can be found on YouTube that provide lessons in how to use the tool.YouTube

The 1980s threats are still challenges today, but attackers sophistication is increasing Code Injection PC viruses Key- loggers Worm Rootkit MSDOS virus Spy ware Phishing DoS DDoS Spam Session hijack SQL Worm Large Botnet virus SQL injection XSS virus Cloud attack Cyber weapon Malnet APT War dialling Digit grabbers Man-in- middle

Injection - extraction Attacker Vulnerable Web server exploited Insecure web form (e.g.) SQL Commands injected via the form Password or PCI databases compromised SQL Commands Stolen data extracted

Code injection example Over several months in early 2011 hackers: –executed a series of successful SQL Code Injection attacks against the servers of Sony Online Entertainment (SOE) –reportedly exposed the personal data of 100m SOE customers –Cost SOE $178 million in the process (mainly lost business through downtime)

The 1980s threats are still challenges today, but attackers sophistication is increasing Man-in-the-Middle PC viruses Key- loggers Worm Rootkit MSDOS virus Spy ware Phishing DoS DDoS Spam Session hijack SQL Worm Large Botnet virus SQL injection XSS virus Cloud attack Cyber weapon Malnet APT War dialling Digit grabbers Man-in- middle

Definition 1 You wish to send me a message You Me

Definition 1 You Me 2 John manages to convince you that he is actually me… He also convinces me that he is actually you. You Me John

Definition 1 You Me 2 You Me John 3 You now innocently send your message to John, thinking he is me. John takes a copy or alters the message and then sends it on to me. John is the man-in-the- middle. You Me John

Man-in-the-Middle The equipment to attack Wireless (WiFi) networks can be purchased online

The 1980s threats are still challenges today, but attackers sophistication is increasing Cyber Weapons PC viruses Key- loggers Worm Rootkit MSDOS virus Spy ware Phishing DoS DDoS Spam Session hijack SQL Worm Large Botnet virus SQL injection XSS virus Cloud attack Cyber weapon Malnet APT War dialling Digit grabbers Man-in- middle

Cyber weapon examples Flame & Stuxnet: –Adapted to attack Irans nuclear programme –Flame designed to collect target data –Stuxnet designed to attack SCADA systems Shamoon (2012) –Attacked PCs on Saudi Aramco network –30,000 PCs had to be written off The Low Orbit Ion Cannon…

Drop, Report & Wipe 1.The malware is dropped onto the target machine 2.The malware executes its payload and the extracted data is sent to the attacker 3.The eventually wipes itself off the machine, hiding the evidence of its activities Wipe (may persist for an extended period before wiping) Report Drop

Common APT vectors Advanced Persistent Threats: –Internet-based malware infection –Physical malware infection –External exploitation/hacking Internet Malware Infections Drive-by downloads attachments File sharing Pirated software DNS routing mods Physical Malware Infections Infected USB sticks Infected DVDs or CDs Infected memory cards Infected appliances Back-doored IT equipment External exploitation Professional hacking Co-location host exploits Cloud provider penetration WiFi penetration Device attacks

Trusted connections Insider Threats Rogue employee Malicious sub-contractor Social engineering Funded placement Criminal break-in Walk in Trusted connections Stolen VPN credentials Partner system breaches External hosting breaches Grey market equipment

The 1980s threats are still challenges today, but attackers sophistication is increasing Malnets PC viruses Key- loggers Worm Rootkit MSDOS virus Spy ware Phishing DoS DDoS Spam Session hijack SQL Worm Large Botnet virus SQL injection XSS virus Cloud attack Cyber weapon Malnet APT War dialling Digit grabbers Man-in- middle

Simple Malnet Malicious server Infected site Innocent users Innocent user Innocent users Infected site

Real Malnets A Malnet is comprised of unique domains, servers and websites working together to funnel users to the Malware payload. This visual map, produced by Blue Coat, shows the relationships between trusted sites, relays and exploit servers to which users are directed.Blue Coat

The Blackhole Exploit Kit Currently the most prevalent web threat (Q % of all web threats detected by Sophos and 91% by AVG are due to Blackhole Delivers a malicious payload to a victim's computer Suspected creators are Russian hackers named "HodLuM" and "Paunch"

How Blackhole works Attacker buys the kit & specifies the attack options. Victim: –Loads a compromised web page or; –Opens a malicious link in a spammed Malformed page or sends user to a Blackhole landing page. Landing page contains code that determines what is on the victim's computers and loads all exploits to which it is vulnerable.

Key implications for Firms Data integrity and compliance: –Data protection –PCI –Corporate data Fraud & other financial risks Reputation & public trust Legal liability Operational sustainability

Key controls The perimeter: –Firewalls –Intrusion detection –Antivirus Cloud and Social Media security Device security and BYOD management Data classification & encryption User awareness

Conclusion Threat factors Threat agents Vulnerabilities ControlsRisks Assets User awareness is the most important governing factor at all points in the chain of cause and effect.

Q&A

The CISI would like to thank Mark Johnson, Chairman, The Risk Management Group

Enjoy this event? Then why not attend one of our short courses Building a Client-Focussed Professional Service for the New World London 29 January 2013 Anti Money Laundering & Terrorist Financing Introductory Workshop London 31 January 2013 Manchester 5 February