Presentation is loading. Please wait.

Presentation is loading. Please wait.

Presented by Martin Šimek Ransomware, Internet of Things and Botnets vs. Control.

Similar presentations


Presentation on theme: "Presented by Martin Šimek Ransomware, Internet of Things and Botnets vs. Control."— Presentation transcript:

1 Presented by Martin Šimek Ransomware, Internet of Things and Botnets vs. Control

2 Agenda Ransomware The Internet of Things Botnets

3 Ransomware

4 Ransomware – definition Ransom  The practice of holding a prisoner or item to extort money to secure their release. Ransomware  Malicious software holding your files as prisoners to extort money to secure their release.

5 Cryptolocker Encrypts your files  Files are present but unreadable  No need of transfer and remote storage  Files can be decrypted only by private key You must pay money to get the key  Bitcoins  TOR sites

6 Cryptolocker – Email infection “Image: works.jpeg” http://fickmonster.blogspot.cz/2015/09/how- ransomware-spreads-and-how-it-works.html

7 Cryptolocker – Fake update site

8 Cryptolocker – Ramification

9 Cryptolocker – sequels

10 Ransomware – workstation protection Up-to-date antivirus  Emails and websites are transferred encrypted  Endpoint workstation can see them plain Up-to-date software  Zero day vulnerabilities elimination Employee training  Learn to swim and don't swim in wild river

11 Ransomware – webfilter +

12 Ransomware – Intrusion prevention system

13 Ransomware – Application awareness

14 Ransomware – Protocol inspection

15 Ransomware – Antivirus

16 The Internet of Things

17 Home  Wi-fi router, fridge, lightbulb, printer, extension cord, thermostat Bussines  NAS, printer, IP phone, air condition, window blinds

18 The Internet of Things – pitfalls Low cost chips, small RAM, unprotected OS  No spare resources for self-defense Rapid development  Small to no focus on security Linux based  full-featured computer

19 The Internet of Things – Attack

20 The Internet of Things – Recovery Disconnect thing immediately Re-flash firmware or replace Thing Set strong password Perform system audit  Logs  Scan other systems

21 The Internet of Things – Prevention Strong password for Thing's administration Update Thing's firmware regularly Don’t buy second hand devices  Saving few euros might not pay off

22 The Internet of Things – Multiple interfaces

23 The Internet of Things – Access Don't expose Thing's web interface  Use VPN to access network behind firewall and then access Thing's web interface locally.  If exposing is necessary, use Reverse proxy

24 The Internet of Things – Reverse Proxy Only web port is exposed Firewall can see and filter all requests

25 Botnet

26 Set of computers enslaved by malware performing tasks assigned by master  Spam, DDoS Attack, Malware distribution, Bitcoin mining, clickfraud, spying on user Tasks are issued by command & control center

27 Botnet – attack “Image:Botnet.svg” https://commons.wikimedia.org/wiki/File:Botnet.svg

28 Botnet – recovery Scan computers in LAN by up-to-date antivirus Perform audit of firewall logs Negotiate blacklist removal if botnet operation gets your IP address there

29 Botnet – prevention Forbid access to the Internet underground  Webfilter & Content Rules Forbid botnet to call home  Blacklists, Security rules

30 Botnet – Blacklists & Security rules

31 Summary


Download ppt "Presented by Martin Šimek Ransomware, Internet of Things and Botnets vs. Control."

Similar presentations


Ads by Google