Presentation is loading. Please wait.

Presentation is loading. Please wait.

Game of P0WN3Ds: Winter Has Come

Similar presentations


Presentation on theme: "Game of P0WN3Ds: Winter Has Come"— Presentation transcript:

1 Game of P0WN3Ds: Winter Has Come

2 Game of P0WN3Ds: Winter Has Come
Duncan McAlynn, Principal Security Engineer Follow Follow Today’s Hashtag: #GameOfP0wn3ds

3 Game of P0WN3Ds: Winter Has Come
Jon (Snow) Stark, Civil Wall Engineer Follow Follow Today’s Hashtag: #GameOfP0wn3ds

4 You Have Been Warned!

5 about us

6 Our History

7 Global Offices Headquarters: SLC, UT • USA Corporate Offices
Satellite Offices

8

9 Agenda Jon comes to the Night’s Watch
Meant to protect & defend the Wall Jon warns against the White Walkers Had firsthand accounts Knew the families & how to exploit them Fought & lost Tried to unify the families White Walkers are coming The Wall will fail (fall) Must unify & use a different battle strategy WINTER IS HERE!

10

11 What is Ransomware? Ransomware is a sophisticated piece of malware that blocks the victim’s access to his/her files, and the only way to regain access to the files is to pay a ransom. Two types of ransomware in circulation: Encrypting Ransomware - which incorporates advanced encryption algorithms to lock victim out of files. Examples include CryptoLocker, Locky, CrytpoWall and more. Locker ransomware, which locks the victim out of the operating system, making it impossible to access the desktop and any apps or files.  Some locker versions can even infect the Master Boot Record (MBR). Examples include Satana and Petya families.

12 Key Characteristics of Ransomware
Unbreakable encryption Ability to encrypt all kinds of files Scramble your file names Add a different extension to your files An image or a message (ransom note) Requests payment in Bitcoin The ransom payments have a time-limit Uses a complex set of evasion techniques Often recruits the infected PCs into botnets  Can spread to other PCs connected to a local network Frequently features data exfiltration capabilities

13

14 8 ways in which JavaScript is used to spread malware
Malicious JavaScript code injections in legitimate websites Hidden iFrames Malicious JavaScript code injections in advertising networks Drive-by downloads Malicious JavaScript attachments  Infected downloads triggered through compromised JavaScript code injects Browser add-ons and plugins Fake software pop-up messages

15 Protecting Yourself Against JavaScript Malware
Keeping your software updated at all times (your browsers, apps, operating system, etc.) Using a strong antivirus product with extensive capabilities Installing a traffic filtering solution that can ensure proactive security (VPN, Proxy, URL Filtering, Personal Firewall) Never clicking on links in unsolicited s (spam) Never downloading and opening attachments in spam s Keeping away from suspicious websites

16 What You Can Do Right Now to Protect Yourself
Implement Backup for Critical Systems Have your own backup strategy and test often (Veeam Agent for Microsoft Windows FREE v2) Consider changing your browser security settings, removing old/unused plugins, disabling JavaScript Ensure proper Windows Update settings for auto-protection, including other Microsoft products Patch 3rd party applications and consider turning on vendor’s auto update features for continuous protection Use VPN for public/open WiFi Install HTTPS Everywhere plug-in from EFF & Tor Use a TOR browser for complete anonymity

17

18 What You Can Do Right Now to Protect Your Organization
Use GPOs to Re-associate dangerous file extension types to notepad.exe or for Software Restriction policy Programs: .EXE, .PIF, .APPLICATION, .GADGET, .MSI, .COM, .SCR, .HTA, .CPL, .MSC, .JAR Scripts: .BAT, .CMD, .VB, .VBS, .VBE, .JS, .JSE, .WS, .WSF, .WSC, .WSH, .PS1, .PS1XML, .PS2, .PS2XML, .PSC1, .PSC2, .MSH, .MSH1, .MSH2, .MSHXML, .MSH1XML, .MSH2XML Office Macros: .DOC, .XLS, .PPT, .DOCM, .DOTM, .XLSM, .XLTM, .XLAM, .PPTM, .POTM, .PPAM, .PPSM, .SLDM Others: .REG, .INF, .LNK, .SCF, .PDF

19

20 What You Can Do Right Now to Protect Your Organization
Remove local administrator rights from end users Drive-level Encryption (BITLocker) File/Folder-level Encryption (7-Zip, WinMagic AES-256) Deploy Windows 10 NOW! Device Guard Credential Guard Secure Boot Windows Server Update Services (WSUS) 3rd Patching Patching Solutions like Ivanti Patch for SCCM Use Security Compliance Baselines to Identify Drift Disable SMBv1 Everywhere Possible!

21 I’m Outta Here!

22 @infosecwar @GoIvanti
Questions? @infosecwar @GoIvanti

23 THANK YOU!


Download ppt "Game of P0WN3Ds: Winter Has Come"

Similar presentations


Ads by Google