270 likes | 429 Views
ISON. February 1, 2011 Presenter Phil Marasco. Hacking Today: Current Trends and Techniques . Agenda. What are a criminal's goals Where is your data/device vulnerable How do they exploit your data/devices How we work for customers How do you protect yourself Stuxnet SCADA
E N D
ISON February 1, 2011 Presenter Phil Marasco Hacking Today: Current Trends and Techniques
Agenda • What are a criminal's goals • Where is your data/device vulnerable • How do they exploit your data/devices • How we work for customers • How do you protect yourself • Stuxnet SCADA • Who is ISON?
What is the goal? • Compromise your data • It is all about the money • It is all about your friends money • Your identity (it’s still about the money) • Compromise your device • Zombies aren’t just in the movies anymore
Vulnerable points • Your computer • Your applications (email, PDF, WWW) • Your operating system • Your connection paths • What you are connecting to • Web pages • Social Media
Email • SPAM • Malicious links • 419 • Phishing • Paypal has suspended your account • You account at BankNameHere has been compromised…. • Virus Propagation
OS • Patch • UNINSTALL anything you don’t need. • PATCH • Antivirus – plenty of free ones out there • Did I mention Patching?
Connection Path • Wireless is Public • Side jacking/Firesheep • Manipulation in the Middle • SSL is not always what you think it is • SSL Strip • “Eyes” can be anywhere
Serv(ic)er Side • Compromised Servers • Drive By Banners • Compromised Services • Twitter hacking • Tiny URL • Facebook Malware
Once they are in: • They steal your money
Once they are in: • They steal your friends’ money
Once they are in: • They steal your identity
Once they are in: • They use your device
It is not just you • It is anyone that has your data
Your bank? • Source: http://www.bankinfosecurity.com/articles.php?art_id=2378
ATM Skimmers • 2008 • Redbox Skimmer
ATM Skimmers • Early 2009 • ATM Skimmer
ATM Skimmers • Late 2009 • ATM Skimmer
ATM Skimmers • 2010 • ATM skimmer full skin
What can you do? • Technical • Patch • Antivirus • Personal Firewalls • Behaviors • Be observant • Don’t engage in risky behavior • Be careful with your data
What can you do? • A good list of privacy and safety tools can be found at http://epic.org/privacy/tools.html
Control Systems • Process Control systems deliver almost everything • Power • Water • Petroleum • Sewage • Manufacturing
Stuxnet • Targets Siemens process control systems in a specific configuration • Encrypted • Virtual Environment Aware • Written in 4 languages • Asserted as a non-military solution • Probably too successful
Stuxnet • Additional Stuxnet resources • http://www.symantec.com/connect/blogs/stuxnet-breakthrough • http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html • http://www.schneier.com/blog/archives/2010/10/stuxnet.html • http://www.us-cert.gov/control_systems/icsjwg/presentations/Walter%20Sikora%20icsjwg-fall-2010.pdf
What we do • Penetration testing • Network • Application • Physical • Security Awareness • Compliance
Who is ISON? • Managed IT Services Firm • Focus on small to medium business • Extension of an organization • With IT personnel • Without IT personnel • 30+ years industry experience
Thank You! www.ISONgroup.com