400 likes | 422 Views
THREATS AND THE DARK WEB. Threats against your computer. PASSWORD ATTACKS HIJACKING MAN-IN-THE-MIDDLE RANSOMWARE. Threats against YOU. Social engineering Phishing Whaling Smishing. Classic Threat Actors. Hackers/Hacktivist Terrorist Nation State APT Insiders/Spies/Thieves.
E N D
Threats against your computer • PASSWORD ATTACKS • HIJACKING • MAN-IN-THE-MIDDLE • RANSOMWARE
Threats against YOU Social engineering Phishing Whaling Smishing
Classic Threat Actors • Hackers/Hacktivist • Terrorist • Nation State APT • Insiders/Spies/Thieves
THREATS OF A DIFFERENT COLOR LEADERSHIP Lackofgovernance lackofleadership Blametechnology Blame anything “sophisticatedattack”=stagnation
THREATS OF A DIFFERENT COLOR • EMPLOYEES Source.LisaWhite-LinkedIn
THREATS OF A DIFFERENT COLOR • EMPLOYEES BusinessProgramsDoNotTeach IT andCybersecurity CybersecurityProgramsDoNotTeachBusiness
InsiderThreatBytheNumbers TheGrowingThreat PrevalenceinIndustry 90% 59% 25% Fraud 41% Of ITemployees, surveyedsaid they may takesensitive companydataif laid off. 35% takesensitivebusiness with them when leaving or fired. Of employees(over700 cases)usede-mail to exfiltratedata Data Leakage 49% IP Theft 16% of organizationshave hadaninsider threat incident DataBreach 36% Financial ImpactofIPandR&DTheft ImportanceofPotential RiskIndicators(PRI)* 97% 92% 51% Average (inMs) $13.5M $- $2.5 $5.0 $7.5 $10.0 $12.5 $15.0 Of employeesinvolvedin aninsider threat incident hadahistoryof violating ITsecurity Of insider threat cases precededbya negativework-related event insider threat involvedemployees flaggedbysupervisorsas suspicious $200-$250B In annualestimatedlosses toU.S. Companiesdue to IPtheft frominternalandexternal sourcesaccording to the FBI.8
FBI-TheInsiderThreatProfile “Acompanycanoftendetectorcontrolwhenanoutsider(non-employee) tries toaccesscompanydata, eitherphysically orelectronically, andcanmitigate the threat of anoutsider stealingcompanyproperty.However, the thief whoisharder to detect andwhocouldcause themost damageis theinsider- theemployeewithlegitimateaccess. That insidermay stealsolely forpersonalgain, or that insidermaybea“spy”-someonewhois stealingcompany informationorproductsinorder tobenefit anotherorganization, self orcountry” National InsiderThreat TaskForce(NITTF)Behavioral MotivationsIdentified Greedor Financial Need: abelief that moneycan fixanything. Excessivedebt oroverwhelmingexpenses. Anger/Revenge: disgruntlement to thepoint of wanting toretaliateagainst theorganization. Problems atwork: alackof recognition, disagreementswithco-workersormanagers, dissatisfactionwith thejob, apendinglayoff. Ideology/Identification: adesire tohelp the“underdog”oraparticularcause. DividedLoyalty: allegiance toanotherpersonorcompany, or toacountrybesides theUnited States. Adventure/Thrill: Want toaddexcitement to theirlife, intriguedby theclandestineactivity, “JamesBondWannabe.” Vulnerability toblackmail: extra-maritalaffairs, gambling, fraud. Ego/Self-image: an“above therules”attitude, ordesire torepairwounds to theirself-esteem. Oftencoupledwithanger/revengeoradventure/thrill. Ingratiation:Adesire topleaseorwin theapprovalof someonewhocouldbenefit frominsiderinformationwith theexpectationof returned favors. Compulsive anddestructivebehavior: drugoralcoholabuse.
Careful who you call Friends! Robert Hanssen FBI KGB Aldrich Ames CIA KGB Not all ENEMIES are Foreign Jeffrey Sterling CIA IRAN
RANSOMWARE SCAM A scare tactic that takes control of your device or files; designed to scare you into sending money to get your access back. WARNING Your personal files are encrypted. In order to obtain the private key to restore access, you need to pay $300. Private Key will be destroyed. Time Left 01: 05: 02 NEXT
OUR ADVERSARIES ARE GOING DARK FBI Director James Comey 2014
SURFACE THEINTERNET: DEEP DARK
The DEEPweb • are parts of the Internet whose • contents are not indexed by • standard search engines • & NO encryption is required
The DARKweb- NON-INDEXED PROTECTED AREAS OF THEINTERNET A collection of >10K websites that use anonymity toolslike Tor You can find DRUGS and CHILD PORN Market places, The DARK WEB also allows Whistleblowers, Political Dissidents, Privacy Forums, and many other LEGAL activities, to be conducted privately.
Now we know thedifference Who’s Surfing the DARKWEB?
Who's out there on the DARKWEB? Over 3 Million a day Aug-Nov 2017
Dark Web Map https://www.hyperiongray.com/dark-web-map/
DIVING EVEN DEEPER INTO THEDARK WEB THE ONION ROUTER THE ENCRYPTED NETWORK TO THE DARKWEB
encrypts traffic 3 times relay 1 www.anywhere www.anywhere relay 3 www.anywhere www.anywhere IP address relay 2 Client TOR Browser WEBSITE • List of all public keys • For every relay in the • TOR network & • IP address www.anywhere • approximately 8,000 “relays,” which are servers (owned by individuals, universities, and organizations)
Money Cryptocurrency Digital cash, such as bitcoin provide a convenient system for users to spend moneyonline while keeping their real-world identitieshidden. 43
WHY CRYPTO CURRENCY(BITCOIN) ANONOMOUS: Encrypted networks and sites provide confidentiality & anonymity. JUDGEMENT FREE: SYSTEMDOESN’TCARE!WHO YOU ARE, WHERE YOU ARE, OR WHATYOUBUY AND SELL NO BORDERS: Stateless PEER TO PEER PAYMENT = NO MIDDLE MAN. NO COUNTRY NOGOVERNMENT Global, and universal. Banking the Bankless & protecting privacy THE ‘INTEGRITY’OF THE NETWORK IS PARAMOUNT FOR THE INFRASTRUCTURE.
GRAMS 57 moonrocks
The GoodGuys Aug 2017 FBI unmasks Tor-usingsuspected child sextortionist on child exploitation site PLAYPEN Charging only 137 of the over 200,000 members! 63
Not all DARK Web contentis • bad orillegal • Researchers claimthat • 50% of theDARK web contents arelegal (not necessarilymoral)
PRIVACY ANDIDENTITY can it getworse?
PRIVACY ANDIDENTITY You are a target. You can no longer comfort yourself hiding in themasses. You now standout in the crowds of hundreds ofmillions. General Michael Hayden, the former head of theNSA and CIA, stated “Americais more secure—America is more safe—with unbreakable end-to-end encryption,” Director of National Intelligence Dan Coats “The weaponization of cyber tools and the relative lack of global guardrails in a cyber domain significantly increases the risk that a discrete act will have enormous strategic implications. I remain deeply concerned about threats from several countries to upcoming U.S. elections
SUGGESTIONS Set PINs and passwords Wipe data on your old phone before you donate, resell, or recycle it. Install security apps that enable remote location and wiping Backup and secure your data
WRAPUP • Adversariesare using encryptednetworks • Deep Web and Dark Web not the same Crypto currency is anonymous andStateless • Encrypted capabilities are a tool can be used for positiveor • negative • Encrypted applications are strong but not bulletproof