4233 4233-601.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

4233 4233-601.Pdf WHAT’S OUR OBLIGATION? Instructor Course WHY SHOULD I…?? Legal Lives Depend Fiduciary on it! Privacy Ethical - Patriotic Instructor Course Instructor Course GLOBAL ATTACKS • Cyber crime will cost 6 trillion annually by 2021 • It will be more profitable than the global drug trade • Cyber defense spending will be 1 Trillion within the next 4 years • There will be 3.5 million UNFILLED Cyber Security Jobs by 2021 • Ransomware alone is estimated to cost 11.5 billion in 2019 https://www.csoonline.com/article/3153707/security/top-5-cybersecurity-facts-figures-and-statistics.html Instructor Course A MASSIVE PROBLEM http://allnewspipeline.com/images/cna1.jpg http://media4.s-nbcnews.com/j/newscms/2015_31/1148606/150730-nsa-cyber-map-jhc-1407_cde28ac585ec2df79ff3cb20f7bb4559.nbcnews-ux-2880-1000.jpg Instructor Course LOSS OF CRITICAL TECHNOLOGY? Chinese Hackers Steal Sensitive Data on U.S. Subs and Missiles from Military Contractor, Report Says • 614 gigabytes of submarine communications data and information about Sea Dragon “an underwater technology that the Defense Department has described as introducing a “disruptive offensive capability”” • It is believed that China’s Ministry of State Security, or MSS is responsible • It was reported that the data was on an unclassified network as officials say the data “could be considered classified and was highly sensitive” • “Former Navy officer and NSA analyst John Schindler, writing for the Observer, highlights the loss of cryptographic information used in submarine communications.” He likens the theft to the Allied compromise of the German Enigma cipher that led to the sinking of German U-boats in World War II http://fortune.com/2018/06/10/chinese-hackers-steal-sensitive-data-us-military/ Instructor Course LOSS OF CRITICAL TECHNOLOGY? Chinese Hackers Steal Dozens of Critical Military Designs for Weapons Systems Dozens of designs for highly sensitive systems were stolen in 2013 such as: • The Advanced Patriot missile system • The Navy's Aegis ballistic missile defense systems • The F/A-18 fighter jet • The V-22 Osprey • The Black Hawk helicopter • The F-35 Joint Strike Fighter http://fortune.com/2018/06/10/chinese-hackers-steal-sensitive-data-us-military/ Instructor Course EVEN LAW ENFORCEMENT NEEDS TO WORRY? Let’s look at some examples: • April 2018: Iberia Parish, Louisiana Sheriff’s infected with Ransomware • October 2017: Pulaski County Jail cameras hacked • February 2017: Licking County Sheriff’s Network, Websites and local computers offline • May 2018: Securus prison phone and location tracking company hacked • Feb 2018: LAPD Twitter account hacked • April 2018: Arizona Road Sign Hacked • June 2017: Multiple Florida County sites hacked • August 2011: Antisec hacks more than 70 small town LEs • March 2017: Warren County Sheriff’s Hacked Instructor Course The Villains? Parties and Tactics, Across Industries: Verizon 2017 Data Breach Investigations Report Instructor Course But my Password is Complicated! The Wi-Fi Pineapple enables anyone to steal data on public Wi-Fi networks. It captures traffic coming across the network…yes including clear text passwords. Instructor Course But no Really…my Password is Super Complicated! Instructor Course But My People Are Great! • 99 percent said they feel responsible for data • 21 percent of healthcare employees write down their user names and passwords near their computer • 18 percent are willing to sell their access or confidential data to an unauthorized outsider • Average expectation was $500-$1000 • About 25% of employees know someone in their organization who has already acted on this • Employees are absolutely a HUGE part of the problem Instructor Course Instructor Course Instructor Course Project Shine (SHodan INtelligence Extraction) Bob Radvanovsky and Jake Brodsky of Infracritcal used a special search engine known as SHODAN to search the globe for devices running Industrial Control Systems exposed to the public Internet. They identified 460,000 IPs before they handed the database to the DOD and who then reduced the number to under 25,000 critical Industrial Control Systems. That total is now believed to be over 2,000,000. Shodan searched TCP/UDP port numbers such as: • 23 (Telnet) • 443 (HTTPS) • 161 (SNMP) • 80 (HTTP) • 21 (FTP) Instructor Course Industrial Control Incidents Count Total >750 Malicious >250 Targeted >100 (of the 250+) Loss of View/Loss of Control >300 Injury/Deaths >50 (>1,000 people) Equipment Damage >100 Environmental Damage >50 Operational Impact >450 Financial Impact >$30B Instructor Course What are ICS-unique Cyber Threats • Not just the network • Cyber-physical • Persistent Design Vulnerabilities not APT • Want control of the process not denial-of-service Gap in protection of the process – eg, Aurora Compromise of the measurement – eg, HART vulnerability Compromise design features of the controller – eg, Stuxnet Instructor Course Industrial Controls • Impacts ranged from significant discharges to significant equipment damage and deaths • Affects all industries • Very few ICS-specific cyber security technologies, training, and policies • >2,000,000 ICS devices directly connected to the Internet (and counting) Instructor Course Instructor Course Instructor Course A Syrian group compromised an un-named water company’s computers. The Hack involved: • Unpatched Web Vulnerabilities • Phishing • SQL Injection • Obtaining Credentials for the AS400 that were stored on a front-end Web server • Changing flow and mixture settings • Changes were discovered by alerts and the flows and mixtures were corrected But what if…they also made changes to the sensors that triggered the alerts? Would the result have been different? https://www.theregister.co.uk/2016/03/24/water_utility_hacked/ Instructor Course Yes. Your system is likely attached to the network! Instructor Course DATA CENTERS ARE VULNERABLE! • “Control system network vulnerabilities include the use of standardized cyber vulnerable communications protocols such as Modbus/TCP, BACnet and SNMP. These protocols have been demonstrated to be vulnerable to cyberattacks and, in the case of Modbus, there are simply no security features built into the protocol at all. Hardware vulnerabilities include the Aurora vulnerability and Uninterruptible Power Supplies (UPSs).” • “The Aurora demonstration proved there could be physical damage from an attack though the operators were blind because the attack was not see from the SCADA system. An actual Aurora event affected a data center when the data center experienced multiple Aurora events over a multi-day span.” • The very recent attack reportedly took down the UPSs and Chillers and therefore the entire datacenter for an extended period. https://www.controlglobal.com/blogs/unfettered/data-centers-have-been-damaged-and-they-are-not-being-adequately-cyber-secured/ Instructor Course So what’s the point you ask? • Don’t rely on facility Security Technology • Don’t assume live security will catch a determined actor • You MUST encrypt where possible Instructor Course PHYSICAL MANAGEMENT IS CRITICAL Instructor Course Drones Are a Physical and Logical Threat The Department of Homeland Security (DHS)/National Protection and Programs Directorate (NPPD)/Office of Cyber and Infrastructure Analysis (OCIA) assesses that unmanned aircraft systems (UASs) provide malicious actors an additional method of gaining undetected proximity to networks and equipment within critical infrastructure sectors. Instructor Course In 2016, researchers in Israel flew a UAS outside of an office building and were able to compromise smart lightbulbs installed within the building using equipment attached to the UAS. The researchers were able to perform over-the-air firmware updates to take control of the lightbulbs at a range of 350 meters. In 2015, researchers in Singapore attached a smartphone holding applications to a UAS to detect printers with unsecured wireless connections. The researchers flew the UAS outside an office building, had the phone pose as the printer, and tricked nearby computers to connect to the phone instead of the printer. When a user sent a document for printing, the phone intercepted the document and sent a copy to the researchers using a 3G or 4G connection. Instructor Course Let’s Look At Spreading Entity Killers • AKA: CryptoWall, Crypto Locker, Reveton, Locky, Petya, NotPetya, CryptoMix, Shark CryptoMix • Extortion–Blackmail - Shaming • IT Hostage (Needing Rescue) – I T Hostage Rescue ™) Instructor Course https://upload.wikimedia.org/wikipedia/commons/8/84/National_Security_Agency_headquarters%2C_Fort_Meade%2C_Maryland.jpg Instructor Course NSA & CIA HACKS AND TOOLS RELEASED • NSA Thieves - Shadow Brokers • Tools from Equation Group (US, Australia, Britain, Israel, &…?) • Team Equation is believed to be behind Regin (espionage) & Stuxnet (sabotage) • AV firms documented 500+ related malware infections in 42 countries • Designed to control Routers and Firewalls • Now packaged to target additional assets • Malware, zero day, private exploits, and hacking tools (most avoiding traditional security methods) Instructor Course SAMPLE OF NEARLY 100 TOOLS THOUGHT TO BE CIA NSA & CIA Hacks and Tools Released • SparrowHawk – Keylogger intended for use across multiple architectures and Unix-based platforms • Terodactyl – A “custom hardware solution to support media copying” • DerStarke – Boot-level rootkit implant for Apple computers • GyrFalcon – Tracks the client of an OpenSSH connection and collects password, username and connection data • SnowyOwl – Uses
Recommended publications
  • Ransom Where?
    Ransom where? Holding data hostage with ransomware May 2019 Author With the evolution of digitization and increased interconnectivity, the cyberthreat landscape has transformed from merely a security and privacy concern to a danger much more insidious by nature — ransomware. Ransomware is a type of malware that is designed to encrypt, Imani Barnes Analyst 646.572.3930 destroy or shut down networks in exchange [email protected] for a paid ransom. Through the deployment of ransomware, cybercriminals are no longer just seeking to steal credit card information and other sensitive personally identifiable information (PII). Instead, they have upped their games to manipulate organizations into paying large sums of money in exchange for the safe release of their data and control of their systems. While there are some business sectors in which the presence of this cyberexposure is overt, cybercriminals are broadening their scopes of potential victims to include targets of opportunity1 across a multitude of industries. This paper will provide insight into how ransomware evolved as a cyberextortion instrument, identify notorious strains and explain how companies can protect themselves. 1 WIRED. “Meet LockerGoga, the Ransomware Crippling Industrial Firms” March 25, 2019; https://www.wired.com/story/lockergoga-ransomware-crippling-industrial-firms/. 2 Ransom where? | May 2019 A brief history of ransomware The first signs of ransomware appeared in 1989 in the healthcare industry. An attacker used infected floppy disks to encrypt computer files, claiming that the user was in “breach of a licensing agreement,”2 and demanded $189 for a decryption key. While the attempt to extort was unsuccessful, this attack became commonly known as PC Cyborg and set the archetype in motion for future attacks.
    [Show full text]
  • Minimizing the Risk of Ransomware
    Minimizing the Impact of Ransomware Authors: Tushar Nandwana, OneBeacon Technology Risk Control and Joe Budzyn – OneBeacon Insurance Group Published: July 2018 1 Ransomware has featured prominently in the news over the last few years. Ransomware – Hospitals, municipalities, businesses, law enforcement agencies, individuals and A Growing Threat even entire regions of the world have been affected by it. Some have paid the ransom and recovered their computer data; others have lost their data forever. In March 2018, the city of Atlanta, Georgia was hit by SamSam ransomware which prevented city residents from paying their bills and accessing court information online. The demand was for $51,000 but it ultimately cost the city several million dollars from other costs to rectify. SamSam also infected the Colorado Department of Transportation twice in February 2018. Numerous other U.S. municipalities and healthcare organizations have been hit by this ransomware2. WannaCry wreaked havoc on the world in May 2017. With its worm‐like, self‐ propagating behaviour, it spread to thousands of systems within hours using the Eternal Blue exploit to target Windows machines. WannaCry resulted in an estimated $4B in economic losses to the affected businesses and infected 30,000 machines worldwide3. In June 2017 we also saw Petya and NotPetya which used the same exploit as WannaCry, but were more intent on destruction rather than ransom. NotPetya targeted systems specifically in the Ukraine4. FedEx ended up reporting a $300M loss, not from the ransom payout but due to the downtime and economic loss sustained by its Ukrainian subsidiary, TNT Express5. Petya caused Danish shipping giant AP Moller $300M in lost revenue6.
    [Show full text]
  • Hacking Healthcare Petya
    Hacking Healthcare Welcome to the first edition of Hacking Healthcare, NH-ISAC’s new weekly newsletter designed to guide you through the week in healthcare cybersecurity and policy. Every Wednesday, Hacking Healthcare, will bring you analysis on the latest news stories, policy developments, reports, and public remarks that impact the cybersecurity practitioner across all the different healthcare industries. We have our views on what matters, but we also want to reflect your interests – so get in touch and let the Hacking Healthcare team know what you want to see. Here we go… This is the public version of the Hacking Healthcare newsletter. For additional in-depth analysis and opinion, become a member of the NH-ISAC. Petya (aka GoldenEye, NotPetya) For the second time in as many months, a ransomware attack is snaking its way around the globe. It appears that the attack started in Ukraine and has much of its impact in Europe. But there are reports that U.S. entities have also been infected, including at least 1 U.S. hospital. Some researchers have reported that the malware resembles Petya or GoldenEye, or maybe an off-spring of one of these variants. We’ll call it Petya for now since that is the standard that NH-ISAC has adopted. Regardless of its lineage, the malware used in the current attack does seem to be relying on the ETERNALBLUE exploit to gain initial network access. Installing all of the latest Microsoft updates for the related vulnerabilitiesseems like a good first step in response. The NH-ISAC is working hard to gather and share further information on this attack and will keep its members informed through their incident- specific blog and AMBER list-serve.
    [Show full text]
  • Security – a Midlife Crisis 02/12/19 What Constitutes a Security Midlife Crisis? History of Technology and Threats
    Security – A midlife crisis 02/12/19 What constitutes a security midlife crisis? History of technology and threats 2005 – 2006 Identify theft (phishing) 2003 – 2004 Advanced worm/Trojan (“I love you”) 2007 – 2008 2000 1995 Organized crime Malicious (data theft) 1980s Breaking code Viruses websites (Melissa) 2009 – today Sophisticated targeted attacks Petya/ Non-Petya Meltdown/ Slammer Stuxnet Spectre Advanced For-profit Viruses and worms persistent Targeted attacks malware threats Mainframe Client / server Client / cloud You know the challenge – breaches are increasing World’s largest data breaches and hacks 2009 – 2014 2015 – 2019 2014 Latest 2019 2013 2018 2012 2017 2011 2016 2010 2015 2009 Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ Sept 26 – Food delivery service gets hacked • Affected users: 4.9 million • Industry or type: restaurant • Cause of breach: hack DoorDash learned in September that an unauthorized third party was able to access its user data on May 4, 2019. Many of the food delivery app’s users were affected, totaling almost 5 million. The hack affected only those people who joined before April 5, 2018. The hacker was able to access the following information: • Profile information • Names • Email addresses • Delivery addresses • Order history • Phone numbers • Passwords (hashed and salted) • Last four digits of payment cards (for consumers) • Last four digits of bank accounts (for Dashers and merchants) • Driver’s license numbers (for roughly 100,000 Dashers) July 30 – Largest banking data breach • Affected users: 100 million • Industry or type: banking and finance • Cause of breach: hack Capital One, the major US banking institution, suffered possibly the largest banking data breach in history.
    [Show full text]
  • A PRACTICAL METHOD of IDENTIFYING CYBERATTACKS February 2018 INDEX
    In Collaboration With A PRACTICAL METHOD OF IDENTIFYING CYBERATTACKS February 2018 INDEX TOPICS EXECUTIVE SUMMARY 4 OVERVIEW 5 THE RESPONSES TO A GROWING THREAT 7 DIFFERENT TYPES OF PERPETRATORS 10 THE SCOURGE OF CYBERCRIME 11 THE EVOLUTION OF CYBERWARFARE 12 CYBERACTIVISM: ACTIVE AS EVER 13 THE ATTRIBUTION PROBLEM 14 TRACKING THE ORIGINS OF CYBERATTACKS 17 CONCLUSION 20 APPENDIX: TIMELINE OF CYBERSECURITY 21 INCIDENTS 2 A Practical Method of Identifying Cyberattacks EXECUTIVE OVERVIEW SUMMARY The frequency and scope of cyberattacks Cyberattacks carried out by a range of entities are continue to grow, and yet despite the seriousness a growing threat to the security of governments of the problem, it remains extremely difficult to and their citizens. There are three main sources differentiate between the various sources of an of attacks; activists, criminals and governments, attack. This paper aims to shed light on the main and - based on the evidence - it is sometimes types of cyberattacks and provides examples hard to differentiate them. Indeed, they may of each. In particular, a high level framework sometimes work together when their interests for investigation is presented, aimed at helping are aligned. The increasing frequency and severity analysts in gaining a better understanding of the of the attacks makes it more important than ever origins of threats, the motive of the attacker, the to understand the source. Knowing who planned technical origin of the attack, the information an attack might make it easier to capture the contained in the coding of the malware and culprits or frame an appropriate response. the attacker’s modus operandi.
    [Show full text]
  • Digitaalisen Kybermaailman Ilmiöitä Ja Määrittelyjä
    DIGITAALISEN KYBERMAAILMAN ILMIÖITÄ JA MÄÄRITTELYJÄ PROF. MARTTI LEHTO V 15.0 6.4.2021 JYVÄSKYLÄN YLIOPISTO INFORMAATIOTEKNOLOGIAN TIEDEKUNTA 2021 ALKUSANAT Euroopan komissio analysoi pohdinta-asiakirjassaan kesällä 2017 tulevaisuuden uhka- maailmaa. Sen mukaan teknologian kehitys muuttaa merkittävästi niin turvallisuuden kuin puolustuksen luonnetta. Big data, pilviteknologia, miehittämättömät ajoneuvot ja tekoäly muokkaavat yhteiskunnan eri rakenteita aina turvallisuuteen ja puolustukseen saakka. Tämän verrattain helposti saatavilla olevan teknologian käyttö mahdollistaa epätavanomaisten, valtioiden rajat ylittävien ja epäsymmetristen uhkien nopean kas- vun. Näitä ovat muun muassa hybridi- ja kyberuhat, terrorismi sekä kemialliset, biologi- set ja radiologiset iskut. Internetin käyttäjien määrän nopean kasvun myötä kyberrikol- lisuus ja terroristien internetin käyttö ovat 2000-luvulla muokanneet merkittävästi digi- taalista toimintaympäristöä.1 Digitaaliteknologia muuttaa ihmisten elämää. EU:n digitaalistrategian tavoitteena on valjastaa digitalisaatio palvelemaan ihmisiä ja yrityksiä sekä tukemaan tavoitetta tehdä Euroopasta ilmastoneutraali vuoteen 2050 mennessä. Komissio on päättänyt tehdä ku- luvasta vuosikymmenestä Euroopan "digitaalisen vuosikymmenen". Euroopan on nyt lu- jitettava digitaalista suvereniteettiaan ja asetettava standardeja sen sijaan, että se kul- kisi muiden jäljissä. Painopisteinä ovat data, teknologia ja infrastruktuuri.2 Euroopan komissio ja unionin ulkoasioiden ja turvallisuuspolitiikan korkea edustaja esit-
    [Show full text]
  • Hack.Lu 2019 / 2019-10-23 Public / Tlp:White Disturbance the Sorry State of Cybersecurity and What We Can Do About It
    SAÂD KADHI, HEAD OF CERT-EU. HACK.LU 2019 / 2019-10-23 PUBLIC / TLP:WHITE DISTURBANCE THE SORRY STATE OF CYBERSECURITY AND WHAT WE CAN DO ABOUT IT v1 IN THE BEGINNING IN THE BEGINNING, A CYBERSECURITY PRODUCT WAS BORN THE ANTIVIRUS IN THE BEGINNING, IT PROTECTED US (TO SOME EXTENT) FILELESS MALWARE RANSOMWARE SLAMMER (2003) BRAIN POWELIKS (1986) (2015) WORMS AIDS (1989) ILOVEYOU (2000) REVETON (2012) CODE NIMDA RED (2001) THE ANTIVIRUS (2001) CRYPTOLOCKER (2013) CONFICKER (2008) TROJANS & RATS PETYA (2016) EGABTR (1989?) POTENTIALLY UNWANTED APPLICATIONS WANNACRY (2017) NETBUS MIMIKATZ DARKCOMET (1998) (2011) (2012) FINFISHER (2011?) IN THE BEGINNING, IT PROTECTED US (TO SOME EXTENT) FILELESS MALWARE THIS SLIDE (NOR RANSOMWARE MY LIFE) WILL SLAMMER SUFFICE TO LIST (2003) BRAIN (1986) THEM ALL POWELIKS (2015) WORMS AIDS (1989) ILOVEYOU (2000) REVETON (2012) CODE NIMDA RED (2001) THE ANTIVIRUS (2001) CRYPTOLOCKER (2013) CONFICKER (2008) TROJANS & RATS PETYA (2016) EGABTR (1989?) POTENTIALLY UNWANTED APPLICATIONS WANNACRY (2017) NETBUS MIMIKATZ DARKCOMET (1998) (2011) (2012) FINFISHER (2011?) Source: Wired HOW WE ENDED UP HERE? CYBERINSECURITY: THE COST OF MONOPOLY HOW THE DOMINANCE OF MICROSOFT’S PRODUCTS POSES A RISK TO SECURITY DAN GEER, SEP 24, 2003 THESE EXAMPLES ARE ALL TELLTALE SIGNS OF THE DOMINATING MONOCULTURE BUT… A MONOCULTURE HAS ADVANTAGES (AND THE SECURITY OF MS PRODUCTS HAS SIGNIFICANTLY AND STEADILY IMPROVED) HOWEVER, CLASS BREAKS ARE TOO COSTLY TO IGNORE CLASS BREAKS 101 TARGETS A CERTAIN COMPROMISES A PIECE OF SOFTWARE
    [Show full text]
  • Ransomware 2017
    Internet Security Threat Report ISTR Ransomware 2017 An ISTR Special Report Analyst: Dick O’Brien July 2017 Contents Executive summary and Key findings Ransomware: An overview A new breed of threat: WannaCry and Petya Businesses in the crosshairs Affecting the bottom line: Impact of ransomware How ransomware is spread Major ransomware threats Protection and best practices Internet Security Threat Report Contents 3 Executive summary and key findings 28 02 Contain 29 Advanced antivirus engine 5 Ransomware: An overview 29 SONAR behavior engine 8 A new breed of threat: WannaCry 29 Sapient – machine learning and Petya 29 Best practice 9 How WannaCry spread and how it was stopped 29 Ongoing development 9 What is EternalBlue? 29 03 Respond 10 Poor implantation, poor returns 29 Incident Response 10 Petya: Different threat, similar tactics 29 Best practices 10 Who was behind the WannaCry attacks? 30 Appendix: Symantec detections for 11 How Petya was spread common ransomware families 11 Ransomware or wiper? 34 About Symantec 12 Ransomware as a political tool 34 More Information 13 Businesses in the crosshairs 14 Worms are not the only threat 14 Targeted ransomware attacks Figures and Tables 15 Prevention is possible, a cure may not be 6 Ransomware infections by year 6 Ransomware infections by month 16 Affecting the bottom line: Impact of ransomware 6 Impact of WannaCry and Petya outbreaks on monthly infection rate 17 Ransom demands stabilize 6 Monthly ransomware infection numbers 17 Financial and reputational damage without WannaCry and Petya 18
    [Show full text]
  • 'Petya' Ransomware Attack Goes Global, Targets Merck in US
    Ph: (8621) 5404-3999 Fax: (8621) 5404-7759 Email: [email protected] www.SSBG.com.cn ’Petya’ ransomware attack goes global, targets Merck in US Published time: 27 Jun, 2017 16:42Edited time: 27 Jun, 2017 18:36 link: https://www.rt.com/usa/394294-ransomware-attack-petya-merck/ The US-based division of the global pharmaceutical giant Merck has been hit by the ‘Petya’ ransomware attack that has crippled computer systems across the world on Tuesday. “We confirm our company’s computer network was compromised today as part of global hack,” Merck said in a statement on Tuesday. “Other organizations have also been affected. We are investigating the matter and will provide additional information as we learn more.” We confirm our company's computer network was compromised today as part of global hack. Other organizations have also been affected (1 of 2) — Merck (@Merck) June 27, 2017 “The company is currently experiencing a hostile ransomware attack on its network systems,” said an internal Merck memo quoted by the Philadelphia Inquirer. “While IT risk management and global security respond to this threat please remain calm.” Merck employees were instructed to disconnect all mobile devices from the company network and advised not to speak to reporters or post messages on social media accounts. Computers at Merck facilities in Pennsylvania and New Jersey locked up Tuesday morning around 8am local time, according to the Inquirer. The ransomware attack reportedly began in Ukraine, but has since spread to corporate systems across the world, affecting the Russian state oil giant Rosneft, the international shipping and energy conglomerate Maersk, and the UK-based advertising and public relations company WPP, among others.
    [Show full text]
  • EY Technical Intelligence Analysis
    “Petya ” Ransomware Attack Technical intelligence analysis June 2017 Executive summary On 27 June 2017, a global ransomware attack campaign called Petya (also being called “NotPetya”, and “Petna”) impacted companies across a wide range of sectors including financial services, power and utilities, media, telecom, life sciences, transportation as well as government agencies. While organizations in countries around the world were affected - including the United States, Netherlands, France, India, Spain and Russia - Ukraine seems to have been the first and hardest country hit by the attack due to the use of an auto-update feature of M.E.Doc software required for tax calculation by any company operating in the Ukraine. The ransomware successfully infected several of its banks as well as media outlets, energy companies, government agencies, airports and radiation monitoring equipment within the Chernobyl power plant. It is the second major ransomware event in as many months after the WannaCry outbreak in May 2017. Although initially characterized as very similar to that attack, Petya is notably different, particularly in the way it spreads and encrypts victims’ data. While WannaCry relied on its worm-like behavior to spread across the Internet, Petya was less virulent, and spread internally using a number of lateral movement techniques including the SMB vulnerability and credential harvesting. Once inside the network, Petya is more sophisticated and nefarious than WannaCry. It subsequently leverages several additional hacking tools to gather credentials from the infected computer’s memory, before spreading to other machines using legitimate and well-known Windows system administration tools such as PsExec and WMIC. It does this for about an hour before rebooting and encrypting the system and/or the files.
    [Show full text]
  • Is Malware the New Weapon of Mass Destruction?
    #RSAC SESSION ID: STR-F03 IS MALWARE THE NEW WEAPON OF MASS DESTRUCTION? Tony Anscombe Global Security Evangelist ESET [email protected] @tonyatESET Weapons of Mass Destruction #RSA C Title 18 U.S.C. §2332a defines weapons of mass destruction (WMD) as: Any explosive, incendiary, or poison gas, including the following: a bomb; grenade; rocket having an explosive or incendiary charge of more than four ounces; missile having an explosive or incendiary charge of more than one- quarter ounce; mine; or device similar to any of the previously described devices; Any weapons that is designed or intend to cause death or serious bodily injury through the release, dissemination, or impact of toxic or poisonous chemicals, or their precursors; Any weapon involving a disease organism; and Any weapon that is designed to release radiation or radioactivity at a level dangerous to human life. Presenter’s Company Logo – replace or delete on master slide Malware of Mass Disruption #RSA C Malware of Mass Disruption (MMD) as: Any exploit, virus, worm, Trojan horse, ransomware, spyware, adware or scareware and any other intentionally harmful computer program; Any software that is intended to damage or disable computers and computer systems; Any phishing attempt to obtain sensitive information such as usernames, passwords, credit card details for malicious reasons; Any data breach of sensitive, protected or confidential data Presenter’s Company Logo – replace or delete on master slide #RSA EVOLUTION OF MALWARE C Elk Cloner 50% US homes online Infected Apple’s
    [Show full text]
  • A History of Cyber Incidents and Threats Involving Industrial Control Systems Kevin Hemsley, Ronald Fisher
    A History of Cyber Incidents and Threats Involving Industrial Control Systems Kevin Hemsley, Ronald Fisher To cite this version: Kevin Hemsley, Ronald Fisher. A History of Cyber Incidents and Threats Involving Industrial Control Systems. 12th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2018, Arlington, VA, United States. pp.215-242, 10.1007/978-3-030-04537-1_12. hal-02076302 HAL Id: hal-02076302 https://hal.archives-ouvertes.fr/hal-02076302 Submitted on 22 Mar 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License Chapter 12 A HISTORY OF CYBER INCIDENTS AND THREATS INVOLVING INDUSTRIAL CONTROL SYSTEMS Kevin Hemsley and Ronald Fisher Abstract For many years, malicious cyber actors have been targeting the indus- trial control systems that manage critical infrastructure assets. Most of these events are not reported to the public and their details along with their associated threats are not as well-known as those involving enterprise (information technology) systems. This chapter presents an analysis of publicly-reported cyber incidents involving critical infras- tructure assets. The list of incidents is by no means comprehensive.
    [Show full text]