Hack.Lu 2019 / 2019-10-23 Public / Tlp:White Disturbance the Sorry State of Cybersecurity and What We Can Do About It

Total Page:16

File Type:pdf, Size:1020Kb

Hack.Lu 2019 / 2019-10-23 Public / Tlp:White Disturbance the Sorry State of Cybersecurity and What We Can Do About It SAÂD KADHI, HEAD OF CERT-EU. HACK.LU 2019 / 2019-10-23 PUBLIC / TLP:WHITE DISTURBANCE THE SORRY STATE OF CYBERSECURITY AND WHAT WE CAN DO ABOUT IT v1 IN THE BEGINNING IN THE BEGINNING, A CYBERSECURITY PRODUCT WAS BORN THE ANTIVIRUS IN THE BEGINNING, IT PROTECTED US (TO SOME EXTENT) FILELESS MALWARE RANSOMWARE SLAMMER (2003) BRAIN POWELIKS (1986) (2015) WORMS AIDS (1989) ILOVEYOU (2000) REVETON (2012) CODE NIMDA RED (2001) THE ANTIVIRUS (2001) CRYPTOLOCKER (2013) CONFICKER (2008) TROJANS & RATS PETYA (2016) EGABTR (1989?) POTENTIALLY UNWANTED APPLICATIONS WANNACRY (2017) NETBUS MIMIKATZ DARKCOMET (1998) (2011) (2012) FINFISHER (2011?) IN THE BEGINNING, IT PROTECTED US (TO SOME EXTENT) FILELESS MALWARE THIS SLIDE (NOR RANSOMWARE MY LIFE) WILL SLAMMER SUFFICE TO LIST (2003) BRAIN (1986) THEM ALL POWELIKS (2015) WORMS AIDS (1989) ILOVEYOU (2000) REVETON (2012) CODE NIMDA RED (2001) THE ANTIVIRUS (2001) CRYPTOLOCKER (2013) CONFICKER (2008) TROJANS & RATS PETYA (2016) EGABTR (1989?) POTENTIALLY UNWANTED APPLICATIONS WANNACRY (2017) NETBUS MIMIKATZ DARKCOMET (1998) (2011) (2012) FINFISHER (2011?) Source: Wired HOW WE ENDED UP HERE? CYBERINSECURITY: THE COST OF MONOPOLY HOW THE DOMINANCE OF MICROSOFT’S PRODUCTS POSES A RISK TO SECURITY DAN GEER, SEP 24, 2003 THESE EXAMPLES ARE ALL TELLTALE SIGNS OF THE DOMINATING MONOCULTURE BUT… A MONOCULTURE HAS ADVANTAGES (AND THE SECURITY OF MS PRODUCTS HAS SIGNIFICANTLY AND STEADILY IMPROVED) HOWEVER, CLASS BREAKS ARE TOO COSTLY TO IGNORE CLASS BREAKS 101 TARGETS A CERTAIN COMPROMISES A PIECE OF SOFTWARE CERTAIN DEVICE COMPROMISES HUNDREDS IF NOT THOUSANDS OF DEVICES DEVICE DEVICE MONOCULTURE & STANDARDISATION DEVICE DEVICE TARGETS A WIDELY DEPLOYED PIECE OF SOFTWARE DEVICE DEVICE DEVICE DEVICE Source: Google's Project Zero CLASS BREAKS: EXAMPLES SYMANTEC ENDPOINT PROTECTION (2016) 2012-2018: GOOGLE’S PROJECT ZERO FOUND SEVERAL HIGHLY CRITICAL VULNERABILITIES IN MANY OTHER AV PRODUCTS (KASPERSKY, ESET, COMODO, TRENDMICRO, SOPHOS…) Source: The Register Source: imgflip.com FROM SUPPLY-CHAIN ATTACKS TO CLASS BREAKS COMPANY X IS A COMPROMISES TARGETS COMPANY X SUPPLIER OF COMPANY A (SECONDARY TARGET) COMPANY A (PRIMARY TARGET) Source: Reuters COMPROMISES TENS IF NOT HUNDREDS OF COMPANIES COMPANY A COMPANY B COMPANY C COMPANY D TARGETS COMPANY X COMPANY X IS A (SECONDARY TARGET) SUPPLIER OF MANY ORGS COMPANY E COMPANY F COMPANY G COMPANY H THIS IS NOT THEORETICAL 2016 ? 2019 Source: Twitter Source: Arstechnica MARCHING TOWARD FAILURE IN THE BEGINNING… INSUFFICIENT (COVER ONLY A CERTAIN CLASS OF THREATS) FAILLIBLE (FAULTY SIGNATURES, BSOD) THE ANTIVIRUS EXCELLENT VECTOR (FOR A NICE CLASS BREAK INSECURE ATTACK) (TOO MANY PARSERS, BAD CODING) WITH GROWING DIGITALISATION COMES PRODUCT PROLIFERATION UBA UEBA UTM SANDBOX 2FA NETWORK VPN ANTI-MALWARE FIREWALL (WITH DPI) NIDS THREAT FEEDS VULNERABILITY WAF THE ANTIVIRUS SCANNERS NIPS TIP ANTI-SPAM SOAR SIEM EPP PERSONAL PROXY FIREWALL (WITH DPI) DLP EDR Source: RSA Conference LIKE THE ANTIVIRUS, THESE ‘SOLUTIONS’ ARE ALL PART OF THE ATTACK SURFACE 10 Oct 2019, Source: ZDNet 7 Oct 2019, Source: thebestvpn 2019 Source: TechCrunch 2011, Source: CSOOnline … RUNNING ON TOP OF VULNERABLE PROCESSORS Source: https://meltdownattack.com Source: https://foreshadowattack.eu Source: https://zombieloadattack.com AND THEY NEED HUMANS & €€€ TO INSTALL, USE AND MAINTAIN CONFIGURE LOGGING PROPERLY (NO, IT’S NOT A FIRE & FORGET TASK) BUY THREAT FEEDS MONITOR THE HEALTH OF THE SYSTEM (ARE YOU SURE YOU ARE NOT MISSING LOGS?) BUILD AND MAINTAIN TRAIN PEOPLE USE CASES (TO USE SOME OBSCURE QUERY BUY A TIP BUY SOFTWARE LANGUAGE) BUY AN SIEM ADD-ON FOR YOUR COMPLIANCE NEEDS HIRE DATA BUY HARDWARE MAKE CLUSTERS & BACK-UPS SCIENTISTS RECRUIT SYSADMINS BUY AN INCIDENT RESPONSE PLATFORM BUY SUPPORT BUY PRO SERVICES (BECAUSE YOU NEED NEW PARSERS AND BUY PRO SERVICES YOUR EXISTING PARSERS WILL CONFIGURE ALERTS (BECAUSE THERE ARE ALWAYS ‘EDGE BREAK) (AND HOPE YOUR ANALYSTS WON’T DIE OUT OF CASES’) FALSE POSITIVE FATIGUE) HOUSTON, WE HAVE A SERIOUS LAYER 8 PROBLEM TRENDING! THE PERFECT RECIPE FOR INFOBESITY DOOM TOO FRUSTRATION (& BURNOUTS) MANY THINGS TO LEARN FEAR OF THE HUMAN MISSING OUT BRAIN IS NOT A TOO COMPUTER MANY THINGS TO DEFEND CONTINUOUS DISTRACTIONS & CONTINUOUSLY INTERRUPTIONS CHANGING TECH TOO LITTLE TIME CONTINUOUSLY TO INVESTIGATE CHANGING THREAT LANDSCAPE HANG ON APOLLO! HELP IS ON ITS WAY! NOPE, ARTIFICIAL INTELLIGENCE IS NOWHERE READY TO HELP US BREAKING DEEP NEURAL NETWORKS (DNNs) IS VERY EASY Further reading: Adversarial Reprogramming of Neural Networks, Cornell University ALGORITHMS ARE CREATED BY ‘FLAWED' HUMANS & TRAINED ON DATA OF VARYING QUALITY WHILE RUNNING ON VULNERABLE PROCESSORS Source: Nature BREAKING THE FAILURE CYCLE THERE IS NO SILVER BULLET GROWING TIME TO COMPLEXITY MARKET NO LIABILITY (USE AS-IS BUT DON’T FORGET TO PAY) (SECURITY) BUGS ARE A DIRECT BYPRODUCT OF MODERN SOFTWARE LIMITED OR DEVELOPMENT NON-EXISTENT REGULATION FLAWED VC MODEL BAD CODING PRACTICES MARKETING IS LACK OF KING TRANSPARENCY AND THINGS ARE GETTING WORSE The over-complexification of provisioning and deployment pipelines is a dangerous trend. I don't trust the layers upon layers of scripts and tools to not break randomly, and I worry the maintenance cost is getting out of hands. Yes, I'm looking at you, k8s. Source: Julien Vehent, Firefox Operations Security at @Mozilla, Author of Security DevOps http://securing-devops.com; coder & speaker. WE KNOW THE SOLUTIONS AND THEY REQUIRE COURAGE & HARD WORK ASK FOR MORE TRANSPARENCY FROM DEMAND EASY-TO-USE VENDORS & SUPPLIERS SOLUTIONS PUSHBACK! LOBBY FOR SOUND REGULATION & LIABILITY DEMAND INTEROPERABILITY LEVERAGE THE POWER OF THE CROWD EMPOWER & HELP LAW ENFORCEMENT (THOSE CRIMINALS MUST BE USE & CONTRIBUTE TO ARRESTED) FREE, OPEN SOURCE SOLUTIONS (WHEN APPLICABLE) PARTICIPATE IN VARIOUS INVEST IN PEOPLE & SKILLS COMMUNITIES & FOSTER TRUE SHARING HELP EACH OTHER OUT (SHOW ME HOW TO DO THIS & I’LL SHOW YOU HOW TO DO THAT) IDENTIFY THE CROWN JEWELS IN YOUR IMPLEMENT PROPER LEARN TO USE WHAT YOU NETWORK (YOU CAN LOSE A LEG BUT NOT A CYBER HYGIENE ALREADY HAVE HEART) (IT REALLY HELPS A LOT!) (AND STOP USING WHAT YOU DON’T NEED) THINK CONSTITUENT CREATE VALUE.
Recommended publications
  • Ransom Where?
    Ransom where? Holding data hostage with ransomware May 2019 Author With the evolution of digitization and increased interconnectivity, the cyberthreat landscape has transformed from merely a security and privacy concern to a danger much more insidious by nature — ransomware. Ransomware is a type of malware that is designed to encrypt, Imani Barnes Analyst 646.572.3930 destroy or shut down networks in exchange [email protected] for a paid ransom. Through the deployment of ransomware, cybercriminals are no longer just seeking to steal credit card information and other sensitive personally identifiable information (PII). Instead, they have upped their games to manipulate organizations into paying large sums of money in exchange for the safe release of their data and control of their systems. While there are some business sectors in which the presence of this cyberexposure is overt, cybercriminals are broadening their scopes of potential victims to include targets of opportunity1 across a multitude of industries. This paper will provide insight into how ransomware evolved as a cyberextortion instrument, identify notorious strains and explain how companies can protect themselves. 1 WIRED. “Meet LockerGoga, the Ransomware Crippling Industrial Firms” March 25, 2019; https://www.wired.com/story/lockergoga-ransomware-crippling-industrial-firms/. 2 Ransom where? | May 2019 A brief history of ransomware The first signs of ransomware appeared in 1989 in the healthcare industry. An attacker used infected floppy disks to encrypt computer files, claiming that the user was in “breach of a licensing agreement,”2 and demanded $189 for a decryption key. While the attempt to extort was unsuccessful, this attack became commonly known as PC Cyborg and set the archetype in motion for future attacks.
    [Show full text]
  • Minimizing the Risk of Ransomware
    Minimizing the Impact of Ransomware Authors: Tushar Nandwana, OneBeacon Technology Risk Control and Joe Budzyn – OneBeacon Insurance Group Published: July 2018 1 Ransomware has featured prominently in the news over the last few years. Ransomware – Hospitals, municipalities, businesses, law enforcement agencies, individuals and A Growing Threat even entire regions of the world have been affected by it. Some have paid the ransom and recovered their computer data; others have lost their data forever. In March 2018, the city of Atlanta, Georgia was hit by SamSam ransomware which prevented city residents from paying their bills and accessing court information online. The demand was for $51,000 but it ultimately cost the city several million dollars from other costs to rectify. SamSam also infected the Colorado Department of Transportation twice in February 2018. Numerous other U.S. municipalities and healthcare organizations have been hit by this ransomware2. WannaCry wreaked havoc on the world in May 2017. With its worm‐like, self‐ propagating behaviour, it spread to thousands of systems within hours using the Eternal Blue exploit to target Windows machines. WannaCry resulted in an estimated $4B in economic losses to the affected businesses and infected 30,000 machines worldwide3. In June 2017 we also saw Petya and NotPetya which used the same exploit as WannaCry, but were more intent on destruction rather than ransom. NotPetya targeted systems specifically in the Ukraine4. FedEx ended up reporting a $300M loss, not from the ransom payout but due to the downtime and economic loss sustained by its Ukrainian subsidiary, TNT Express5. Petya caused Danish shipping giant AP Moller $300M in lost revenue6.
    [Show full text]
  • Hacking Healthcare Petya
    Hacking Healthcare Welcome to the first edition of Hacking Healthcare, NH-ISAC’s new weekly newsletter designed to guide you through the week in healthcare cybersecurity and policy. Every Wednesday, Hacking Healthcare, will bring you analysis on the latest news stories, policy developments, reports, and public remarks that impact the cybersecurity practitioner across all the different healthcare industries. We have our views on what matters, but we also want to reflect your interests – so get in touch and let the Hacking Healthcare team know what you want to see. Here we go… This is the public version of the Hacking Healthcare newsletter. For additional in-depth analysis and opinion, become a member of the NH-ISAC. Petya (aka GoldenEye, NotPetya) For the second time in as many months, a ransomware attack is snaking its way around the globe. It appears that the attack started in Ukraine and has much of its impact in Europe. But there are reports that U.S. entities have also been infected, including at least 1 U.S. hospital. Some researchers have reported that the malware resembles Petya or GoldenEye, or maybe an off-spring of one of these variants. We’ll call it Petya for now since that is the standard that NH-ISAC has adopted. Regardless of its lineage, the malware used in the current attack does seem to be relying on the ETERNALBLUE exploit to gain initial network access. Installing all of the latest Microsoft updates for the related vulnerabilitiesseems like a good first step in response. The NH-ISAC is working hard to gather and share further information on this attack and will keep its members informed through their incident- specific blog and AMBER list-serve.
    [Show full text]
  • Security – a Midlife Crisis 02/12/19 What Constitutes a Security Midlife Crisis? History of Technology and Threats
    Security – A midlife crisis 02/12/19 What constitutes a security midlife crisis? History of technology and threats 2005 – 2006 Identify theft (phishing) 2003 – 2004 Advanced worm/Trojan (“I love you”) 2007 – 2008 2000 1995 Organized crime Malicious (data theft) 1980s Breaking code Viruses websites (Melissa) 2009 – today Sophisticated targeted attacks Petya/ Non-Petya Meltdown/ Slammer Stuxnet Spectre Advanced For-profit Viruses and worms persistent Targeted attacks malware threats Mainframe Client / server Client / cloud You know the challenge – breaches are increasing World’s largest data breaches and hacks 2009 – 2014 2015 – 2019 2014 Latest 2019 2013 2018 2012 2017 2011 2016 2010 2015 2009 Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ Sept 26 – Food delivery service gets hacked • Affected users: 4.9 million • Industry or type: restaurant • Cause of breach: hack DoorDash learned in September that an unauthorized third party was able to access its user data on May 4, 2019. Many of the food delivery app’s users were affected, totaling almost 5 million. The hack affected only those people who joined before April 5, 2018. The hacker was able to access the following information: • Profile information • Names • Email addresses • Delivery addresses • Order history • Phone numbers • Passwords (hashed and salted) • Last four digits of payment cards (for consumers) • Last four digits of bank accounts (for Dashers and merchants) • Driver’s license numbers (for roughly 100,000 Dashers) July 30 – Largest banking data breach • Affected users: 100 million • Industry or type: banking and finance • Cause of breach: hack Capital One, the major US banking institution, suffered possibly the largest banking data breach in history.
    [Show full text]
  • A PRACTICAL METHOD of IDENTIFYING CYBERATTACKS February 2018 INDEX
    In Collaboration With A PRACTICAL METHOD OF IDENTIFYING CYBERATTACKS February 2018 INDEX TOPICS EXECUTIVE SUMMARY 4 OVERVIEW 5 THE RESPONSES TO A GROWING THREAT 7 DIFFERENT TYPES OF PERPETRATORS 10 THE SCOURGE OF CYBERCRIME 11 THE EVOLUTION OF CYBERWARFARE 12 CYBERACTIVISM: ACTIVE AS EVER 13 THE ATTRIBUTION PROBLEM 14 TRACKING THE ORIGINS OF CYBERATTACKS 17 CONCLUSION 20 APPENDIX: TIMELINE OF CYBERSECURITY 21 INCIDENTS 2 A Practical Method of Identifying Cyberattacks EXECUTIVE OVERVIEW SUMMARY The frequency and scope of cyberattacks Cyberattacks carried out by a range of entities are continue to grow, and yet despite the seriousness a growing threat to the security of governments of the problem, it remains extremely difficult to and their citizens. There are three main sources differentiate between the various sources of an of attacks; activists, criminals and governments, attack. This paper aims to shed light on the main and - based on the evidence - it is sometimes types of cyberattacks and provides examples hard to differentiate them. Indeed, they may of each. In particular, a high level framework sometimes work together when their interests for investigation is presented, aimed at helping are aligned. The increasing frequency and severity analysts in gaining a better understanding of the of the attacks makes it more important than ever origins of threats, the motive of the attacker, the to understand the source. Knowing who planned technical origin of the attack, the information an attack might make it easier to capture the contained in the coding of the malware and culprits or frame an appropriate response. the attacker’s modus operandi.
    [Show full text]
  • Digitaalisen Kybermaailman Ilmiöitä Ja Määrittelyjä
    DIGITAALISEN KYBERMAAILMAN ILMIÖITÄ JA MÄÄRITTELYJÄ PROF. MARTTI LEHTO V 15.0 6.4.2021 JYVÄSKYLÄN YLIOPISTO INFORMAATIOTEKNOLOGIAN TIEDEKUNTA 2021 ALKUSANAT Euroopan komissio analysoi pohdinta-asiakirjassaan kesällä 2017 tulevaisuuden uhka- maailmaa. Sen mukaan teknologian kehitys muuttaa merkittävästi niin turvallisuuden kuin puolustuksen luonnetta. Big data, pilviteknologia, miehittämättömät ajoneuvot ja tekoäly muokkaavat yhteiskunnan eri rakenteita aina turvallisuuteen ja puolustukseen saakka. Tämän verrattain helposti saatavilla olevan teknologian käyttö mahdollistaa epätavanomaisten, valtioiden rajat ylittävien ja epäsymmetristen uhkien nopean kas- vun. Näitä ovat muun muassa hybridi- ja kyberuhat, terrorismi sekä kemialliset, biologi- set ja radiologiset iskut. Internetin käyttäjien määrän nopean kasvun myötä kyberrikol- lisuus ja terroristien internetin käyttö ovat 2000-luvulla muokanneet merkittävästi digi- taalista toimintaympäristöä.1 Digitaaliteknologia muuttaa ihmisten elämää. EU:n digitaalistrategian tavoitteena on valjastaa digitalisaatio palvelemaan ihmisiä ja yrityksiä sekä tukemaan tavoitetta tehdä Euroopasta ilmastoneutraali vuoteen 2050 mennessä. Komissio on päättänyt tehdä ku- luvasta vuosikymmenestä Euroopan "digitaalisen vuosikymmenen". Euroopan on nyt lu- jitettava digitaalista suvereniteettiaan ja asetettava standardeja sen sijaan, että se kul- kisi muiden jäljissä. Painopisteinä ovat data, teknologia ja infrastruktuuri.2 Euroopan komissio ja unionin ulkoasioiden ja turvallisuuspolitiikan korkea edustaja esit-
    [Show full text]
  • 4233 4233-601.Pdf
    WHAT’S OUR OBLIGATION? Instructor Course WHY SHOULD I…?? Legal Lives Depend Fiduciary on it! Privacy Ethical - Patriotic Instructor Course Instructor Course GLOBAL ATTACKS • Cyber crime will cost 6 trillion annually by 2021 • It will be more profitable than the global drug trade • Cyber defense spending will be 1 Trillion within the next 4 years • There will be 3.5 million UNFILLED Cyber Security Jobs by 2021 • Ransomware alone is estimated to cost 11.5 billion in 2019 https://www.csoonline.com/article/3153707/security/top-5-cybersecurity-facts-figures-and-statistics.html Instructor Course A MASSIVE PROBLEM http://allnewspipeline.com/images/cna1.jpg http://media4.s-nbcnews.com/j/newscms/2015_31/1148606/150730-nsa-cyber-map-jhc-1407_cde28ac585ec2df79ff3cb20f7bb4559.nbcnews-ux-2880-1000.jpg Instructor Course LOSS OF CRITICAL TECHNOLOGY? Chinese Hackers Steal Sensitive Data on U.S. Subs and Missiles from Military Contractor, Report Says • 614 gigabytes of submarine communications data and information about Sea Dragon “an underwater technology that the Defense Department has described as introducing a “disruptive offensive capability”” • It is believed that China’s Ministry of State Security, or MSS is responsible • It was reported that the data was on an unclassified network as officials say the data “could be considered classified and was highly sensitive” • “Former Navy officer and NSA analyst John Schindler, writing for the Observer, highlights the loss of cryptographic information used in submarine communications.” He likens the theft
    [Show full text]
  • Ransomware 2017
    Internet Security Threat Report ISTR Ransomware 2017 An ISTR Special Report Analyst: Dick O’Brien July 2017 Contents Executive summary and Key findings Ransomware: An overview A new breed of threat: WannaCry and Petya Businesses in the crosshairs Affecting the bottom line: Impact of ransomware How ransomware is spread Major ransomware threats Protection and best practices Internet Security Threat Report Contents 3 Executive summary and key findings 28 02 Contain 29 Advanced antivirus engine 5 Ransomware: An overview 29 SONAR behavior engine 8 A new breed of threat: WannaCry 29 Sapient – machine learning and Petya 29 Best practice 9 How WannaCry spread and how it was stopped 29 Ongoing development 9 What is EternalBlue? 29 03 Respond 10 Poor implantation, poor returns 29 Incident Response 10 Petya: Different threat, similar tactics 29 Best practices 10 Who was behind the WannaCry attacks? 30 Appendix: Symantec detections for 11 How Petya was spread common ransomware families 11 Ransomware or wiper? 34 About Symantec 12 Ransomware as a political tool 34 More Information 13 Businesses in the crosshairs 14 Worms are not the only threat 14 Targeted ransomware attacks Figures and Tables 15 Prevention is possible, a cure may not be 6 Ransomware infections by year 6 Ransomware infections by month 16 Affecting the bottom line: Impact of ransomware 6 Impact of WannaCry and Petya outbreaks on monthly infection rate 17 Ransom demands stabilize 6 Monthly ransomware infection numbers 17 Financial and reputational damage without WannaCry and Petya 18
    [Show full text]
  • 'Petya' Ransomware Attack Goes Global, Targets Merck in US
    Ph: (8621) 5404-3999 Fax: (8621) 5404-7759 Email: [email protected] www.SSBG.com.cn ’Petya’ ransomware attack goes global, targets Merck in US Published time: 27 Jun, 2017 16:42Edited time: 27 Jun, 2017 18:36 link: https://www.rt.com/usa/394294-ransomware-attack-petya-merck/ The US-based division of the global pharmaceutical giant Merck has been hit by the ‘Petya’ ransomware attack that has crippled computer systems across the world on Tuesday. “We confirm our company’s computer network was compromised today as part of global hack,” Merck said in a statement on Tuesday. “Other organizations have also been affected. We are investigating the matter and will provide additional information as we learn more.” We confirm our company's computer network was compromised today as part of global hack. Other organizations have also been affected (1 of 2) — Merck (@Merck) June 27, 2017 “The company is currently experiencing a hostile ransomware attack on its network systems,” said an internal Merck memo quoted by the Philadelphia Inquirer. “While IT risk management and global security respond to this threat please remain calm.” Merck employees were instructed to disconnect all mobile devices from the company network and advised not to speak to reporters or post messages on social media accounts. Computers at Merck facilities in Pennsylvania and New Jersey locked up Tuesday morning around 8am local time, according to the Inquirer. The ransomware attack reportedly began in Ukraine, but has since spread to corporate systems across the world, affecting the Russian state oil giant Rosneft, the international shipping and energy conglomerate Maersk, and the UK-based advertising and public relations company WPP, among others.
    [Show full text]
  • EY Technical Intelligence Analysis
    “Petya ” Ransomware Attack Technical intelligence analysis June 2017 Executive summary On 27 June 2017, a global ransomware attack campaign called Petya (also being called “NotPetya”, and “Petna”) impacted companies across a wide range of sectors including financial services, power and utilities, media, telecom, life sciences, transportation as well as government agencies. While organizations in countries around the world were affected - including the United States, Netherlands, France, India, Spain and Russia - Ukraine seems to have been the first and hardest country hit by the attack due to the use of an auto-update feature of M.E.Doc software required for tax calculation by any company operating in the Ukraine. The ransomware successfully infected several of its banks as well as media outlets, energy companies, government agencies, airports and radiation monitoring equipment within the Chernobyl power plant. It is the second major ransomware event in as many months after the WannaCry outbreak in May 2017. Although initially characterized as very similar to that attack, Petya is notably different, particularly in the way it spreads and encrypts victims’ data. While WannaCry relied on its worm-like behavior to spread across the Internet, Petya was less virulent, and spread internally using a number of lateral movement techniques including the SMB vulnerability and credential harvesting. Once inside the network, Petya is more sophisticated and nefarious than WannaCry. It subsequently leverages several additional hacking tools to gather credentials from the infected computer’s memory, before spreading to other machines using legitimate and well-known Windows system administration tools such as PsExec and WMIC. It does this for about an hour before rebooting and encrypting the system and/or the files.
    [Show full text]
  • Is Malware the New Weapon of Mass Destruction?
    #RSAC SESSION ID: STR-F03 IS MALWARE THE NEW WEAPON OF MASS DESTRUCTION? Tony Anscombe Global Security Evangelist ESET [email protected] @tonyatESET Weapons of Mass Destruction #RSA C Title 18 U.S.C. §2332a defines weapons of mass destruction (WMD) as: Any explosive, incendiary, or poison gas, including the following: a bomb; grenade; rocket having an explosive or incendiary charge of more than four ounces; missile having an explosive or incendiary charge of more than one- quarter ounce; mine; or device similar to any of the previously described devices; Any weapons that is designed or intend to cause death or serious bodily injury through the release, dissemination, or impact of toxic or poisonous chemicals, or their precursors; Any weapon involving a disease organism; and Any weapon that is designed to release radiation or radioactivity at a level dangerous to human life. Presenter’s Company Logo – replace or delete on master slide Malware of Mass Disruption #RSA C Malware of Mass Disruption (MMD) as: Any exploit, virus, worm, Trojan horse, ransomware, spyware, adware or scareware and any other intentionally harmful computer program; Any software that is intended to damage or disable computers and computer systems; Any phishing attempt to obtain sensitive information such as usernames, passwords, credit card details for malicious reasons; Any data breach of sensitive, protected or confidential data Presenter’s Company Logo – replace or delete on master slide #RSA EVOLUTION OF MALWARE C Elk Cloner 50% US homes online Infected Apple’s
    [Show full text]
  • A History of Cyber Incidents and Threats Involving Industrial Control Systems Kevin Hemsley, Ronald Fisher
    A History of Cyber Incidents and Threats Involving Industrial Control Systems Kevin Hemsley, Ronald Fisher To cite this version: Kevin Hemsley, Ronald Fisher. A History of Cyber Incidents and Threats Involving Industrial Control Systems. 12th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2018, Arlington, VA, United States. pp.215-242, 10.1007/978-3-030-04537-1_12. hal-02076302 HAL Id: hal-02076302 https://hal.archives-ouvertes.fr/hal-02076302 Submitted on 22 Mar 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License Chapter 12 A HISTORY OF CYBER INCIDENTS AND THREATS INVOLVING INDUSTRIAL CONTROL SYSTEMS Kevin Hemsley and Ronald Fisher Abstract For many years, malicious cyber actors have been targeting the indus- trial control systems that manage critical infrastructure assets. Most of these events are not reported to the public and their details along with their associated threats are not as well-known as those involving enterprise (information technology) systems. This chapter presents an analysis of publicly-reported cyber incidents involving critical infras- tructure assets. The list of incidents is by no means comprehensive.
    [Show full text]