SlideShare ist ein Scribd-Unternehmen logo
1 von 42
Downloaden Sie, um offline zu lesen
Profile of the World’s
Top Hackers:
Mafiaboy
Agenda

• The New Threat Landscape

• Insider’s View of Cybercrime

• Evolution of Hacker Techniques

• Changing Motives and Targets

• Impact on Businesses and Governments

• Steps to Reducing the Threat of Attack




2
Panelists




    Paul Henry               Michael Calce     Byron Acohido
    Security and Forensics   a.k.a. Mafiaboy   Investigative Reporter and
    Analyst, Lumension                         Author of Zero Day Threat




3
The New Threat Landscape
Pogo Plug – Backdoor in a Box
• Allows anything connected via USB to be easily shared across the
  Internet
    » Hard drive
    » Ethernet adapter
    » Wireless adapter




5
Pogo Plug – Backdoor in a Box

• Yes there are a few good uses but…. Pogo Plug demonstrates the need
  to re-evaluate access to 80/443 outbound




6
Business Is Good For The Bad Guys

• Companies in the US, UK, Germany, Japan, Brazil, India and Dubai lost
  $4.6 billion in intellectual property last year
    » And spent $600M on repairing the damage


• Global damage from data loss will exceed $1Trillion
    » This is more then the cost to fix the global recession


• 98% of those polled in a recent survey reported a tangible loss due to
  cybercrime




7
Annual Reported Vulnerabilities

• It is common knowledge that you can eliminate 90% of your risk by
  applying patches in a timely manner

                               Annual Reported Vulnerabilities
         7,000                                                                                  6704


         6,000                                                                                         5633

                                                                                         4894
         5,000


         4,000


         3,000
                                                                                  2372
                                                                    1963
         2,000                                               1672
                                                                           1289
                                                      1015
                                               790
         1,000
                                251    243
                  24     75
            0
                 1996   1997   1998   1999    2000   2001    2002   2003   2004   2005   2006   2007   2008

                 Source: National Vulnerability Database



8
Obfuscation Changes The Game




9
Total Sample Growth




10
No One’s Fault But Our Own




11
Botnet Growth Continues




12
Black Market




13
Prices Have Fallen In 2009




14
Going Inside the Mind of the Cybercriminal
Mafiaboy’s Distributed Denial-of-Service (DDoS)

‘Mafiaboy’ hacker jailed – September 13, 2001
                 Author: Michael Calce, 15
                  » St. Raphael Country Club

                 Botnet used in denial-of-service
                 attack
                  » Yale, Harvard servers botted
                  » CNN, Yahoo, Amazon, Dell, Excite, E-
                    trade attacked

                 Estimated $1.7 billion in damages



16
How it All Started

Excerpt from “How I Cracked the Internet and Why It’s Still Broken”

“…Someone knocked me offline by hitting me with so much data that my connection was
 severed. These punters seemed to have a huge amount of power over others on AOL. I
 was intrigued that an individual was able to “attack” someone else, regardless of the
 distance between them, using the internet. It seemed like harmless fun, almost a practical
 joke. The people punted off could simply sign on again and rejoin the chat room. Nobody
 got hurt. I wanted to punt someone. Badly.

 … That’s when my real hunt for AOL hacking tools started. Once I found that first
 application, I stumbled across more and more. They were each brilliant in their own
 subversive way. I came across one site that had a huge list of applications. I decided to
 download all of them and browse their various functions. With these tools in hand, I began
 to feel like I was in control of the internet, rather than the other way around. The sense of
 power and possibility was intoxicating.”




17
Why the Internet Was Broken

                 Internet was relatively new and global
                 security knowledge was lacking
                   » Many available tools that enabled attacks to
                     be delivered with relative ease
                   » The internet was never intended to be a tool
                     of Commerce
                   » The fundamental protocols the internet was
                     built on are still flawed
                   » The lack of regulation between governments
                     and companies
                   » Security was never incorporated into the
                     architecture of ARPANET
                   » The lack of fundamental knowledge of the
                     users who try to utilize the internet




18
Hacking Technique – Denial of Service

• What is a DoS?
     » Causes loss of service to
       users, typically the loss of
       network connectivity and
       services
     » Not designed to gain
       access to systems


• Three types of attack
     » Consumption of computer resources such as bandwidth, disk space or
       CPU time
     » Disruption of configuration information, such as routing information
     » Disruption of physical network components




19
Attack Types – DoS and DDoS

• The attack on Yahoo was an ICMP flood
     » ICMP traffic is the simplest kind of computer conversation - a ping, or a single
       bit of data sent to see if another computer is responding
     » ICMP flood is when an attacking ping is sent to a target computer with a faked
       return address, which sends the attacked computer on an endless quest for a
       place to return the ping


• Attack on CNN was a Syn Flood
     » Starts with a falsified synchronization packet which is sent by a computer
       when it wants to actually connect with another computer
     » It sent so-called synchronization packets, or attempts to connect, to random
       ports, ranging from 2 to 400
     » Each packet had to be approved by the ACL - normally, synchronization
       packets are followed by legitimate traffic which simply flows through the router
     » Quickly, the router’s memory was consumed and stopped functioning


20
Why the Internet is Still Broken Today

                  Social Engineering
                    » Hackers rely on manipulation of naïve end-
                      users
                    » Doesn’t have to be remote – they can dress
                      up in uniform and literally walk into a
                      company



                  Internal IT hackers are more of a threat than
                  remote exploits or DoS attacks
                    » Employees don’t necessarily care about the
                      company, just about the paycheck
                    » Sabotage / retribution for loss of job or
                      internal dispute




21
Why the Internet is Still Broken Today

                  Web 2.0 and Cloud Computing
                   » Ease of data access
                   » Inevitably less secure technology
                   » Further enables social engineering



                  Time to Market Valued Over Security
                   » New technology developed before
                     predecessors are secured
                   » Zero-day exploits - people are unaware of
                     them and patches don’t exist yet




22
Evolving Hacker Techniques

                Low-level attacks – script-kiddie
                attacks, viruses

                Medium level attacks – more
                technical, leveraging recent
                vulnerabilities

                High level attacks – stealthy, zero-
                day, polymorphic, designed NOT to
                be caught



23
Evolution of Hacker Motives

                 • Intoxicating power over others
                 • Intellectual challenge
                 • Vengeance
                 • Exploration of technology
                 • Self-expression and peer recognition
                 • Mischief or Curiosity
                 • Terrorism
                 • Financial Gain
                   » Data is worth a lot on the black market
                   » Easier and less traceable than robbing a
                     bank




24
Why Organizations are At Risk - Hacker’s Perspective

• The lack of concern for security
• Easy exploitable loopholes that aren’t
  patched
• Not having properly trained IT employees
• Default’s left untouched
• Flaws in the software or operating
  systems they use
• Networks aren’t properly monitored
• Lack of funding to the IT department
• No outside pen testing
• Unprotected valuable data




25
Zero Day Threat – Why Businesses Still Don’t Get It
Convergence / Integration of Criminal Pursuits

 • Pharm spam
 • Pump-and-dump spam
 • Spear phishing
 • Drive by downloads
 • Web spam
 • Banking Trojans
 • Cross site scripting
 • SQL injections
 • Zero day exploits
 • Tainted banner ads
 • Extortionist denial of service
 • Cross-platform Web attacks
 • Vishing
 • Poly-morphic Javascript




27
Two Criminal Markets




                       •Stealing data
                       •Using stolen data




28
Three Main Ways to Steal Data

 •Corrupted email spam (port 25)
     • Phishing
     • Bad attachments/ tainted URLs


 •Tainted Web links (port 80)
     • Drive-by downloads
     • Tainted banner ads
     • Corrupted search results

 •Database breaches
     • Direct hacks - SQL injections; Cross site scripting
     • Insider theft


29
Attacks Move to the Web Layer
Tainted Web links - port 80
                                   Mar. 2009 –banking Trojan spike

              Feb. 2009 – Keystroke logger spike




                                                     Source: Scan Safe



30
Corrupted Search Results and Ads on Popular Sites




                                   hxxp://antivirusquickscanv1.com
                                   /1/?id=2006-
                                   40&smersh=a54b37c24&back=
                                   %3DzQ21zT3MAQNMI%3DM
     Source: Finjan                   Source: Purewire




31
Corrupting Major Software Vendors




32
Corrupting Social Media
 Koobface messaging spam exploits trust-level




          Address replicator;
          social engineering
33
Corrupted Tweets




34
Botnets Micro
Koobface unleashed with help of
CAPTCHA breakers



     Sample CAPTCHA: smwm




                                                 Botnet driven operations
                                                 --Worm spreads via address replicator
                                                 --Members trust downloads
                                                 MALWARE installed:
                  CAPTCHA protection               --Pitches scareware
                                                   --Steals cookies
                                       Member      --Installs Waldac email spamming engine
                                       account     --Installs ZeuS banking Trojan
                                                   --Carries out click-through fraud


35
Latest Techniques
USA Today, 03 Apr. 2009, p. 1A - 2A   USA Today, 10 Jun. 2009, p. 1B-2B




36
Conficker – Multi-faceted Threat
     Weak passwords




USB toggles




                                                                          RPC-Dcom
                                                                          worm – like
                                                                          MSBlast
 Open shares

                                      Unpatched PCs
              Source: Tech Republic              Source: Panda Security




37
Why Businesses Still Don’t Get It
     USA Today, 12 Nov. 2008 p. 1B – 2B




38
What Needs To Be Done

 •Macro View
     »   Select and empower an effective cyber czar
     »   Set forth effective mix of incentives and regulations
     »   Foster private/public partnerships
     »   Engender global cooperation


 •Micro View
     »   Think of data as a valuable asset
     »   Make data privacy and security a core competency
     »   Keep antivirus/antispyware updated
     »   Install ALL updates
     »   Realize social media applications are festering with malware



39
Byron Acohido
     lastwatchdog.com
     http://lastwatchdog.com
     360 297-5566
     byron@lastwatchdog.com




40
Q&A via Chat or…
Twitter - send us your questions using hashtag: #TOPHCKR1
                      Follow on Twitter:
                  Lumension @_Lumension
                Byron Acohido @lastwatchdog
                  Paul Henry @phenrycissp
Global Headquarters
15880 N. Greenway-Hayden Loop
Suite 100
Scottsdale, AZ 85260

1.888.725.7828
info@lumension.com

Weitere ähnliche Inhalte

Was ist angesagt?

Augmented Reality: Envisioning the Future of Tomorrow
Augmented Reality: Envisioning the Future of TomorrowAugmented Reality: Envisioning the Future of Tomorrow
Augmented Reality: Envisioning the Future of TomorrowAnna Harris
 
Lecture9 camera calibration
Lecture9 camera calibrationLecture9 camera calibration
Lecture9 camera calibrationzukun
 
Cost Prediction of Health Insurance
Cost Prediction of Health InsuranceCost Prediction of Health Insurance
Cost Prediction of Health InsuranceIRJET Journal
 
Augmented reality technical presentation
 Augmented reality technical presentation Augmented reality technical presentation
Augmented reality technical presentationsairamgoud16
 
SURF - Speeded Up Robust Features
SURF - Speeded Up Robust FeaturesSURF - Speeded Up Robust Features
SURF - Speeded Up Robust FeaturesMarta Lopes
 
Virtual Machine Migration & Hypervisors
Virtual Machine Migration & HypervisorsVirtual Machine Migration & Hypervisors
Virtual Machine Migration & HypervisorsArun Shukla
 
Unit i introduction to grid computing
Unit i   introduction to grid computingUnit i   introduction to grid computing
Unit i introduction to grid computingsudha kar
 
Fuzzy rules and fuzzy reasoning
Fuzzy rules and fuzzy reasoningFuzzy rules and fuzzy reasoning
Fuzzy rules and fuzzy reasoningVeni7
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionSiddique Ibrahim
 
Client control
Client controlClient control
Client controlSireesh K
 
Malicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine LearningMalicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine Learningsecurityxploded
 
Edge computing in practice using IoT, Tensorflow and Google Cloud
Edge computing in practice using IoT, Tensorflow and Google CloudEdge computing in practice using IoT, Tensorflow and Google Cloud
Edge computing in practice using IoT, Tensorflow and Google CloudAlvaro Viebrantz
 

Was ist angesagt? (20)

Augmented Reality: Envisioning the Future of Tomorrow
Augmented Reality: Envisioning the Future of TomorrowAugmented Reality: Envisioning the Future of Tomorrow
Augmented Reality: Envisioning the Future of Tomorrow
 
Lecture9 camera calibration
Lecture9 camera calibrationLecture9 camera calibration
Lecture9 camera calibration
 
Cost Prediction of Health Insurance
Cost Prediction of Health InsuranceCost Prediction of Health Insurance
Cost Prediction of Health Insurance
 
Data Link Control
Data Link ControlData Link Control
Data Link Control
 
Augmented reality technical presentation
 Augmented reality technical presentation Augmented reality technical presentation
Augmented reality technical presentation
 
Z specification
Z specificationZ specification
Z specification
 
SURF - Speeded Up Robust Features
SURF - Speeded Up Robust FeaturesSURF - Speeded Up Robust Features
SURF - Speeded Up Robust Features
 
Virtual Machine Migration & Hypervisors
Virtual Machine Migration & HypervisorsVirtual Machine Migration & Hypervisors
Virtual Machine Migration & Hypervisors
 
2013 Lecture3: AR Tracking
2013 Lecture3: AR Tracking 2013 Lecture3: AR Tracking
2013 Lecture3: AR Tracking
 
Unit i introduction to grid computing
Unit i   introduction to grid computingUnit i   introduction to grid computing
Unit i introduction to grid computing
 
Fuzzy rules and fuzzy reasoning
Fuzzy rules and fuzzy reasoningFuzzy rules and fuzzy reasoning
Fuzzy rules and fuzzy reasoning
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Mobile agents
Mobile agentsMobile agents
Mobile agents
 
Client control
Client controlClient control
Client control
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Virtual Reality
Virtual RealityVirtual Reality
Virtual Reality
 
Cloud computing stack
Cloud computing stackCloud computing stack
Cloud computing stack
 
Malicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine LearningMalicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine Learning
 
Lecture 03 - Synchronous and Asynchronous Communication - Concurrency - Fault...
Lecture 03 - Synchronous and Asynchronous Communication - Concurrency - Fault...Lecture 03 - Synchronous and Asynchronous Communication - Concurrency - Fault...
Lecture 03 - Synchronous and Asynchronous Communication - Concurrency - Fault...
 
Edge computing in practice using IoT, Tensorflow and Google Cloud
Edge computing in practice using IoT, Tensorflow and Google CloudEdge computing in practice using IoT, Tensorflow and Google Cloud
Edge computing in practice using IoT, Tensorflow and Google Cloud
 

Andere mochten auch

HIMSS Summit of the Southeast: Compliance and Controls
HIMSS Summit of the Southeast: Compliance and ControlsHIMSS Summit of the Southeast: Compliance and Controls
HIMSS Summit of the Southeast: Compliance and ControlsTony Gambacorta
 
Gpw 2013, Konstruktive Paranoia, 2013-03-15
Gpw 2013, Konstruktive Paranoia,  2013-03-15Gpw 2013, Konstruktive Paranoia,  2013-03-15
Gpw 2013, Konstruktive Paranoia, 2013-03-15vit_r
 
romantic paranoia
romantic paranoiaromantic paranoia
romantic paranoia_numbers
 
Healthy Paranoia: What Keeps Me Up at Night
Healthy Paranoia: What Keeps Me Up at NightHealthy Paranoia: What Keeps Me Up at Night
Healthy Paranoia: What Keeps Me Up at NightMatt Wurst
 
Paranoia or risk management 2013
Paranoia or risk management 2013Paranoia or risk management 2013
Paranoia or risk management 2013Henrik Kramshøj
 
Pledge, Turn, Prestige - The Snowden Pitch
Pledge, Turn, Prestige - The Snowden PitchPledge, Turn, Prestige - The Snowden Pitch
Pledge, Turn, Prestige - The Snowden PitchMarcus John Henry Brown
 
Attitude
AttitudeAttitude
AttitudeVishal
 
Hacks, hackers and data journalism
Hacks, hackers and data journalismHacks, hackers and data journalism
Hacks, hackers and data journalismGlen McGregor
 
On Going Evaluations
On Going EvaluationsOn Going Evaluations
On Going EvaluationsTheJellehKed
 
Pants policies and paranoia
Pants policies and paranoiaPants policies and paranoia
Pants policies and paranoiaPracticalHT
 
Sakai11 Migration Planning: When Paranoia Leads to Success
Sakai11 Migration Planning: When Paranoia Leads to SuccessSakai11 Migration Planning: When Paranoia Leads to Success
Sakai11 Migration Planning: When Paranoia Leads to Successrobin0red
 
How to Protect Your Oracle Database from Hackers
How to Protect Your Oracle Database from HackersHow to Protect Your Oracle Database from Hackers
How to Protect Your Oracle Database from HackersJeff Kayser
 
Of Hobbits, Amish, Hackers and Technology (or, is technology for humans or vi...
Of Hobbits, Amish, Hackers and Technology (or, is technology for humans or vi...Of Hobbits, Amish, Hackers and Technology (or, is technology for humans or vi...
Of Hobbits, Amish, Hackers and Technology (or, is technology for humans or vi...Kaido Kikkas
 
Adventures in paranoia with sinatra and sequel
Adventures in paranoia with sinatra and sequelAdventures in paranoia with sinatra and sequel
Adventures in paranoia with sinatra and sequelEleanor McHugh
 
Paranoia
ParanoiaParanoia
ParanoiaJames
 
RSA USA 2015 - Getting a Jump on Hackers
RSA USA 2015 - Getting a Jump on HackersRSA USA 2015 - Getting a Jump on Hackers
RSA USA 2015 - Getting a Jump on HackersWolfgang Kandek
 
Jonas Gyalokay, Airtame @ Nordic growth Hackers event #3
Jonas Gyalokay, Airtame @ Nordic growth Hackers event #3Jonas Gyalokay, Airtame @ Nordic growth Hackers event #3
Jonas Gyalokay, Airtame @ Nordic growth Hackers event #3Nordic Growth Hackers
 

Andere mochten auch (20)

HIMSS Summit of the Southeast: Compliance and Controls
HIMSS Summit of the Southeast: Compliance and ControlsHIMSS Summit of the Southeast: Compliance and Controls
HIMSS Summit of the Southeast: Compliance and Controls
 
Gpw 2013, Konstruktive Paranoia, 2013-03-15
Gpw 2013, Konstruktive Paranoia,  2013-03-15Gpw 2013, Konstruktive Paranoia,  2013-03-15
Gpw 2013, Konstruktive Paranoia, 2013-03-15
 
romantic paranoia
romantic paranoiaromantic paranoia
romantic paranoia
 
Healthy Paranoia: What Keeps Me Up at Night
Healthy Paranoia: What Keeps Me Up at NightHealthy Paranoia: What Keeps Me Up at Night
Healthy Paranoia: What Keeps Me Up at Night
 
Paranoia or risk management 2013
Paranoia or risk management 2013Paranoia or risk management 2013
Paranoia or risk management 2013
 
Pledge, Turn, Prestige - The Snowden Pitch
Pledge, Turn, Prestige - The Snowden PitchPledge, Turn, Prestige - The Snowden Pitch
Pledge, Turn, Prestige - The Snowden Pitch
 
Attitude
AttitudeAttitude
Attitude
 
Hacks, hackers and data journalism
Hacks, hackers and data journalismHacks, hackers and data journalism
Hacks, hackers and data journalism
 
On Going Evaluations
On Going EvaluationsOn Going Evaluations
On Going Evaluations
 
Pants policies and paranoia
Pants policies and paranoiaPants policies and paranoia
Pants policies and paranoia
 
'Paranoia’
'Paranoia’'Paranoia’
'Paranoia’
 
Sakai11 Migration Planning: When Paranoia Leads to Success
Sakai11 Migration Planning: When Paranoia Leads to SuccessSakai11 Migration Planning: When Paranoia Leads to Success
Sakai11 Migration Planning: When Paranoia Leads to Success
 
How to Protect Your Oracle Database from Hackers
How to Protect Your Oracle Database from HackersHow to Protect Your Oracle Database from Hackers
How to Protect Your Oracle Database from Hackers
 
Paranoia
ParanoiaParanoia
Paranoia
 
Of Hobbits, Amish, Hackers and Technology (or, is technology for humans or vi...
Of Hobbits, Amish, Hackers and Technology (or, is technology for humans or vi...Of Hobbits, Amish, Hackers and Technology (or, is technology for humans or vi...
Of Hobbits, Amish, Hackers and Technology (or, is technology for humans or vi...
 
Adventures in paranoia with sinatra and sequel
Adventures in paranoia with sinatra and sequelAdventures in paranoia with sinatra and sequel
Adventures in paranoia with sinatra and sequel
 
Paranoia
ParanoiaParanoia
Paranoia
 
RSA USA 2015 - Getting a Jump on Hackers
RSA USA 2015 - Getting a Jump on HackersRSA USA 2015 - Getting a Jump on Hackers
RSA USA 2015 - Getting a Jump on Hackers
 
Jonas Gyalokay, Airtame @ Nordic growth Hackers event #3
Jonas Gyalokay, Airtame @ Nordic growth Hackers event #3Jonas Gyalokay, Airtame @ Nordic growth Hackers event #3
Jonas Gyalokay, Airtame @ Nordic growth Hackers event #3
 
Media 2
Media 2Media 2
Media 2
 

Ähnlich wie Profile Of The Worlds Top Hackers Webinar Slides 063009

NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017chauhananand17
 
The Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityThe Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityAVG Technologies AU
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
Cyber crimeppt1-1209117277348428-8
Cyber crimeppt1-1209117277348428-8Cyber crimeppt1-1209117277348428-8
Cyber crimeppt1-1209117277348428-8Ajeet Choudhary
 
kevin's powerpoint chapt 6
kevin's powerpoint chapt 6kevin's powerpoint chapt 6
kevin's powerpoint chapt 6kkajairo
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesMaxime ALAY-EDDINE
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyb coatesworth
 
Security Lifecycle Management Process
Security Lifecycle Management ProcessSecurity Lifecycle Management Process
Security Lifecycle Management ProcessBill Ross
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bankshreemala1
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Wen-Pai Lu
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019PECB
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentationJamesDempsey1
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav SinghGaurav Singh
 
Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022PECB
 

Ähnlich wie Profile Of The Worlds Top Hackers Webinar Slides 063009 (20)

Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Lecture5
Lecture5Lecture5
Lecture5
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
 
The Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityThe Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our Community
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Cyber crimeppt1-1209117277348428-8
Cyber crimeppt1-1209117277348428-8Cyber crimeppt1-1209117277348428-8
Cyber crimeppt1-1209117277348428-8
 
kevin's powerpoint chapt 6
kevin's powerpoint chapt 6kevin's powerpoint chapt 6
kevin's powerpoint chapt 6
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
Security Lifecycle Management Process
Security Lifecycle Management ProcessSecurity Lifecycle Management Process
Security Lifecycle Management Process
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank
 
Hacking
HackingHacking
Hacking
 
Web security
Web securityWeb security
Web security
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022
 

Mehr von Lumension

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsLumension
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers GuideLumension
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationLumension
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary ResultsLumension
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Lumension
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Lumension
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftLumension
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...Lumension
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and AnalysisLumension
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskLumension
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateLumension
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Lumension
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Lumension
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskLumension
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security SolutionsLumension
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Lumension
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesLumension
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksLumension
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT RiskLumension
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...Lumension
 

Mehr von Lumension (20)

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security Risks
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
 

Kürzlich hochgeladen

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Kürzlich hochgeladen (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

Profile Of The Worlds Top Hackers Webinar Slides 063009

  • 1. Profile of the World’s Top Hackers: Mafiaboy
  • 2. Agenda • The New Threat Landscape • Insider’s View of Cybercrime • Evolution of Hacker Techniques • Changing Motives and Targets • Impact on Businesses and Governments • Steps to Reducing the Threat of Attack 2
  • 3. Panelists Paul Henry Michael Calce Byron Acohido Security and Forensics a.k.a. Mafiaboy Investigative Reporter and Analyst, Lumension Author of Zero Day Threat 3
  • 4. The New Threat Landscape
  • 5. Pogo Plug – Backdoor in a Box • Allows anything connected via USB to be easily shared across the Internet » Hard drive » Ethernet adapter » Wireless adapter 5
  • 6. Pogo Plug – Backdoor in a Box • Yes there are a few good uses but…. Pogo Plug demonstrates the need to re-evaluate access to 80/443 outbound 6
  • 7. Business Is Good For The Bad Guys • Companies in the US, UK, Germany, Japan, Brazil, India and Dubai lost $4.6 billion in intellectual property last year » And spent $600M on repairing the damage • Global damage from data loss will exceed $1Trillion » This is more then the cost to fix the global recession • 98% of those polled in a recent survey reported a tangible loss due to cybercrime 7
  • 8. Annual Reported Vulnerabilities • It is common knowledge that you can eliminate 90% of your risk by applying patches in a timely manner Annual Reported Vulnerabilities 7,000 6704 6,000 5633 4894 5,000 4,000 3,000 2372 1963 2,000 1672 1289 1015 790 1,000 251 243 24 75 0 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 Source: National Vulnerability Database 8
  • 11. No One’s Fault But Our Own 11
  • 14. Prices Have Fallen In 2009 14
  • 15. Going Inside the Mind of the Cybercriminal
  • 16. Mafiaboy’s Distributed Denial-of-Service (DDoS) ‘Mafiaboy’ hacker jailed – September 13, 2001 Author: Michael Calce, 15 » St. Raphael Country Club Botnet used in denial-of-service attack » Yale, Harvard servers botted » CNN, Yahoo, Amazon, Dell, Excite, E- trade attacked Estimated $1.7 billion in damages 16
  • 17. How it All Started Excerpt from “How I Cracked the Internet and Why It’s Still Broken” “…Someone knocked me offline by hitting me with so much data that my connection was severed. These punters seemed to have a huge amount of power over others on AOL. I was intrigued that an individual was able to “attack” someone else, regardless of the distance between them, using the internet. It seemed like harmless fun, almost a practical joke. The people punted off could simply sign on again and rejoin the chat room. Nobody got hurt. I wanted to punt someone. Badly. … That’s when my real hunt for AOL hacking tools started. Once I found that first application, I stumbled across more and more. They were each brilliant in their own subversive way. I came across one site that had a huge list of applications. I decided to download all of them and browse their various functions. With these tools in hand, I began to feel like I was in control of the internet, rather than the other way around. The sense of power and possibility was intoxicating.” 17
  • 18. Why the Internet Was Broken Internet was relatively new and global security knowledge was lacking » Many available tools that enabled attacks to be delivered with relative ease » The internet was never intended to be a tool of Commerce » The fundamental protocols the internet was built on are still flawed » The lack of regulation between governments and companies » Security was never incorporated into the architecture of ARPANET » The lack of fundamental knowledge of the users who try to utilize the internet 18
  • 19. Hacking Technique – Denial of Service • What is a DoS? » Causes loss of service to users, typically the loss of network connectivity and services » Not designed to gain access to systems • Three types of attack » Consumption of computer resources such as bandwidth, disk space or CPU time » Disruption of configuration information, such as routing information » Disruption of physical network components 19
  • 20. Attack Types – DoS and DDoS • The attack on Yahoo was an ICMP flood » ICMP traffic is the simplest kind of computer conversation - a ping, or a single bit of data sent to see if another computer is responding » ICMP flood is when an attacking ping is sent to a target computer with a faked return address, which sends the attacked computer on an endless quest for a place to return the ping • Attack on CNN was a Syn Flood » Starts with a falsified synchronization packet which is sent by a computer when it wants to actually connect with another computer » It sent so-called synchronization packets, or attempts to connect, to random ports, ranging from 2 to 400 » Each packet had to be approved by the ACL - normally, synchronization packets are followed by legitimate traffic which simply flows through the router » Quickly, the router’s memory was consumed and stopped functioning 20
  • 21. Why the Internet is Still Broken Today Social Engineering » Hackers rely on manipulation of naïve end- users » Doesn’t have to be remote – they can dress up in uniform and literally walk into a company Internal IT hackers are more of a threat than remote exploits or DoS attacks » Employees don’t necessarily care about the company, just about the paycheck » Sabotage / retribution for loss of job or internal dispute 21
  • 22. Why the Internet is Still Broken Today Web 2.0 and Cloud Computing » Ease of data access » Inevitably less secure technology » Further enables social engineering Time to Market Valued Over Security » New technology developed before predecessors are secured » Zero-day exploits - people are unaware of them and patches don’t exist yet 22
  • 23. Evolving Hacker Techniques Low-level attacks – script-kiddie attacks, viruses Medium level attacks – more technical, leveraging recent vulnerabilities High level attacks – stealthy, zero- day, polymorphic, designed NOT to be caught 23
  • 24. Evolution of Hacker Motives • Intoxicating power over others • Intellectual challenge • Vengeance • Exploration of technology • Self-expression and peer recognition • Mischief or Curiosity • Terrorism • Financial Gain » Data is worth a lot on the black market » Easier and less traceable than robbing a bank 24
  • 25. Why Organizations are At Risk - Hacker’s Perspective • The lack of concern for security • Easy exploitable loopholes that aren’t patched • Not having properly trained IT employees • Default’s left untouched • Flaws in the software or operating systems they use • Networks aren’t properly monitored • Lack of funding to the IT department • No outside pen testing • Unprotected valuable data 25
  • 26. Zero Day Threat – Why Businesses Still Don’t Get It
  • 27. Convergence / Integration of Criminal Pursuits • Pharm spam • Pump-and-dump spam • Spear phishing • Drive by downloads • Web spam • Banking Trojans • Cross site scripting • SQL injections • Zero day exploits • Tainted banner ads • Extortionist denial of service • Cross-platform Web attacks • Vishing • Poly-morphic Javascript 27
  • 28. Two Criminal Markets •Stealing data •Using stolen data 28
  • 29. Three Main Ways to Steal Data •Corrupted email spam (port 25) • Phishing • Bad attachments/ tainted URLs •Tainted Web links (port 80) • Drive-by downloads • Tainted banner ads • Corrupted search results •Database breaches • Direct hacks - SQL injections; Cross site scripting • Insider theft 29
  • 30. Attacks Move to the Web Layer Tainted Web links - port 80 Mar. 2009 –banking Trojan spike Feb. 2009 – Keystroke logger spike Source: Scan Safe 30
  • 31. Corrupted Search Results and Ads on Popular Sites hxxp://antivirusquickscanv1.com /1/?id=2006- 40&smersh=a54b37c24&back= %3DzQ21zT3MAQNMI%3DM Source: Finjan Source: Purewire 31
  • 33. Corrupting Social Media Koobface messaging spam exploits trust-level Address replicator; social engineering 33
  • 35. Botnets Micro Koobface unleashed with help of CAPTCHA breakers Sample CAPTCHA: smwm Botnet driven operations --Worm spreads via address replicator --Members trust downloads MALWARE installed: CAPTCHA protection --Pitches scareware --Steals cookies Member --Installs Waldac email spamming engine account --Installs ZeuS banking Trojan --Carries out click-through fraud 35
  • 36. Latest Techniques USA Today, 03 Apr. 2009, p. 1A - 2A USA Today, 10 Jun. 2009, p. 1B-2B 36
  • 37. Conficker – Multi-faceted Threat Weak passwords USB toggles RPC-Dcom worm – like MSBlast Open shares Unpatched PCs Source: Tech Republic Source: Panda Security 37
  • 38. Why Businesses Still Don’t Get It USA Today, 12 Nov. 2008 p. 1B – 2B 38
  • 39. What Needs To Be Done •Macro View » Select and empower an effective cyber czar » Set forth effective mix of incentives and regulations » Foster private/public partnerships » Engender global cooperation •Micro View » Think of data as a valuable asset » Make data privacy and security a core competency » Keep antivirus/antispyware updated » Install ALL updates » Realize social media applications are festering with malware 39
  • 40. Byron Acohido lastwatchdog.com http://lastwatchdog.com 360 297-5566 byron@lastwatchdog.com 40
  • 41. Q&A via Chat or… Twitter - send us your questions using hashtag: #TOPHCKR1 Follow on Twitter: Lumension @_Lumension Byron Acohido @lastwatchdog Paul Henry @phenrycissp
  • 42. Global Headquarters 15880 N. Greenway-Hayden Loop Suite 100 Scottsdale, AZ 85260 1.888.725.7828 info@lumension.com