SlideShare ist ein Scribd-Unternehmen logo
1 von 39
UNDER THE HOOD
DARIUS POVILAITIS
DARIUS@ESEC.LT
HTTPS://TYRIMAI.ESEC.LT
MASSIVE REMOTE WORK – CHALLENGES IN THE
BEGINNING
What challenges arise when people massively started remote work ?
• The massive shift to remote work overwhelmed organizations internet links ( e.g. remote user count
increased 1200% )
• That caused problems for security patch install over those saturated internet links
• Service quality issues while video communications are forced to go over VPN
• Security scanning of remote workplaces might be impacted as well
• People started to use more and more online services be it public or private sector.
• Etc.
SOLUTIONS ?
These problems caused by massive instant shift for the remote work can be managed by redesigning your
network, process flows, etc.
Split tunneling might be the case for the saturated internet links. But this cure might cause another
problems – e.g. for the security:
• In split tunneling situation remote employees might lose additional protection provided by enterprise
defense systems. So the security risks arise even at the operational level.
These are indirect security risks caused by some major changes in the infrastructure and are / were
temporary. But let's look at the direct security risks.
MAJOR SECURITY RISKS
• Social / technical attacks
• Technical attacks
SOCIAL / TECHNICAL ATTACKS
• Due to CORONA, massive shift to collaboration platforms occurred.
• Those platforms has attracted increased attention from the hackers and some of them had
some serious security vulnerabilities ( e.g. Zoom ). People were well informed regarding
those vulnerabilities.
• Other popular collaboration platforms like Teams/Office365 did not receive so much attention.
Meanwhile most organizations using Office365 have authentication setup which might expose them to
the social-technical attacks.
• During the quarantine period people were forced to use more and more public services online.
The same is true for the financial institutions – all went online. Activities not directly related to work
also might bring some dangers.
O365 AUTHENTICATION METHODS
• User / password
• User / password + 2FA ( e.g. SMS or Microsoft Authenticator )
• Federation (here you can use digital certificates)
O365 - TWO FACTOR AUTHENTICATION
If an organization wants to implement O365 in a secure way, they are considering all the above-mentioned
authentication solutions. User password authentication is insecure – everyone understands that.
Federation with certificates – are legacy – that's what I was told by local solution providers. The winner
here is two factor authentication – 2FA – that's what is said
• Username / password with SMS (or Microsoft Authenticator ) solves all authentication risks. Really ?
Do you have such a setup ?
• What would you say if just one email or SMS could break all your security ?
• The biggest problem here is that organizations don't even understand that they could be very easy
target since they are assured that 2FA is very secure.
DEMO / MOVIE
• https://tyrimai.esec.lt/movies/ivairus/o365/all1.mp4
MICROSOFT O365
• It was nothing new :) The time to setup the interception just took several hours.
• It is very easy to enumerate the organizations which are using O365
• After that – just some spoofed SMS or emails – and you might be exposed
CHECK YOUR ORGANIZATION SETUP
During the break you can ask to try that on your organization. Sometimes it is very challenging to see that
someone else is inside your organization :)
ORGANIZATIONS USING O365
THE CYBER KILL CHAIN
The kill chain in cybersecurity defines various phases of an attack . Attacks may occur in phases and can be
disrupted through controls established at each phase.
The biggest challenge and the most important / difficult steps in containing an attack is to:
• Identify and prevent an attack in advance
• Mitigate an ongoing attack
Let's look at some real attack mitigation examples
MITIGATION CAPABILITIES / CURRENT SITUATION
• Companies usually do not boast when the intrusion occurs. So it is difficult to estimate the real situation
in this area
• On the other side we do see multiple cybersecurity incidents that are in the mass media. Let's analyze
them. Let's pay attention how these threats are mitigated when they are identified.
• The examples provided would show how real attack could be identified and stopped / mitigated. That
way we can estimate our capabilities to mitigate attacks.
• The conclusions you should make yourself :)
MAIN HACKERS TARGET
• In 99% cases – they are after money or something that lets them to make that money. Remember that.
SOCIAL / TECHNICAL ATTACKS - 1337 SMS
• Massive SMS subscribe to expensive services using number 1337.
• Mostly done using hacked websites .
• Attacks are not stopped for years.
• Here is a short movie how these attacks look like:
https://tyrimai.esec.lt/index.php?option=com_content&view=article&id=35
YEAR 2018
YEAR 2020
MITIGATION RESULTS – 1337 SMS
• Search the google for the keywords – 1337 SMS – you will see fresh complaints from multiple people
LINKS
• https://www.delfi.lt/mokslas/technologijos/ispeja-apie-nesuvaldomus-sukcius-uztenka-vienos-sms-kad-
is-jusu-nesustabdomai-siurbtu-pinigus.d?id=84490425
• https://www.delfi.lt/mokslas/technologijos/ispeja-apie-gudriai-veikiancius-sukcius-uztenka-vieno-sms-
kad-is-jusu-nesustabdomai-siurbtu-pinigus.d?id=78880551
• https://tyrimai.esec.lt/index.php?option=com_content&view=article&id=35
SOCIAL / TECHNICAL ATTACKS - CREDIT CARD
STEALING
KRISTIANA ESHOP
HUNDREDS OF WEBSITES IN THE END OF 2019
EMERGENCY RESPONSE CENTRE – NUMBER 112
CREDIT CARD STEALING - MITIGATIONS
• In some cases can be done rather easily. Current biggest credit card stealing botnet in Lithuania can be
easily stopped by just blocking several small networks.
ACTIVE MITIGATION ACTIONS
• Nothing that I know
• Some institutions – e.g. Bank of Lithuania or Gaming Control Authority block access to illegal websites.
• Why this cannot be done to stop stealing credit card data from Lithuanian citizens ?
"Show Must Go On" ...
LINKS
• https://www.delfi.lt/mokslas/technologijos/tiriama-ar-buvo-isilauzta-i-kristiana-el-parduotuve-galimai-
pasisavinti-klientu-duomenys.d?id=84499591
• https://tyrimai.esec.lt/index.php?option=com_content&view=article&id=52
• https://www.lrytas.lt/it/ismanyk/2019/12/12/news/sokiruojantis-tyrimas-400-lietuvisku-interneto-
svetainiu-slapcia-vagia-vartotoju-pinigus-ir-duomenis-12894109/
• https://tyrimai.esec.lt/index.php?option=com_content&view=article&id=55
PUBLIC / FINANCIAL SERVICES ATTACKS
During the quarantine period people were forced to use more and more public services online. The same is
true for the financial institutions – all went online
• Incorrect implementation of SMART-ID / Msignature has led to massive attacks against users.
• Obvious problem that has been before everyone eyes for several years
• Very slow problem fixing
• Problem fixing speed changes instantly if the attack hits certain organization
SMART-ID / MSIGNATURE
• Attack hit banks. To be more precise – the banks users. Remember – target is money.
• Due to the incorrect authentication implementation also all Egovernment services ( more than 600 )
were impacted
• It took more than half a year for Egovernment services to become not impacted ( not verified very
carefully)
• Some organizations were very fast fixing that problem – took it seriously ( State Enterprise Centre of
Registers )
• Some organizations are still impacted
OWASP TESTING GUIDE
NKSC
IGNITIS
DEMO / MOVIE
• https://tyrimai.esec.lt/index.php?option=com_content&view=article&id=48
LINKS
• https://www.15min.lt/verslas/naujiena/finansai/sukciai-seb-banko-vartotoju-atpazinimo-kodus-
paprasciausiai-atspedavo-spraga-bandoma-uzlopyti-662-1256248
• https://tyrimai.esec.lt/index.php?option=com_content&view=article&id=48
THANK YOU!
DARIUS@ESEC.LT

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Aviva Spectrum™
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 ChallengesLeandro Bennaton
 
Sec and ethics presentation
Sec and ethics presentationSec and ethics presentation
Sec and ethics presentationDarren McManus
 
Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Marco Morana
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident responseBrian Honan
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersJoel Cardella
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliabilitycaca1009
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
WSO2Con EU 2016: Reinforcing Your Enterprise with Security Architectures
WSO2Con EU 2016: Reinforcing Your Enterprise  with Security ArchitecturesWSO2Con EU 2016: Reinforcing Your Enterprise  with Security Architectures
WSO2Con EU 2016: Reinforcing Your Enterprise with Security ArchitecturesWSO2
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingKimberly Hood
 
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudSwapna Shetye
 
June 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be YouJune 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be Youseadeloitte
 

Was ist angesagt? (18)

Case study
Case studyCase study
Case study
 
Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 
Sec and ethics presentation
Sec and ethics presentationSec and ethics presentation
Sec and ethics presentation
 
Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident response
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of users
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
WSO2Con EU 2016: Reinforcing Your Enterprise with Security Architectures
WSO2Con EU 2016: Reinforcing Your Enterprise  with Security ArchitecturesWSO2Con EU 2016: Reinforcing Your Enterprise  with Security Architectures
WSO2Con EU 2016: Reinforcing Your Enterprise with Security Architectures
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
 
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus Cloud
 
June 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be YouJune 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be You
 

Ähnlich wie Under thehood

Cybersecurity During the COVID Era
Cybersecurity During the COVID EraCybersecurity During the COVID Era
Cybersecurity During the COVID EraCitrin Cooperman
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsCognizant
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeMelbourne IT
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterpriseJason Bloomberg
 
Security human
Security humanSecurity human
Security humanJisc
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Knowledge Group
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementRedZone Technologies
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET Journal
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptxsrikmhh
 
a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2Mike Revell
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessLucy Denver
 
Digitalisation du secteur de l’eau #2 : Protocoles de communication, hebergem...
Digitalisation du secteur de l’eau #2 : Protocoles de communication, hebergem...Digitalisation du secteur de l’eau #2 : Protocoles de communication, hebergem...
Digitalisation du secteur de l’eau #2 : Protocoles de communication, hebergem...Cluster H2O
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docxlorainedeserre
 

Ähnlich wie Under thehood (20)

Cybersecurity During the COVID Era
Cybersecurity During the COVID EraCybersecurity During the COVID Era
Cybersecurity During the COVID Era
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterprise
 
Security human
Security humanSecurity human
Security human
 
File000119
File000119File000119
File000119
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptx
 
a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
 
Digitalisation du secteur de l’eau #2 : Protocoles de communication, hebergem...
Digitalisation du secteur de l’eau #2 : Protocoles de communication, hebergem...Digitalisation du secteur de l’eau #2 : Protocoles de communication, hebergem...
Digitalisation du secteur de l’eau #2 : Protocoles de communication, hebergem...
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx
 

Kürzlich hochgeladen

Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...SUHANI PANDEY
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...SUHANI PANDEY
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...SUHANI PANDEY
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.soniya singh
 

Kürzlich hochgeladen (20)

Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 

Under thehood

  • 1. UNDER THE HOOD DARIUS POVILAITIS DARIUS@ESEC.LT HTTPS://TYRIMAI.ESEC.LT
  • 2. MASSIVE REMOTE WORK – CHALLENGES IN THE BEGINNING What challenges arise when people massively started remote work ? • The massive shift to remote work overwhelmed organizations internet links ( e.g. remote user count increased 1200% ) • That caused problems for security patch install over those saturated internet links • Service quality issues while video communications are forced to go over VPN • Security scanning of remote workplaces might be impacted as well • People started to use more and more online services be it public or private sector. • Etc.
  • 3. SOLUTIONS ? These problems caused by massive instant shift for the remote work can be managed by redesigning your network, process flows, etc. Split tunneling might be the case for the saturated internet links. But this cure might cause another problems – e.g. for the security: • In split tunneling situation remote employees might lose additional protection provided by enterprise defense systems. So the security risks arise even at the operational level. These are indirect security risks caused by some major changes in the infrastructure and are / were temporary. But let's look at the direct security risks.
  • 4. MAJOR SECURITY RISKS • Social / technical attacks • Technical attacks
  • 5. SOCIAL / TECHNICAL ATTACKS • Due to CORONA, massive shift to collaboration platforms occurred. • Those platforms has attracted increased attention from the hackers and some of them had some serious security vulnerabilities ( e.g. Zoom ). People were well informed regarding those vulnerabilities. • Other popular collaboration platforms like Teams/Office365 did not receive so much attention. Meanwhile most organizations using Office365 have authentication setup which might expose them to the social-technical attacks. • During the quarantine period people were forced to use more and more public services online. The same is true for the financial institutions – all went online. Activities not directly related to work also might bring some dangers.
  • 6. O365 AUTHENTICATION METHODS • User / password • User / password + 2FA ( e.g. SMS or Microsoft Authenticator ) • Federation (here you can use digital certificates)
  • 7. O365 - TWO FACTOR AUTHENTICATION If an organization wants to implement O365 in a secure way, they are considering all the above-mentioned authentication solutions. User password authentication is insecure – everyone understands that. Federation with certificates – are legacy – that's what I was told by local solution providers. The winner here is two factor authentication – 2FA – that's what is said • Username / password with SMS (or Microsoft Authenticator ) solves all authentication risks. Really ? Do you have such a setup ? • What would you say if just one email or SMS could break all your security ? • The biggest problem here is that organizations don't even understand that they could be very easy target since they are assured that 2FA is very secure.
  • 8.
  • 9.
  • 10.
  • 11. DEMO / MOVIE • https://tyrimai.esec.lt/movies/ivairus/o365/all1.mp4
  • 12. MICROSOFT O365 • It was nothing new :) The time to setup the interception just took several hours. • It is very easy to enumerate the organizations which are using O365 • After that – just some spoofed SMS or emails – and you might be exposed
  • 13. CHECK YOUR ORGANIZATION SETUP During the break you can ask to try that on your organization. Sometimes it is very challenging to see that someone else is inside your organization :)
  • 15. THE CYBER KILL CHAIN The kill chain in cybersecurity defines various phases of an attack . Attacks may occur in phases and can be disrupted through controls established at each phase. The biggest challenge and the most important / difficult steps in containing an attack is to: • Identify and prevent an attack in advance • Mitigate an ongoing attack Let's look at some real attack mitigation examples
  • 16. MITIGATION CAPABILITIES / CURRENT SITUATION • Companies usually do not boast when the intrusion occurs. So it is difficult to estimate the real situation in this area • On the other side we do see multiple cybersecurity incidents that are in the mass media. Let's analyze them. Let's pay attention how these threats are mitigated when they are identified. • The examples provided would show how real attack could be identified and stopped / mitigated. That way we can estimate our capabilities to mitigate attacks. • The conclusions you should make yourself :)
  • 17. MAIN HACKERS TARGET • In 99% cases – they are after money or something that lets them to make that money. Remember that.
  • 18. SOCIAL / TECHNICAL ATTACKS - 1337 SMS • Massive SMS subscribe to expensive services using number 1337. • Mostly done using hacked websites . • Attacks are not stopped for years. • Here is a short movie how these attacks look like: https://tyrimai.esec.lt/index.php?option=com_content&view=article&id=35
  • 21. MITIGATION RESULTS – 1337 SMS • Search the google for the keywords – 1337 SMS – you will see fresh complaints from multiple people
  • 23. SOCIAL / TECHNICAL ATTACKS - CREDIT CARD STEALING
  • 25. HUNDREDS OF WEBSITES IN THE END OF 2019
  • 26. EMERGENCY RESPONSE CENTRE – NUMBER 112
  • 27. CREDIT CARD STEALING - MITIGATIONS • In some cases can be done rather easily. Current biggest credit card stealing botnet in Lithuania can be easily stopped by just blocking several small networks.
  • 28.
  • 29. ACTIVE MITIGATION ACTIONS • Nothing that I know • Some institutions – e.g. Bank of Lithuania or Gaming Control Authority block access to illegal websites. • Why this cannot be done to stop stealing credit card data from Lithuanian citizens ? "Show Must Go On" ...
  • 30. LINKS • https://www.delfi.lt/mokslas/technologijos/tiriama-ar-buvo-isilauzta-i-kristiana-el-parduotuve-galimai- pasisavinti-klientu-duomenys.d?id=84499591 • https://tyrimai.esec.lt/index.php?option=com_content&view=article&id=52 • https://www.lrytas.lt/it/ismanyk/2019/12/12/news/sokiruojantis-tyrimas-400-lietuvisku-interneto- svetainiu-slapcia-vagia-vartotoju-pinigus-ir-duomenis-12894109/ • https://tyrimai.esec.lt/index.php?option=com_content&view=article&id=55
  • 31. PUBLIC / FINANCIAL SERVICES ATTACKS During the quarantine period people were forced to use more and more public services online. The same is true for the financial institutions – all went online • Incorrect implementation of SMART-ID / Msignature has led to massive attacks against users. • Obvious problem that has been before everyone eyes for several years • Very slow problem fixing • Problem fixing speed changes instantly if the attack hits certain organization
  • 32. SMART-ID / MSIGNATURE • Attack hit banks. To be more precise – the banks users. Remember – target is money. • Due to the incorrect authentication implementation also all Egovernment services ( more than 600 ) were impacted • It took more than half a year for Egovernment services to become not impacted ( not verified very carefully) • Some organizations were very fast fixing that problem – took it seriously ( State Enterprise Centre of Registers ) • Some organizations are still impacted
  • 33.
  • 35. NKSC
  • 37. DEMO / MOVIE • https://tyrimai.esec.lt/index.php?option=com_content&view=article&id=48