SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
Insights on IT risk
         March 2011




                  Countering
                  cyber attacks
Although companies worldwide have been dealing
            with opportunistic cyber attacks for years, many
            now find themselves the target of the advanced
            persistent threat (APT), which is characterized by
            more sophisticated and concentrated efforts. APT
            attacks are focused on a single target, lasting until
            they are in, and are meant to collect information
            over a long period of time. They leave few signs of
            their success, wanting to stay hidden for as long
            as possible in order to acquire large amounts of
            sensitive information.

            The information targeted is specific. Attackers are not looking to just grab
            anything they come across — the target is an organization’s valuable
            intellectual property.
            No single technology or process will stop the APT, and traditional security
            methods are proving to be ineffective against these threats. While many
            organizations are vulnerable to attack because they have under-invested in
            security in the past, simply shoring up existing and conventional defenses is not
            enough; new approaches and increased vigilance are required. Protecting against
            these types of threats requires several layers of defense, knowledge of the threat,
            and advanced skills to detect and react to ongoing and successful attacks.



                 •     Recent high-profile attacks have gained the attention of many
                       executives of large, global companies.
                 •     These attacks are sophisticated and targeted against specific
                       companies and often target specific employees to gain entry.
                 •     The goal is unnoticed infiltration with a long-term presence to steal as
                       much information as possible.
                 •     Countering these attacks is complex and must involve prevention,
                       detection and response.
                 •     We are not aware of any organizations that have successfully stopped
                       these threats. Smart organizations focus on effective detection and
                       fast response.
                 •     It takes time to develop a mature program.
                 •     The threat landscape is changing, risks are increasing and companies
                       need to change their mind-set and approach toward information
                       security (i.e., establish a “new normal”).




Insights on IT risk | March 2011                                                                  1
The evolving threat landscape


Despite its roots as a collaboration between defense and research, the early internet was a place where users trusted each other. Bad
behavior was generally more mischief than attack, and it typically was motivated by challenge or glory. But as the internet grew, it
eventually came to resemble the real world, containing friends and business associates, playgrounds and workplaces, and good guys and
bad guys.

Today’s internet serves as critical infrastructure for both                    Recent high-profile attacks against several enterprises have
government and commerce, and it has attracted a new class                      been a wake-up call for organizations and information security
of attacker. State-sponsored entities are now targeting specific               professionals alike in recognizing this new level of threat.
organizations, as opposed to the more opportunistic attacks that
we’ve seen in the past. If one attack fails, another one will be tried
— again and again. This persistent nature makes these groups more
dangerous and defenses against them more important than ever.




Threat — target landscape

           Unsophisticated attackers;    Increasing sophistication and
            targets are anyone with a       organization; criminally                Corporate espionage       Advanced persistent threat
                  vulnerability                   motivated
    Risk




                                             Resources and sophistication of attacks
           “Hobbyists”                  Organized crime                      Corporate espionage             Advanced persistent threat (APT)
           ► Fun                        ► Criminal intent                    ► Economically motivated        ► Long-term pattern of targeted,
           ► Challenge                  ► More coordinated attacks           ► Theft of intellectual           sophisticated attacks aimed at
                                        ► Financially motivated (e.g., theft   property                        governments, companies and
                                          of credit card numbers for use                                       political activists
                                          or sale)                                                           ► Politically and economically
                                                                                                               motivated
                                                                                                             ► Well-funded, sophisticated
                                                                                                               resources




2                                                Insights on IT risk | March 2011
The evolving threat landscape


Two main types of threats have established themselves: the opportunistic threat and the continuous and orchestrated APT. While the
results may be similar — infiltration, unauthorized access and theft — the motivation behind each is entirely different.


Opportunistic threats: Opportunistic threats may be motivated                 Advanced persistent threat: The APT collects information from a
financially, or simply by a desire for vandalism, but they strike at          specific group of organizations. The population of target victims has
the softest targets available. Often initiated by simple vulnerability        clearly grown over the last several years, and the attackers will use
scanning, access to stolen passwords or discovery of misconfigured            any means possible to exploit the target. The APT is characterized
applications, the attacks are usually indiscriminate and strike once          by substantial reconnaissance to identify individuals within the
and move on. Denial of service attacks, web defacement and even               organization, long periods of persistence (measured in years) and a
the theft of financial information are types of opportunistic threats.        desire to remain undetected for as long as possible.




Who is a target?
Originally, the APT targeted military and government entities before moving to softer targets that had military or intelligence value —
namely western defense contractors. More recently, the APT has expanded to a new set of targets, including manufacturing, financial,
energy and high-tech engineering companies. We have assisted numerous APT victims that are not defense contractors, but produce
technology with an economic value — particularly to developing nations. The APT targets any company with useful intellectual property.




 Target industries              Motivation
                                •    Theft of intellectual property (e.g., equipment test data)
 Government contractors
                                •    Theft of government classified information

                                •    Theft of intellectual property to bring competing products to market with less R&D time and investment
 Technology providers
                                •    Theft of corporate secrets to gain competitive advantage in negotiating contract and buying terms

                                •    Theft of intellectual property to bring competing products to market with less R&D time and investment
 Manufacturing
                                •    Theft of corporate secrets to gain competitive advantage in negotiating contract and buying terms




                                              Any organization with intellectual property that would be
                                         useful in a growing economy is a potential target of the APT.



                                                 Insights on IT risk | March 2011                                                                3
Countering the evolving threat landscape


Drive security strategy based on the “new normal”
Given the continuous and persistent threat posed by the new wave of attack channels and malicious actors, now is the time for businesses
to establish a “new normal,” i.e., instill a new mind-set and approach into driving the organization’s security strategy.

 Traditional approach                 The new normal
 Response to security incidents       •    Organizations must answer the questions “what?” and “why?”. Start with a threat-centric analysis by
 limited to the “how?” (“How               understanding the attacker, and therefore identifying what data the attacker wants to collect.
 did the attacker get into the        •    Start by focusing your protection, detection and response efforts around this highest-risk data.
 network?”)

 Assumption that the corporate        •    It should be assumed that there are pockets of the corporate infrastructure that have already been infiltrated.
 infrastructure is secure until       •    This shift in mind-set will drive an intelligence-based approach that is necessary to build a solid strategy to
 evidence is presented to prove            identify and combat the continuous threat of the new wave of malicious actors.
 otherwise                            •    Develop detection mechanisms that go beyond AV (antivirus) and IDS (intrusion detection systems), and
                                           proactively seek evidence of compromise.

 Outcome of projects in the           •    Well-trained, expert incident detection and response staff provide a defense against today’s complex threats.
 security portfolio is based on the        Ongoing security efforts must continuously incorporate actionable intelligence from the threat team to engineer
 procurement and deployment of             and fine-tune automation achieved by assessment and identification tools.
 security tools                       •    Projects in the security portfolio must be justifiable based on results presented by the threat team.

 “Red Team” is another term for       Red Teams add new value when used to validate existing detection and response mechanisms. When conducted
 the capability to counter routine    regularly, they can serve as a gauge for effectiveness and a way to measure improvement.
 attack and penetration               •    The scope of Red Team activities should go beyond technical assets to include the protection of high-risk
                                           personnel and executives.
                                      •    Red Team efforts must not be hindered by corporate bureaucracy. Executive leadership should grant Red Team
                                           activities greater autonomy to investigate, assess and respond to critical events and suspicious activity.


 Emerging attack vectors are an       The tactics used by the more sophisticated attackers are increasingly geared toward channels that bypass perimeter
 academic endeavor                    controls. These tactics are no longer an academic projection of the future but a current reality. As such, the following
                                      should be included in the portfolio of security projects:
                                      •    Hardening of web browser, laptop and mobile device configurations, especially for high-risk personnel, including
                                           executives.
                                      •    Further enhancement of application security assessment and developer training efforts, incorporating emerging
                                           attack vectors that aim to create channels to bypass perimeter controls.
                                      •    A solid approach to security controls and monitoring of cloud applications and services.




4                                                     Insights on IT risk | March 2011
Countering the evolving threat landscape



                                                                                                                  Disconnection from internet
               Advanced




                                                                                                           Sensitive data “airgapped”
                                                                                                  Counterintelligence operation



                                                               Outbound gateway consolidation                       PC virtualization
Threat level
               Intermediate




                                                         Proprietary email scanning                       Sensitive data/networks segregated

                                                                                                  Proxy authentication
                                           Constant phishing simulation
                                                                                     Improved access control


                                                                  Refocused patching and configuration management efforts

                                                        Searchable event repository
               Basic




                                              Network instrumentation
                                     Build incident response capability

                                                                            Degree of response




           The new normal
           •           Organizations should strive to identify why particular elements of the business are of interest to the enemy.
           •           It should be assumed that there are pockets of the corporate infrastructure that have already been infiltrated.
           •           Red Team efforts must not be hindered by corporate bureaucracy. Executive leadership should grant Red Team activities greater
                       autonomy to investigate, assess and respond to critical events and suspicious activity.
           •           The tactics used by the more sophisticated attackers are increasingly geared toward channels that bypass perimeter controls.
                       These tactics are no longer an academic projection of the future, but a current reality.



                                                               Insights on IT risk | March 2011                                                        5
An example of an APT attack
A recent APT attack analyzed by Ernst & Young was executed in                       •    Compromising a user’s social network credentials
two parts: 1. malicious software (malware) download and 2. hidden                        (e.g., MySpace, Facebook, LinkedIn), by posting URLs or
execution. The malicious code exploited an unknown vulnerability in                      TinyURLs that encourage friends to go to that link
the Internet Explorer web browser known as a zero-day exploit. The                  The number of methods to induce a user to click on a link is limited
nefarious aspect of a zero-day exploit is that traditional signature-               only by the creativity of the attackers.
based antivirus tools are unable to pick up the attack because
attackers test their malware against commercial packages. To load                   Once the malware is in, it can take on different forms and functions.
the malware, attackers rely on end users clicking on a hyperlink or                 In the example attack, it morphed and split itself into the final
opening an attachment in which the browser is forced to download                    version of the malware, maintaining itself in an encrypted form
the malware. While the company did not detail how the payload                       until it needed to be executed. The basic function of the malware
was delivered, this part of the attack can be achieved in a number                  in this attack was similar to previous APTs: creation of a backdoor
of ways:                                                                            communications channel to the attacker’s home systems over an
                                                                                    encrypted channel, retransformation of the malware, duplication,
•        Using specifically crafted emails (phishing or spear-phishing) to          search of the enterprise and remote removal of targeted
         entice a recipient to click on a link in the message or open an            information.
         attachment
                                                                                    What should be noticed is that while the payload itself is advanced
•        Embedding hyperlinks (URLs) in instant messaging
                                                                                    and extremely sophisticated, the means by which the malware is
         conversations
                                                                                    inserted into the environment is not. Phishing, social engineering,
•        Compromising a website and replacing legitimate links with                 hacking a website and user credential theft were all issues long
         links that now contain the malware                                         before the APT appeared.
•        Spoofing a website either by using a similar name (famous
         example: whitehouse.com instead of whitehouse.gov) or by
         hacking a victim’s DNS server such that legitimate hyperlinks
         now point to the attacker’s server

How does the attack unfold?

                    Reconnaissance                 Attack                      Run malware                   Pivot                     Exfiltrate


                •    Recent conference     •   Phishing email          •     Add new accounts       •    Use stolen           •    Log onto target
                     attendees             •   Vulnerability scan      •     Increase                    accounts to               system remotely,
                •    Executive                                               permissions                 strengthen                using stolen
                                           •   Removable media                                           foothold                  credentials
    How?




                     biographies                                       •     Install back door
                                           •   Web application                                      •    Attack newly         •    Package data in
                •    Previously stolen                                 •     Exfiltrate SAM file
                     emails                                                                              discovered                password-protected
                                                                       •     Install scanning            vulnerable devices        archives
                                                                             tools and scan                                   •    Exfiltrate data to
                                                                                                                                   intermediate servers
                                                                                                                                   via company proxies

                •    The APT probably      •   Although initial        •     From this point        •    The APT will lie     •    Malware is usually
                     knows which users         attacks are                   forward, APT                low and pivot as          not on the target
    Challenge




                     hold sensitive data       sophisticated, they           can and will be             needed. They              devices.
                     better than you           are not frequently            using legitimate            will re-establish    •    Exfiltration is
                     do.                       needed.                       accounts. IDS               footholds if they         staged carefully
                                                                             or AV will be               detect their              and executed very
                                                                             oblivious.                  presence is in            quickly.
                                                                       •     Malware can sleep           jeopardy.
                                                                             to avoid detection.



6                                                     Insights on IT risk | March 2011
Ernst & Young’s incident response services

Ernst & Young has proven experience in handling advanced threats and building incident response capability. We assist clients in building a
sustainable in-house capability to plan for, protect against, detect and respond to cybersecurity incidents, and we provide investigation and
remediation services in the event of a breach.
We offer a proactive APT assessment to evaluate vulnerability to common APT attack vectors and to identify whether an APT or malware
attack has occurred.

                                                            • Assess environment
                                                            • Identify and remediate gaps
                                                            • Develop incident response plan




                                                                           Plan

                    • Computer Incident Response
                                                                                                   • Harden environment
                      Team (CIRT) staffed and
                                                                                                   • Improve authentication
                      trained
                      t i d
                                                                                                   • Manage privileged accounts
                    • CIRT chartered with authority    Respond                           Protect   • Limit unnecessary
                      to drive response
                                                                                                     communication
                    • Response and remediation
                                                                                                   • Potentially reduce user
                      cycle times are measured
                                                                                                     privileges

                                                                         Detect
                                                                         D t t


                                                        • Network security monitoring program
                                                          in place — not just IDS
                                                        • Key network egress points monitored
                                                        • L
                                                          Logs archived and analyzed
                                                                   hi d d         l d
                                                        • Key host information collected


Next steps             Page 1                           Useful PowerPoint graphics

Given the continuous and persistent threat posed by the new                          If you think that you may be the target of an APT, consider the
wave of attack channels and malicious entities, now is the time                      actions you should take. Remember that your security program
for businesses to establish a “new normal,” that is, to instill a new                needs to include elements to protect against these threats, detect
mind-set and approach toward the organization’s security strategy.                   an ongoing or successful attack, and be able to effectively respond
Organizations need to better understand the threats and their                        to the attack. Given the nature of the APT, no one control or
potential risks (e.g., are they a likely target for an APT or just an                countermeasure is likely to be effective; a defense-in-depth strategy
opportunistic threat?). Based on a better understanding of their                     is paramount.
risks, companies should examine their current security strategy,
                                                                                     Finally, if you are a high-risk organization, take action as if you
controls, and maturity of controls to determine their gaps and
                                                                                     have been compromised. Given the ability of APT malware to evade
weaknesses. This may seem like an obvious first step, but recent
                                                                                     normal prevention and detection mechanisms, if you haven’t taken
experience shows that many companies have defined their security
                                                                                     specific measures to protect yourself, you may already be a victim
programs and required controls based on compliance requirements
                                                                                     and not know it.
as opposed to risk. A compliance-driven approach to security may
not only increase cost due to repetition of activities, but the core
notion of reducing enterprise risk is often absent. Organizations
that merely focus on third-party requirements and regulations
in lieu of a holistic approach to business risk end up driving
compliance, not security.



                                                      Insights on IT risk | March 2011                                                                   7
Why Ernst & Young?

Ernst & Young is the most globally integrated professional services             Our IT risk and assurance professionals assist clients to use
organization in the world, with more than 141,000 professionals                 technology to achieve a competitive advantage. They advise
working in 41 countries. World-renowned for our assurance, tax,                 on how to make IT more efficient and how to manage the risks
transaction and business advisory services, Ernst & Young is also a             associated with running IT operations. They focus on helping clients
global leader in the field of information technology risk and security.         improve and secure their technology so that it serves the business
                                                                                effectively and enhances results: this includes several focused
For more than 20 years, our clients have benefited from an
                                                                                competency groups, including application controls and security,
extensive portfolio of professional services in assessment,
                                                                                third-party reporting and IT risk advisory.
remediation, design and implementation of effective enterprise
security services. Ernst & Young brings together an unparalleled                Our privacy advisors assist clients with enabling the governance,
team of highly experienced industry, security, privacy and risk                 risk and compliance efforts related to the use of personal
management professionals, to meet the complex needs of some                     information, assessing enterprise privacy risk, leading privacy
of the most data-intensive organizations in the world. We have                  internal audits and inventorying the use of personal information in
developed proven industry leading methods, tools and resources to               business processes, technologies and third parties.
address our clients’ information risk management challenges and to
                                                                                Our Information Security practice offers a wide range of
support the ongoing security, integrity and availability of our client’s
                                                                                management, assessment and improvement services. Our
information assets and processes.
                                                                                targeted security services help our clients maintain the appropriate
As a large established professional services organization,                      alignment between their security, IT and business strategies,
Ernst & Young’s name and experience lend weight to each project                 enabling them to maintain their focus on their business needs while
we undertake: we provide a broad business risk perspective that will            addressing their security and risk issues.
enhance a project’s value with your senior management and your
audit committee.
Companies choose to work with us because of our intense
client focus, and our deep technical and sector-based business
knowledge. We have earned a reputation as a leading innovator
because we invest heavily in our people, our processes and in our
technology capabilities.




8                                                 Insights on IT risk | March 2011
Contacts
Global
Norman Lonergan                                                   +44 20 7980 0596   norman.lonergan@uk.ey.com
(Advisory Services Leader, London)
Paul van Kessel                                                   +31 88 40 71271    paul.van.kessel@nl.ey.com
(IT Risk and Assurance Services Leader, Amsterdam)

Advisory Services
Robert Patton                                                     +1 404 817 5579    robert.patton@ey.com
(Americas Leader, Atlanta)
Andrew Embury                                                     +44 20 7951 1802   aembury@uk.ey.com
(Europe, Middle East, India and Africa Leader, London)
Doug Simpson                                                      +61 2 9248 4923    doug.simpson@au.ey.com
(Asia-Pacific Leader, Sydney)
Naoki Matsumura                                                   +81 3 3503 1100    matsumura-nk@shinnihon.or.jp
(Japan Leader, Tokyo)
IT Risk and Assurance Services
Bernie Wedge                                                      +1 404 817 5120    bernard.wedge@ey.com
(Americas Leader, Atlanta)
Paul van Kessel                                                   +31 88 40 71271    paul.van.kessel@nl.ey.com
(Europe, Middle East, India and Africa Leader, Amsterdam)
Troy Kelly                                                        +85 2 2629 3238    troy.kelly@hk.ey.com
(Asia-Pacific Leader, Hong Kong)
Giovanni Stagno                                                   +81 3 3503 1100    stagno-gvnn@shinnihon.or.jp
(Japan Leader, Chiyoda-ku)




                                               Insights on IT risk | March 2011                                     9
Ernst & Young

Assurance | Tax | Transactions | Advisory


About Ernst & Young
Ernst & Young is a global leader in assurance, tax,
transaction and advisory services. Worldwide,
our 141,000 people are united by our shared
values and an unwavering commitment to quality.
We make a difference by helping our people, our
clients and our wider communities achieve their
potential.
Ernst & Young refers to the global organization of
member firms of Ernst & Young Global Limited,
each of which is a separate legal entity.
Ernst & Young Global Limited, a UK company
limited by guarantee, does not provide services
to clients. For more information about our
organization, please visit www.ey.com
About Ernst & Young’s Advisory Services
The relationship between risk and performance
improvement is an increasingly complex and
central business challenge, with business
performance directly connected to the
recognition and effective management of risk.
Whether your focus is on business transformation
or sustaining achievement, having the right
advisors on your side can make all the difference.
Our 20,000 advisory professionals form one of
the broadest global advisory networks of any
professional organization, delivering seasoned
multidisciplinary teams that work with our
clients to deliver a powerful and superior
client experience. We use proven, integrated
methodologies to help you achieve your strategic
priorities and make improvements that are
sustainable for the longer term. We understand
that to achieve your potential as an organization
you require services that respond to your specific
issues, so we bring our broad sector experience
and deep subject matter knowledge to bear in a
proactive and objective way. Above all, we are
committed to measuring the gains and identifying
where the strategy is delivering the value your
business needs. It’s how Ernst & Young makes a
difference.

© 2011 EYGM Limited.
All Rights Reserved.

EYG no. AU0768

This publication contains information in summary form and is
therefore intended for general guidance only. It is not intended to
be a substitute for detailed research or the exercise of professional
judgment. Neither EYGM Limited nor any other member of the
global Ernst & Young organization can accept any responsibility
for loss occasioned to any person acting or refraining from action
as a result of any material in this publication. On any specific
matter, reference should be made to the appropriate advisor.



www.ey.com

Weitere ähnliche Inhalte

Was ist angesagt?

Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015
Mark Lanterman
 
wp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industrywp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industry
Numaan Huq
 
Darktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemDarktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystem
Austin Eppstein
 
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
Mergers & Acquisitions security - (ISC)2 Secure Summit DACHMergers & Acquisitions security - (ISC)2 Secure Summit DACH
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
EQS Group
 

Was ist angesagt? (20)

Gartner Security & Risk Management Summit Brochure
Gartner Security & Risk Management Summit BrochureGartner Security & Risk Management Summit Brochure
Gartner Security & Risk Management Summit Brochure
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Countering Violent Extremism In Urban Environments Through Design Issue
Countering Violent Extremism In Urban Environments Through Design IssueCountering Violent Extremism In Urban Environments Through Design Issue
Countering Violent Extremism In Urban Environments Through Design Issue
 
Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015
 
Framework for Security: Security in the Community Context
Framework for Security: Security in the Community ContextFramework for Security: Security in the Community Context
Framework for Security: Security in the Community Context
 
wp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industrywp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industry
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Collaborative Defence
Collaborative DefenceCollaborative Defence
Collaborative Defence
 
Ghioni Fabio The Importance of System Availability in Corporate Critical Infr...
Ghioni Fabio The Importance of System Availability in Corporate Critical Infr...Ghioni Fabio The Importance of System Availability in Corporate Critical Infr...
Ghioni Fabio The Importance of System Availability in Corporate Critical Infr...
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law Please
 
Fabio Ghioni
Fabio GhioniFabio Ghioni
Fabio Ghioni
 
The Evolving Landscape on Information Security
The Evolving Landscape on Information SecurityThe Evolving Landscape on Information Security
The Evolving Landscape on Information Security
 
Cyber Influence Operations
Cyber Influence OperationsCyber Influence Operations
Cyber Influence Operations
 
Darktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemDarktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystem
 
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
Mergers & Acquisitions security - (ISC)2 Secure Summit DACHMergers & Acquisitions security - (ISC)2 Secure Summit DACH
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
 
Dod IA Pen Testing Brief
Dod IA Pen Testing BriefDod IA Pen Testing Brief
Dod IA Pen Testing Brief
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
Managed security services for financial services firms
Managed security services for financial services firmsManaged security services for financial services firms
Managed security services for financial services firms
 
Brochure - Jan 14
Brochure - Jan 14Brochure - Jan 14
Brochure - Jan 14
 
Paradigm Shift! - Customer Information Centric IT Risk Assessments
Paradigm Shift! - Customer Information Centric IT Risk AssessmentsParadigm Shift! - Customer Information Centric IT Risk Assessments
Paradigm Shift! - Customer Information Centric IT Risk Assessments
 

Ähnlich wie Insights on it risks cyber attacks

powerpointpresentThreat Actor Groups.pptx
powerpointpresentThreat Actor Groups.pptxpowerpointpresentThreat Actor Groups.pptx
powerpointpresentThreat Actor Groups.pptx
deveraralph2
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
Sirius
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
banerjeea
 

Ähnlich wie Insights on it risks cyber attacks (20)

powerpointpresentThreat Actor Groups.pptx
powerpointpresentThreat Actor Groups.pptxpowerpointpresentThreat Actor Groups.pptx
powerpointpresentThreat Actor Groups.pptx
 
Proactive Defense: Understanding the 4 Main Threat Actor Types
Proactive Defense: Understanding the 4 Main Threat Actor TypesProactive Defense: Understanding the 4 Main Threat Actor Types
Proactive Defense: Understanding the 4 Main Threat Actor Types
 
Countering Advanced Persistent Threats
Countering Advanced Persistent ThreatsCountering Advanced Persistent Threats
Countering Advanced Persistent Threats
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Zero Trust.pptx
Zero Trust.pptxZero Trust.pptx
Zero Trust.pptx
 
Responding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksResponding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacks
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
 
Cyber_Security_Issues_and_Challenges.pptx
Cyber_Security_Issues_and_Challenges.pptxCyber_Security_Issues_and_Challenges.pptx
Cyber_Security_Issues_and_Challenges.pptx
 
UN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - MaccagliaUN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - Maccaglia
 
Guide to high volume data sources for SIEM
Guide to high volume data sources for SIEMGuide to high volume data sources for SIEM
Guide to high volume data sources for SIEM
 
The Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksThe Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted Attacks
 
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docxOutsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
 
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromise
 
Understanding Advanced Cybersecurity Threats for the In-House Counsel
Understanding Advanced Cybersecurity Threats for the In-House CounselUnderstanding Advanced Cybersecurity Threats for the In-House Counsel
Understanding Advanced Cybersecurity Threats for the In-House Counsel
 
Adam Palmer: Managing Advanced Cyber Threats for In-House Counsel
Adam Palmer: Managing Advanced Cyber Threats for In-House CounselAdam Palmer: Managing Advanced Cyber Threats for In-House Counsel
Adam Palmer: Managing Advanced Cyber Threats for In-House Counsel
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of Attack
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
 

Mehr von Vladimir Matviychuk

Thinking outside the box survey questions
Thinking outside the box survey questions Thinking outside the box survey questions
Thinking outside the box survey questions
Vladimir Matviychuk
 
Insights on it risks evolving it landscape
Insights on it risks evolving it landscapeInsights on it risks evolving it landscape
Insights on it risks evolving it landscape
Vladimir Matviychuk
 
2010 giss results_global and ua_2010
2010 giss results_global and ua_20102010 giss results_global and ua_2010
2010 giss results_global and ua_2010
Vladimir Matviychuk
 
как составить грамотный Slа
как составить грамотный Slакак составить грамотный Slа
как составить грамотный Slа
Vladimir Matviychuk
 

Mehr von Vladimir Matviychuk (19)

дети в интернете
дети в интернетедети в интернете
дети в интернете
 
Thinking outside the box survey questions
Thinking outside the box survey questions Thinking outside the box survey questions
Thinking outside the box survey questions
 
Thinking outside the box (SOX)
Thinking outside the box (SOX)Thinking outside the box (SOX)
Thinking outside the box (SOX)
 
Insights on it risk bcm
Insights on it risk bcmInsights on it risk bcm
Insights on it risk bcm
 
Insights on it risks evolving it landscape
Insights on it risks evolving it landscapeInsights on it risks evolving it landscape
Insights on it risks evolving it landscape
 
Управление рисками - серебряная пуля или данность моды?
Управление рисками - серебряная пуля или данность моды?Управление рисками - серебряная пуля или данность моды?
Управление рисками - серебряная пуля или данность моды?
 
Building control efficiency: Rationalization, optimization and redesign
Building control efficiency: Rationalization, optimization and redesign Building control efficiency: Rationalization, optimization and redesign
Building control efficiency: Rationalization, optimization and redesign
 
Роль ИТ в выявлении и предотвращении мошенничества на предприятии
Роль ИТ в выявлении и предотвращении мошенничества на предприятииРоль ИТ в выявлении и предотвращении мошенничества на предприятии
Роль ИТ в выявлении и предотвращении мошенничества на предприятии
 
Privacy trends 2011
Privacy trends 2011Privacy trends 2011
Privacy trends 2011
 
2010 giss results_global and ua_2010
2010 giss results_global and ua_20102010 giss results_global and ua_2010
2010 giss results_global and ua_2010
 
Effective risk management
Effective risk managementEffective risk management
Effective risk management
 
как составить грамотный Slа
как составить грамотный Slакак составить грамотный Slа
как составить грамотный Slа
 
BCP intro
BCP introBCP intro
BCP intro
 
2010 GISS EY
2010 GISS EY2010 GISS EY
2010 GISS EY
 
Continious auditing
Continious auditingContinious auditing
Continious auditing
 
Security certification overview
Security certification overviewSecurity certification overview
Security certification overview
 
Legalcamp 2.0
Legalcamp 2.0Legalcamp 2.0
Legalcamp 2.0
 
Security Innovation Forum
Security Innovation ForumSecurity Innovation Forum
Security Innovation Forum
 
Yalta_10 _ey-cio_forum
Yalta_10 _ey-cio_forumYalta_10 _ey-cio_forum
Yalta_10 _ey-cio_forum
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Insights on it risks cyber attacks

  • 1. Insights on IT risk March 2011 Countering cyber attacks
  • 2.
  • 3. Although companies worldwide have been dealing with opportunistic cyber attacks for years, many now find themselves the target of the advanced persistent threat (APT), which is characterized by more sophisticated and concentrated efforts. APT attacks are focused on a single target, lasting until they are in, and are meant to collect information over a long period of time. They leave few signs of their success, wanting to stay hidden for as long as possible in order to acquire large amounts of sensitive information. The information targeted is specific. Attackers are not looking to just grab anything they come across — the target is an organization’s valuable intellectual property. No single technology or process will stop the APT, and traditional security methods are proving to be ineffective against these threats. While many organizations are vulnerable to attack because they have under-invested in security in the past, simply shoring up existing and conventional defenses is not enough; new approaches and increased vigilance are required. Protecting against these types of threats requires several layers of defense, knowledge of the threat, and advanced skills to detect and react to ongoing and successful attacks. • Recent high-profile attacks have gained the attention of many executives of large, global companies. • These attacks are sophisticated and targeted against specific companies and often target specific employees to gain entry. • The goal is unnoticed infiltration with a long-term presence to steal as much information as possible. • Countering these attacks is complex and must involve prevention, detection and response. • We are not aware of any organizations that have successfully stopped these threats. Smart organizations focus on effective detection and fast response. • It takes time to develop a mature program. • The threat landscape is changing, risks are increasing and companies need to change their mind-set and approach toward information security (i.e., establish a “new normal”). Insights on IT risk | March 2011 1
  • 4. The evolving threat landscape Despite its roots as a collaboration between defense and research, the early internet was a place where users trusted each other. Bad behavior was generally more mischief than attack, and it typically was motivated by challenge or glory. But as the internet grew, it eventually came to resemble the real world, containing friends and business associates, playgrounds and workplaces, and good guys and bad guys. Today’s internet serves as critical infrastructure for both Recent high-profile attacks against several enterprises have government and commerce, and it has attracted a new class been a wake-up call for organizations and information security of attacker. State-sponsored entities are now targeting specific professionals alike in recognizing this new level of threat. organizations, as opposed to the more opportunistic attacks that we’ve seen in the past. If one attack fails, another one will be tried — again and again. This persistent nature makes these groups more dangerous and defenses against them more important than ever. Threat — target landscape Unsophisticated attackers; Increasing sophistication and targets are anyone with a organization; criminally Corporate espionage Advanced persistent threat vulnerability motivated Risk Resources and sophistication of attacks “Hobbyists” Organized crime Corporate espionage Advanced persistent threat (APT) ► Fun ► Criminal intent ► Economically motivated ► Long-term pattern of targeted, ► Challenge ► More coordinated attacks ► Theft of intellectual sophisticated attacks aimed at ► Financially motivated (e.g., theft property governments, companies and of credit card numbers for use political activists or sale) ► Politically and economically motivated ► Well-funded, sophisticated resources 2 Insights on IT risk | March 2011
  • 5. The evolving threat landscape Two main types of threats have established themselves: the opportunistic threat and the continuous and orchestrated APT. While the results may be similar — infiltration, unauthorized access and theft — the motivation behind each is entirely different. Opportunistic threats: Opportunistic threats may be motivated Advanced persistent threat: The APT collects information from a financially, or simply by a desire for vandalism, but they strike at specific group of organizations. The population of target victims has the softest targets available. Often initiated by simple vulnerability clearly grown over the last several years, and the attackers will use scanning, access to stolen passwords or discovery of misconfigured any means possible to exploit the target. The APT is characterized applications, the attacks are usually indiscriminate and strike once by substantial reconnaissance to identify individuals within the and move on. Denial of service attacks, web defacement and even organization, long periods of persistence (measured in years) and a the theft of financial information are types of opportunistic threats. desire to remain undetected for as long as possible. Who is a target? Originally, the APT targeted military and government entities before moving to softer targets that had military or intelligence value — namely western defense contractors. More recently, the APT has expanded to a new set of targets, including manufacturing, financial, energy and high-tech engineering companies. We have assisted numerous APT victims that are not defense contractors, but produce technology with an economic value — particularly to developing nations. The APT targets any company with useful intellectual property. Target industries Motivation • Theft of intellectual property (e.g., equipment test data) Government contractors • Theft of government classified information • Theft of intellectual property to bring competing products to market with less R&D time and investment Technology providers • Theft of corporate secrets to gain competitive advantage in negotiating contract and buying terms • Theft of intellectual property to bring competing products to market with less R&D time and investment Manufacturing • Theft of corporate secrets to gain competitive advantage in negotiating contract and buying terms Any organization with intellectual property that would be useful in a growing economy is a potential target of the APT. Insights on IT risk | March 2011 3
  • 6. Countering the evolving threat landscape Drive security strategy based on the “new normal” Given the continuous and persistent threat posed by the new wave of attack channels and malicious actors, now is the time for businesses to establish a “new normal,” i.e., instill a new mind-set and approach into driving the organization’s security strategy. Traditional approach The new normal Response to security incidents • Organizations must answer the questions “what?” and “why?”. Start with a threat-centric analysis by limited to the “how?” (“How understanding the attacker, and therefore identifying what data the attacker wants to collect. did the attacker get into the • Start by focusing your protection, detection and response efforts around this highest-risk data. network?”) Assumption that the corporate • It should be assumed that there are pockets of the corporate infrastructure that have already been infiltrated. infrastructure is secure until • This shift in mind-set will drive an intelligence-based approach that is necessary to build a solid strategy to evidence is presented to prove identify and combat the continuous threat of the new wave of malicious actors. otherwise • Develop detection mechanisms that go beyond AV (antivirus) and IDS (intrusion detection systems), and proactively seek evidence of compromise. Outcome of projects in the • Well-trained, expert incident detection and response staff provide a defense against today’s complex threats. security portfolio is based on the Ongoing security efforts must continuously incorporate actionable intelligence from the threat team to engineer procurement and deployment of and fine-tune automation achieved by assessment and identification tools. security tools • Projects in the security portfolio must be justifiable based on results presented by the threat team. “Red Team” is another term for Red Teams add new value when used to validate existing detection and response mechanisms. When conducted the capability to counter routine regularly, they can serve as a gauge for effectiveness and a way to measure improvement. attack and penetration • The scope of Red Team activities should go beyond technical assets to include the protection of high-risk personnel and executives. • Red Team efforts must not be hindered by corporate bureaucracy. Executive leadership should grant Red Team activities greater autonomy to investigate, assess and respond to critical events and suspicious activity. Emerging attack vectors are an The tactics used by the more sophisticated attackers are increasingly geared toward channels that bypass perimeter academic endeavor controls. These tactics are no longer an academic projection of the future but a current reality. As such, the following should be included in the portfolio of security projects: • Hardening of web browser, laptop and mobile device configurations, especially for high-risk personnel, including executives. • Further enhancement of application security assessment and developer training efforts, incorporating emerging attack vectors that aim to create channels to bypass perimeter controls. • A solid approach to security controls and monitoring of cloud applications and services. 4 Insights on IT risk | March 2011
  • 7. Countering the evolving threat landscape Disconnection from internet Advanced Sensitive data “airgapped” Counterintelligence operation Outbound gateway consolidation PC virtualization Threat level Intermediate Proprietary email scanning Sensitive data/networks segregated Proxy authentication Constant phishing simulation Improved access control Refocused patching and configuration management efforts Searchable event repository Basic Network instrumentation Build incident response capability Degree of response The new normal • Organizations should strive to identify why particular elements of the business are of interest to the enemy. • It should be assumed that there are pockets of the corporate infrastructure that have already been infiltrated. • Red Team efforts must not be hindered by corporate bureaucracy. Executive leadership should grant Red Team activities greater autonomy to investigate, assess and respond to critical events and suspicious activity. • The tactics used by the more sophisticated attackers are increasingly geared toward channels that bypass perimeter controls. These tactics are no longer an academic projection of the future, but a current reality. Insights on IT risk | March 2011 5
  • 8. An example of an APT attack A recent APT attack analyzed by Ernst & Young was executed in • Compromising a user’s social network credentials two parts: 1. malicious software (malware) download and 2. hidden (e.g., MySpace, Facebook, LinkedIn), by posting URLs or execution. The malicious code exploited an unknown vulnerability in TinyURLs that encourage friends to go to that link the Internet Explorer web browser known as a zero-day exploit. The The number of methods to induce a user to click on a link is limited nefarious aspect of a zero-day exploit is that traditional signature- only by the creativity of the attackers. based antivirus tools are unable to pick up the attack because attackers test their malware against commercial packages. To load Once the malware is in, it can take on different forms and functions. the malware, attackers rely on end users clicking on a hyperlink or In the example attack, it morphed and split itself into the final opening an attachment in which the browser is forced to download version of the malware, maintaining itself in an encrypted form the malware. While the company did not detail how the payload until it needed to be executed. The basic function of the malware was delivered, this part of the attack can be achieved in a number in this attack was similar to previous APTs: creation of a backdoor of ways: communications channel to the attacker’s home systems over an encrypted channel, retransformation of the malware, duplication, • Using specifically crafted emails (phishing or spear-phishing) to search of the enterprise and remote removal of targeted entice a recipient to click on a link in the message or open an information. attachment What should be noticed is that while the payload itself is advanced • Embedding hyperlinks (URLs) in instant messaging and extremely sophisticated, the means by which the malware is conversations inserted into the environment is not. Phishing, social engineering, • Compromising a website and replacing legitimate links with hacking a website and user credential theft were all issues long links that now contain the malware before the APT appeared. • Spoofing a website either by using a similar name (famous example: whitehouse.com instead of whitehouse.gov) or by hacking a victim’s DNS server such that legitimate hyperlinks now point to the attacker’s server How does the attack unfold? Reconnaissance Attack Run malware Pivot Exfiltrate • Recent conference • Phishing email • Add new accounts • Use stolen • Log onto target attendees • Vulnerability scan • Increase accounts to system remotely, • Executive permissions strengthen using stolen • Removable media foothold credentials How? biographies • Install back door • Web application • Attack newly • Package data in • Previously stolen • Exfiltrate SAM file emails discovered password-protected • Install scanning vulnerable devices archives tools and scan • Exfiltrate data to intermediate servers via company proxies • The APT probably • Although initial • From this point • The APT will lie • Malware is usually knows which users attacks are forward, APT low and pivot as not on the target Challenge hold sensitive data sophisticated, they can and will be needed. They devices. better than you are not frequently using legitimate will re-establish • Exfiltration is do. needed. accounts. IDS footholds if they staged carefully or AV will be detect their and executed very oblivious. presence is in quickly. • Malware can sleep jeopardy. to avoid detection. 6 Insights on IT risk | March 2011
  • 9. Ernst & Young’s incident response services Ernst & Young has proven experience in handling advanced threats and building incident response capability. We assist clients in building a sustainable in-house capability to plan for, protect against, detect and respond to cybersecurity incidents, and we provide investigation and remediation services in the event of a breach. We offer a proactive APT assessment to evaluate vulnerability to common APT attack vectors and to identify whether an APT or malware attack has occurred. • Assess environment • Identify and remediate gaps • Develop incident response plan Plan • Computer Incident Response • Harden environment Team (CIRT) staffed and • Improve authentication trained t i d • Manage privileged accounts • CIRT chartered with authority Respond Protect • Limit unnecessary to drive response communication • Response and remediation • Potentially reduce user cycle times are measured privileges Detect D t t • Network security monitoring program in place — not just IDS • Key network egress points monitored • L Logs archived and analyzed hi d d l d • Key host information collected Next steps Page 1 Useful PowerPoint graphics Given the continuous and persistent threat posed by the new If you think that you may be the target of an APT, consider the wave of attack channels and malicious entities, now is the time actions you should take. Remember that your security program for businesses to establish a “new normal,” that is, to instill a new needs to include elements to protect against these threats, detect mind-set and approach toward the organization’s security strategy. an ongoing or successful attack, and be able to effectively respond Organizations need to better understand the threats and their to the attack. Given the nature of the APT, no one control or potential risks (e.g., are they a likely target for an APT or just an countermeasure is likely to be effective; a defense-in-depth strategy opportunistic threat?). Based on a better understanding of their is paramount. risks, companies should examine their current security strategy, Finally, if you are a high-risk organization, take action as if you controls, and maturity of controls to determine their gaps and have been compromised. Given the ability of APT malware to evade weaknesses. This may seem like an obvious first step, but recent normal prevention and detection mechanisms, if you haven’t taken experience shows that many companies have defined their security specific measures to protect yourself, you may already be a victim programs and required controls based on compliance requirements and not know it. as opposed to risk. A compliance-driven approach to security may not only increase cost due to repetition of activities, but the core notion of reducing enterprise risk is often absent. Organizations that merely focus on third-party requirements and regulations in lieu of a holistic approach to business risk end up driving compliance, not security. Insights on IT risk | March 2011 7
  • 10. Why Ernst & Young? Ernst & Young is the most globally integrated professional services Our IT risk and assurance professionals assist clients to use organization in the world, with more than 141,000 professionals technology to achieve a competitive advantage. They advise working in 41 countries. World-renowned for our assurance, tax, on how to make IT more efficient and how to manage the risks transaction and business advisory services, Ernst & Young is also a associated with running IT operations. They focus on helping clients global leader in the field of information technology risk and security. improve and secure their technology so that it serves the business effectively and enhances results: this includes several focused For more than 20 years, our clients have benefited from an competency groups, including application controls and security, extensive portfolio of professional services in assessment, third-party reporting and IT risk advisory. remediation, design and implementation of effective enterprise security services. Ernst & Young brings together an unparalleled Our privacy advisors assist clients with enabling the governance, team of highly experienced industry, security, privacy and risk risk and compliance efforts related to the use of personal management professionals, to meet the complex needs of some information, assessing enterprise privacy risk, leading privacy of the most data-intensive organizations in the world. We have internal audits and inventorying the use of personal information in developed proven industry leading methods, tools and resources to business processes, technologies and third parties. address our clients’ information risk management challenges and to Our Information Security practice offers a wide range of support the ongoing security, integrity and availability of our client’s management, assessment and improvement services. Our information assets and processes. targeted security services help our clients maintain the appropriate As a large established professional services organization, alignment between their security, IT and business strategies, Ernst & Young’s name and experience lend weight to each project enabling them to maintain their focus on their business needs while we undertake: we provide a broad business risk perspective that will addressing their security and risk issues. enhance a project’s value with your senior management and your audit committee. Companies choose to work with us because of our intense client focus, and our deep technical and sector-based business knowledge. We have earned a reputation as a leading innovator because we invest heavily in our people, our processes and in our technology capabilities. 8 Insights on IT risk | March 2011
  • 11. Contacts Global Norman Lonergan +44 20 7980 0596 norman.lonergan@uk.ey.com (Advisory Services Leader, London) Paul van Kessel +31 88 40 71271 paul.van.kessel@nl.ey.com (IT Risk and Assurance Services Leader, Amsterdam) Advisory Services Robert Patton +1 404 817 5579 robert.patton@ey.com (Americas Leader, Atlanta) Andrew Embury +44 20 7951 1802 aembury@uk.ey.com (Europe, Middle East, India and Africa Leader, London) Doug Simpson +61 2 9248 4923 doug.simpson@au.ey.com (Asia-Pacific Leader, Sydney) Naoki Matsumura +81 3 3503 1100 matsumura-nk@shinnihon.or.jp (Japan Leader, Tokyo) IT Risk and Assurance Services Bernie Wedge +1 404 817 5120 bernard.wedge@ey.com (Americas Leader, Atlanta) Paul van Kessel +31 88 40 71271 paul.van.kessel@nl.ey.com (Europe, Middle East, India and Africa Leader, Amsterdam) Troy Kelly +85 2 2629 3238 troy.kelly@hk.ey.com (Asia-Pacific Leader, Hong Kong) Giovanni Stagno +81 3 3503 1100 stagno-gvnn@shinnihon.or.jp (Japan Leader, Chiyoda-ku) Insights on IT risk | March 2011 9
  • 12. Ernst & Young Assurance | Tax | Transactions | Advisory About Ernst & Young Ernst & Young is a global leader in assurance, tax, transaction and advisory services. Worldwide, our 141,000 people are united by our shared values and an unwavering commitment to quality. We make a difference by helping our people, our clients and our wider communities achieve their potential. Ernst & Young refers to the global organization of member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients. For more information about our organization, please visit www.ey.com About Ernst & Young’s Advisory Services The relationship between risk and performance improvement is an increasingly complex and central business challenge, with business performance directly connected to the recognition and effective management of risk. Whether your focus is on business transformation or sustaining achievement, having the right advisors on your side can make all the difference. Our 20,000 advisory professionals form one of the broadest global advisory networks of any professional organization, delivering seasoned multidisciplinary teams that work with our clients to deliver a powerful and superior client experience. We use proven, integrated methodologies to help you achieve your strategic priorities and make improvements that are sustainable for the longer term. We understand that to achieve your potential as an organization you require services that respond to your specific issues, so we bring our broad sector experience and deep subject matter knowledge to bear in a proactive and objective way. Above all, we are committed to measuring the gains and identifying where the strategy is delivering the value your business needs. It’s how Ernst & Young makes a difference. © 2011 EYGM Limited. All Rights Reserved. EYG no. AU0768 This publication contains information in summary form and is therefore intended for general guidance only. It is not intended to be a substitute for detailed research or the exercise of professional judgment. Neither EYGM Limited nor any other member of the global Ernst & Young organization can accept any responsibility for loss occasioned to any person acting or refraining from action as a result of any material in this publication. On any specific matter, reference should be made to the appropriate advisor. www.ey.com