SlideShare a Scribd company logo
1 of 34
#BSidesSeattle
ABOUT ME
Tony Martin-Vegue
tony.martinvegue@gmail.com
www.thestandarddeviant.com
@tdmv
AGENDA
•What is extortion?
•DDoS for ransom
•Ransomware
•Targeted victims (Sony, Ashley Madison)
•Assessing the risk at your company
EXTORTION
LEGAL DEFINITION
”The obtaining of property from another induced
by wrongful use of actual or threatened force,
violence, or fear, or under color of official right.”
- 18 U.S.C.A. §871 et seq.; §1951
FIRST SEXTORTION?
DDOS
Attack website with a small and
short attack
Simultaneous attack on others in
the sector
Send a ransom note demanding
payment
Increase DDoS attack
intensity/duration OR move on
ANATOMY OF AN ATTACK
WHY DOES IT WORK?
ATTACKER
• Attack is Very low cost per hour
• Can attack multiple websites in
the time allotted
• Scalable – can scale up in
bandwidth to make a point or
scale down to save costs
• The attacker knows what they are
capable of (information
asymmetry)
DEFENDER
• Costs a company on average of
$40,000 an hour1
• Can be only or primary source of
revenue
• Reputational issues
• Have no idea if attack is isolated
or worst nightmare
1 Source: Incapsula DDoS Survey: http://lp.incapsula.com/rs/incapsulainc/images/eBook%20-
%20DDoS%20Impact%20Survey.pdf
DD4BC
Source: Recorded Future, DD4BC, Armada Collective, and the Rise of Cyber Extortion;
https://www.recordedfuture.com/dd4bc-cyber-extortion/
TO PAY OR
NOT TO PAY?
KNOWN PAYMENTS
NITROGEN SPORTS
• EU based sports betting site
• Patrons pay in Bitcoin
• DDoS Attacks started in
September 2014
• Attackers continually asked for 2
BC
• Copycats also attacked
PROTON MAIL
• Swiss encrypted email provider
• On November 4th, 2015 they
were hit with one of the largest
DDoS attacks seen in Europe –
50gbps
• Armada Collective demanded
$6000 in ransom which was paid
• A copycat attacked, hoping to
get paid
DETECTION AND RESPONSE
•Risk models should include DDoS for ransom
•Cost/benefit analysis on DDoS protection services
•Update incident response plans
•Review and update crisis team members
RANSOMWARE
HOW IT WORKS
Image Source: TrendMicro.com
Bad
Guy
DETECTION AND RESPONSE
TO PAY OR NOT TO PAY?
TARGETED ATTACKS
ASHLEY MADISON
PAY THE RANSOM?
RISK ANALYSIS
ANATOMY OF A RISK ASSESSMENT
Risk
Loss Event Frequency
Threat Event
Frequency
Vulnerability
Threat
Capability
Control
Strength
Loss Magnitude
Primary Loss
Secondary
Loss
RISK ANALYSIS
•US-based credit union founded in 2008
•Has on online banking presence with several thousand
customers
•In 2014, was hit with one DDoS for ransom attack for 30
minutes; response costs were high but no loss of customers
•Last attack, we decided to wait it out until the attackers
stopped
THREAT EVENT FREQUENCY
Threat
Event
Frequency
Method
Objectives Resources
Limits
VULNERABILITY
Vulnerability
Threat
Capability
Control
Strength
The probability that an asset will be
unable to resist the actions of a threat
agent.
Top 2%
Top 16%
Average
Bottom 16%
Bottom 2%
DERIVE RISK
Loss Event Frequency
1x to .1x / year
Vulnerability
Threat Capability
Low- Bottom 16%
Control Strength
Very Low – Only protects
against the bottom 2%
Probable Loss
$40,000 / hour
Risk
ALE: 9k
RESIDUAL RISK
Loss Event Frequency
1x to .1x / year
Vulnerability
Threat Capability
Low- Bottom 16%
Control Strength
Very High – Protects against
all but the top 2%
Probable Loss
$40,000 / hour
Risk
ALE: $260
FINAL THOUGHTS
•Ransomware can and does happen to anyone – plan for it
•Other types of extortion are rare, but model the threats
and see if you are fit the target profile
•Update your incident response plans & BC/DR plans
•A good risk analysis can help execs make better decisions
•Have a way for extortionists to contact you
•Partner with law enforcement BEFORE something bad
happens  do this Monday
QUESTIONS?

More Related Content

Similar to Can cyber extortion happen to you? Practical tools for assessing the threat

Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
OnRamp
 
Akamai___WebSecurity_eBook_Final
Akamai___WebSecurity_eBook_FinalAkamai___WebSecurity_eBook_Final
Akamai___WebSecurity_eBook_Final
Cheryl Goldberg
 

Similar to Can cyber extortion happen to you? Practical tools for assessing the threat (20)

Security
SecuritySecurity
Security
 
types of cyber attack by taufiqurrahman.pptx
types of cyber attack by taufiqurrahman.pptxtypes of cyber attack by taufiqurrahman.pptx
types of cyber attack by taufiqurrahman.pptx
 
DNS Cybersecurity in 2012-2015
DNS Cybersecurity in 2012-2015DNS Cybersecurity in 2012-2015
DNS Cybersecurity in 2012-2015
 
Malware attack Social engineering attack
Malware attack  Social engineering attackMalware attack  Social engineering attack
Malware attack Social engineering attack
 
Cyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLVCyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLV
 
2012 Global Application and Network Security Report
2012 Global Application and Network Security Report2012 Global Application and Network Security Report
2012 Global Application and Network Security Report
 
Cyber Security Briefing for Beginners
Cyber Security Briefing for BeginnersCyber Security Briefing for Beginners
Cyber Security Briefing for Beginners
 
DDoS Hurts Everyone
DDoS Hurts EveryoneDDoS Hurts Everyone
DDoS Hurts Everyone
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
 
Akamai___WebSecurity_eBook_Final
Akamai___WebSecurity_eBook_FinalAkamai___WebSecurity_eBook_Final
Akamai___WebSecurity_eBook_Final
 
InfoSecurity Europe 2014: The Art Of Cyber War
InfoSecurity Europe 2014:  The Art Of Cyber WarInfoSecurity Europe 2014:  The Art Of Cyber War
InfoSecurity Europe 2014: The Art Of Cyber War
 
Cloud Security Architecture - a different approach
Cloud Security Architecture - a different approachCloud Security Architecture - a different approach
Cloud Security Architecture - a different approach
 
Web Attack Survival Guide
Web Attack Survival GuideWeb Attack Survival Guide
Web Attack Survival Guide
 
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the SmokeA Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
 
Brooks18
Brooks18Brooks18
Brooks18
 
Data Driven Risk Assessment
Data Driven Risk AssessmentData Driven Risk Assessment
Data Driven Risk Assessment
 
Information Security Basics.pptx
Information Security Basics.pptxInformation Security Basics.pptx
Information Security Basics.pptx
 
Clear and present danger: Cyber Threats and Trends 2017
Clear and present danger: Cyber Threats and Trends 2017Clear and present danger: Cyber Threats and Trends 2017
Clear and present danger: Cyber Threats and Trends 2017
 
Zero Trust.pptx
Zero Trust.pptxZero Trust.pptx
Zero Trust.pptx
 
Protecting your business from ddos attacks
Protecting your business from ddos attacksProtecting your business from ddos attacks
Protecting your business from ddos attacks
 

More from Tony Martin-Vegue

Incentivizing Better Risk Decisions - Lessons from Rogue Actuaries - SIRAcon ...
Incentivizing Better Risk Decisions - Lessons from Rogue Actuaries - SIRAcon ...Incentivizing Better Risk Decisions - Lessons from Rogue Actuaries - SIRAcon ...
Incentivizing Better Risk Decisions - Lessons from Rogue Actuaries - SIRAcon ...
Tony Martin-Vegue
 
How to Lie with Statistics, Information Security Edition
How to Lie with Statistics, Information Security EditionHow to Lie with Statistics, Information Security Edition
How to Lie with Statistics, Information Security Edition
Tony Martin-Vegue
 
Ransomware & Game Theory: To Pay, or Not to Pay?
Ransomware & Game Theory: To Pay, or Not to Pay?Ransomware & Game Theory: To Pay, or Not to Pay?
Ransomware & Game Theory: To Pay, or Not to Pay?
Tony Martin-Vegue
 
Should I Pay or Should I Go? Game Theory and Ransomware
Should I Pay or Should I Go? Game Theory and RansomwareShould I Pay or Should I Go? Game Theory and Ransomware
Should I Pay or Should I Go? Game Theory and Ransomware
Tony Martin-Vegue
 
How to Lie with Statistics, Information Security Edition
How to Lie with Statistics, Information Security EditionHow to Lie with Statistics, Information Security Edition
How to Lie with Statistics, Information Security Edition
Tony Martin-Vegue
 
How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat ModelingHow to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
Tony Martin-Vegue
 

More from Tony Martin-Vegue (10)

Incentivizing Better Risk Decisions - Lessons from Rogue Actuaries - SIRAcon ...
Incentivizing Better Risk Decisions - Lessons from Rogue Actuaries - SIRAcon ...Incentivizing Better Risk Decisions - Lessons from Rogue Actuaries - SIRAcon ...
Incentivizing Better Risk Decisions - Lessons from Rogue Actuaries - SIRAcon ...
 
How to Lie with Statistics, Information Security Edition
How to Lie with Statistics, Information Security EditionHow to Lie with Statistics, Information Security Edition
How to Lie with Statistics, Information Security Edition
 
Crowdsourced Probability Estimates: A Field Guide (FAIR Institute)
Crowdsourced Probability Estimates: A Field Guide (FAIR Institute)Crowdsourced Probability Estimates: A Field Guide (FAIR Institute)
Crowdsourced Probability Estimates: A Field Guide (FAIR Institute)
 
Cybersecurity aspects of blockchain and cryptocurrency
Cybersecurity aspects of blockchain and cryptocurrencyCybersecurity aspects of blockchain and cryptocurrency
Cybersecurity aspects of blockchain and cryptocurrency
 
Crowdsourced Probability Estimates: A Field Guide
Crowdsourced Probability Estimates: A Field GuideCrowdsourced Probability Estimates: A Field Guide
Crowdsourced Probability Estimates: A Field Guide
 
Ransomware & Game Theory: To Pay, or Not to Pay?
Ransomware & Game Theory: To Pay, or Not to Pay?Ransomware & Game Theory: To Pay, or Not to Pay?
Ransomware & Game Theory: To Pay, or Not to Pay?
 
Should I Pay or Should I Go? Game Theory and Ransomware
Should I Pay or Should I Go? Game Theory and RansomwareShould I Pay or Should I Go? Game Theory and Ransomware
Should I Pay or Should I Go? Game Theory and Ransomware
 
Measuring DDoS Risk using FAIR (Factor Analysis of Information Risk
Measuring DDoS Risk using FAIR (Factor Analysis of Information RiskMeasuring DDoS Risk using FAIR (Factor Analysis of Information Risk
Measuring DDoS Risk using FAIR (Factor Analysis of Information Risk
 
How to Lie with Statistics, Information Security Edition
How to Lie with Statistics, Information Security EditionHow to Lie with Statistics, Information Security Edition
How to Lie with Statistics, Information Security Edition
 
How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat ModelingHow to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Can cyber extortion happen to you? Practical tools for assessing the threat

  • 3. AGENDA •What is extortion? •DDoS for ransom •Ransomware •Targeted victims (Sony, Ashley Madison) •Assessing the risk at your company
  • 5. LEGAL DEFINITION ”The obtaining of property from another induced by wrongful use of actual or threatened force, violence, or fear, or under color of official right.” - 18 U.S.C.A. §871 et seq.; §1951
  • 8. Attack website with a small and short attack Simultaneous attack on others in the sector Send a ransom note demanding payment Increase DDoS attack intensity/duration OR move on ANATOMY OF AN ATTACK
  • 9. WHY DOES IT WORK? ATTACKER • Attack is Very low cost per hour • Can attack multiple websites in the time allotted • Scalable – can scale up in bandwidth to make a point or scale down to save costs • The attacker knows what they are capable of (information asymmetry) DEFENDER • Costs a company on average of $40,000 an hour1 • Can be only or primary source of revenue • Reputational issues • Have no idea if attack is isolated or worst nightmare 1 Source: Incapsula DDoS Survey: http://lp.incapsula.com/rs/incapsulainc/images/eBook%20- %20DDoS%20Impact%20Survey.pdf
  • 10. DD4BC Source: Recorded Future, DD4BC, Armada Collective, and the Rise of Cyber Extortion; https://www.recordedfuture.com/dd4bc-cyber-extortion/
  • 11. TO PAY OR NOT TO PAY?
  • 12. KNOWN PAYMENTS NITROGEN SPORTS • EU based sports betting site • Patrons pay in Bitcoin • DDoS Attacks started in September 2014 • Attackers continually asked for 2 BC • Copycats also attacked PROTON MAIL • Swiss encrypted email provider • On November 4th, 2015 they were hit with one of the largest DDoS attacks seen in Europe – 50gbps • Armada Collective demanded $6000 in ransom which was paid • A copycat attacked, hoping to get paid
  • 13. DETECTION AND RESPONSE •Risk models should include DDoS for ransom •Cost/benefit analysis on DDoS protection services •Update incident response plans •Review and update crisis team members
  • 15. HOW IT WORKS Image Source: TrendMicro.com
  • 16.
  • 17.
  • 19.
  • 21. TO PAY OR NOT TO PAY?
  • 23.
  • 27. ANATOMY OF A RISK ASSESSMENT Risk Loss Event Frequency Threat Event Frequency Vulnerability Threat Capability Control Strength Loss Magnitude Primary Loss Secondary Loss
  • 28. RISK ANALYSIS •US-based credit union founded in 2008 •Has on online banking presence with several thousand customers •In 2014, was hit with one DDoS for ransom attack for 30 minutes; response costs were high but no loss of customers •Last attack, we decided to wait it out until the attackers stopped
  • 30. VULNERABILITY Vulnerability Threat Capability Control Strength The probability that an asset will be unable to resist the actions of a threat agent. Top 2% Top 16% Average Bottom 16% Bottom 2%
  • 31. DERIVE RISK Loss Event Frequency 1x to .1x / year Vulnerability Threat Capability Low- Bottom 16% Control Strength Very Low – Only protects against the bottom 2% Probable Loss $40,000 / hour Risk ALE: 9k
  • 32. RESIDUAL RISK Loss Event Frequency 1x to .1x / year Vulnerability Threat Capability Low- Bottom 16% Control Strength Very High – Protects against all but the top 2% Probable Loss $40,000 / hour Risk ALE: $260
  • 33. FINAL THOUGHTS •Ransomware can and does happen to anyone – plan for it •Other types of extortion are rare, but model the threats and see if you are fit the target profile •Update your incident response plans & BC/DR plans •A good risk analysis can help execs make better decisions •Have a way for extortionists to contact you •Partner with law enforcement BEFORE something bad happens  do this Monday