SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Security Assessment for Financial Institutions
Group-IB history


         Group-IB is            Acquisition       International        Creation of            Dedicated Certified
         founded                by Leta Group     Expansion            CERT-GIB               Professionals




                                                                                                        60+
                                                                                                      employees         2012
                  2003                 2010                     2011           2011


                         Stages of Company Development


Leader on the Russian               Various service packages             Skolkovo resident                   First 24/7 CERT in
market                              Pre-incident consulting;             The CyberCop project, an            Eastern Europe
The first and only company          Response;                            integrated system for               CERT-GIB is the first private
in the CIS providing                Forensics;                           counteracting cybercrime.           Computer Emergency
comprehensive services in           Investigation;                                                           Response Team in Russia.
investigation of the security       Legal support;
incidents.                          Post-incident consulting.
Our key Customers




* completed project samples are available per customer request
Group-IB services for Financial Institutions

  Security analysis + penetration testing
  Offensive security services
  Computer Forensics & Investigations
  Malware intelligence
  Security incident response & Managed security services
  Botnet Monitoring (Zeus, SpyEye, Carberp, etc.)
  DDOS-attack protection service
Banking & E-Commerce vulnerabilities specifics


  As a result of PCI DSS / PA DSS is rarely facing a "classical" WEB-
  application vulnerabilities (SQL Injection, XSS, Local File Inclusion)

  WAF (WEB-Application Firewall) is widely used, however it is rarely
  set up and maintained properly;

  Complicated applications, large dynamic changes, the use of third-
  party and borrowed applications and plugins;

  Various attacks on the client, initially located in the untrusted
  environment (ActiveX-objects vulnerabilities at the client-side,
  client-side vulnerabilities, inefficient Information protection
  measures)
Penetration testing

Traditional approaches

 «Black box» model

 «Grey box» mode

 «White box» model

Informal testing options and qualification

- Developing exploits for vulnerabilities in online-banking software

- Using of «zero-day» vulnerabilities in client-side / server-side

- Own software security lab with more then 20 public advisories in bugtracks

- Use of social engineering and individual tactical approaches

- We provide detailed report and free of charge consulting services
«PCI Compliance does not equal security»

  HDFC Bank / Blind SQL-Injection;
  (CVSS Base Score - 9.0)




  http://www.hdfcbank.com
XSS exotics – RBS customer is under attack

HTML5 Canvas capabilities / JQuery and XSS vectors vulnerabilities
(taking a screenshot + keystrokes interception in the context of the session)
Analysis of the protection measures

 A trusted environment - may also contain a vulnerability
( ZTIC detachable devices - Zone Trusted Information Channel)




Checkpoint Abra Multiple Vulnerabilities
http://www.exploit-db.com/exploits/19716/ - Group-IB’s Advisory

Sample built-in ACL-list (F:PWCdatasandbox-persistence.ref ):
<Execute OriginalName="calc.exe" PathName="calc.exe" AppName="Microsoft
Calculator" UIDescription="Microsoft Calculator" id="134"/>

«Dirty» security trick (after shutting of the Windows File Protection ):
takeown /f <file_name>
icacls <file_name> /grant %username%:F
icacls <file_name> /grant *S-1-1-0:(F)
«Zero-day» vulnerabilities applicable to Banks
Network architecture misconfiguration errors

     Gathering information from the internal infrastructure of the bank
     Line format: <STX><message><ETX><checksum_character>




          Tixi HSM-HNG Modem for Mitsubishi FX Remote Access
Information security integration services


 Security Information and Event Management solutions
 (SEM, SIM and SIEM)

 Implementation of Intrusion Detection and Prevention
 systems (IDS/IPS)

 Implementation of Data Leakage Prevention systems (DLP)
 and their legal support

 SOC’s & Managed security services (MSS)
Computer Forensics

Forensic examination:

 Restores the chronology of
 security events

 Reveals signs of internal
 employees involvement

 Disclose details of the
 committed theft in online
 banking
Investigations

Typical cases:

 Theft involving employees of
 the affected organizations

 Theft with the use of malicious
 software (Trojans)

 Theft involving the substitution
 of the transaction details sent by
 e-mail
Investigations

Steps of the RBS incident investigation:

 Search for signs of involvement (gathering evidence) of internal staff (based on
 the results of forensic investigations)

 Identify bot network control panels and search for links to other information
 security incidents

 Identification of individuals providing additional services to the attacker

 Getting detailed information about the structure of the control panel bot
 network and to obtain evidence of its use in a particular fraud in online banking

Defining a person controlling the bot-network, and its actual location

 Gathering data in the form of a set of documents to be sent to law enforcement
 and legal authorities
Investigations

Resources used and sources of information gathering:

 Distributed network of HoneyNet traps

 Forensic investigation cases database

 Malicious software research database

 All time theft cases database, collected by Group-IB staff

 Details on phishing sources

 Previous investigation outcomes

 Operational information & OSINT

 Links to organizations involved in investigations in 48 countries
DDoS attacks investigations

As part of the investigation you get a detailed report on progress, as
well as all necessary information and documentation:

 Get the exact location of the botnet’s control center;

 Malicious code sample reversing;

 Details on individuals involved in a DDoS attack;

 A set of documents to hand the case over the law enforcement.
Successful cases and projects

«Grum botnet shutdown, kills 20 percent of worldwide spam»




http://blog.fireeye.com/research/2012/07/grum-botnet-no-longer-safe-havens.html
Successful cases and projects

  Joint operation with Microsoft on arrest of Leo Kuvaev




            http://krebsonsecurity.com/tag/group-ib/
Successful cases and projects

«Russian Authorities Arrest 6 More Members of the Carberp Gang»




       http://www.sbrf.ru/en/presscenter/all/index.php?id114=11018427
DDoS protection services

HTTP Protection Technology




          Proxifying                                      Internal routing



                                                                      External routing
 Client
                       Group-IB’s network filtering platform
DDoS protection services

HTTP/HTTPS Protection Technologies


                                                                          Visitors
                      Group-IB’s
 Client                gateway                                  Routing



          Client’s router

                            Group-IB’s network filtering platform
Security Incident response & MSS

       The response to an information security incident is carried out by highly qualified
  professionals who are confronted daily with a variety of incidents, such as attacks on a web
site, online banking system, or another information asset. Each incident is unique and requires
an individualized approach, that’s why we have a dedicated forensic team of professionals and
               a certified CERT to meet the most exacting customer requirements.




Our 24/7 CERT-GIB Team respond to all sort of threats:
• Denial of services attacks (DoS, DDoS);
• Unauthorized use of data processing and storage systems;
• Data compromise;
• Asset compromise;
• Internal/external unauthorized access;
• Creation and distribution of malicious software;
• Breach of information security policies;
• Phishing and unlawful brand use online;
• Online banking fraud and electronic payment systems.
CERT-GIB Europe - North America - Asia
                                                                                      CERT-GIB
                                                        CERT-GIB                      Vladivostok:
                                                        Moscow:                       GMT+10
                CERT-GIB                                GMT+4
                New York:
                GMT-5

                                                                            CERT-GIB
                                                                            Singapore:
                                                                            GMT+7




First 24/7 CERT in              Expanding global presence          Immediate response to all         .RU, .РФ, .SU: unique
Eastern Europe                  Europe  North America  Asia      types of security threats:        capabilities
CERT-GIB is the first Eastern   – for smooth and comprehensive     Phishing, Spam, Scam, DDoS        Official ccTLD.ru-assigned
European 24/7 Computer          incident handling                  attacks, malware, etc.            expert organization to fight
Emergency Response Team,                                                                             phishing, malware, and
and the first private CERT in                                                                        botnets, authorized to take
Russia                                                                                               actions against suspicious
                                                                                                     activities in RU, РФ and SU
                                                                                                     domain zones.
Commendations from Law Enforcment officials
References




*translated references and commendations are available per customer request
Media about us

Weitere ähnliche Inhalte

Was ist angesagt?

Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Security B-Sides
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsSteven SIM Kok Leong
 
Future-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsFuture-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsSteven SIM Kok Leong
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Anindya Ghosh,
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guideYury Chemerkin
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceTrend Micro
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromiseCMR WORLD TECH
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_finalCMR WORLD TECH
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010graywilliams
 
Damballa automated breach defense june 2014
Damballa automated breach defense   june 2014Damballa automated breach defense   june 2014
Damballa automated breach defense june 2014Ricardo Resnik
 
ISACA Houston Texas Chapter 2010
ISACA Houston Texas Chapter 2010ISACA Houston Texas Chapter 2010
ISACA Houston Texas Chapter 2010Ulf Mattsson
 
Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics EMC
 
Responding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksResponding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksIBM
 
Five IDS mistakes people make
Five IDS mistakes people makeFive IDS mistakes people make
Five IDS mistakes people makeAnton Chuvakin
 
2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecurity2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecuritySvetlana Belyaeva
 

Was ist angesagt? (20)

Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threats
 
Future-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsFuture-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical Threats
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS Compliance
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromise
 
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
DamballaOverview
DamballaOverviewDamballaOverview
DamballaOverview
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_final
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010
 
Damballa automated breach defense june 2014
Damballa automated breach defense   june 2014Damballa automated breach defense   june 2014
Damballa automated breach defense june 2014
 
ISACA Houston Texas Chapter 2010
ISACA Houston Texas Chapter 2010ISACA Houston Texas Chapter 2010
ISACA Houston Texas Chapter 2010
 
Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics
 
Responding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksResponding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacks
 
Sophos
SophosSophos
Sophos
 
Five IDS mistakes people make
Five IDS mistakes people makeFive IDS mistakes people make
Five IDS mistakes people make
 
2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecurity2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecurity
 

Andere mochten auch

Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceDr David Probert
 
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...Ethan S. Burger
 
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsNATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsBenjamin Rohé
 
Analytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber securityAnalytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber securityBoston Global Forum
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...Boston Global Forum
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictZsolt Nemeth
 
On Cyber
On Cyber  On Cyber
On Cyber grugq
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Andere mochten auch (10)

Ht f42
Ht f42Ht f42
Ht f42
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
 
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
 
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsNATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-Ups
 
Analytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber securityAnalytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber security
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber Conflict
 
On Cyber
On Cyber  On Cyber
On Cyber
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Ähnlich wie Security assessment for financial institutions

Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021lior mazor
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security IntelligenceSplunk
 
Building a cybersecurity strategy for growing companies (IDC Day 2022 - Tashk...
Building a cybersecurity strategy for growing companies (IDC Day 2022 - Tashk...Building a cybersecurity strategy for growing companies (IDC Day 2022 - Tashk...
Building a cybersecurity strategy for growing companies (IDC Day 2022 - Tashk...Vsevolod Shabad
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)WAJAHAT IQBAL
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032PECB
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTSimone Onofri
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 sucesuminas
 
Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6hymasakhamuri
 
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowIBM Security
 
iViZ Security : On Demand Penetration Testing
iViZ Security : On Demand Penetration TestingiViZ Security : On Demand Penetration Testing
iViZ Security : On Demand Penetration TestingiViZ Techno Solutions
 
Road map for actionable threat intelligence
Road map for actionable threat intelligenceRoad map for actionable threat intelligence
Road map for actionable threat intelligenceabhisheksinghcs
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04Kyle Lai
 
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Kyle Lai
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceNISIInstituut
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk
 
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)Cognitive Security - Anatomy of Advanced Persistent Threats ('12)
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)Gabriel Dusil
 
Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Ferenc Fresz
 

Ähnlich wie Security assessment for financial institutions (20)

Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
Building a cybersecurity strategy for growing companies (IDC Day 2022 - Tashk...
Building a cybersecurity strategy for growing companies (IDC Day 2022 - Tashk...Building a cybersecurity strategy for growing companies (IDC Day 2022 - Tashk...
Building a cybersecurity strategy for growing companies (IDC Day 2022 - Tashk...
 
CRI Cyber Board Briefing
CRI Cyber Board Briefing CRI Cyber Board Briefing
CRI Cyber Board Briefing
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APT
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6
 
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
 
R u hacked
R u hackedR u hacked
R u hacked
 
iViZ Security : On Demand Penetration Testing
iViZ Security : On Demand Penetration TestingiViZ Security : On Demand Penetration Testing
iViZ Security : On Demand Penetration Testing
 
Road map for actionable threat intelligence
Road map for actionable threat intelligenceRoad map for actionable threat intelligence
Road map for actionable threat intelligence
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
 
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
 
New Horizons SCYBER Presentation
New Horizons SCYBER PresentationNew Horizons SCYBER Presentation
New Horizons SCYBER Presentation
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
 
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)Cognitive Security - Anatomy of Advanced Persistent Threats ('12)
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)
 
Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0
 

Kürzlich hochgeladen

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Kürzlich hochgeladen (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Security assessment for financial institutions

  • 1. Security Assessment for Financial Institutions
  • 2. Group-IB history Group-IB is Acquisition International Creation of Dedicated Certified founded by Leta Group Expansion CERT-GIB Professionals 60+ employees 2012 2003 2010 2011 2011 Stages of Company Development Leader on the Russian Various service packages Skolkovo resident First 24/7 CERT in market Pre-incident consulting; The CyberCop project, an Eastern Europe The first and only company Response; integrated system for CERT-GIB is the first private in the CIS providing Forensics; counteracting cybercrime. Computer Emergency comprehensive services in Investigation; Response Team in Russia. investigation of the security Legal support; incidents. Post-incident consulting.
  • 3. Our key Customers * completed project samples are available per customer request
  • 4. Group-IB services for Financial Institutions  Security analysis + penetration testing  Offensive security services  Computer Forensics & Investigations  Malware intelligence  Security incident response & Managed security services  Botnet Monitoring (Zeus, SpyEye, Carberp, etc.)  DDOS-attack protection service
  • 5. Banking & E-Commerce vulnerabilities specifics  As a result of PCI DSS / PA DSS is rarely facing a "classical" WEB- application vulnerabilities (SQL Injection, XSS, Local File Inclusion)  WAF (WEB-Application Firewall) is widely used, however it is rarely set up and maintained properly;  Complicated applications, large dynamic changes, the use of third- party and borrowed applications and plugins;  Various attacks on the client, initially located in the untrusted environment (ActiveX-objects vulnerabilities at the client-side, client-side vulnerabilities, inefficient Information protection measures)
  • 6. Penetration testing Traditional approaches  «Black box» model  «Grey box» mode  «White box» model Informal testing options and qualification - Developing exploits for vulnerabilities in online-banking software - Using of «zero-day» vulnerabilities in client-side / server-side - Own software security lab with more then 20 public advisories in bugtracks - Use of social engineering and individual tactical approaches - We provide detailed report and free of charge consulting services
  • 7. «PCI Compliance does not equal security» HDFC Bank / Blind SQL-Injection; (CVSS Base Score - 9.0) http://www.hdfcbank.com
  • 8. XSS exotics – RBS customer is under attack HTML5 Canvas capabilities / JQuery and XSS vectors vulnerabilities (taking a screenshot + keystrokes interception in the context of the session)
  • 9. Analysis of the protection measures A trusted environment - may also contain a vulnerability ( ZTIC detachable devices - Zone Trusted Information Channel) Checkpoint Abra Multiple Vulnerabilities http://www.exploit-db.com/exploits/19716/ - Group-IB’s Advisory Sample built-in ACL-list (F:PWCdatasandbox-persistence.ref ): <Execute OriginalName="calc.exe" PathName="calc.exe" AppName="Microsoft Calculator" UIDescription="Microsoft Calculator" id="134"/> «Dirty» security trick (after shutting of the Windows File Protection ): takeown /f <file_name> icacls <file_name> /grant %username%:F icacls <file_name> /grant *S-1-1-0:(F)
  • 11. Network architecture misconfiguration errors Gathering information from the internal infrastructure of the bank Line format: <STX><message><ETX><checksum_character> Tixi HSM-HNG Modem for Mitsubishi FX Remote Access
  • 12. Information security integration services  Security Information and Event Management solutions (SEM, SIM and SIEM)  Implementation of Intrusion Detection and Prevention systems (IDS/IPS)  Implementation of Data Leakage Prevention systems (DLP) and their legal support  SOC’s & Managed security services (MSS)
  • 13. Computer Forensics Forensic examination:  Restores the chronology of security events  Reveals signs of internal employees involvement  Disclose details of the committed theft in online banking
  • 14. Investigations Typical cases:  Theft involving employees of the affected organizations  Theft with the use of malicious software (Trojans)  Theft involving the substitution of the transaction details sent by e-mail
  • 15. Investigations Steps of the RBS incident investigation:  Search for signs of involvement (gathering evidence) of internal staff (based on the results of forensic investigations)  Identify bot network control panels and search for links to other information security incidents  Identification of individuals providing additional services to the attacker  Getting detailed information about the structure of the control panel bot network and to obtain evidence of its use in a particular fraud in online banking Defining a person controlling the bot-network, and its actual location  Gathering data in the form of a set of documents to be sent to law enforcement and legal authorities
  • 16. Investigations Resources used and sources of information gathering:  Distributed network of HoneyNet traps  Forensic investigation cases database  Malicious software research database  All time theft cases database, collected by Group-IB staff  Details on phishing sources  Previous investigation outcomes  Operational information & OSINT  Links to organizations involved in investigations in 48 countries
  • 17. DDoS attacks investigations As part of the investigation you get a detailed report on progress, as well as all necessary information and documentation:  Get the exact location of the botnet’s control center;  Malicious code sample reversing;  Details on individuals involved in a DDoS attack;  A set of documents to hand the case over the law enforcement.
  • 18. Successful cases and projects «Grum botnet shutdown, kills 20 percent of worldwide spam» http://blog.fireeye.com/research/2012/07/grum-botnet-no-longer-safe-havens.html
  • 19. Successful cases and projects Joint operation with Microsoft on arrest of Leo Kuvaev http://krebsonsecurity.com/tag/group-ib/
  • 20. Successful cases and projects «Russian Authorities Arrest 6 More Members of the Carberp Gang» http://www.sbrf.ru/en/presscenter/all/index.php?id114=11018427
  • 21. DDoS protection services HTTP Protection Technology Proxifying Internal routing External routing Client Group-IB’s network filtering platform
  • 22. DDoS protection services HTTP/HTTPS Protection Technologies Visitors Group-IB’s Client gateway Routing Client’s router Group-IB’s network filtering platform
  • 23. Security Incident response & MSS The response to an information security incident is carried out by highly qualified professionals who are confronted daily with a variety of incidents, such as attacks on a web site, online banking system, or another information asset. Each incident is unique and requires an individualized approach, that’s why we have a dedicated forensic team of professionals and a certified CERT to meet the most exacting customer requirements. Our 24/7 CERT-GIB Team respond to all sort of threats: • Denial of services attacks (DoS, DDoS); • Unauthorized use of data processing and storage systems; • Data compromise; • Asset compromise; • Internal/external unauthorized access; • Creation and distribution of malicious software; • Breach of information security policies; • Phishing and unlawful brand use online; • Online banking fraud and electronic payment systems.
  • 24. CERT-GIB Europe - North America - Asia CERT-GIB CERT-GIB Vladivostok: Moscow: GMT+10 CERT-GIB GMT+4 New York: GMT-5 CERT-GIB Singapore: GMT+7 First 24/7 CERT in Expanding global presence Immediate response to all .RU, .РФ, .SU: unique Eastern Europe Europe  North America  Asia types of security threats: capabilities CERT-GIB is the first Eastern – for smooth and comprehensive Phishing, Spam, Scam, DDoS Official ccTLD.ru-assigned European 24/7 Computer incident handling attacks, malware, etc. expert organization to fight Emergency Response Team, phishing, malware, and and the first private CERT in botnets, authorized to take Russia actions against suspicious activities in RU, РФ and SU domain zones.
  • 25. Commendations from Law Enforcment officials
  • 26. References *translated references and commendations are available per customer request