Top Banner
Cyber Security Awareness Training Rob Shapland First Base Technologies LLP @rdshapland [email protected]
32

Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

Jun 06, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

Cyber Security Awareness Training

Rob Shapland

First Base Technologies LLP@[email protected]

Page 2: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

Rob Shapland

© First Base Technologies LLP 2018

• Ethical Hacker and Social Engineer at First Base

Technologies since 2008

• Physical intrusions of hundreds of different locations

• Published technical writer for TechTarget and

ComputerWeekly

• Cyber Security adviser for BBC and ITV

• Trained in Kidnap Escape and Evasion

• OCR Racer

Page 3: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

How to Hack a Company

© First Base Technologies LLP 2018

Social Engineering to gain physical access to a building and plant a remote access device

Email Phishing that looks like genuine correspondence tricks staff into installing malware or making large financial transactions to fake accounts

Ransomware infects your systems, demanding financial payment to release your files

Guessing Passwords to gain access to genuine user accounts on the network

Page 4: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

Equifax

© First Base Technologies LLP 2018

Page 5: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

1. Social engineering

2. Email phishing

3. Ransomware

4. Passwords

First Topic

© First Base Technologies LLP 2018

Page 6: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

What is Social Engineering?

Obtaining something by exploiting trust or the ignorance or

naivety of others

It works on the human factor

… frequently called “the weakest link”

© First Base Technologies LLP 2018

Page 7: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

Why Social Engineering?

Social engineering can be used to gain access to

any computer or any building

It’s the hardest form of attack to defend against

because hardware and software alone can’t stop it

© First Base Technologies LLP 2018

Page 8: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

Social Engineering Defence

• Make sure visitors are accompanied at all times

• All visitors must wear visitor badges. If you see someone who you do not recognise

don’t be scared to approach and question them

• Do not wear your ID badge openly when you leave the office

• Look out for people tailgating you into secure areas

© First Base Technologies LLP 2018

Page 9: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

Round Two

1. Social engineering

2. Email phishing

3. Ransomware

4. Passwords

© First Base Technologies LLP 2018

Page 10: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

Targeting Social Networks

© First Base Technologies LLP 2018

Page 11: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

Tips to Minimise your Exposure

• Don’t reveal personal or sensitive information via social media or blogs

• Set the privacy options on your social media, especially Facebook, Twitter and Instagram:

➢ Facebook – “Limit Past Posts” (Settings – Account Settings – Privacy – “Limit who can see past posts”)

➢ Twitter – “Protect my Tweets”

➢ Instagram – “Private Account”

• Don’t discuss confidential company information online

• Don’t ‘friend’ people on social media that you don’t know

Remember – what goes on the Internet, stays on the Internet!

© First Base Technologies LLP 2018

Page 12: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

Spear Phishing

• Spear phishing uses information taken from social media to target specific

individuals

• The email address of the sender can be faked to look like anything

• Most phishing is done via two methods: attachments and links

• Attachments are most commonly xls, doc, pdf or zip files. Once opened the hacker

can steal passwords or install viruses

• Malicious links will either take control of your PC once clicked, or trick you into

entering your password into a fake website that looks like Amazon/Facebook/Google

© First Base Technologies LLP 2018

Page 13: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

Real World Example – “Carbanak” Banking Attacks

• “Carbanak” group attacked banking institutions

• Started their attack with spear phishing emails

• Manual reconnaissance of the network, including recording everything typed by staff, and

video footage from CCTV and webcams, so the hackers can simulate real employee

transactions

• Large sums of money then transferred through ATMs, SWIFT network and by creating high

value bank accounts

© First Base Technologies LLP 2018

Page 14: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

Whaling / CEO Fraud

• Whaling is a technique that primarily targets finance staff

• The email appears to be from the CEO or CFO, using information

from LinkedIn or your website

• The scammers will use an email address that looks similar to the

real CEO’s address, or has an official sounding name

• The email usually asks for a bank transfer to be made

• The email will often be in three steps, the first email simply asking

if you are in the office

© First Base Technologies LLP 2018

Page 15: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

Defending against CEO Fraud

© First Base Technologies LLP 2018

• Always verify bank transfers by calling the relevant person in your company. Do

not use the phone number in the email.

• Check the email address of the sender

• Look for anything out of the ordinary:

➢ Do you normally receive bank transfer requests from this person?

➢ Do you recognise the payee name or account details, if they have revealed it?

➢ Is the email in the style and format you would expect?

Page 16: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

Tips to avoid email attacks

© First Base Technologies LLP 2018

1. Never respond to emails that ask you to click a link and enter your password

2. Check the email address of the sender. Look out for misspellings, different

endings to the address, or extensions, such as billing-apple.com

3. Be suspicious of emails with attachments or links from unrecognised sources.

Be especially aware of attachments that appear to be voicemail messages,

package delivery information (e.g. Amazon or Royal Mail) or invoices

4. If an email requests that you make a money transfer, always confirm directly

with the relevant person using an internal phone number.

Page 17: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

Round three …

1. Social engineering

2. Email phishing

3. Ransomware

4. Passwords

© First Base Technologies LLP 2018

Page 18: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

Ransomware

• Ransomware encrypts all files, including shared

drives, and demands a ransom payment to unlock

them. Recent example is an email pretending to be

a Royal Mail parcel delivery note and emails that

contain voicemails

• Recent examples are WannaCry and Petya

• Latest versions actively seeks backups in order to

destroy them first

© First Base Technologies LLP 2018

Page 19: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

NHS Ransomware

© First Base Technologies LLP 2018

• Spreads using a Windows vulnerability

• Seeks out any other device connected to the victim’s

computer

• Encrypts all files and demands a ransom payment of

$300 per computer

• Doubles the ransom if not paid in 3 days

• Unique due to the way it spreads

• The way it spreads was originally stolen from the NSA

• Bypassed anti-virus

Page 20: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

WannaCry Ransomware

© First Base Technologies LLP 2018

Page 21: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

Round four…

1. Social engineering

2. Email phishing

3. Ransomware

4. Passwords

© First Base Technologies LLP 2018

Page 22: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

Password ‘Quality’

© First Base Technologies LLP 2018

Page 23: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

A Secure Password?

1. Maggie1

2. !J3r3my

3. 6k5&R*Gz

4. I love green tomatoes

5. Password1

6. P@ssw0rd1

7. Oxford1984

© First Base Technologies LLP 2018

Page 24: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

Brute Force Results (using one laptop)

1. Maggie1 (1 hour)

2. !J3r3my (19 hours)

3. 6k5&R*Gz (2 months)

4. I love green tomatoes (25 septillion years) (25x1042)

5. Password1 (90 days)

6. P@ssw0rd1 (20 years)

7. Oxford1984 (27 years)

© First Base Technologies LLP 2018

Page 25: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

Brute Force Results (using a medium-sized botnet)

1. Maggie1 (instant)

2. !J3r3my (1 second)

3. 6k5&R*Gz (1 minute 7 seconds)

4. I love green tomatoes (99 quintillion years) (99x1030)

5. Password1 (2 minutes)

6. P@ssw0rd1 (2 hours)

7. Oxford1984 (2 hours)

© First Base Technologies LLP 2018

Page 26: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

Intelligent Dictionary Results

1. Maggie1 (unsafe: dictionary word + one or two digits)

2. !J3r3my (unsafe: leet speech + one character)

3. 6k5&R*Gz (requires brute force: 1 minute)

4. I love green tomatoes (99 quintillion years) (99x1030)

5. Password1 (unsafe: dictionary word + one or two digits)

6. P@ssw0rd1 (unsafe: leet speech + two digits)

7. Oxford1984 (unsafe: dictionary word + year)

© First Base Technologies LLP 2018

Page 27: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

• Use a random passphrase of 4-5 words that you can remember

• Misspell it on purpose

• Avoid passphrases based on common quotes or song lyrics

• Use a different passphrase for any website that holds your most personal

information, e.g. credit card details, bank accounts

• Don’t share passwords (or write them down!)

Password Tips

© First Base Technologies LLP 2018

Page 28: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

The Final Countdown …

1. Social Engineering

2. Email phishing

3. Password selection

4. Mobile phones and public wifi

5. Who would hack us?

© First Base Technologies LLP 2018

Page 29: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

Who May Attack and Why?

Criminal gangs to extort money by encrypting data

Competitors to steal key intellectual property

Nation states to steal intellectual property and gather intelligence

Anti-capitalist activists to steal and publish information

Activists and hacktivists aiming to cause disruption or embarrassment

Insiders with legitimate access stealing data for personal gain

© First Base Technologies LLP 2018

Page 30: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

Consequences of a Successful Attack

• Damage to brand and reputation

• Loss of customer confidence

• Reduction in market share

• Impact on business operations

• Fines

A successful cyber attack where personal details are stolen costs a

FTSE 100 company an estimated £120 million.

© First Base Technologies LLP 2018

Page 31: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

What can you do?

Security is everyone’s responsibility:

• Minimise your exposure online, e.g. by setting the privacy options on

social networks and being careful who you share with

• Be alert to phishing attacks, especially attachments and links

• Look out for unaccompanied visitors

• Change your password to a passphrase

• Report any incidents to IT

© First Base Technologies LLP 2018

Page 32: Cyber Security Awareness Training - CRELA · Real World Example –“Carbanak” Banking Attacks • “Carbanak” group attacked banking institutions • Started their attack with

© First Base Technologies LLP 2018

Questions?@[email protected]