Top Banner
SESSION ID: SESSION ID: #RSAC Alex Holden Hackers Interrupted CCT-W05 Chief Information Security Officer Hold Security, LLC @HoldSecurity
29

Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

May 01, 2018

Download

Documents

vudat
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

SESSION ID:SESSION ID:

#RSAC

Alex Holden

Hackers Interrupted

CCT-W05

Chief Information Security OfficerHold Security, LLC@HoldSecurity

Page 2: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSAC

Understanding Hackers

2

Why is this important?

Can this stop cyber crime?

Transcending technology

Page 3: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSAC

What Drives a Hacker?

3

HACKTIVISM REVENGE STATE-SPONSORED

FOR-PROFIT CRIME

Page 4: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSAC

Modern Hacker

4

Page 5: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSAC

What is a Threat to You

5

Defamation and Reputation Loss

Stolen Secrets

Stolen Data

Availability

Page 6: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSAC

Learn to be a Hacker

6

Carding UniversityVirtual Carding Basics

Hacker University

Job After Graduation

Professor’s Insight

Page 7: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSAC

Hackers’ View of Us

7

Tessa88: Foreignersthe common folkI despise themthey are garbage to me

War of stereotypes“I’m fighting a holy war against the West… They drive their Rolls Royce's and go home to their million-dollar houses, while people here are struggling. I will never harm my fellow Slavs; but America, Europe, and the rest of the world deserve it.”

- aqua (jabberzeus)

Page 8: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSAC

Target Retail Stores Breach

8

Kartoxa POS Malware author - Rinat Shabaev was looking for a regular job programming, asking for about 12 USD per hour. After failing to find a job, he is recruited to write a virus that steals financial data from 40 million victims.

Page 9: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSAC

Target Breach – Delivery Man

9

Page 10: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSAC

Target Breach

10

Page 11: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSAC

Extortion - Ransomware

11

Page 12: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSACSan Francisco Municipal Transport Agency Ransomware Attach

12

What Happened?

Hacker Techniques

Who Is To Blame?

How To Defend?

Page 13: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSAC

The Russians Did It

13

Yandex Mail Messages

Russian Phone Numbers

х Language Preferences

х Access Techniques

Page 14: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSAC

Hackers Setup

14

Discovery and Attack ServerScan the Internet

Exploit

Explore

Infection Server

Extort and Communicate

Page 15: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSAC

San Francisco Light Rail Ransomware

15

Metropolitan area railroad transportation system paralyzed from Ransomware attack sourced from Iran

Page 16: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSAC

Target the Internet

16

Scans of 4.0.0.0/8 network (Layer 3)Scan of 75.0.0.0/11 network (AT&T)

Found 75.10.2xx.xxx target SFMTA Oracle Primavera Server

Exploited vulnerability

Identified a network with 8,000+ systems

Continued scanning US, Iran, and other networks.

Page 17: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSAC

Tessa88

17

Page 18: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSAC

Who is the Real Tessa88?

18

Hacker sells stolen credentials from major breaches. Creates instability by exposing billions of accounts, and lying about Twitter and Yahoo breached data.

Page 19: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSAC

Graduation to a Criminal

19

Resume

Petty Crimes

Crime & Punishment

Graduation

Page 20: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSAC

Drugs

20

HiroshimaAlso called “Atomic Bomb” or “Atomic Blast”

Contains synthetic cannabinoid products like JWH-018

Page 21: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSAC

2014 – Drug Runner

21

Page 22: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSAC

While in Prison

22

I see a dreamI am DROWNING

My heart beats fastI want to ESCAPETake a deep breath

This is only a dreamOnly a NIGHTMARE

I see myselfI am a bird flying so high

I wake up I am still in SHOCK

White pillowBed CAGEI am LOCKED UP

My mood is dimWorld disappeared This is my reality now

Page 23: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSAC

Yahoo – Summer 2016

23

July sampleFake sale

Page 24: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSAC

Malware Tech – Marcus Hutchins

24

Transformation from hacker to a security researcher

2009 – Selling password stealers and scareware

2012-2014 – Distribution and reselling of viruses and exploit kits

2014 – Emergence of a researcher alter ego

2017 – Accidental discovery of WannaCry killswitch.

Page 25: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSAC

Understanding Hackers

25

Hackers are human with faults

Hackers are ruthless

Hackers are innovative

Understanding the human side of a hacker leads to improvement of our defenses

Page 26: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSAC

Defense Techniques

26

Learn about your enemy

Tune your defenses toward the threat

Fortify against hackers NOT auditors

Page 27: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSAC

Defenses 101

27

Viruses

Credentials Misconfigurations

0days

Page 28: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSAC

Using Knowledge to Discourage Hackers

28

Increase complexity required for an attack to make your infrastructure the most unhospitable and fruitless for an attacker.

Create HoneyPots in systems, applications, functions, and data as early identifiers for on-going attacks or exploitations.

Use Threat Intelligence as a defense technique. Understand the Dark Web. Stay ahead of the adversary by adapting your defenses to their attack techniques.

Page 29: Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime & Punishment ... Use Threat Intelligence as a defense technique. Understand the Dark

#RSAC

Conclusions

29

Hackers are winning

We are improving

Understanding our adversary is the key