Top Banner
“Menschenkenntnis ” and Cyber Security Thomas George International Business Manager - cyscon GmbH
32

OWASP Ukraine Thomas George presentation

Aug 23, 2014

Download

Internet

uisgslide

OWASP Ukraine Thomas George presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: OWASP Ukraine Thomas George presentation

“Menschenkenntnis” and Cyber

SecurityThomas George

International Business Manager - cyscon GmbH

Page 2: OWASP Ukraine Thomas George presentation

Who are Cyscon?• Founded 2001 by Thorsten Kraft

• Cyber Security Consulting

• Founding Member of Botfrei and ACDC Project.

• Official Partner of BSI - German Federal Office for Information Security

• 2010 - Conficker Takedown

• 2013 - Check & Secure - Private User Initiative

Page 3: OWASP Ukraine Thomas George presentation

Working Relationshipscyscon works with a variety of partners in the IT

Security world. These include:

• Internet Service Providers, including Vodafone and 1&1 Telecom

• Banks, such as Deutsche Bank and Postbank

• Law enforcement, including FBI and Europol

• NGOs, including Stop.Think.Connect - Funded by the Department of Homeland Security

Page 4: OWASP Ukraine Thomas George presentation

Knowing your Enemy

How cyscon gets its data.

Page 5: OWASP Ukraine Thomas George presentation

Sinkholing

• 80 Million Events per day

• 42 Different Types of Malware recognised

Page 6: OWASP Ukraine Thomas George presentation

Honeypots and Spam Traps

• 3.5 Million Spam Emails Per Day

• Honeypots installed on real systems by our customers

• 40,000 New Malicious URLs Each Day

Page 7: OWASP Ukraine Thomas George presentation

Web Crawling

• Systems Continually Crawling the Web

• 16 Different Settings - Chilled to Paranoia

• Analysing Behaviour and AV Detection

Page 8: OWASP Ukraine Thomas George presentation

The Data Toilet• Gathering Data since 2006

• Enriching Data with Meta Data

• More than 20,000 Sensors

• More than 50 Partners

• WHOIS, SSH HOSTKEY, DNS details, etc.

Page 9: OWASP Ukraine Thomas George presentation

What goes in?

Page 10: OWASP Ukraine Thomas George presentation

Where Does it All Go?• Data is sent to ISPs

• AND / OR

• Anonymised and Sent to Law Enforcement, Research or Industry

Page 11: OWASP Ukraine Thomas George presentation

Internet Service Providers

Sensor

Sensor

Concentrator

ConcentratorSensor

SensorSensor

SensorSensor

Sensor

Anonymisation

Law Enforcement Agencies

Research

Industry

Detection Supporting

Page 12: OWASP Ukraine Thomas George presentation

Flushing the Toilet

• Okay…we have the data.

• Let’s Make Some Money!

Page 13: OWASP Ukraine Thomas George presentation

Menschenkenntnis in Business

Wer keine Menschenkenntnis hat, hat als Kaufmann bereits verloren

Page 14: OWASP Ukraine Thomas George presentation

Flexibility

• Knowing what customers want

• Using trust and Existing Relationships

• Knowing when to work for free

Page 15: OWASP Ukraine Thomas George presentation

BanksIts All About the Money

Page 16: OWASP Ukraine Thomas George presentation

What is Hurting?

• Losing Money

• Losing More Money

• Losing Even More Money

• Losing Reputation

Page 17: OWASP Ukraine Thomas George presentation

How do Banks (and their customers) lose money?

• Redirection of Payment

• Identity Theft through Trojan Infection

• Direct Phishing Scams

Page 18: OWASP Ukraine Thomas George presentation

Technical Overview - Banking Services

Threat Detection, Mitigation, Prevention

Page 19: OWASP Ukraine Thomas George presentation

Malware Detection• Identification of infected customers

• More than 40 Trojan Families - 4000 events per second.

• JSON Format - Easy to implement and process

• Can be combined with sales of Malware Deletion Product.

Page 20: OWASP Ukraine Thomas George presentation

Malicious Traffic Mitigation

• Access to C-SIRT Database and Cyber Threat Detection Cloud

• Database fed by Worldwide sensors of Malicious Traffic

• Eliminates Cyber Attacks against banking platforms.

Page 21: OWASP Ukraine Thomas George presentation

Brand Protection• Fully automated takedown service

• Detection, Blocking, Blacklisting

• Normal process time, 2 hours

• Excellent contacts to ISPs for quick takedowns

Page 22: OWASP Ukraine Thomas George presentation

Menschenkenntnis in the Community

“Love thy Neighbour”

Page 23: OWASP Ukraine Thomas George presentation

Two Sides of the Story

• How much can experts do without end users?

• GameOver Zeus Takedown - Pointless?

• “Slipping through the net”

Page 24: OWASP Ukraine Thomas George presentation

The Cyber Vaccination

• Appears as analysis system from AV industry.

• Protection against MITB attacks and identity theft.

• Works on 10 different browsers.

• Free to use - One time installation.

• Attack interception - Malicious code cannot be executed.

• “Panic Switch” when intruder is detected.

Page 25: OWASP Ukraine Thomas George presentation
Page 26: OWASP Ukraine Thomas George presentation

HitmanPro: A Second Opinion Scanner

• Behavioural analysis - not signature based.

• 10MB file, can boot from USB.

• Complement to existing AV programs

• 30 Day free trial for emergency cases.

Page 27: OWASP Ukraine Thomas George presentation
Page 28: OWASP Ukraine Thomas George presentation
Page 29: OWASP Ukraine Thomas George presentation

Case Study:Cyber Alliance of

Switzerland

How can the “Check & Secure” Technology be Implemented by Banks?

Page 30: OWASP Ukraine Thomas George presentation

Concept and Goals• Making Switzerland into the “Cleanest

Internet Country in the World

• Identification and Help for Infected End Users

• Support for the deletion of malware and securing of end user systems with Check & Secure and End User Products.

Page 31: OWASP Ukraine Thomas George presentation

Realisation• Banking Partners: Credit Suisse, Raffeisen,

Postfinance and UBS.

• Internet Service Partners: Swisscom, Sunrise, UPC

• Creation of a shared Malware database.

• Planned Launch 1.8.2014.

Page 32: OWASP Ukraine Thomas George presentation

Thank you for Listening• [email protected]

• +491733853804