+ All Categories
Home > Technology > How I'd hack into your business and how you can stop me!

How I'd hack into your business and how you can stop me!

Date post: 14-Jan-2015
Category:
Upload: avg-technologies-au
View: 1,902 times
Download: 0 times
Share this document with a friend
Description:
See firsthand how hackers would attack your business and learn effective countermeasures for peace of mind.
Popular Tags:
52
Michael McKinnon, Security Advisor [email protected] | @bigmac How I’d hack into your business, and how you can stop me!
Transcript
Page 1: How I'd hack into your business and how you can stop me!

Michael McKinnon, Security [email protected] | @bigmac

How I’d hack into your business, and how you can stop me!

Page 2: How I'd hack into your business and how you can stop me!

AVG Confidential2

What are we looking at today?

What sort of business do you have?

Ask questions!

We are all here to prosper

together.

Page 3: How I'd hack into your business and how you can stop me!

AVG Confidential

Overview

Introduction• Who is AVG?• What data are you protecting in your business?

Common hack tactics• Phishing, Wireless Networks, Website

vulnerabilities• Malicious links, Mobile devices, Automated scans

Security, it’s a way of thinking• Protect, Detect and Correct• Staying in the “know” when it comes to security.

3

Page 4: How I'd hack into your business and how you can stop me!

AVG Confidential

Top line statistics in Australia

During 2012

• 5.4 million Australians fell victim to cyber crime

• Estimated cost to the economy $1.65 billion

• 250 Businesses surveyed found 1 in 5 were victims

• No mandatory disclosure laws means the problem may well be much bigger

4

Page 5: How I'd hack into your business and how you can stop me!

AVG Confidential

Business - How vulnerable are you?

victims were targets of opportunity

attacks were not highly difficult

took two-weeks or more to discover

79%96%85%

Is your business MORE or LESS vulnerable than the business next door?

Source: Verizon Data Breach Investigations Report 2012

5

Page 6: How I'd hack into your business and how you can stop me!

AVG Confidential

The solutions are NOT expensive

6

Page 7: How I'd hack into your business and how you can stop me!

AVG Confidential7

Tonight is all about the easy wins

80%

20%

Page 8: How I'd hack into your business and how you can stop me!

Who would hack your business, and why?

Page 9: How I'd hack into your business and how you can stop me!

AVG Confidential9

Motive & opportunity

The ability for anyone to attack your business is always based on two factors:

• How much they want to (their motive)

• How easy it would be to do (their opportunity)

When your business is connected to the Internet:

• Motivations are magnified by currency exchange rates in poorer countries – something you don’t value is worth much more.

• Opportunity is provided through instant electronic connectivity anywhere in the world. Can be so tempting, that motivation sometimes is hard to identify!

Page 10: How I'd hack into your business and how you can stop me!

AVG Confidential10

Types of attackers

Targeted Attackers

Garden Variety Cybercriminals

Page 11: How I'd hack into your business and how you can stop me!

AVG Confidential11

Motives - Follow the money

• Cybercriminals tend to “follow the money”

• So, the types of attack are often predictable

• Credit card data• Private customer information• Refund / returns policy• Bank accounts• Financial processes

• Think about the money leavingthe business…

Page 12: How I'd hack into your business and how you can stop me!

AVG Confidential12 AVG Confidential

Example – Stealing POS transaction data

• Lots of examples in the news…

http://www.cio.com.au/article/436663/two_romanians_plead_guilty_point-of-sale_hacking/

Page 13: How I'd hack into your business and how you can stop me!

AVG Confidential13

Motives – Using your reputation

• When money isn’t available, you are the stepping stone

• You could be related to the “real” target

• So, the types of attack change slightly

• Installing links on your website to snare visitors• Private Customer Information• Phishing attacks using your e-mail• Passing themselves off as your business

• The damage to your reputation could last a life time

Page 14: How I'd hack into your business and how you can stop me!

Types of attack

Page 15: How I'd hack into your business and how you can stop me!

AVG Confidential15

Common types of attack

* Source: Verizon Data Breach Investigations Report 2012

How many involve the incorrect use of passwords? 5 out of 10

Page 16: How I'd hack into your business and how you can stop me!

AVG Confidential16

Malware / Trojans

• Common varieties that cause general havoc(Fake antivirus, ransomware)

• Retail / POS specific – “RAM Scrapers”(Designed to exflitrate transaction data)

• Remote Control Trojan or Rootkit(Designed to remain hidden for future access)

Page 17: How I'd hack into your business and how you can stop me!

AVG Confidential17

Hacking

• When combined with custom written malware, this is highly-targeted and designed to avoid detection and remain in place for a long time.

• In 2011, Verizon reported that 81% of incidents utilised some form of hacking.

Page 18: How I'd hack into your business and how you can stop me!

Attack vectors

Page 19: How I'd hack into your business and how you can stop me!

AVG Confidential19

#1. Default passwords

1. The user manual says:

“Step 1. Change the default password”

2. Far too common that these are not changed, or they’re changed to someone else’s “default” password (which is widely known)

Page 20: How I'd hack into your business and how you can stop me!

AVG Confidential20

Passwords – Back to basics!

What should we aim for in a password?

• Should be easy for you to remember

• Should be hard for someone else to guess (and

“brute-force”)

Page 21: How I'd hack into your business and how you can stop me!

AVG Confidential21

Passwords – World’s top 10 most used

• 123456

• 123456789

• Password

• 12345678

• 654321

• Password1

• Password123

• 1234567

• abc123

• Qwerty

Page 22: How I'd hack into your business and how you can stop me!

AVG Confidential22

Can someone guess your password?

• Favourite football team?• Pet’s name?• Family members?

Page 23: How I'd hack into your business and how you can stop me!

AVG Confidential23

Rank these passwords in order of strength…

1. E56#av+Yb!

2. Password123

3. aaaaaAAAAA#####43

4. 123456

5. lucasjames

MOST SECURE

Page 24: How I'd hack into your business and how you can stop me!

AVG Confidential24

Why? Anatomy of a good password

• The password: aaaaaAAAAA#####43

• It is 17 characters in length

• Contains upper and lowercase letters

• Contains numbers

• Contains the ‘#’ symbol

• How many combinations?

• 72 combinations, 17 combinations long is 72^17

• That’s 37 thousand billion billion billion combinations!

Page 25: How I'd hack into your business and how you can stop me!

AVG Confidential25

Password separation

• Make new passwords for different accounts you access…

• Start with your “base” password (aaaaaAAAAA#####43)

• “Facebook” – you could take the letters “f” and “b” from Facebook and create a new password:

• aaaaaAAAAA#####43fb

• “Twitter” – you could take the letters “t” and “r” from Twitter and create another password:

• aaaaaAAAAA#####43tr

• Mix it up! Be creative! And don’t use these examples!

Page 26: How I'd hack into your business and how you can stop me!

AVG Confidential26

The golden rules of passwords

• Never, never, ever give your password to someone else!

• Absolute minimum of 15 characters

• Use a combination of different characters

• Upper and lowercase (a – z, A – Z)

• At least one numeral ( 0 – 9 )

• At least one symbol ( !@#$%^&*()_+= )

• Password length is always better than randomness

• Must be easy for you to remember

Page 27: How I'd hack into your business and how you can stop me!

AVG Confidential27

#2. Your vulnerable website

• Websites are being compromised too frequently, especially:

• Wordpress, Joomla and others

• Is your website password also used elsewhere?

• Examples of impact to your business could be:

• Theft of credit card details if you have a shopping cart

• Stolen credentials can be used to access other systems

• Visitors to your website can be infected/snared into other scams

• Your website could be implicated in spam or phishing attacks

• Get your website updated or tested.

Page 28: How I'd hack into your business and how you can stop me!

AVG Confidential28

#3. Insecure wireless networks

• Wireless networks are convenient

• But poorly configured they represent a huge security risk!

• Data packets can be “sniffed” by nearby attackers

Page 29: How I'd hack into your business and how you can stop me!

AVG Confidential29

Secure your wireless networks

• Amazing how many are insecure – including my GP!

• Never use “WEP”, always use “WPA” or “WPA2”

• Wireless password should be very long and NOT easy to remember (okay to write it down somewhere safe)

• When using public WiFi networks, it’s always better to use password protected ones rather than “open” wireless networks – easy for criminals to “sniff” the traffic

Page 30: How I'd hack into your business and how you can stop me!

AVG Confidential30

#4. Incorrect internet banking

• Many businesses I speak with are using “Consumer” grade

Internet banking

• Not secured with two-factor authentication

• Sharing logins with bookkeepers etc. (no ability to separate

permissions – i.e. who can transfer money?)

• SOLUTION: Talk to your bank!

• General security when accessing Internet banking

• Never from an unprotected computer – keyloggers etc.

• Always bookmark the Bank URL with https://…

Page 31: How I'd hack into your business and how you can stop me!

AVG Confidential31

Internet banking – Two-factor authentication

• Insist on “Two-factor” authentication for business Internet banking; either a security token (preferred) or an SMS response code.

• Contact your bank ASAP if you find anything unusual

Page 32: How I'd hack into your business and how you can stop me!

AVG Confidential32

#5. Phishing, spear phishing & whaling

• Sending of specially crafted e-mails to trick users into divulging sensitive information

• “Click here to see the details of your order” –> (login page)

• Does your e-mail use anti-spam to stop these? What about the ones that it won’t stop?

Page 33: How I'd hack into your business and how you can stop me!

Scammers & spammers

Page 34: How I'd hack into your business and how you can stop me!

AVG Confidential34

Rogue scanners & fake antivirus

Page 35: How I'd hack into your business and how you can stop me!

AVG Confidential35

Fake antivirus – Nag screens and pop-ups

Page 36: How I'd hack into your business and how you can stop me!

AVG Confidential36

Ransomware – Your PC is blocked…

“Australian Federal Police” labeled Ransomware – first appeared late September 2012

Page 37: How I'd hack into your business and how you can stop me!

AVG Confidential37

Scams – Fake Telstra emails

Page 38: How I'd hack into your business and how you can stop me!

AVG Confidential38

Scams – Fake Facebook emails

* Received by AVG on 7 August 2012

Page 39: How I'd hack into your business and how you can stop me!

AVG Confidential39

Social engineering – Getting you to click

Page 40: How I'd hack into your business and how you can stop me!

AVG Confidential40

Big events – London 2012 games on YouTube

Page 41: How I'd hack into your business and how you can stop me!

AVG Confidential41

Mobile security – Rogue apps

• Trojan-infected version of ‘Angry Birds Space’ appeared in January 2012

• Malicious functionality can communicate with remote servers, install additional malware, botnet functions

• Only download from official app stores

Page 42: How I'd hack into your business and how you can stop me!

AVG Confidential42

SMS scams & extortion attempts

Page 43: How I'd hack into your business and how you can stop me!

AVG Confidential43

“Microsoft” acam – How the call starts

• …Microsoft had told them of the failure and that your system was in danger of crashing…

• …a Partner of Microsoft and Microsoft R&D, given information by your ISP that you are infected…

• …viruses being tracked back to your IP number…

• …have been commissioned by Microsoft to help people remove malware from infected systems…

• …My ID Number is XXX. We have been notified that your system is infected…

Page 44: How I'd hack into your business and how you can stop me!

Mobile security tips

Page 45: How I'd hack into your business and how you can stop me!

AVG Confidential45

Mobile security - What are the risks?

• Physical loss of the device, still the biggest risk

• Infection from malware and possible fraud

Page 46: How I'd hack into your business and how you can stop me!

AVG Confidential46

Mobile security – Physical risks

• Device locks• PIN numbers and/or passwords

• Can you locate your lost/stolen phone?• “Find My iPhone/iPad”

• Android solutions as well

Page 47: How I'd hack into your business and how you can stop me!

AVG Confidential47

Mobile Security - Protecting Mobile Data

• What data do you have on your devices?• Do an audit to find out!

• Classify your data and think about the consequences

• Does it need to be mobile?

• Device encryption available in latest mobile devices

Page 48: How I'd hack into your business and how you can stop me!

AVG Confidential48

Mobile security - Preventing mobile malware

• Use anti-malware on your mobile

• Don’t install apps from outside trusted marketplaces

• When installing apps always check permissions

• Never, ever hack your phone

• i.e. iPhone/iPad “Jailbreak” or Android “root”

• Limit/consider implications of clicking on links on a mobile device, especially via social networking sites

Page 49: How I'd hack into your business and how you can stop me!

49

Adopting a security mindset

Protect Detect Correct

Page 50: How I'd hack into your business and how you can stop me!

AVG Confidential50

Identify and classify your data

• Consider classifying all the data in your business into three areas:

• Top secret (if obtained could shut your business down)

• Classified (if obtained would cause embarrassment)

• Unclassified (everything else, brochures, publicly available)

• Your strategies around protecting your information will be much easier.

Page 51: How I'd hack into your business and how you can stop me!

AVG Confidential51

Summary

• Change default passwords, and use strong and long passwords, and separate them.

• Use strong two-factor authentication whenever you can.

• Always update your computers and mobile devices (use auto-update where possible).

• If you didn’t ask for it, don’t click the link. But if you do, make sure you’ve got software to detect and correct.

• And communicate this advice to your colleagues and staff and even customers! You’re only as secure as your weakest link.

Page 52: How I'd hack into your business and how you can stop me!

Thank you!

For more information please visit our website:www.avg.com.au/business

facebook.com/avgaunz twitter.com/avgaunz resources.avg.com.au


Recommended