+ All Categories
Home > Documents > Trends in Cyber Crime - ACAMSfiles.acams.org/pdfs/2015/ACAMS-CyberSecurity08-27-2015...2015/08/27...

Trends in Cyber Crime - ACAMSfiles.acams.org/pdfs/2015/ACAMS-CyberSecurity08-27-2015...2015/08/27...

Date post: 12-Oct-2020
Category:
Upload: others
View: 3 times
Download: 0 times
Share this document with a friend
19
Trends in Cyber Crime Ike Barnes, Secret Service
Transcript
Page 1: Trends in Cyber Crime - ACAMSfiles.acams.org/pdfs/2015/ACAMS-CyberSecurity08-27-2015...2015/08/27  · Trends in Cyber Crime Ike Barnes, Secret Service Actors Perpetrating Cyber Crimes

Trends in Cyber Crime Ike Barnes, Secret Service

Page 2: Trends in Cyber Crime - ACAMSfiles.acams.org/pdfs/2015/ACAMS-CyberSecurity08-27-2015...2015/08/27  · Trends in Cyber Crime Ike Barnes, Secret Service Actors Perpetrating Cyber Crimes

Actors Perpetrating Cyber Crimes

2

Page 3: Trends in Cyber Crime - ACAMSfiles.acams.org/pdfs/2015/ACAMS-CyberSecurity08-27-2015...2015/08/27  · Trends in Cyber Crime Ike Barnes, Secret Service Actors Perpetrating Cyber Crimes

Actors Perpetrating Cyber Crimes

3

Page 4: Trends in Cyber Crime - ACAMSfiles.acams.org/pdfs/2015/ACAMS-CyberSecurity08-27-2015...2015/08/27  · Trends in Cyber Crime Ike Barnes, Secret Service Actors Perpetrating Cyber Crimes

Actors Perpetrating Cyber Crimes

4

Page 5: Trends in Cyber Crime - ACAMSfiles.acams.org/pdfs/2015/ACAMS-CyberSecurity08-27-2015...2015/08/27  · Trends in Cyber Crime Ike Barnes, Secret Service Actors Perpetrating Cyber Crimes

Actors Perpetrating Cyber Crimes

5

Page 6: Trends in Cyber Crime - ACAMSfiles.acams.org/pdfs/2015/ACAMS-CyberSecurity08-27-2015...2015/08/27  · Trends in Cyber Crime Ike Barnes, Secret Service Actors Perpetrating Cyber Crimes

Actors Perpetrating Cyber Crimes

6

Page 7: Trends in Cyber Crime - ACAMSfiles.acams.org/pdfs/2015/ACAMS-CyberSecurity08-27-2015...2015/08/27  · Trends in Cyber Crime Ike Barnes, Secret Service Actors Perpetrating Cyber Crimes

Actors Perpetrating Cyber Crimes

7

Criminals

Spies

Activists

Page 8: Trends in Cyber Crime - ACAMSfiles.acams.org/pdfs/2015/ACAMS-CyberSecurity08-27-2015...2015/08/27  · Trends in Cyber Crime Ike Barnes, Secret Service Actors Perpetrating Cyber Crimes

Types of Attacks

8

Page 9: Trends in Cyber Crime - ACAMSfiles.acams.org/pdfs/2015/ACAMS-CyberSecurity08-27-2015...2015/08/27  · Trends in Cyber Crime Ike Barnes, Secret Service Actors Perpetrating Cyber Crimes

Tactics, Techniques, and Procedures

9

Presenter
Presentation Notes
Now that we’ve defined the actors, who are the victims? Financial institutions, retail stores and restaurants combined account for better than 60% of the breaches. 20% are accounted for by manufacturing, transportation, and utilities; And 20% are accounted for by professional services. By size approximately 60% of the breaches are directed against organizations of fewer than 1,000 employees and 40% are against organizations with more than 1,000 employees. This is a fairly even distribution between small and large. Let’s discuss which industries are typically targeted by which actors. Criminals target retail and food service establishments, as well as financial institutions because that is where the money is. Spies target industries which have proprietary information that gives them a competitive advantage in the market place. So, it follows that if you’re in manufacturing, transportation, or professional services, then you are more likely to be the target of espionage, because you have valuable proprietary information. Activists usually target the public sector and those in the information industry.
Page 10: Trends in Cyber Crime - ACAMSfiles.acams.org/pdfs/2015/ACAMS-CyberSecurity08-27-2015...2015/08/27  · Trends in Cyber Crime Ike Barnes, Secret Service Actors Perpetrating Cyber Crimes

TTP

10

Page 11: Trends in Cyber Crime - ACAMSfiles.acams.org/pdfs/2015/ACAMS-CyberSecurity08-27-2015...2015/08/27  · Trends in Cyber Crime Ike Barnes, Secret Service Actors Perpetrating Cyber Crimes

TTPInstallation of Malware Through Known Vulnerabilities

11

•Infiltration (malware/keyloggers/sniffers)•Aggregation •Exfiltration (email/servers)

Data Flow

Page 12: Trends in Cyber Crime - ACAMSfiles.acams.org/pdfs/2015/ACAMS-CyberSecurity08-27-2015...2015/08/27  · Trends in Cyber Crime Ike Barnes, Secret Service Actors Perpetrating Cyber Crimes

TTP

12

Page 13: Trends in Cyber Crime - ACAMSfiles.acams.org/pdfs/2015/ACAMS-CyberSecurity08-27-2015...2015/08/27  · Trends in Cyber Crime Ike Barnes, Secret Service Actors Perpetrating Cyber Crimes

TTP

13

Page 14: Trends in Cyber Crime - ACAMSfiles.acams.org/pdfs/2015/ACAMS-CyberSecurity08-27-2015...2015/08/27  · Trends in Cyber Crime Ike Barnes, Secret Service Actors Perpetrating Cyber Crimes

Phishing

14

Page 15: Trends in Cyber Crime - ACAMSfiles.acams.org/pdfs/2015/ACAMS-CyberSecurity08-27-2015...2015/08/27  · Trends in Cyber Crime Ike Barnes, Secret Service Actors Perpetrating Cyber Crimes

Phishing

15

Presenter
Presentation Notes
A little about phishing. Phishing works. People are going to click on links in emails, which will direct them to bogus websites, etc…..A scary statistic….two “spearphishing” campaigns directed at three individuals, run twice has a 80% success rate at getting someone to click on the link. So, it might be worthwhile to design mechanisms into your networks which restricts movement internally without the appropriate credentials.
Page 16: Trends in Cyber Crime - ACAMSfiles.acams.org/pdfs/2015/ACAMS-CyberSecurity08-27-2015...2015/08/27  · Trends in Cyber Crime Ike Barnes, Secret Service Actors Perpetrating Cyber Crimes

What Can I Do to Prevent Breaches?http://www.sans.org/critical-security-controls

16

Presenter
Presentation Notes
What Can I Do to Prevent? At this point, I am going to point you directly to the SANS Twenty Critical Controls, available at: http://www.sans.org/critical-security-controls/
Page 17: Trends in Cyber Crime - ACAMSfiles.acams.org/pdfs/2015/ACAMS-CyberSecurity08-27-2015...2015/08/27  · Trends in Cyber Crime Ike Barnes, Secret Service Actors Perpetrating Cyber Crimes

17

Page 18: Trends in Cyber Crime - ACAMSfiles.acams.org/pdfs/2015/ACAMS-CyberSecurity08-27-2015...2015/08/27  · Trends in Cyber Crime Ike Barnes, Secret Service Actors Perpetrating Cyber Crimes

Dark Web

18

Page 19: Trends in Cyber Crime - ACAMSfiles.acams.org/pdfs/2015/ACAMS-CyberSecurity08-27-2015...2015/08/27  · Trends in Cyber Crime Ike Barnes, Secret Service Actors Perpetrating Cyber Crimes

Recommended