Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime ...
Embed Size (px)
Transcript of Hackers Interrupted - RSA Conference Interrupted. CCT-W05. ... Resume Petty Crimes Crime ...
SESSION ID:SESSION ID:
Chief Information Security OfficerHold Security, LLC@HoldSecurity
Why is this important?
Can this stop cyber crime?
What Drives a Hacker?
HACKTIVISM REVENGE STATE-SPONSORED
What is a Threat to You
Defamation and Reputation Loss
Learn to be a Hacker
Carding UniversityVirtual Carding Basics
Job After Graduation
Hackers View of Us
Tessa88: Foreignersthe common folkI despise themthey are garbage to me
War of stereotypesIm fighting a holy war against the West They drive their Rolls Royce's and go home to their million-dollar houses, while people here are struggling. I will never harm my fellow Slavs; but America, Europe, and the rest of the world deserve it.
- aqua (jabberzeus)
Target Retail Stores Breach
Kartoxa POS Malware author - Rinat Shabaev was looking for a regular job programming, asking for about 12 USD per hour. After failing to find a job, he is recruited to write a virus that steals financial data from 40 million victims.
Target Breach Delivery Man
Extortion - Ransomware
#RSACSan Francisco Municipal Transport Agency Ransomware Attach
Who Is To Blame?
How To Defend?
The Russians Did It
Yandex Mail Messages
Russian Phone Numbers
Discovery and Attack ServerScan the Internet
Extort and Communicate
San Francisco Light Rail Ransomware
Metropolitan area railroad transportation system paralyzed from Ransomware attack sourced from Iran
Target the Internet
Scans of 184.108.40.206/8 network (Layer 3)Scan of 220.127.116.11/11 network (AT&T)
Found 75.10.2xx.xxx target SFMTA Oracle Primavera Server
Identified a network with 8,000+ systems
Continued scanning US, Iran, and other networks.
Who is the Real Tessa88?
Hacker sells stolen credentials from major breaches. Creates instability by exposing billions of accounts, and lying about Twitter and Yahoo breached data.
Graduation to a Criminal
Crime & Punishment
HiroshimaAlso called Atomic Bomb or Atomic Blast
Contains synthetic cannabinoid products like JWH-018
2014 Drug Runner
While in Prison
I see a dreamI am DROWNING
My heart beats fastI want to ESCAPETake a deep breath
This is only a dreamOnly a NIGHTMARE
I see myselfI am a bird flying so high
I wake up I am still in SHOCK
White pillowBed CAGEI am LOCKED UP
My mood is dimWorld disappeared This is my reality now
Yahoo Summer 2016
July sampleFake sale
Malware Tech Marcus Hutchins
Transformation from hacker to a security researcher
2009 Selling password stealers and scareware
2012-2014 Distribution and reselling of viruses and exploit kits
2014 Emergence of a researcher alter ego
2017 Accidental discovery of WannaCry killswitch.
Hackers are human with faults
Hackers are ruthless
Hackers are innovative
Understanding the human side of a hacker leads to improvement of our defenses
Learn about your enemy
Tune your defenses toward the threat
Fortify against hackers NOT auditors
Using Knowledge to Discourage Hackers
Increase complexity required for an attack to make your infrastructure the most unhospitable and fruitless for an attacker.
Create HoneyPots in systems, applications, functions, and data as early identifiers for on-going attacks or exploitations.
Use Threat Intelligence as a defense technique. Understand the Dark Web. Stay ahead of the adversary by adapting your defenses to their attack techniques.
Hackers are winning
We are improving
Understanding our adversary is the key
Hackers InterruptedUnderstanding HackersWhat Drives a Hacker?Modern HackerWhat is a Threat to YouLearn to be a HackerHackers View of UsTarget Retail Stores BreachTarget Breach Delivery ManTarget BreachExtortion - RansomwareSan Francisco Municipal Transport Agency Ransomware AttachThe Russians Did ItHackers SetupSan Francisco Light Rail RansomwareTarget the InternetTessa88Who is the Real Tessa88?Graduation to a Criminal Drugs2014 Drug RunnerWhile in PrisonYahoo Summer 2016Malware Tech Marcus HutchinsUnderstanding HackersDefense TechniquesDefenses 101Using Knowledge to Discourage HackersConclusions