types of highly effective HACKERS - MicroAge · points into its networks, or “denial of...

27
7 types of highly effective THE Highly Effective Approaches to Cybersecurity HACKERS

Transcript of types of highly effective HACKERS - MicroAge · points into its networks, or “denial of...

Page 1: types of highly effective HACKERS - MicroAge · points into its networks, or “denial of service” (DoS) attacks, which act as distraction while the attackers work to access another

7types of highly effective

THE

Highly Effective Approaches to Cybersecurity

HACKERS

Page 2: types of highly effective HACKERS - MicroAge · points into its networks, or “denial of service” (DoS) attacks, which act as distraction while the attackers work to access another

Digital transformation is impacting every aspect of

business—shaping growth, transforming products,

optimizing operations, and empowering employees.

But with these extraordinary opportunities comes

many questions about how IT leadership can effectively

evolve their organizations, while still securing their data

against the threat of increasingly severe cyberattacks.

THE THREAT LANDSCAPE. The rapidly dissolving IT

perimeter has created new targets for hackers. And hackers

are becoming much more skilled and organized. As a result,

there’s been an unprecedented rise in the number, sophis-

tication, severity, and financial impact of different attack

vectors around the world. Threats now range from trouble-

making teenagers hacking alone on their laptops for brag-

ging rights, to highly organized criminal collectives with

the power to threaten national and international security.

2Introduction

Page 3: types of highly effective HACKERS - MicroAge · points into its networks, or “denial of service” (DoS) attacks, which act as distraction while the attackers work to access another

THE GOOD AND BAD NEWS. Let’s start with the

bad news. Due largely to the seven different types of

hackers outlined in this e-book, the rate of cybercrime

is increasing exponentially. Millions of dollars of

intellectual property are at risk, as well as the threat

of lost productivity. The good news is that your organiza-

tion doesn’t have to fight these criminals alone. While the

reality is clearly daunting, thanks to its sheer size and scope

worldwide, Microsoft is uniquely positioned to help

you do something about it.

Because of the massive scale of information that

Microsoft processes—billions of device updates and

hundreds of billions of emails and authentications for

example—we’re able to synthesize threat data far faster

than your organization could ever do it alone.

– Microsoft Blog “Microsoft’s unique perspective on

cybersecurity.” June 24, 2016.

[Our] unique insight into the threat landscape, informed

by trillions of signals from billions of sources, create an

intelligent security graph that we use to inform how we

protect all endpoints, better detect attacks, and accelerate

our response.

– Microsoft’s Chief Information Security Officer

Bret Arsenault, 2015 - Microsoft Blog “Enterprise security

for our mobile-first, cloud-first world.” November 17, 2015.

3Introduction

Page 4: types of highly effective HACKERS - MicroAge · points into its networks, or “denial of service” (DoS) attacks, which act as distraction while the attackers work to access another

600%Attachment-based

URL-deliveredmalware attacks

vs.

from mid-2014 to 2015(Proofpoint, 2015)4

There was a

increase in

$209MILLIONwas stolen in the

first quarter of 2016

using

CYBERTHREATS and

RANSOMWARE

( FBI report, April 2016)6

In the U.S. alone,

2,400RANSOMWAREwere reported to the

Internet Crime Complaint

Center for 2015—at a cost of

$24 MILLION(FBI Press Release, 2016)1

complaints of

CYBERCRIMESURPASSEDall other forms ofcrime in the U.K.(Dark Reading, June 2016)3

According to the National Crime Agency (NCA), in 2016,

IN 2015

594MILLIONpeople worldwidewere victims ofONLINE CRIME

(2016 Norton Cybersecurity Insights Report)5

There’s a newidentity fraudvictim every

2(Javelin, 2015)2

SECONDS

Cybercrime statistics

are staggering

4Cybercrime Statistics

Page 5: types of highly effective HACKERS - MicroAge · points into its networks, or “denial of service” (DoS) attacks, which act as distraction while the attackers work to access another

Script KiddiesOften bored teens, hacking alone,

don’t put much time or thought

into gaining computer knowl-

edge on their own and instead

exploit existing code.

WHAT MOTIVATES THEM. Thrill seekers,

these budding criminals mostly hack for fun,

recognition, and bragging rights. But that

doesn’t mean they can’t pose a serious threat.⁷

5Script Kiddies

Page 6: types of highly effective HACKERS - MicroAge · points into its networks, or “denial of service” (DoS) attacks, which act as distraction while the attackers work to access another

TOOLS OF CHOICE. Because they often lack the skill to

write their own code, they instead cut and paste code or

scripts developed by others to cause trouble for their victims.

Among the most damaging tools used by script kiddies are

rootkits, which allow them to solidify their hold on systems

once they’ve broken in.

TARGETS. Script kiddies often scan the internet for a

victim computer with a specific vulnerability to leverage

their limited skill set. The newest generation of rootkits

actually replaces pieces of your kernel in RAM, where it

takes control of your system.⁸ THE BEST PROTECTION. Because script kiddies usually

lack technical skill, they tend to be sloppy and often leave

evidence of their work. Your best security plans are:

Stop them from getting in the door in the first

place by keeping your security up to date and

deploying intrusion detection systems.

Implement tools like chkrootkit Rootkit Hunter

to tackle the more challenging rootkit problem.

Be proactive and set your security measurements

up ahead of time so they can offer advance warning

if something goes wrong.

1.

2.

3.

6Script Kiddies

STATS. Although they’re difficult to track, it’s estimated

that there are millions of script kiddies at work around the

world. And, although they’re the most inexperienced and

immature on our scale of hacker types, they can cause as

much damage as their more savvy counterparts.⁹

Page 7: types of highly effective HACKERS - MicroAge · points into its networks, or “denial of service” (DoS) attacks, which act as distraction while the attackers work to access another

Hacking GroupsA loose collection of script kiddies who wield

more power as a collective than as individuals

and can seriously disrupt business.

WHAT MOTIVATES THEM. While disregarded by some for the

same reasons as script kiddies, these hackers, working together,

glean confidence from their status as a collective and have the

potential to wreak a great deal more havoc, often leveraging the

combined range of skills within their group to be more effective.

7Hacking Groups

Page 8: types of highly effective HACKERS - MicroAge · points into its networks, or “denial of service” (DoS) attacks, which act as distraction while the attackers work to access another

TARGETS. Currently, hacker groups typically

focus on releasing sensitive documents and

personally identifiable information. These

attacks have the potential to result in serious

harm, particularly to high-profile companies,

law enforcement, and government personnel.

One famous hacker group is LulzSec, known

for well-publicized attacks on the CIA and the

U.S. Senate in 2015.

STATS. Clearly, the range of damage hacker

groups can do varies widely, but even seemingly

harmless pranks can have potentially disastrous

effects. For example, on April 23, 2013, a single

tweet from the hacked account of the Associated

Press led to a $136 billion drop on the S&P

500 index within approximately two minutes.10

THE BEST PROTECTION. A basic 5-step

plan is helpful against ALL forms of criminal

cyberthreats:

1. Invest in defense, including intrusion

detection and protection.

2. Plan a response strategy to uniquely

address each type of attack.

3. Institute solid HR policies to protect

against insider threats.

4. Deploy a solid incident response platform.

5. Document and share attack reports across

the IT department.

8Hacking Groups

Page 9: types of highly effective HACKERS - MicroAge · points into its networks, or “denial of service” (DoS) attacks, which act as distraction while the attackers work to access another

WE ARE EVERYWHERE

#HACK

HacktivistsCollectives of savvy, politically motivated,

and often exceptionally skilled hackers.

They’re fighting a war and cybersecurity

is their weapon of choice.

WHAT MOTIVATES THEM. Grounded in hacker

culture and ethics, hacktivist goals are often inspired

by a passionate commitment to free speech, human

rights, or freedom of information.

9Hacktivists

Page 10: types of highly effective HACKERS - MicroAge · points into its networks, or “denial of service” (DoS) attacks, which act as distraction while the attackers work to access another

?

WE ARE EVERYWHERE

#HACK

TOOLS OF CHOICE. In many cases, hacktivists use

the same tools and techniques as regular hackers.

However, because their goal is attention rather than

financial gain, there are some significant differences.

DNS tunneling, for instance, exploits a target’s servers

that convert IP addresses to domain names as entry

points into its networks, or “denial of service” (DoS)

attacks, which act as distraction while the attackers

work to access another part of the network. These,

along with hijacking websites and taking over Twitter

accounts and Facebook pages, allow hacktivists to steal

and disclose sensitive information they illegally access.

In fact, more than any other type of hacker, hacktivists

often leverage social media to generate publicity and

support for their efforts.11

TARGETS. They might leave a highly visible message

on the homepage of a site that represents a political

affiliation the hackers oppose. Or they may disrupt traffic

to a high-profile site that will cause a stir and get people

asking questions, thereby giving them the opportunity

to state their case.

For example, Anonymous, the best-known hacktivist

group, has launched attacks against child-porn sites,

Koch Industries, Bank of America, NATO, and various

government websites. Interestingly, in almost 75 percent

of cases, hacktivist targets are warned ahead of time

of the impending attack, something that rarely if ever

happens with financially motivated hacks.12

10Hacktivists

Page 11: types of highly effective HACKERS - MicroAge · points into its networks, or “denial of service” (DoS) attacks, which act as distraction while the attackers work to access another

#HACK

STATS. Most of the cyberattacks performed by hacktivists

are illegal under domestic crime statutes. Few cases, however,

reach the point of prosecution, in part because the damages are

usually minor. However, with nationalist groups getting in on

the action, the problem is growing. In 2012, of the 177 million

records stolen by hackers, 100 million were taken by hacktivists.

THE BEST PROTECTION. Several leaders of prominent

hacktivist groups have argued that it’s actually quite simple to

Stay off their radar, conduct business ethically, and be so-

cially responsible. But the truth is, organizations need to

take real precautions as the scale of hacktivism expands

exponentially year over year.

Put multiple layers of security controls in place, so that

something that breaches one layer is less likely to get

through to another.

Ongoing education and awareness efforts are also

crucial. Informed and proactive people are the first line

of defense against any of these criminals.

1.

2.

3.

11Hacktivists

Page 12: types of highly effective HACKERS - MicroAge · points into its networks, or “denial of service” (DoS) attacks, which act as distraction while the attackers work to access another

Black HatProfessionalsThese are highly experienced hackers who

do this work for a living, bringing decades

of extensive computer knowledge to the

table. They generally neither destroy nor

seek publicity but figure out new ways to

infiltrate impenetrable targets, developing

avenues of attacks that often prove costly

for both governments and businesses.

WHAT MOTIVATES THEM. A broad range of incentives

and goals attract hackers at this elite level, including mon-

ey, revenge, public attention, bragging rights, access to

valuable data, and even mere amusement.

12Black Hat Professionals

Page 13: types of highly effective HACKERS - MicroAge · points into its networks, or “denial of service” (DoS) attacks, which act as distraction while the attackers work to access another

TARGETS. Black hats target applications,

networks, computer systems, infrastructure

and, occasionally, even people. Their victims

include companies with valuable intellectual

property, financial organizations, any company

with sensitive data to exploit, and even, maybe

most distressing, hospitals and other

healthcare facilities.13

TOOLS OF CHOICE. Their purpose is to breach

or bypass internet security, break into computers

and networks, and also create computer viruses.

While regular hackers build things, black hat

professionals (also known as “crackers”) break

things, maliciously exploiting security vulnerabil-

ities that frequently threaten the personal and/or

financial information of millions of customers.

13Black Hat Professionals

Page 14: types of highly effective HACKERS - MicroAge · points into its networks, or “denial of service” (DoS) attacks, which act as distraction while the attackers work to access another

STATS. To offer a glimpse into the power of a single black

hat hacker, consider this: American hacker, “c0mrade”, man-

aged to hack into a number of networks, including those

belonging to NASA. He downloaded enough source code

to learn how the International Space Station worked. The

total value of the downloaded assets was worth millions.

To make things worse, NASA was forced to shut down its

network for weeks while they investigated the breach.

THE BEST PROTECTION. Ironically, one of the most

effective strategies to defend your organization from a

Black Hat professional, is to engage a member of their own.

Engage the services of a “white hat”—an ethical hacker

with similarly comprehensive skills who puts them to

work testing vulnerabilities, exploits, and viruses and

reporting them to potential target organizations so

they can breach any holes and strengthen their overall

security position.

Maintain good security hygiene across your network.

Enforce good configuration policy. Ensure systems are

protected by firewalls. Enforce password best practices.

1.

2.

14Black Hat Professionals

Page 15: types of highly effective HACKERS - MicroAge · points into its networks, or “denial of service” (DoS) attacks, which act as distraction while the attackers work to access another

Organized Criminal GangsLed by seasoned professional criminals,

these serious and very talented hackers

function within a sophisticated struc-

ture, guided by strict rules to ensure their

crimes go undetected by law enforcement.

It’s like The Mafia, only with computers. In

fact, a large number of black hat hackers

are affiliated with organized crime.

WHAT MOTIVATES THEM. Forget the image of a

17-year-old hacker, working alone in his parents’ basement;

instead, picture sophisticated and organized cybercriminals

who choose this way of life as a profession. They’re driven

by the immense amounts of money they can make at this

level, and how much “easier” cybercrime is relative to more

traditional criminal activity.

15Organized Criminal Gangs

Page 16: types of highly effective HACKERS - MicroAge · points into its networks, or “denial of service” (DoS) attacks, which act as distraction while the attackers work to access another

TOOLS OF CHOICE. These highly experienced

developers have deep knowledge and years of expertise

that enables them to constantly innovate their malware

and attack tactics.

TARGETS. Every kind of cyberattack mentioned above

and many more you can’t imagine. These professional

crime rings often launch their attacks on Friday evenings,

after work hours, so their infiltration is more likely to go

undetected for longer—and therefore do more damage.

A few years ago, these hackers were stealing money in the

five-figure range; today these brazen cybercriminals are

stealing millions of dollars at a time.

STATS. We’ve reached the point where highly organized

criminal gangs are generating about 80 percent of

cybercrimes. Unlike other types of hackers, they keep

office hours and take weekends off, treating their nefarious

activities just like regular jobs. But when they turn out the

lights, they flip the switch on the kinds of data breaches

that, according to a 2015 Cost of Data Breach Study by the

Ponemon Institute, cost an average total of $15 million per

year. And cybercrime is forecast to become a $2.1 trillion

problem by 2019.14

16Organized Criminal Gangs

Page 17: types of highly effective HACKERS - MicroAge · points into its networks, or “denial of service” (DoS) attacks, which act as distraction while the attackers work to access another

THE BEST PROTECTION. The scale and sophistication

of modern cybercrime is unprecedented. Protecting your

organization from this rapidly evolving threat will require

a new holistic approach to cybersecurity. Alongside this

new approach, there are ways you can improve your

security today.

17

Maintain best practices for organization security

and stronger architecture.

Additionally, the open and rapid sharing of infor-

mation offers the best protection against this

level of cyberthreat.

Stay up to date on the latest information about

cyberthreats, including tools, tactics, and procedures.

1.

2.

3.

Organized Criminal Gangs

Page 18: types of highly effective HACKERS - MicroAge · points into its networks, or “denial of service” (DoS) attacks, which act as distraction while the attackers work to access another

Nation-StatesThis is organized cybercrime at the inter-

national level, using hacking techniques as

military, political, and economic weapons.

WHAT MOTIVATES THEM. Nation-states are more inter-

ested in political and economic espionage — stealing state

secrets, intellectual property, and the personal information

of government employees — than simply making money.

A recent example was the hack of the U.S. Office of Personnel

Management, which put at risk the personal information

of up to 14 million current and former federal employees.15

18Nation-States

Page 19: types of highly effective HACKERS - MicroAge · points into its networks, or “denial of service” (DoS) attacks, which act as distraction while the attackers work to access another

TOOLS OF CHOICE. Spear phishing, credential harvest-

ing, malware, records theft, and complex techniques for

evading detection... The list is sophisticated and seemingly

endless. The most talented and ruthless hackers are put to

work by nation-states to do the dirty work while the

government officials who employ them remain officially

unsullied. U.S. and European defense officials have charged

that nations such as Russia and Iran are increasingly arm-

ing and encouraging criminal and activist groups with the

cyberweaponry necessary to harm their enemies, without

taking official responsibility for the crimes.

TARGETS. With massive computing power at their

disposal, nation-states target critical infrastructure,

military, utilities, or financial sectors of their adversaries.

In May 2016, the FBI issued a warning that foreign

government hackers are actively targeting the U.S.

The report read, “Advanced Persistent Threat (APT)

cyber actors continue to target sensitive information

stored on U.S. commercial and government networks

through cyber espionage.”16

19Nation-States

Page 20: types of highly effective HACKERS - MicroAge · points into its networks, or “denial of service” (DoS) attacks, which act as distraction while the attackers work to access another

STATS. Because nation-state–supported hackers are

extremely well funded, they can be particularly formidable

adversaries. As a result, nefarious nation-state–sponsored

cyber activity can have devastating effects on a country’s

national security and its economy. According to Forrester

research, “...all nation-states are not created equal, and like

individual hackers, each has a different motivation and

level of cyber capability.”17

THE BEST PROTECTION. Most organizations are far

more likely to experience the other kinds of cybercrime

detailed here than have to deal with nation-state activity.

However, as always there are ways to improve your organi-

zation’s network security.

20

Know your network. Address easily exploitable

vulnerabilities and encrypt all confidential data.

The FBI has advised network administrators to engage

in “proactive patch management” as the main line

of defense.

1.

2.

Nation-States

Page 21: types of highly effective HACKERS - MicroAge · points into its networks, or “denial of service” (DoS) attacks, which act as distraction while the attackers work to access another

The Cyberweapons DealerA more seasoned criminal who sells

automated pieces of software that act

like weapons, mostly to nation-states

or organized crime rings, but really

to anyone who can afford them.

WHAT MOTIVATES THEM. Money. A lot of it.

TOOLS OF CHOICE. The dealer arms attackers with a

foundational piece of software that acts like a worm virus,

which they then use to build their weapons without

advanced coding skills. Because it’s so much easier to

customize a preexisting tool than to start from scratch,

these tools are worth a lot of money to attackers. And

a well-crafted piece of software can be used by any one

of the other six cybercriminal types.

21Cyberweapons Dealer

Page 22: types of highly effective HACKERS - MicroAge · points into its networks, or “denial of service” (DoS) attacks, which act as distraction while the attackers work to access another

TARGETS. The weapons peddled by these dealers target

vulnerabilities in software that haven’t been discovered by

their manufacturers. Nation-states often use those same

virtual holes to gain under-the-radar access into foreign

computer systems for the purposes of eavesdropping or

even taking control of the systems themselves.

TOOLS OF CHOICE. One example of a dangerous cyber-

weapon is the malicious Dorkbot botnet. It infects over

100,000 devices each month and has owned over a million

PCs in 190 countries. In December of 2015, thanks in part

to its sophisticated security software that detects and re-

moves the virus (often before users are even aware they’ve

been targeted), Microsoft teamed up with various law

enforcement around the world, including the DHS and FBI,

to disrupt the Dorkbot network.

THE BEST PROTECTION. Once again, you need to get in-

side the minds (and skillsets) of the criminals to fight them

effectively. A 2014 Rand study found that computer securi-

ty companies and software vendors often pay researchers

a bounty for cyberweapons, so they can take them off the

market before they’re used for attacks. But the dealers can

earn 10 to 100 times more on the gray markets, where gov-

ernment and agencies and corporations are the big buyers,

as well as on the black market where criminals conduct

their business.18

22Cyberweapons Dealer

Page 23: types of highly effective HACKERS - MicroAge · points into its networks, or “denial of service” (DoS) attacks, which act as distraction while the attackers work to access another

We’ve taken a high-level threat assessment

of seven different but dangerous attackers.

Securing organizations from rapidly evolving

threats and mitigating the risks associated

with the digital world that we live in requires

a new approach to cybersecurity. One of the

best ways to protect your data is to move it

into Office 365 and take advantage of the

expertise Microsoft can deliver.

OFFICE 365 SECURITY. Microsoft takes

extensive measures to protect your data

in Office 365. Our investment in security

resources is among the best in our industry,

and we are constantly looking for new,

innovative ways to protect your data.

Microsoft continuously invests in advanced

security tactics, it has world-class security

experts, and the datacenters have incredible

investments in physical security features.

Security is a journey not a destination.

Knowledge and preparation are power.

23

Page 24: types of highly effective HACKERS - MicroAge · points into its networks, or “denial of service” (DoS) attacks, which act as distraction while the attackers work to access another

One security innovation utilized by Microsoft is

Red Teaming, a type of wargame that leverages

actual attacks to test Microsoft’s systems and

operations. These real-life attacks are launched

by our internal Red Team and defended against

by our Blue Team. By simulating actual attacks

against Microsoft services, we can better antici-

pate and protect against threats to your data. Red

Teaming is just one part of our overall approach

to security. Our defense in-depth strategy lever-

ages six layers of security to protect your data

from attackers. These layers are physical, network,

identity, host security, application-level security,

and data security.

DATACENTER PHYSICAL SECURITY. Office

365 data is stored in Microsoft’s network of

datacenters, strategically located around the

world. These datacenters are built from the

ground up to protect services and data from

harm by natural disaster or unauthorized access.

Datacenter access is restricted 24 hours per day

by job function so that only essential personnel

have access to customer applications and ser-

vices. Physical access uses multiple authentication

and security processes, including badges and

smartcard, biometric scanners, on-premises

security officers, continuous video surveillance,

and two-factor authentication. The datacenters

are monitored using motion sensors, video sur-

veillance, and security breach alarms. To prepare

for a natural disaster, the datacenters use seismi-

cally braced racks where required and have auto-

mated fire prevention and extinguishing systems.

DATACENTER NETWORK SECURITY. Networks within Office 365 datacenters are

segmented to provide physical separation of

critical back-end servers and storage devices

from the public-facing interfaces. Microsoft

Edge router security detects intrusions and

signs of vulnerability. Customer connections

are encrypted using industry-standard Transport

Layer Security (TLS)/Secure Sockets Layer (SSL).

The use of TLS/SSL establishes a highly secure

client-to-server connection to help provide data

confidentiality and integrity between the desk-

top and the datacenter.

IDENTITY AND ACCESS CONTROL. In this

digital world filled with hackers, it is critical for

customers to be able to control who can access

data and how they can use it. Office 365 is

integrated with Active Directory, Azure Active

Directory, and ADFS. This integration provides

strong authentication and granular control over 24

Page 25: types of highly effective HACKERS - MicroAge · points into its networks, or “denial of service” (DoS) attacks, which act as distraction while the attackers work to access another

to the secondary datacenter as one of the

recovery mechanisms.

The throttling mechanisms in Exchange Online

and SharePoint Online are also important tools that

defend against DDoS attacks. Exchange throttling

for users is based on the amount of Active Directo-

ry, Exchange store, and other resources that a user

consumes.

DATA SECURITY. Office 365 is designed to host

multiple tenants in a secure way through data iso-

lation. Data storage and processing for each tenant

is segregated through Active Directory and capabil-

ities specifically developed to help build, manage,

and secure multitenant environments.

Within Microsoft datacenters, staff’s access to

the IT systems that store customer data is strictly

controlled via role-based access control (RBAC)

and lockbox processes. Access control is an auto-

mated process that follows the separation of duties

principle and granting least privilege. Engineers

request access for particular tasks into a lockbox.†

The lockbox process determines the duration

and level of access.

how IT professionals and users can access and

use the service.

HOST SECURITY. Antivirus and antispam

protection is delivered through Exchange

Online Protection and Advanced Threat Pro-

tection.* These services deliver comprehensive

protection against known malware and zero-day

attacks. They are easy to use and deliver granular

controls.

APPLICATION LEVEL. Office 365 services

are intentionally built to support a very high

load and to protect and mitigate against appli-

cation-level DDoS (distributed denial-of-service)

attacks through the implementation of throt-

tling, a scaled-out architecture, regional isolation,

and high-performance components.

We also leverage our global presence to

distribute attacks across a vast surface area.

Customer data is replicated to redundant

datacenters in a primary/backup fashion.

The distribution of data in multiple datacenters

reduces the affected surface area in case one

datacenter is attacked. The services in the

affected datacenter can be quickly failed over

25

* Available in Office 365 Enterprise E5 or as a standalone † Customer Lockbox Available in Office 365 Enterprise E5 or as a standalone

Page 26: types of highly effective HACKERS - MicroAge · points into its networks, or “denial of service” (DoS) attacks, which act as distraction while the attackers work to access another

Customer data in Office 365 exists in two states:

at rest on storage media and in transit from

Office 365 over a network to a customer

device. Office 365 allows encryption of data in

both states to make it unreadable to unautho-

rized parties. All email content is encrypted on

disk using BitLocker 256-bit AES Encryption.

With all of the potential threats out there,

don’t try to protect your data on your

own. Take advantage of the expertise that

Microsoft delivers with Office 365.

Download Empowering Employees in a Digital World E-book to learn how to get a secure, productive workforce with enterprise cloud services.

Watch this episode of Modern Work-place, Inside Security: Help Keep Your Organization Safe, to learn how you can protect your organization from cybersecurity attacks.

Page 27: types of highly effective HACKERS - MicroAge · points into its networks, or “denial of service” (DoS) attacks, which act as distraction while the attackers work to access another

¹ Anderson, Vicki D. (Special Agent). “Ransomware: Latest Cyber Extortion Tool.” FBI Cleveland. April 26, 2016. https://www.fbi.gov/contact-us/field-offices/cleveland/news/press-releases/ransomware-latest-cy-ber-extortion-tool

2 Pascual, Al. “$16 Billion Stolen From 12.7 Million Identity Fraud Victims in 2014, According to Javelin Strategy & Research.” Javelin. March 3, 2015. https://www.javelinstrategy.com/press-release/16-billion-sto-len-127-million-identity-fraud-victims-2014-accord-ing-javelin-strategy

3 Yasin, Rutrell. “Cybercrime Now Surpasses Traditional Crime In UK.” Dark Reading. June 8, 2016. http://www.darkreading.com/threat-intelligence/cybercrime-now-surpasses-traditional-crime-in-uk/d/d-id/1326208

4 Proofpoint Staff. “Proofpoint Threat Report: Top Trends of 2015 So Far.” Proofpoint. August 13, 2015. https://www.proofpoint.com/us/threat-insight/post/Top-Trends-of-2015

5 “Norton Cybersecurity Insights Report”. Norton. 2016. https://us.norton.com/norton-cybersecurity-in-sights-report-global?inid=hho_norton.com_cybersecu-rityinsights_hero_seeglobalrpt

6 “2015 Internet Crime Report.” FBI. 2016. https://pdf.ic3.gov/2015_IC3Report.pdf

Sources⁷ Wlasuk, Alan. “Help! I Think My Kid Is A Script Kiddie.” Security Week. January 13, 2012. http://www.securityweek.com/help-i-think-my-kid-script-kiddie

8 LeBlanc, Dee-Ann. “How to Protect Yourself Against Script Kiddies.” Information Week. August 6, 2004. http://www.informationweek.com/how-to-protect-yourself-against-script-kiddies/d/d-id/1026655

9 “What Is A Script Kiddie?” Security News. http://www.pctools.com/security-news/script-kiddie/

10 Ibid.

11 Greenberg, Andy. “Verizon Study Confirms 2011 Was The Year Of Anonymous, With 100 Million Users’ Data Breached By Hacktivists.” Forbes. March 22, 2012. http://www.forbes.com/sites/andygreen-berg/2012/03/22/verizon-study-confirms-2011-was-the-year-of-anonymous-with-100-million-credentials-breached-by-hacktivists/#86e7cdf1f227

12 Ibid.

13 Samani, Raj. “What Morpho Means: Why Hackers Target Intellectual Property And Business-Confiden-tial Information.” Dark Reading. June 13, 2015. http://www.darkreading.com/partner-perspectives/intel/what-morpho-means-why-hackers-target-intellec-tual-property-and-business-confidential-informa-tion/a/d-id/1321275

14 “2015 Cost Of Cyber Crime Study: United States”. Ponemon Institute. October 9, 2015. http://www.ponemon.org/library/2015-cost-of-cyber-crime-unit-ed-states?s=+cost+of+cyber

15 Armerding, Taylor. “Cybercrime: Much More Or-ganized”. CSO. June 23, 2015. http://www.csoonline.com/article/2938529/cyber-attacks-espionage/cyber-crime-much-more-organized.html

16 FBI. “Vulnerabilities And Post Exploitation IOCs For An Advanced Persistent Threat.” FBI Flash. May 11, 2016. [PDF]

17 Walls, Mike. “Nation-State Cyberthreats: Why They Hack.” Dark Reading. January 8, 2015. http://www.darkreading.com/informationweek-home/nation-state-cyberthreats-why-they-hack-/a/d-id/1318522

18 Ablon, Lillian and Martin C. Libicki, Andrea A. Golay. “Markets For Cybercrime Tools And Stolen Data.” Rand National Security Research Division. 2014. http://www.rand.org/content/dam/rand/pubs/research_reports/RR600/RR610/RAND_RR610.epub

©2017 Microsoft CorporationAll rights reserved.