Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- для 16.05.23
- Profiling hackers
- #profile
- "CC is clearly a management problem".
- We can make a probability statement about an unknown offender by the word he use(behaviour).
- That's how hackers can be catched(by their digital trace. For example, messages, calls).
- To open the door, it is enough to convince the person with the key to do it.
- "Humans are the weakest link in the cyber security chain"
- More than 90% of cyber crimes caused by human error.
- "Amateurs hack systems, professionals hack people" (C) Bruce Scheiner.
- Category of hackers: "Black hat".
- It consists of 90% male, 81% is under 30y.o., well educated).
- "Black hat" motives:
- - thrill-seeking
- - financial gain
- - espionage
- - ego
- - challenge to beat the system
- Hacking methods:
- 1) Misdirection
- *A trick with egg*
- "They hack you while telling you that you have been hacked"
- - Phishing mails, short messages
- - They don't give you time to think
- 2) Sympathy principle
- *history about a girl with flash drive*
- Many criminals may look like an character of a film.
- Beautiful appearance doesn't look suspicious.
- 3) Authority principle
- *Doctor's Best TV commercial*
- We are used to trust an authoritative sources.
- So we can be deceived this way.
- Hackers use authority names and brands to gain people's trust.
- For example, delivery companies.
- "Hackers play with human emotions like a piano."
- Ways to protect yourself from hacking:
- Companies wrongly think: "It won't hit us", "I don't care", "We are not interesting enough."
- But "There is only two kinds of companies: company that has ben attacked and that will be attacked."
- The key to preventing CS attacks is awareness of hacking ways to prevent cybercrime.
- What hacker's biggest fear?
- The biggest fear of hackers is being hacked.
- There are 2 groups of hackers:
- 1) Crackers(motivated by personal gain, thrill-seeking)
- 2) Hackers who finds a novel way of doing something
- Things needed to became a hacker:
- - Programming language knowledge
- - Programming skills
- The most dangerous hacking is when physical systems are affected.
- For example, factory mechanisms could spill liquid metal on humans.
- TJ Maxx, the data of 45*10^9 bill cards was stolen.(the biggest fin.fraud)
- "Get off the Internet"
- Inside the Mind of a Hacker.
- Hackers are manupulative, deceitful, exploilative, cynical.
- They can be devided into 3 groups:
- 1) White hat - ethical hackers
- 2) Gray hat - "hacktivists", hack for ideological, political reason
- 3) Black hat - crackers, motivated by thrill-seeking personal gain.
- Motives:
- 1) White hatters—the good guys—tend to be narcissists
- 2) Gray hatters oppose authority
- 3) Black hatters are thrill-seeking
- The researchers surveyed 439 college sophomores and juniors to determine their personality traits.
- They developed a set of scales to determine the three hat categories,
- as well as a scale to measure each person’s perception of the probability of being caught for violating privacy laws.
- Criminal activity gives a choice of consequences and opportunities.
- The ways to reduce secutiry breaches by organizations:
- 1) Multifactor authentification(to prevent unathorized access)
- 2) Use personality traits to evaluate employees
- We have to reconsider the way we do cybersecurity.
- Companies needs to shift toward a more reliable approach(Cyber Immunity)
- Security Network Statistics show that Every 3rd user in META was affected by threats in January-September 2022.
- There was company's Cyber Security Weekend(Meta - Middle East, Turkey, Africa).
- The main topic for discussion was: emerging technologies: IOT, critical industrial, smart cities.
- All this should be protected from a cybercriminal.
- The participants also discussed various topics and threats, shared predictions for the next year.
- To provide Cyber Imunnity means to make a system that is designed to be difficult to hack.
- The largest cyberepidemials occur every 6-7 years.
- Predictions for 2023:
- - There will be a mixed physical and cyber intrusions, employing drons.
- - Malware will more silent and wide spread: extremely hard to spot.
- - Attacks will affect government sector and key industries.
- - Mail servers will still be priority targets.
- - APT(Advanced Persistent Threat) will use satellite technologies
- (For example, Viasat is a provider of high-speed satellite broadband services and secure networking systems)
- - There will still be data leaks
- What is cyber immunity?
- Due to the specificies of marketing requirements, IOT devices have to be as cheap as possible.
- IoT already includes > 12*10^9 devices.
- Among them not only personal devices, but also industrial, medical, etc.
- Thus IoT became so vulneerable. It is a problem for companies that want to implement IoT.
- (more than 57% of organizations are at risk)
- "Everything that can be hacked, will be hacked."
- To provide Cyber Imunnity means to make a system that is designed to be difficult to hack.
- So Kaspersky shift the paradigm and concentrate an effort on building systems architecture with Cyber Immunity.
- Four principles of Cyber Immunity:
- 1) Isolation. Virus shouldn't spread between parts.
- 2) Interaction control. There should be a special action checker.
- 3) Minimalism. Develop systems smart, not complicated.
- 4) Security development process. The process should be controlled.
- Things that should be protected from cyber attacks:
- - Smart devices
- - Smart city systems
- - IoT
- - Critical infrastructue
- Kaspersky Cyber Immune Products:
- - IoT gateway
- - thin client(virtual desktop infrostruction)
- The fewer operations are performed on the client side, the safer the system is.
- From CyberSecurity to CyberImmunity.
- 342000 malware samples is catched every day.
- Mirai botnet is still alive.
- Malvare is moving to IoT world.
- "If the camera is infected, the virus will stay there forever".
- No updates is a reason for the hack.
- New cyberworld will be based on the Cyber Immunity.
- The cost of attack is always greater than the cost of the damage caused.
- System architecture:
- 1) Standart(old version): It looks like a "house of cards". There is no requarements.
- 2) New one Micro-lernel Architecture. Applications are little independent parts.
- There security layer is located between OS and App layers.
- Every model is under strict control.
- для 16.05.23
- Profiling hackers
- #profile
- "Everything we do, we show something of who we are"
- Hackers always leave digital traces(messages, calls), and personal tracesAnalysis of language is a key element in profiling.
- Any door is only secure as the person who is holding the key.
- "Humans are the weaked link in the cyber security chain"
- > 90% of cyber crimes caused by human error.
- "Amateurs hack systems, professionals hack people" - Bruce Scheiner.
- "Black hat" (90% male, 81% is under 30y.o., well educated).
- Motives:
- - financial gain
- - espionage
- - thrill-seeking(fun)
- - ego
- -challenge to beat the system.
- #methods
- 1) Misdirection(trick with egg)
- They hack you while telling you that you have been hackerd(eliminate your critical thinking).
- - Phishing mails, short messages
- - Urgent do now without thinking
- 2) Sympathy principle(girl with flash drive)
- Our tendency to trust and to like people(silk road)
- Many crimes: and spies are veery successful because they don't look like criminals, they unsuspiciout
- 3) Authority principle
- We are much more influencable when we consider someone an authority. (Doctor's Best TV commercial)
- Hackers use authority symbols, logos, brands(FBI, Bank of America) to gain people's trust.
- Hackers play with human emotions like a piano.
- #defence
- Team "It won't hit us", "I don't care",
- "We are not interesting enough.
- There is only two kinds of companies: company that has ben attacked and that will be attacked.
- The key to defence CS attacks is awareness to prevent cybercrime.
- What hacker's biggest fear?
- Hackers:
- 1) crackers
- 2) someone whi finds a novel way of doing something
- - How to become a hacker?(learn scripting language, develop your skils)
- - The most dangerous kind of hacker?(that tampers with control system for devices, like elevator)
- - The biggest fear? (Getting hacked)
- - The biggest financial fraud?(TJ Maxx, 45 bill cards)
- - How to avoid an attack? (Get off the Internet)
- Inside the Mind of a Hacker.
- Hackers: manupulative, deceitful, exploilative, cynical.
- 1) White hat - ethical hackers
- 2) Gray hat - "hacktivists", hack for ideological reason
- 3) Black hat - crackers, motivated by personal gain.
- Motives:
- 1) Good guys - narcissists
- 2) Oppose authority
- 3) Thrill-seeking
- The researchers developed
- - scales to determine 3 categories:
- - scale to measure perception of the probability of being caught
- Criminal activity gives a choice of consequences and opportunities.
- How can organizations reduce secutiry breaches:
- 1) Multifactor authentification(to prevent unathorized access)
- 2) Use personality traits to evaluate employees
- We have to reconsider the way we do cybersecurity.
- Security leaders need to collaborate and rethink the way we do cybersecurity. (company's Cyber Security Weekend - Meta, Jordan).
- Meta - Middle East, Turkey, Africa.
- Special focus: emerging technologies(robotics, IOT, critical industrial - specific threats),
- They should be addressed thought a secure(Cyber Immunity)
- 1) Expands discussed various topics and threats, shared thread predictions for next year.
- Cyber Immune products with innate protection.
- Thread statistics:
- - Every 3rd user in META was affected by thread 01.09.22
- - Qatar 39.8%, Bahrain 36.5%, Saudi Arabia 33.3%, UAE 32.9%, Kuwait 32.5%, Egypt 28%, Jordan 28%(online)
- APT - Advanced Persistent Thread.
- In 2028 has been increased in the number of sophisticated attacks(Metador targeting telecommunication).
- 2023 predictions:
- The largest cyber epidemics occur every 6-7 years(Last WannyCry ransomware - word, next in 2023)
- Current global tensions greatly increase the chance that Shadow Brokers - style hack-and-leak could take place.
- - Major shift will be reflected in new types of attack(mixing phhysical and cyber intrusions, employing drons)
- - Malware - the most wide spread, extremely hard to spot.
- - Destructive attacks:
- * affecting both government sector and key industries
- * look like pseudo-ransomware
- - mail servers become priority targets(store key intellesence)
- - APT use satellite technologies(Viasat is a provider of high-speed satellite broadband services and secure networking systems)
- - Hack and leak(hybrid conflit)
- What is cyber immunity?
- Because of specificity of the IOT sphere, products is made as cheap as possible.
- Cybersecurity risks are the biggest concern for 57% of organizations that are planning to implement IOT.
- Antivirus can't have algorithms against all types of attacks. New sophisticated attack appears every day.
- Everything that can be hacked, will be hacked.
- Therefore, Kaspersky experts concentrate an efford not only on eliminating all known vulnerabilities.
- They shift the paradigm and concentrate an effort on building systems architecture, so that the use of vulnerabilities becomes very difficult.
- Attack is just not cost-effective.
- Four principles of Cyber Immunity:
- 1) Isolation(one model is infected, others - no)
- 2) Interaction control(every interaction is checked)
- 3) Minimalism(as small code as possible)
- 4) Security development process(life cycle)
- Design -> development -> testing -> requarements
- What could be cyber immune?
- - IOT
- - Industrial devices
- - Smart city systems
- - Mobile devices
- Cyber Immune Products:
- - IoT gateway
- - thin client(virtual desktop infrostruction)
- (The fewer operations are performed on the client side, the safer the system is.)
- From CyberSecurity to CyberImmunity.
- 342000 malware samples is catched per day.
- Mirai botnet is still alive.
- Reasons of being infected:
- - no antivirus
- - no updates
- IoT: house(smart TV, fire alarm systems)
- city(transport, street lights, cell tower)
- office(pc)
- Kill antivirus -> security revolution
- Cost of attack > cost of damage(Immunity)
- System architecture:
- 1) Standart(old version): there is no requarements. It looks like a "house of cards".
- 2) New one Micro-lernel Architecture. Applications cur in little independent pieces.
- Every model under strict control.
- There security layer is located between OS and App layers.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement