SlideShare une entreprise Scribd logo
1  sur  26
Télécharger pour lire hors ligne
With all the breaches
What YOU need to know
Michael Gough – Co-Founder
MalwareArchaeology.com
IMFSecurity.com
LOG-MD.com
Who am I
• Blue Team Defender Ninja, Incident Responders, Malware
Archaeologist
• I help people recover from breaches, evaluate malware
• Co-Creator of “Log-MD” – The Log and Malicious Discovery Tool
Podcast - “Brakeing Down Incident Response”
LOG-MD.com
Where to find me
• Twitter - @HackerHurricane
• Blog – HackerHurricane.com
• Website
– MalwareArchaeology.com
• Windows Incident Response Tool
– LOG-MD.com
LOG-MD.com
Why we here?
LOG-MD.com
You’re Next
97,000 76 Mil + 8 Mil
1000+ Businesses395 Stores
4.5 Million
25,000
4.9 Million
4.03 Million
105k trans
40 Million
40+70 Million
$148 Mil
33 locations
650k - 2010
??????
76,000
670,000
1900 locations
145 Million
20,000
3 Million
35,000
60,000 alerts
990,000
56 Mil
550,000
TBD
Citigroup, E*Trade Financial Corp.,
Regions Financial Crop, HSBC
Holdings and ADP
??????
Yup, our Personal Info is gone
MalwareArchaeology.com
ATM Fraud via Malware
LOG-MD.com
Malware focuses on one main OS
LOG-MD.com
MAC Malware
• So get a MAC
• 90+% less chance of
getting malware
• MUCH safer to use
• Than Windows
• Stats do not lie
LOG-MD.com
Debit Card Fraud
LOG-MD.com
Debit Cards
• They are a REALLY bad idea these days
• With fraud so high, your checking account is at
risk
• Remember the movie ‘Catch me if you can’?
LOG-MD.com
Debit Cards
• Use it at ONE place and ONE place only !!!
– The Grocery Store
• You can pay for food AND get cash, so it is an
ATM too
• Use the SAME chain when traveling
• Then if it gets compromised you know
EXACTLY where
LOG-MD.com
Credit Cards
• They are insured
• No risk to you
• 30 days or so until you have to pay your bill
• Debit Cards are taken directly out of your
checking account
• It is always better to use someone else's $$$
before yours
LOG-MD.com
Shredding
• People do not do enough of this
• It is cheap and easy
• Shred your stuff
• Even Frank says so
• Don’t throw away
mail, shred it !
LOG-MD.com
Credit Monitoring
LOG-MD.com
I’m a Security
Monitor… You
are being robbed
Credit Monitoring
• It let’s you know something has occurred
• Usually way too late for you to do anything
about it
• 10 days was my experience when I unfroze my
credit to buy our property here in Salado
• We already closed the deal before I was
notified
• It is NOT worth the money… unless FREE
LOG-MD.com
Credit Freeze – Your BEST Friend
• There are FIVE (5) agencies
– Bet you thought there were only 3
• Equifax
• Experian
• Trans Union
• Innovis
• NCTUE (Telco’s) – Serviced by Equifax
LOG-MD.com
How to Place a Freeze
• Equifax
– https://help.equifax.com/s/article/What-are-the-security-
freeze-fees-in-my-state
• Experian
– https://www.experian.com/freeze/center.html
• Trans Union
– https://www.transunion.com/credit-freeze
• Innovis
– https://www.innovis.com/personal/securityFreeze
• NCTUE
– 1-866-349-5355
LOG-MD.com
Credit Freeze
• Security researcher and author Brian Krebs
does more research on this subject than
anyone
• https://krebsonsecurity.com/2015/06/how-i-
learned-to-stop-worrying-and-embrace-the-
security-freeze/
• You can see articles on ATM skimmers and
other credit card fraud
LOG-MD.com
Credit Offers
• Placing a security alert at ChexSystems, which
is used by thousands of banks to verify
customers that are requesting new checking
and savings accounts. In addition, consumers
can opt out of pre-approved credit offers by
calling 1-888-5-OPT-OUT (1-888-567-8688), or
visit optoutprescreen.com
LOG-MD.com
Salary History
• How to Opt Out of Equifax Revealing Your Salary
History
• To place a security freeze on your The Work Number
employment report, send
your request via mail to:
• TALX Corporation
ATTN: Employment Data Report Dept 19-10
11432 Lackland Road
St. Louis, Missouri 63146
• Or, you may contact them at
http://www.theworknumber.com
• or call 800-996-7566.
LOG-MD.com
RoboCalls
• They are annoying
• Your Cell provider offers a service for around
$3/mo.
• There are apps for your phone too, also
around $3/mo.
• It is about all you can do until Congress
changes the law
– So send them an email and/or call them
LOG-MD.com
Email.. Is EVIL
• Please learn NOT to open attachments
• Or click on Links/URLs in emails
LOG-MD.com
Passwords
• Use a Password Manager
• LastPass is my favorite
• DON’T REUSE PASSWORDS
• Different for every website
LOG-MD.com
Two-Factor - MFA
• Anywhere you can USE IT !!!
• It is an App on your phone that provides an
expiring token every minute that you enter in
websites or applications that support it
• Even if you password is stolen, if you are using
2-Factor then they would need your phone to
get the tokens
• Google Authenticator for LastPass is awesome
LOG-MD.com
Questions
• You can find us on the Twitters
– @HackerHurricane
– @Boettcherpwned
• LOG-MD.com
• MalwareArchaeology.com
• Preso will be on SlideShare and linked on
MalwareArchaeology.com
• Listen to the BDIR PodCast to hear more on email phishing
– BDIRPodcast.com
LOG-MD.com

Contenu connexe

Plus de Michael Gough

MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01Michael Gough
 
You can detect PowerShell attacks
You can detect PowerShell attacksYou can detect PowerShell attacks
You can detect PowerShell attacksMichael Gough
 
BSidesOK_You_CAN_detect_PowerShell_attacks_v1.1
BSidesOK_You_CAN_detect_PowerShell_attacks_v1.1BSidesOK_You_CAN_detect_PowerShell_attacks_v1.1
BSidesOK_You_CAN_detect_PowerShell_attacks_v1.1Michael Gough
 
Cred stealing emails bsides austin_2018 v1.0
Cred stealing emails bsides austin_2018 v1.0Cred stealing emails bsides austin_2018 v1.0
Cred stealing emails bsides austin_2018 v1.0Michael Gough
 
InnoTech 2017_Defend_Against_Ransomware 3.0
InnoTech 2017_Defend_Against_Ransomware 3.0InnoTech 2017_Defend_Against_Ransomware 3.0
InnoTech 2017_Defend_Against_Ransomware 3.0Michael Gough
 
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?Michael Gough
 
Email keeps getting us pwned - Avoiding Ransomware and malware
Email keeps getting us pwned - Avoiding Ransomware and malwareEmail keeps getting us pwned - Avoiding Ransomware and malware
Email keeps getting us pwned - Avoiding Ransomware and malwareMichael Gough
 
Email keeps getting us pwned v1.1
Email keeps getting us pwned v1.1Email keeps getting us pwned v1.1
Email keeps getting us pwned v1.1Michael Gough
 
Windows IR made easier and faster v1.0
Windows IR made easier and faster v1.0Windows IR made easier and faster v1.0
Windows IR made easier and faster v1.0Michael Gough
 
DIR ISF - Email keeps getting us pwned v1.1
DIR ISF - Email keeps getting us pwned v1.1DIR ISF - Email keeps getting us pwned v1.1
DIR ISF - Email keeps getting us pwned v1.1Michael Gough
 
Email keeps getting us pwned v1.0
Email keeps getting us pwned v1.0Email keeps getting us pwned v1.0
Email keeps getting us pwned v1.0Michael Gough
 
Sandbox vs manual analysis v2.1
Sandbox vs manual analysis v2.1Sandbox vs manual analysis v2.1
Sandbox vs manual analysis v2.1Michael Gough
 
What can you do about ransomware
What can you do about ransomwareWhat can you do about ransomware
What can you do about ransomwareMichael Gough
 
Mw arch mac_tips and tricks v1.0
Mw arch mac_tips and tricks v1.0Mw arch mac_tips and tricks v1.0
Mw arch mac_tips and tricks v1.0Michael Gough
 
Proper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoSProper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoSMichael Gough
 
Logging for hackers SAINTCON
Logging for hackers SAINTCONLogging for hackers SAINTCON
Logging for hackers SAINTCONMichael Gough
 
Sandbox vs manual malware analysis v1.1
Sandbox vs manual malware analysis v1.1Sandbox vs manual malware analysis v1.1
Sandbox vs manual malware analysis v1.1Michael Gough
 
Proper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoSProper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoSMichael Gough
 
Logging for Hackers - What you need to know to catch them
Logging for Hackers - What you need to know to catch themLogging for Hackers - What you need to know to catch them
Logging for Hackers - What you need to know to catch themMichael Gough
 
RMISC logging for hackers
RMISC logging for hackersRMISC logging for hackers
RMISC logging for hackersMichael Gough
 

Plus de Michael Gough (20)

MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
 
You can detect PowerShell attacks
You can detect PowerShell attacksYou can detect PowerShell attacks
You can detect PowerShell attacks
 
BSidesOK_You_CAN_detect_PowerShell_attacks_v1.1
BSidesOK_You_CAN_detect_PowerShell_attacks_v1.1BSidesOK_You_CAN_detect_PowerShell_attacks_v1.1
BSidesOK_You_CAN_detect_PowerShell_attacks_v1.1
 
Cred stealing emails bsides austin_2018 v1.0
Cred stealing emails bsides austin_2018 v1.0Cred stealing emails bsides austin_2018 v1.0
Cred stealing emails bsides austin_2018 v1.0
 
InnoTech 2017_Defend_Against_Ransomware 3.0
InnoTech 2017_Defend_Against_Ransomware 3.0InnoTech 2017_Defend_Against_Ransomware 3.0
InnoTech 2017_Defend_Against_Ransomware 3.0
 
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?
 
Email keeps getting us pwned - Avoiding Ransomware and malware
Email keeps getting us pwned - Avoiding Ransomware and malwareEmail keeps getting us pwned - Avoiding Ransomware and malware
Email keeps getting us pwned - Avoiding Ransomware and malware
 
Email keeps getting us pwned v1.1
Email keeps getting us pwned v1.1Email keeps getting us pwned v1.1
Email keeps getting us pwned v1.1
 
Windows IR made easier and faster v1.0
Windows IR made easier and faster v1.0Windows IR made easier and faster v1.0
Windows IR made easier and faster v1.0
 
DIR ISF - Email keeps getting us pwned v1.1
DIR ISF - Email keeps getting us pwned v1.1DIR ISF - Email keeps getting us pwned v1.1
DIR ISF - Email keeps getting us pwned v1.1
 
Email keeps getting us pwned v1.0
Email keeps getting us pwned v1.0Email keeps getting us pwned v1.0
Email keeps getting us pwned v1.0
 
Sandbox vs manual analysis v2.1
Sandbox vs manual analysis v2.1Sandbox vs manual analysis v2.1
Sandbox vs manual analysis v2.1
 
What can you do about ransomware
What can you do about ransomwareWhat can you do about ransomware
What can you do about ransomware
 
Mw arch mac_tips and tricks v1.0
Mw arch mac_tips and tricks v1.0Mw arch mac_tips and tricks v1.0
Mw arch mac_tips and tricks v1.0
 
Proper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoSProper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoS
 
Logging for hackers SAINTCON
Logging for hackers SAINTCONLogging for hackers SAINTCON
Logging for hackers SAINTCON
 
Sandbox vs manual malware analysis v1.1
Sandbox vs manual malware analysis v1.1Sandbox vs manual malware analysis v1.1
Sandbox vs manual malware analysis v1.1
 
Proper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoSProper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoS
 
Logging for Hackers - What you need to know to catch them
Logging for Hackers - What you need to know to catch themLogging for Hackers - What you need to know to catch them
Logging for Hackers - What you need to know to catch them
 
RMISC logging for hackers
RMISC logging for hackersRMISC logging for hackers
RMISC logging for hackers
 

Dernier

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Dernier (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

What you need to know about all the breaches v1.0

  • 1. With all the breaches What YOU need to know Michael Gough – Co-Founder MalwareArchaeology.com IMFSecurity.com LOG-MD.com
  • 2. Who am I • Blue Team Defender Ninja, Incident Responders, Malware Archaeologist • I help people recover from breaches, evaluate malware • Co-Creator of “Log-MD” – The Log and Malicious Discovery Tool Podcast - “Brakeing Down Incident Response” LOG-MD.com
  • 3. Where to find me • Twitter - @HackerHurricane • Blog – HackerHurricane.com • Website – MalwareArchaeology.com • Windows Incident Response Tool – LOG-MD.com LOG-MD.com
  • 5. You’re Next 97,000 76 Mil + 8 Mil 1000+ Businesses395 Stores 4.5 Million 25,000 4.9 Million 4.03 Million 105k trans 40 Million 40+70 Million $148 Mil 33 locations 650k - 2010 ?????? 76,000 670,000 1900 locations 145 Million 20,000 3 Million 35,000 60,000 alerts 990,000 56 Mil 550,000 TBD Citigroup, E*Trade Financial Corp., Regions Financial Crop, HSBC Holdings and ADP ??????
  • 6. Yup, our Personal Info is gone MalwareArchaeology.com
  • 7. ATM Fraud via Malware LOG-MD.com
  • 8. Malware focuses on one main OS LOG-MD.com
  • 9. MAC Malware • So get a MAC • 90+% less chance of getting malware • MUCH safer to use • Than Windows • Stats do not lie LOG-MD.com
  • 11. Debit Cards • They are a REALLY bad idea these days • With fraud so high, your checking account is at risk • Remember the movie ‘Catch me if you can’? LOG-MD.com
  • 12. Debit Cards • Use it at ONE place and ONE place only !!! – The Grocery Store • You can pay for food AND get cash, so it is an ATM too • Use the SAME chain when traveling • Then if it gets compromised you know EXACTLY where LOG-MD.com
  • 13. Credit Cards • They are insured • No risk to you • 30 days or so until you have to pay your bill • Debit Cards are taken directly out of your checking account • It is always better to use someone else's $$$ before yours LOG-MD.com
  • 14. Shredding • People do not do enough of this • It is cheap and easy • Shred your stuff • Even Frank says so • Don’t throw away mail, shred it ! LOG-MD.com
  • 15. Credit Monitoring LOG-MD.com I’m a Security Monitor… You are being robbed
  • 16. Credit Monitoring • It let’s you know something has occurred • Usually way too late for you to do anything about it • 10 days was my experience when I unfroze my credit to buy our property here in Salado • We already closed the deal before I was notified • It is NOT worth the money… unless FREE LOG-MD.com
  • 17. Credit Freeze – Your BEST Friend • There are FIVE (5) agencies – Bet you thought there were only 3 • Equifax • Experian • Trans Union • Innovis • NCTUE (Telco’s) – Serviced by Equifax LOG-MD.com
  • 18. How to Place a Freeze • Equifax – https://help.equifax.com/s/article/What-are-the-security- freeze-fees-in-my-state • Experian – https://www.experian.com/freeze/center.html • Trans Union – https://www.transunion.com/credit-freeze • Innovis – https://www.innovis.com/personal/securityFreeze • NCTUE – 1-866-349-5355 LOG-MD.com
  • 19. Credit Freeze • Security researcher and author Brian Krebs does more research on this subject than anyone • https://krebsonsecurity.com/2015/06/how-i- learned-to-stop-worrying-and-embrace-the- security-freeze/ • You can see articles on ATM skimmers and other credit card fraud LOG-MD.com
  • 20. Credit Offers • Placing a security alert at ChexSystems, which is used by thousands of banks to verify customers that are requesting new checking and savings accounts. In addition, consumers can opt out of pre-approved credit offers by calling 1-888-5-OPT-OUT (1-888-567-8688), or visit optoutprescreen.com LOG-MD.com
  • 21. Salary History • How to Opt Out of Equifax Revealing Your Salary History • To place a security freeze on your The Work Number employment report, send your request via mail to: • TALX Corporation ATTN: Employment Data Report Dept 19-10 11432 Lackland Road St. Louis, Missouri 63146 • Or, you may contact them at http://www.theworknumber.com • or call 800-996-7566. LOG-MD.com
  • 22. RoboCalls • They are annoying • Your Cell provider offers a service for around $3/mo. • There are apps for your phone too, also around $3/mo. • It is about all you can do until Congress changes the law – So send them an email and/or call them LOG-MD.com
  • 23. Email.. Is EVIL • Please learn NOT to open attachments • Or click on Links/URLs in emails LOG-MD.com
  • 24. Passwords • Use a Password Manager • LastPass is my favorite • DON’T REUSE PASSWORDS • Different for every website LOG-MD.com
  • 25. Two-Factor - MFA • Anywhere you can USE IT !!! • It is an App on your phone that provides an expiring token every minute that you enter in websites or applications that support it • Even if you password is stolen, if you are using 2-Factor then they would need your phone to get the tokens • Google Authenticator for LastPass is awesome LOG-MD.com
  • 26. Questions • You can find us on the Twitters – @HackerHurricane – @Boettcherpwned • LOG-MD.com • MalwareArchaeology.com • Preso will be on SlideShare and linked on MalwareArchaeology.com • Listen to the BDIR PodCast to hear more on email phishing – BDIRPodcast.com LOG-MD.com