SlideShare une entreprise Scribd logo
1  sur  46
Latest challenges in the field of cybersecurity.
Analyzing online and offline cyber threats.
Assoc. Prof. Dr. Ioan-Cosmin MIHAI
“Al. I. Cuza” Police Academy, ROMANIA
Cyber Security Protection Summit
June 11, 2019, Lima, Peru
#ProtectionPeru2019
THE SPEAKER
The University Politehnica of Bucharest
Associate Professor
The Romanian Centre of Excellence for
Cybercrime (CYBEREX)
Trainer
The Romanian Association for Information
Security Assurance (RAISA)
Vice President
The Quality, Reliability and Information
Technology Laboratory (EUROQUAL)
Researcher
“Carol I” National Defence University
Associate Professor
“Alexandru Ioan Cuza” Police Academy
Associate Professor
The CT University of India
Honorary Professor
The Romanian National Institute of
Magistracy (NIM)
Trainer
The Romanian Superior Council of
Magistracy (SCM)
Trainer
The European Union Agency for Law
Enforcement Training (CEPOL)
Trainer
The Romanian National Computer Security
Incident Response Team (CERT-RO)
Trainer
The General Inspectorate of Romanian Police
The Cybercrime Unit (GIRP)
Trainer
AGENDA
• The technical challenges in cybersecurity:
• Software challenges;
• Hardware challenges;
• Cyber agents and their motivation;
• Solutions for fighting the cyber threats.
#ProtectionPeru2019
SOFTWARE CHALLENGES
Source: ENISA Threat
Landscape Report 2018
MALWARE STATISTICS
Source: AV-TEST Institute
Total malware Android malware
MacOS malware
MOST AFFECTED OPERATING SYSTEMS
Source: CERT-RO
0.44%
7.76%
20.65%
30.13%
41.02%
0.00% 5.00% 10.00% 15.00% 20.00% 25.00% 30.00% 35.00% 40.00% 45.00%
Windows
UPnP OS
Network Devices Firmware/OS
Unix
Linux
#ProtectionPeru2019
GEOGRAPHY OF LOCAL MALWARE ATTACKS
Source: Kaspersky
Chile – 19,0%
Colombia – 23,3%
Brazil – 29.8%
Ecuador – 32,2%
Peru – 36,6%
Venezuela – 40,0%
Bolivia – 40,6%
FINANCIAL TROJANS
The most important financial trojans:
• Zeus (2006)
• Ramnit (2011)
• Citadel (2012)
• Dridex (2014)
• Dorkbot (2015)
• BackSwap (2018)
• Cobalt (2016)
#ProtectionPeru2019
CARBANAK / COBALT
Source: EUROPOL
#ProtectionPeru2019
RANSOMWARE
The most important ransomware:
• CryptoLocker (2013)
• CTB-Locker (2014)
• Locky (2016)
• WannaCry (2017)
• Petya (2017)
• Bad Rabbit (2017)
• PUBG (2018)
#ProtectionPeru2019
NO MORE RANSOM PROJECT
Source: https://www.nomoreransom.org
CRYPTOJACKING
The most important cryptojacking threats:
• Coinhive (2017)
• Cryptoloot (2017)
• JSEcoin (2017)
• XMRig (2017)
• Cgminer (2017)
• Authedmine (2017)
• RubyMiner (2017)
CRYPTOJACKING
Source: https://hackernoon.com
BOTNETS
The most important botnets malware:
• Conficker (2008)
• Mariposa (2008)
• Kraken (2008)
• ZeroAccess (2011)
• Necurs (2012)
• Windigo (2013)
• Mirai (2016)
BOTNETS
Source: www.emsisoft.com
TECHNICAL CHALLENGES
• Glitch (CVE-2018-10229)  GPU
• Spectre (CVE-2017-5753)  CPU
• Meltdown (CVE-2017-5754)  CPU
• Rowhammer (CVE-2015-3693)  RAM
• BadUSB (CVE-2014-4115)  USB ports
16
ONLINE ATTACK VECTORS
EMAIL BASED ATTACKS
Spear-phishing campaigns
Source: Symantec
• Spamming;
• Spoofing;
• Phishing;
• Spear-phishing;
• Clone phishing;
• Whaling;
• Bombing;
• Chain-letters.
COMPOSITION OF EMAILS
Emails consist of:
• Envelope Headers – automated generated during the
transport of the message;
• Message Headers – contain information required to
deliver the message (information provided by sender);
• Body – the message itself;
• Attachments – attachments to the e-mail (part of the
body).
#ProtectionPeru2019
STANDARD HEADERS
Return-path: <user@domain.com>
Envelope-to: user@domain.com
Delivery-date: Tue, 10 Jan 2017 17:53:10 +0200
Received: from …
Message-ID: <54B53F63.5090302@domain.com>
Date: Tue, 13 Jan 2017 17:53:07 +0200
From: User <user@domain.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: user@domain.com
Subject: Plain message
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
ENVELOPE HEADERS
Received: from gts4.roserve.net ([128.abc.def.216]:57164)
by gts5.roserve.net with esmtps (TLSv1.2:DHE-RSA-AES256-GCM-
SHA384:256)
(envelope-from <user1@domain1.com>)
id 1YB4bd-0001zn-Fb
for user2@domain2.com; Tue, 10 Jan 2017 18:46:13 +0200
Received: from [77.ab.cd.134] (port=51414 helo=[192.168.0.100])
by gts4.roserve.net with esmtpsa (TLSv1.2:DHE-RSA-AES128-SHA:128)
(envelope-from <user1@domain1.com>)
id 1YB4ba-0001xz-Ps
for user2@domain2.com; Tue, 10 Jan 2017 18:46:13 +0200
Message-ID: <54B54BD1.9060905@domain1.com>
[77.ab.cd.134]
port=51407
helo=[192.168.0.100]
gts4.roserve.net
[128.abc.def.216]:57164
gts5.roserve.net
user2@domain2.com user1@domain1.com
EMAIL HEADER ANALYZER
URL: https://toolbox.googleapps.com/apps/messageheader/
HOW TO DETECT A PHISHING EMAIL
Don’t trust the display name
of the sender
Be careful with the files
attached to email
Check the salutation Check the links before click
Check for spelling errors
Is the email asking for
personal information?
Check the email signature Beware of urgency
WEB BASED ATTACKS
GEOGRAPHY OF MALICIOUS WEB ATTACKS
Source: Kaspersky
Colombia – 16,4%
Peru – 16,6%
Bolivia – 16,8%
Ecuador – 16,8%
Chile – 19,2%
Brazil – 21,5%
Venezuela – 35,9%
SOCIAL MEDIA BASED ATTACKS
Source: Symantec
SOCIAL ENGINEERING
INTELTECHNIQUES SEARCH TOOLS
https://inteltechniques.com/menu.html
CREATING THE FACEBOOK USER PROFILE
Places visited Places liked
Photos liked Photo comments
Photos by user Photos of-tagged
Posts liked Posts comments
Posts by year Posts tagged
Videos liked Videos comments
Events invited Events attended
Groups Pages liked
Friends Followers
#ProtectionPeru2019
OFFLINE ATTACK VECTORS
USB MEMORY STICKS
USB Microcontroller
BadUSB
#ProtectionPeru2019
ELECTROMAGNETIC EMANATIONS
Source: UC3M
THREATS AGENTS AND THEIR MOTIVATION
THREAT AGENTS
Cyber-criminals Hacktivists
Insiders Cyber-fighters
Nation States Cyber-terrorists
Corporations Script Kiddies
DISTRIBUTION OF TARGETS
Source: www.hackmageddon.com
MOTIVATION BEHIND ATTACKS
Source: www.hackmageddon.com
FIGHTING CYBER-THREATS
#ProtectionPeru2019
LAW ENFORCEMENT vs CYBER CRIMINALS
LAW ENFORCEMENT CYBER CRIMINALS
Laws No rules
Procedures No borders
Bureaucracy Resources
Cooperation Tools & documentation in Darknet
DARKNET
Source: Dream Market (2019)
DATA BREACHES
Source: CB Insights
COMPANY COMPROMISED ACCOUNTS DATE
Yahoo 3 billions Aug. 2013
Marriott 500 millions Nov. 2018
Yahoo 500 millions Sep. 2016
Friend Finder Network 412 millions Nov. 2016
MySpace 360 millions May 2016
Equifax 143 millions Jul. 2017
EBay 145 millions May 2014
LinkedIn 117 millions May 2016
MyHeritage 92 millions Jun. 2018
JP Morgan Chase 76 millions Oct. 2014
Sony PlayStation 77 millions Apr. 2011
Tumblr 65 millions Feb. 2013
Uber 57 millions Nov. 2017
Facebook 50 millions Mar. 2018
WHAT DO WE NEED
 Comprehensive and up-to-date legislation;
 Cooperation mechanisms:
• Sharing information and incidents;
• Public-private-academia partnerships;
 Cyber capabilities:
• Projects research and development;
• Modern trainings and investigation tools;
 Education, prevention, and awareness programs;
 Cybersecurity exercises at national and international level.
43
BASIC CYBER HYGIENE
• Minimizing administrative privileges;
• Application directory white listing;
• Application patching;
• System patching;
• Network segmentation and segregation.
BEST PRACTICES FOR USERS
• Use security policies;
• Use proactive security solutions;
• Update the operating system;
• Update the applications;
• Backup the important files.
#ProtectionPeru2019
CONTACT DETAILS
linkedin.com/in/ICMihai
facebook.com/ICMihai
Assoc. Prof. Dr. Ioan-Cosmin Mihai
cosmin.mihai@raisa.org
0040.729.99.77.23
www.cosmin-mihai.com

Contenu connexe

Tendances

Tendances (20)

Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
 
Exploring the Capabilities and Economics of Cybercrime
Exploring the Capabilities and Economics of CybercrimeExploring the Capabilities and Economics of Cybercrime
Exploring the Capabilities and Economics of Cybercrime
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
 
Healthcare Cybersecurity Survey 2018 - Sirius
Healthcare Cybersecurity Survey 2018 - SiriusHealthcare Cybersecurity Survey 2018 - Sirius
Healthcare Cybersecurity Survey 2018 - Sirius
 
2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
 
Cyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber CriminalsCyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber Criminals
 
Detection and Response with Splunk+FireEye
Detection and Response with Splunk+FireEyeDetection and Response with Splunk+FireEye
Detection and Response with Splunk+FireEye
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five Controls
 
INTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICSINTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICS
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
Ict 2015   saga - cisco cybersecurity rešenja- Viktor VargaIct 2015   saga - cisco cybersecurity rešenja- Viktor Varga
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
 
FireEye
FireEyeFireEye
FireEye
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
Detect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksDetect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted Attacks
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Corporate threat vector and landscape
Corporate threat vector and landscapeCorporate threat vector and landscape
Corporate threat vector and landscape
 

Similaire à Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Cibernéticas Online y Offline

Stop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by DownloadsStop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
Invincea, Inc.
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
Russell Publishing
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
sudip pudasaini
 

Similaire à Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Cibernéticas Online y Offline (20)

Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
 
need for NS.ppt
need for NS.pptneed for NS.ppt
need for NS.ppt
 
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
 
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by DownloadsStop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
 
Network security
Network securityNetwork security
Network security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.ppt
 
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
 
Secure by design and secure software development
Secure by design and secure software developmentSecure by design and secure software development
Secure by design and secure software development
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Security Lifecycle Management Process
Security Lifecycle Management ProcessSecurity Lifecycle Management Process
Security Lifecycle Management Process
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Discovering the Value of Verifying Web Application Security Using IBM Rationa...Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
 
Secure Web Apps Training at Corporate College
Secure Web Apps Training at Corporate CollegeSecure Web Apps Training at Corporate College
Secure Web Apps Training at Corporate College
 
Security Firm Program - Corporate College
Security Firm Program - Corporate CollegeSecurity Firm Program - Corporate College
Security Firm Program - Corporate College
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Jean pier talbot - web is the battlefield - atlseccon2011
Jean pier talbot - web is the battlefield - atlseccon2011Jean pier talbot - web is the battlefield - atlseccon2011
Jean pier talbot - web is the battlefield - atlseccon2011
 

Plus de Cristian Garcia G.

Plus de Cristian Garcia G. (20)

Making App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously EasyMaking App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously Easy
 
Ciberseguridad Alineada al Negocio
Ciberseguridad Alineada al NegocioCiberseguridad Alineada al Negocio
Ciberseguridad Alineada al Negocio
 
Reducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridadReducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridad
 
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio. Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
 
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACiberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IA
 
Symantec Enterprise Cloud
Symantec Enterprise CloudSymantec Enterprise Cloud
Symantec Enterprise Cloud
 
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
 
Protección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-DatacenterProtección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-Datacenter
 
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo TecnológicoLa Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
 
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
 
Gestión de la Exposición
Gestión de la ExposiciónGestión de la Exposición
Gestión de la Exposición
 
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
 
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbridoUn enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
 
La crisis de identidad que se avecina
La crisis de identidad que se avecinaLa crisis de identidad que se avecina
La crisis de identidad que se avecina
 
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxitoSimplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
 
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
 
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOCStay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
 
La evolución de IBM Qradar Suite
La evolución de IBM Qradar SuiteLa evolución de IBM Qradar Suite
La evolución de IBM Qradar Suite
 
Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD
 
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Cibernéticas Online y Offline

  • 1. Latest challenges in the field of cybersecurity. Analyzing online and offline cyber threats. Assoc. Prof. Dr. Ioan-Cosmin MIHAI “Al. I. Cuza” Police Academy, ROMANIA Cyber Security Protection Summit June 11, 2019, Lima, Peru #ProtectionPeru2019
  • 2. THE SPEAKER The University Politehnica of Bucharest Associate Professor The Romanian Centre of Excellence for Cybercrime (CYBEREX) Trainer The Romanian Association for Information Security Assurance (RAISA) Vice President The Quality, Reliability and Information Technology Laboratory (EUROQUAL) Researcher “Carol I” National Defence University Associate Professor “Alexandru Ioan Cuza” Police Academy Associate Professor The CT University of India Honorary Professor The Romanian National Institute of Magistracy (NIM) Trainer The Romanian Superior Council of Magistracy (SCM) Trainer The European Union Agency for Law Enforcement Training (CEPOL) Trainer The Romanian National Computer Security Incident Response Team (CERT-RO) Trainer The General Inspectorate of Romanian Police The Cybercrime Unit (GIRP) Trainer
  • 3. AGENDA • The technical challenges in cybersecurity: • Software challenges; • Hardware challenges; • Cyber agents and their motivation; • Solutions for fighting the cyber threats. #ProtectionPeru2019
  • 4. SOFTWARE CHALLENGES Source: ENISA Threat Landscape Report 2018
  • 5. MALWARE STATISTICS Source: AV-TEST Institute Total malware Android malware MacOS malware
  • 6. MOST AFFECTED OPERATING SYSTEMS Source: CERT-RO 0.44% 7.76% 20.65% 30.13% 41.02% 0.00% 5.00% 10.00% 15.00% 20.00% 25.00% 30.00% 35.00% 40.00% 45.00% Windows UPnP OS Network Devices Firmware/OS Unix Linux #ProtectionPeru2019
  • 7. GEOGRAPHY OF LOCAL MALWARE ATTACKS Source: Kaspersky Chile – 19,0% Colombia – 23,3% Brazil – 29.8% Ecuador – 32,2% Peru – 36,6% Venezuela – 40,0% Bolivia – 40,6%
  • 8. FINANCIAL TROJANS The most important financial trojans: • Zeus (2006) • Ramnit (2011) • Citadel (2012) • Dridex (2014) • Dorkbot (2015) • BackSwap (2018) • Cobalt (2016) #ProtectionPeru2019
  • 9. CARBANAK / COBALT Source: EUROPOL #ProtectionPeru2019
  • 10. RANSOMWARE The most important ransomware: • CryptoLocker (2013) • CTB-Locker (2014) • Locky (2016) • WannaCry (2017) • Petya (2017) • Bad Rabbit (2017) • PUBG (2018) #ProtectionPeru2019
  • 11. NO MORE RANSOM PROJECT Source: https://www.nomoreransom.org
  • 12. CRYPTOJACKING The most important cryptojacking threats: • Coinhive (2017) • Cryptoloot (2017) • JSEcoin (2017) • XMRig (2017) • Cgminer (2017) • Authedmine (2017) • RubyMiner (2017)
  • 14. BOTNETS The most important botnets malware: • Conficker (2008) • Mariposa (2008) • Kraken (2008) • ZeroAccess (2011) • Necurs (2012) • Windigo (2013) • Mirai (2016)
  • 16. TECHNICAL CHALLENGES • Glitch (CVE-2018-10229)  GPU • Spectre (CVE-2017-5753)  CPU • Meltdown (CVE-2017-5754)  CPU • Rowhammer (CVE-2015-3693)  RAM • BadUSB (CVE-2014-4115)  USB ports 16
  • 17.
  • 19. EMAIL BASED ATTACKS Spear-phishing campaigns Source: Symantec • Spamming; • Spoofing; • Phishing; • Spear-phishing; • Clone phishing; • Whaling; • Bombing; • Chain-letters.
  • 20. COMPOSITION OF EMAILS Emails consist of: • Envelope Headers – automated generated during the transport of the message; • Message Headers – contain information required to deliver the message (information provided by sender); • Body – the message itself; • Attachments – attachments to the e-mail (part of the body). #ProtectionPeru2019
  • 21. STANDARD HEADERS Return-path: <user@domain.com> Envelope-to: user@domain.com Delivery-date: Tue, 10 Jan 2017 17:53:10 +0200 Received: from … Message-ID: <54B53F63.5090302@domain.com> Date: Tue, 13 Jan 2017 17:53:07 +0200 From: User <user@domain.com> User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:31.0) Gecko/20100101 Thunderbird/31.3.0 MIME-Version: 1.0 To: user@domain.com Subject: Plain message Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit
  • 22. ENVELOPE HEADERS Received: from gts4.roserve.net ([128.abc.def.216]:57164) by gts5.roserve.net with esmtps (TLSv1.2:DHE-RSA-AES256-GCM- SHA384:256) (envelope-from <user1@domain1.com>) id 1YB4bd-0001zn-Fb for user2@domain2.com; Tue, 10 Jan 2017 18:46:13 +0200 Received: from [77.ab.cd.134] (port=51414 helo=[192.168.0.100]) by gts4.roserve.net with esmtpsa (TLSv1.2:DHE-RSA-AES128-SHA:128) (envelope-from <user1@domain1.com>) id 1YB4ba-0001xz-Ps for user2@domain2.com; Tue, 10 Jan 2017 18:46:13 +0200 Message-ID: <54B54BD1.9060905@domain1.com>
  • 24. EMAIL HEADER ANALYZER URL: https://toolbox.googleapps.com/apps/messageheader/
  • 25. HOW TO DETECT A PHISHING EMAIL Don’t trust the display name of the sender Be careful with the files attached to email Check the salutation Check the links before click Check for spelling errors Is the email asking for personal information? Check the email signature Beware of urgency
  • 27. GEOGRAPHY OF MALICIOUS WEB ATTACKS Source: Kaspersky Colombia – 16,4% Peru – 16,6% Bolivia – 16,8% Ecuador – 16,8% Chile – 19,2% Brazil – 21,5% Venezuela – 35,9%
  • 28. SOCIAL MEDIA BASED ATTACKS Source: Symantec
  • 31. CREATING THE FACEBOOK USER PROFILE Places visited Places liked Photos liked Photo comments Photos by user Photos of-tagged Posts liked Posts comments Posts by year Posts tagged Videos liked Videos comments Events invited Events attended Groups Pages liked Friends Followers #ProtectionPeru2019
  • 33. USB MEMORY STICKS USB Microcontroller BadUSB #ProtectionPeru2019
  • 35. THREATS AGENTS AND THEIR MOTIVATION
  • 36. THREAT AGENTS Cyber-criminals Hacktivists Insiders Cyber-fighters Nation States Cyber-terrorists Corporations Script Kiddies
  • 37. DISTRIBUTION OF TARGETS Source: www.hackmageddon.com
  • 38. MOTIVATION BEHIND ATTACKS Source: www.hackmageddon.com
  • 40. LAW ENFORCEMENT vs CYBER CRIMINALS LAW ENFORCEMENT CYBER CRIMINALS Laws No rules Procedures No borders Bureaucracy Resources Cooperation Tools & documentation in Darknet
  • 42. DATA BREACHES Source: CB Insights COMPANY COMPROMISED ACCOUNTS DATE Yahoo 3 billions Aug. 2013 Marriott 500 millions Nov. 2018 Yahoo 500 millions Sep. 2016 Friend Finder Network 412 millions Nov. 2016 MySpace 360 millions May 2016 Equifax 143 millions Jul. 2017 EBay 145 millions May 2014 LinkedIn 117 millions May 2016 MyHeritage 92 millions Jun. 2018 JP Morgan Chase 76 millions Oct. 2014 Sony PlayStation 77 millions Apr. 2011 Tumblr 65 millions Feb. 2013 Uber 57 millions Nov. 2017 Facebook 50 millions Mar. 2018
  • 43. WHAT DO WE NEED  Comprehensive and up-to-date legislation;  Cooperation mechanisms: • Sharing information and incidents; • Public-private-academia partnerships;  Cyber capabilities: • Projects research and development; • Modern trainings and investigation tools;  Education, prevention, and awareness programs;  Cybersecurity exercises at national and international level. 43
  • 44. BASIC CYBER HYGIENE • Minimizing administrative privileges; • Application directory white listing; • Application patching; • System patching; • Network segmentation and segregation.
  • 45. BEST PRACTICES FOR USERS • Use security policies; • Use proactive security solutions; • Update the operating system; • Update the applications; • Backup the important files. #ProtectionPeru2019
  • 46. CONTACT DETAILS linkedin.com/in/ICMihai facebook.com/ICMihai Assoc. Prof. Dr. Ioan-Cosmin Mihai cosmin.mihai@raisa.org 0040.729.99.77.23 www.cosmin-mihai.com

Notes de l'éditeur

  1. Player Unknown's Battlegrounds
  2. https://blog.emsisoft.com/en/27233/what-is-a-botnet/
  3. Envelope Headers can’t be forged, so are very important for investigation process.
  4. I: De ce nu stiu nimic despre Receiver?
  5. Search by keywords