CyberCrime, CyberSpy,
CyberWar – Looking back in
order to protect the future
JD Sherry
VP of Public Technology and Solutions
@jdsherry
Discussion Outcomes
I. How might organizations learn from elite hackers?
II. Given the widespread use of APTs and the evolution of the cyber
attack chain- how can advanced situational awareness be achieved?
III. Predictions for 2013 and how can we counter measure?
Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013
INFORMATION HAS BECOME
YOUR MOST STRATEGIC ASSET
Identify trends
Understand customer behavior
Analyze opportunities
Discover efficiencies
The New Reality
• One new threat created every second 1
• A cyber intrusion happens every 5 minutes 2
• Over 90% of enterprises have malware 1
• Almost 75% have one or more bots 1
• Mobile malware outpacing PC malware
– 350,000 Android pieces in 2012
Sources: 1: Trend Micro, 2012, 2: US-Cert 2012
2013 Cyber Attack Trends
•DDOS-yes still…
•Mobile Malware/Proximity attacks
•Cross-Platform Attacks
•Man-in-the-Browser Attacks
•Watering Hole Attacks
•MAC Attacks
•Cloud Attacks/Island Hopping
•SWATing
• Localized attacks such as malware that will not execute unless certain
conditions are met, such as language settings, or “watering hole”
attacks that will only affect certain geographic regions or even only
specific netblocks.
• The malware used in targeted attacks will have destructive capacity,
either as its primary intent or as a clean-up mechanism to cover the
attackers’ tracks.
• Social, political and economic indicators must be used in conjunction
with technical indicators to fully assess and analyze targeted attacks.
Targeted Attack Trends
Offense Informs Defense: Stages of Attack
1. Reconnaissance
2. Weaponization
3. Delivery
4. Exploitation
5. C&C
6. Lateral Movement
7. Exfiltration
8. Maintenance
8
6/5/2013
A Comparison of Eastern European and East Asian Blackhats
The Greatest Trick the Devil Ever Pulled was Convincing the
World that He Didn’t Exist…
• Kevin Spacey aka Verbal Kint-“The Usual Suspects”
Chinese Actors Gaining Headlines but…
• Trend Micro has concluded that Eastern European hackers pose a greater
threat than East Asian hackers
• East Asian objectives: speed and cost-effectiveness.
• Attacks are persistent, but use known vulnerabilities and malware and don’t
hide their tracks as well.
• Eastern European objectives: remain hidden throughout the operation and
build online reputation. Attacks use custom malware and innovative
techniques.
Eastern European Tactics
• Malware is innovative: RATs have all capabilities hard- coded internally;
encrypted traffic, dynamic drop zones, complex command & control
• Infrastructure is internal to the operation, or bulletproof hosts are carefully
selected
• Professionals who build a reputation over time; they respect and do not
attack the motherland
• Generally control their own servers, develop DNS servers, and create
sophisticated traffic systems for attacks. Hallmark is to maintain total
control.
In the News…
• Spanish police Ransomware-REVETON
– $1M per year revenue stream
– Victims tricked into paying attackers posing as law enforcement
– Computers compromised as well
– Trend Micro corroborates with Spanish police to bring down
• South Korean media and banking attacks
– Destructive Trojan/logic bombs that erased MBR
• Sleep cycle set to cause mayhem on March 20 at 2PM.
– Trend Micro provides intelligence prior to attack
– All codes detected by APT hunter-Deep Discovery
• Major Korean bank avoids major attack
The Children of Stuxnet-
ICS Attacks Become Mainstream
Go where the money is…
• 93.6% of the world’s currency is digital
• 6.4% cash and gold
• 95% of bank heists have an electronic vector
– (FINCEN)
Modern Day John Dillingers
Banking Malware: Customized and Quiet
• Citadel – modularized malware that steals online-banking credentials
• TinBa- Tiny Banker 56K large- memory injection
• SpyEye- Automated Transfer Systems
• Eurograbber – multistaged attacks that compromise desktops and
mobile devices
• Gozi-Prinimalka – spring attack to be aimed at 30 U.S. banking
institutions
• High Roller - uses automation to drain high-value bank accounts
Cybercrime or Cyber Warfare?
-The Shadow Economy
IaaS
DMZ
Mission Critical Servers
Endpoints
Internet
Firewall
Anti-malware
IDS / IPS
Today’s Enterprise Challenges
SaaS
• Data in motion
• Social Media
• Virtualization and Cloud
• Traditional defenses
bypassed by low and slow
attacks
How do you answer these questions?
• Have you been targeted by an attack?
 Unfortunately Yes!
 Not sure? But would like to know!
• How do you know?
 Data breach, forensic analysis
 Continuous Monitoring
 Security audit
 Incident response, alerts
 Custom threat defense
• Why are you being targeted?
• What are they after?
Detection Begins with Network Indicators
• Changing C&C protocols requires considerable effort
• Network traffic can be correlated with other indicators to provide
proactive detection
• Unknown threats may be detected by extrapolating methods and
characteristics from known threat communication behaviors
Mitigation Requires a Custom Defense
Data Center
Physical Virtual Private Cloud Public Cloud
Cloud and Data Center Security
Anti-Malware
Integrity
Monitoring
Encryption
Log
Inspection
Firewall
Intrusion
Prevention
Data Center Ops
Security
Copyright 2013 Trend Micro Inc.
Custom Defense
Network-wide
Detection
Advanced
Threat Analysis
Threat Tools
and Services
Automated
Security Updates
Threat
Intelligence
Custom
Sandboxes
Network Admin
Security
Risk Management 101
6/5/2013 Copyright 2013 Trend Micro Inc.
1. Has the cyber security posture of all third parties been audited?
2. Is access to all sensitive systems and computers governed by two factor authentication?
3. Does a log inspection program exist? How frequently are they reviewed?
4. Does file integrity monitoring exist?
5. Can vulnerabilities be virtually patched?
6. Is MDM and Mobile Application Reputation software utilized?
7. Do you utilize a DLP?
8. Can you migrate your layered security into the cloud?
9. Do you maintain multi-level rule-based event correlation? Is there custom sandbox
analysis?
10. Do you have access to global threat intelligence?
11. Can you transfer your risk?
27Copyright © 2013 Trend Micro Incorporated.All rights reserved.
Thank You!
jd_sherry@trendmicro.com
@jdsherry

More Related Content

PPTX
Cyber-Espionage: Understanding the Advanced Threat Landscape
PPTX
Threat intelligence in security
PPTX
Cyber Threat Simulation Training
PDF
Incident handling of cyber espionage
PDF
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
PPTX
The Sweet Spot of Cyber Intelligence
PPTX
Cyber Threat Intelligence
PPTX
Cyber Crimes: The next five years.
Cyber-Espionage: Understanding the Advanced Threat Landscape
Threat intelligence in security
Cyber Threat Simulation Training
Incident handling of cyber espionage
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Sweet Spot of Cyber Intelligence
Cyber Threat Intelligence
Cyber Crimes: The next five years.

What's hot (18)

PDF
4. Mitigating a Cyber Attack
PDF
Welcome to the world of Cyber Threat Intelligence
PDF
Insa cyber intelligence 2011
PPTX
Cyber Threat Hunting Workshop
PPSX
Cyber Security Awareness Month 2017-Wrap-Up
PDF
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
PDF
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
PPT
Emerging Threats and Strategies of Defense
PDF
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
PPTX
Ethical Hacking
PPTX
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
PDF
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
PDF
Security Solution - IBM Business Connect Qatar Defend your company against cy...
PPT
Introduction To Ethical Hacking
PDF
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
PDF
Insider threat-what-us-do d-want
PDF
Whitepaper Avira about Artificial Intelligence to cyber security
4. Mitigating a Cyber Attack
Welcome to the world of Cyber Threat Intelligence
Insa cyber intelligence 2011
Cyber Threat Hunting Workshop
Cyber Security Awareness Month 2017-Wrap-Up
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Emerging Threats and Strategies of Defense
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Ethical Hacking
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Security Solution - IBM Business Connect Qatar Defend your company against cy...
Introduction To Ethical Hacking
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
Insider threat-what-us-do d-want
Whitepaper Avira about Artificial Intelligence to cyber security
Ad

Similar to Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the lessons from the past, to build for the future (20)

PPT
Mark Arena - Cyber Threat Intelligence #uisgcon9
PPTX
Emerging Threats to Infrastructure
PDF
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
PPT
Cyber Security Emerging Threats
PPTX
Cyber security # Lec 1
PDF
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
PDF
PPT
Combating Cyber Threats: Cyber Thread Information Program
PPTX
Zero Trust.pptx
PPTX
Cyber Sec Update Secure World Seattle Nov 13, 2014
PDF
Raimund genes from traditional malware to targeted attacks
PPTX
NRF Presentation v2
PPTX
LIFT OFF 2017: Ransomware and IR Overview
PDF
SecurityOperations
PPTX
Cyber Crime Threat Landscape - A Focus on the Financial Industry
PPTX
How secure are you?
PDF
Managed security services for financial services firms
PDF
Who is the next target proactive approaches to data security
PDF
M1-02-HowCriminalsPlan.pdf
PDF
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
Mark Arena - Cyber Threat Intelligence #uisgcon9
Emerging Threats to Infrastructure
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
Cyber Security Emerging Threats
Cyber security # Lec 1
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
Combating Cyber Threats: Cyber Thread Information Program
Zero Trust.pptx
Cyber Sec Update Secure World Seattle Nov 13, 2014
Raimund genes from traditional malware to targeted attacks
NRF Presentation v2
LIFT OFF 2017: Ransomware and IR Overview
SecurityOperations
Cyber Crime Threat Landscape - A Focus on the Financial Industry
How secure are you?
Managed security services for financial services firms
Who is the next target proactive approaches to data security
M1-02-HowCriminalsPlan.pdf
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
Ad

More from Graeme Wood (14)

PPTX
TechCatalyst free assessment
PDF
TechCatalyst Corporate Overview
PPTX
How does semantic technology work?
PDF
AI and the Financial Service Segment
PDF
Ai and Legal Industy - Executive Overview
PDF
Semantic Computing Executive Briefing
PPTX
Introduction to Semantic Computing
PDF
AIIA_DataAnalytics_Project_External_20160721
PDF
CSA Introduction 2013 David Ross
PDF
andrew milroy - top security trends and takeaways for 2013
PDF
Anz campaign creative 11 sept 2010
PDF
Anz cloud thought leadership 16 mar
PDF
Vmware Seminar Security & Compliance for the cloud with Trend Micro
PPT
Trend Micro VForum Agentless Scanning Presentation
TechCatalyst free assessment
TechCatalyst Corporate Overview
How does semantic technology work?
AI and the Financial Service Segment
Ai and Legal Industy - Executive Overview
Semantic Computing Executive Briefing
Introduction to Semantic Computing
AIIA_DataAnalytics_Project_External_20160721
CSA Introduction 2013 David Ross
andrew milroy - top security trends and takeaways for 2013
Anz campaign creative 11 sept 2010
Anz cloud thought leadership 16 mar
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Trend Micro VForum Agentless Scanning Presentation

Recently uploaded (20)

PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PPTX
Presentation - Principles of Instructional Design.pptx
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PDF
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
CEH Module 2 Footprinting CEH V13, concepts
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PPTX
Internet of Everything -Basic concepts details
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
Early detection and classification of bone marrow changes in lumbar vertebrae...
giants, standing on the shoulders of - by Daniel Stenberg
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Electrocardiogram sequences data analytics and classification using unsupervi...
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
Presentation - Principles of Instructional Design.pptx
Rapid Prototyping: A lecture on prototyping techniques for interface design
EIS-Webinar-Regulated-Industries-2025-08.pdf
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
A symptom-driven medical diagnosis support model based on machine learning te...
CEH Module 2 Footprinting CEH V13, concepts
Advancing precision in air quality forecasting through machine learning integ...
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
Internet of Everything -Basic concepts details
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
SGT Report The Beast Plan and Cyberphysical Systems of Control
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf

Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the lessons from the past, to build for the future

  • 1. CyberCrime, CyberSpy, CyberWar – Looking back in order to protect the future JD Sherry VP of Public Technology and Solutions @jdsherry
  • 2. Discussion Outcomes I. How might organizations learn from elite hackers? II. Given the widespread use of APTs and the evolution of the cyber attack chain- how can advanced situational awareness be achieved? III. Predictions for 2013 and how can we counter measure?
  • 3. Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013 INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET Identify trends Understand customer behavior Analyze opportunities Discover efficiencies
  • 4. The New Reality • One new threat created every second 1 • A cyber intrusion happens every 5 minutes 2 • Over 90% of enterprises have malware 1 • Almost 75% have one or more bots 1 • Mobile malware outpacing PC malware – 350,000 Android pieces in 2012 Sources: 1: Trend Micro, 2012, 2: US-Cert 2012
  • 5. 2013 Cyber Attack Trends •DDOS-yes still… •Mobile Malware/Proximity attacks •Cross-Platform Attacks •Man-in-the-Browser Attacks •Watering Hole Attacks •MAC Attacks •Cloud Attacks/Island Hopping •SWATing
  • 6. • Localized attacks such as malware that will not execute unless certain conditions are met, such as language settings, or “watering hole” attacks that will only affect certain geographic regions or even only specific netblocks. • The malware used in targeted attacks will have destructive capacity, either as its primary intent or as a clean-up mechanism to cover the attackers’ tracks. • Social, political and economic indicators must be used in conjunction with technical indicators to fully assess and analyze targeted attacks. Targeted Attack Trends
  • 7. Offense Informs Defense: Stages of Attack 1. Reconnaissance 2. Weaponization 3. Delivery 4. Exploitation 5. C&C 6. Lateral Movement 7. Exfiltration 8. Maintenance
  • 9. A Comparison of Eastern European and East Asian Blackhats
  • 10. The Greatest Trick the Devil Ever Pulled was Convincing the World that He Didn’t Exist… • Kevin Spacey aka Verbal Kint-“The Usual Suspects”
  • 11. Chinese Actors Gaining Headlines but… • Trend Micro has concluded that Eastern European hackers pose a greater threat than East Asian hackers • East Asian objectives: speed and cost-effectiveness. • Attacks are persistent, but use known vulnerabilities and malware and don’t hide their tracks as well. • Eastern European objectives: remain hidden throughout the operation and build online reputation. Attacks use custom malware and innovative techniques.
  • 12. Eastern European Tactics • Malware is innovative: RATs have all capabilities hard- coded internally; encrypted traffic, dynamic drop zones, complex command & control • Infrastructure is internal to the operation, or bulletproof hosts are carefully selected • Professionals who build a reputation over time; they respect and do not attack the motherland • Generally control their own servers, develop DNS servers, and create sophisticated traffic systems for attacks. Hallmark is to maintain total control.
  • 13. In the News… • Spanish police Ransomware-REVETON – $1M per year revenue stream – Victims tricked into paying attackers posing as law enforcement – Computers compromised as well – Trend Micro corroborates with Spanish police to bring down • South Korean media and banking attacks – Destructive Trojan/logic bombs that erased MBR • Sleep cycle set to cause mayhem on March 20 at 2PM. – Trend Micro provides intelligence prior to attack – All codes detected by APT hunter-Deep Discovery • Major Korean bank avoids major attack
  • 14. The Children of Stuxnet-
  • 15. ICS Attacks Become Mainstream
  • 16. Go where the money is… • 93.6% of the world’s currency is digital • 6.4% cash and gold • 95% of bank heists have an electronic vector – (FINCEN)
  • 17. Modern Day John Dillingers
  • 18. Banking Malware: Customized and Quiet • Citadel – modularized malware that steals online-banking credentials • TinBa- Tiny Banker 56K large- memory injection • SpyEye- Automated Transfer Systems • Eurograbber – multistaged attacks that compromise desktops and mobile devices • Gozi-Prinimalka – spring attack to be aimed at 30 U.S. banking institutions • High Roller - uses automation to drain high-value bank accounts
  • 19. Cybercrime or Cyber Warfare? -The Shadow Economy
  • 20. IaaS DMZ Mission Critical Servers Endpoints Internet Firewall Anti-malware IDS / IPS Today’s Enterprise Challenges SaaS • Data in motion • Social Media • Virtualization and Cloud • Traditional defenses bypassed by low and slow attacks
  • 21. How do you answer these questions? • Have you been targeted by an attack?  Unfortunately Yes!  Not sure? But would like to know! • How do you know?  Data breach, forensic analysis  Continuous Monitoring  Security audit  Incident response, alerts  Custom threat defense • Why are you being targeted? • What are they after?
  • 22. Detection Begins with Network Indicators • Changing C&C protocols requires considerable effort • Network traffic can be correlated with other indicators to provide proactive detection • Unknown threats may be detected by extrapolating methods and characteristics from known threat communication behaviors
  • 23. Mitigation Requires a Custom Defense
  • 24. Data Center Physical Virtual Private Cloud Public Cloud Cloud and Data Center Security Anti-Malware Integrity Monitoring Encryption Log Inspection Firewall Intrusion Prevention Data Center Ops Security
  • 25. Copyright 2013 Trend Micro Inc. Custom Defense Network-wide Detection Advanced Threat Analysis Threat Tools and Services Automated Security Updates Threat Intelligence Custom Sandboxes Network Admin Security
  • 26. Risk Management 101 6/5/2013 Copyright 2013 Trend Micro Inc. 1. Has the cyber security posture of all third parties been audited? 2. Is access to all sensitive systems and computers governed by two factor authentication? 3. Does a log inspection program exist? How frequently are they reviewed? 4. Does file integrity monitoring exist? 5. Can vulnerabilities be virtually patched? 6. Is MDM and Mobile Application Reputation software utilized? 7. Do you utilize a DLP? 8. Can you migrate your layered security into the cloud? 9. Do you maintain multi-level rule-based event correlation? Is there custom sandbox analysis? 10. Do you have access to global threat intelligence? 11. Can you transfer your risk?
  • 27. 27Copyright © 2013 Trend Micro Incorporated.All rights reserved. Thank You! [email protected] @jdsherry