SlideShare a Scribd company logo
Outpost24 Template
2019
Enhance User Security to Stop the Cyber-Attack Cycle
Bob Egner Darren James
Outpost24 Specops Software
Classification: Open
November 23, 2021
The speakers
2
Bob Egner
Outpost24
Head of Products
Darren James
Specops Software
Product Specialist
and Technical Lead
• Identify and manage
cyber-security
exposure
• Full stack security
assessment
• Pen testing and Red
teaming
3
• Manage digital risk
as quickly as the
threat landscape
changes
• Automated and
targeted cyber-
Threat Intelligence
• Protect your business
data by blocking weak
passwords
• Authentication &
Password
Management
• Desktop Management
solutions
Outpost24 Group
Today’s topic
Business disruption
Know the hacker
Practical strategies for securing users
Takeaways
4
Disruption
Verizon’s brand for digital natives
No stores, app for all customer care
Hacked accounts compromised by credential stuffing
Theft of phones, disruption to users, impact to reputation
BillyPenn.com – INSTAGRAM / @KC_TINARI / #BILLYPENNGRAM, November 10, 2018
5
Explosion of ransomware
6
The security leader’s imperative
7
Identify Protect Detect Respond Recover
Cybersecurity Framework
The security leader’s imperative
8
Identify Protect Detect Respond Recover
Endpoints
Network
Cloud
Application
Data
Users
Cybersecurity Framework
The security leader’s imperative
9
Identify Protect Detect Respond Recover
Endpoints
Network
Cloud
Application
Data
Users
What’s real?
What’s dangerous?
What’s important?
Cybersecurity Framework
Outpost24 Template
2019
Know the hacker
Types of hackers
Cyber-criminals - profit Nation-State - geopolitical Thrill seeker - lulz
Hacktivist - ideological Insider - discontent
11
11
Cyber Kill Chain
12
Lockheed Martin https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
Ransomware Kill Chain – attacker’s view
13
Lockheed Martin https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
Outsourced
Outsourced Outsourced
Outsourced
Outsourced
Outsourced
• 61% of breaches involve
credentials for initial access
• Over 15 billion compromised
credentials in hacker forums
• Increasing use of password
spray attacks targeting
privileged cloud accounts
14
Delivery - initial access
Verizon Data Breach Investigation Report (DBIR), 2021
pass·​word en·​tro·​py
 ˈpas-ˌwərd ˈen-trə-pē 
• Is the measure of password strength
or how strong the given password is.
It is a measure of effectiveness of a
password against guessing or brute-
force attacks.
15
• Hard to brute-force passwords
longer than 8 characters
• Easier if you sniff network
traffic for hashes and compare
to “easy to guess” hashed
passwords
• Or – just buy compromised
credentials
Password entropy
https://www.geeksforgeeks.org/password-entropy-in-cryptography/
Shrink the attack surface
• No such thing as “perfect security”
• Objective is to slow the attacker down
• Evaluate exposed services
• Patch regularly
• Manage access
16
Outpost24 Template
2019
Practical strategies for securing users
“Over 80% of breaches involve
brute force or lost and stolen
credentials”
Verizon’s Data Breach Investigations Report
“Over 70% of employees
reuse passwords at work ”
18
Attacks against
passwords are a way to
breach a network
AND a data source that
can be sold for future
attacks
Cyber attacks involving passwords:
• Brute force
• Key logging
• Phishing
• Social engineering
• Ransomware
• Supply chain
• Dictionary
• Password spraying
• Credential stuffing
Cyber threats and user access
19
• Colonial Pipeline was breached on
April 29, 2021
• Hackers gained access through a VPN
account that was no longer in use, but
still active
• The VPN password was found in a list
of leaked passwords on the dark web
• There was no MFA in place on the VPN
Critical infrastructure breach
20
Securing user access
• Implement MFA where possible
• Security awareness training and enforcement
• Secure user passwords
• Block breached passwords
• Tell users why their chosen passwords fail
• Implement passphrases
• Use a password manager
Best practices
21
• Audit your Active Directory passwords via a
simple scan with Password Auditor
• Identifies accounts using leaked passwords
• Accounts with blank passwords
• Accounts sharing the same passwords
• Accounts not requiring passwords
• …and many more
• Results available in interactive dashboard
• Export to CSV and detailed PDF
• More secure and easy to implement
• World class support
• Updated regularly
Getting Started: Free Audit
22
Password Auditor
Live Demo
23
Outpost24 Template
2019
Takeaways
Takeaways
Risk - Focus on potential disruption to your business
Hygiene - Constantly work to reduce attack surface
Users - The most common vector for initial access
Try it – download the Password Auditor
25

More Related Content

What's hot (20)

PDF
Outpost24 webinar - Mastering the art of multicloud security
Outpost24
 
PPTX
Outpost24 webinar: Risk-based approach to security assessments
Outpost24
 
PDF
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
Outpost24
 
PPTX
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24
 
PPT
Emerging Threats and Strategies of Defense
Alert Logic
 
PDF
Custom defense - Blake final
Minh Le
 
PDF
Top 5 Cloud Security Predictions for 2016
Alert Logic
 
PDF
Outpost24 webinar - Improve your organizations security with red teaming
Outpost24
 
PDF
Journey to the Cloud: Securing Your AWS Applications - April 2015
Alert Logic
 
PPTX
Outpost24 webinar - Winning the cybersecurity race with predictive vulnerabil...
Outpost24
 
PDF
Outpost24 webinar: Security Analytics: what's in a risk score
Outpost24
 
PDF
Next-Generation SIEM: Delivered from the Cloud
Alert Logic
 
PDF
Outpost24 Webinar - To agent or not to agent
Outpost24
 
PPTX
Disección de amenazas en entornos de nube
Cristian Garcia G.
 
PPTX
Cybersecurity Training for Nonprofits
Community IT Innovators
 
PPTX
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Outpost24
 
PPTX
Cisco security 7 jun 17
Yabibo
 
PPTX
Cisco security 27 jun 17
Yabibo
 
PPTX
Unified threat management cisco 1 july 17
Yabibo
 
PPTX
Unified threat management cisco 21 jun 17
Yabibo
 
Outpost24 webinar - Mastering the art of multicloud security
Outpost24
 
Outpost24 webinar: Risk-based approach to security assessments
Outpost24
 
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
Outpost24
 
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24
 
Emerging Threats and Strategies of Defense
Alert Logic
 
Custom defense - Blake final
Minh Le
 
Top 5 Cloud Security Predictions for 2016
Alert Logic
 
Outpost24 webinar - Improve your organizations security with red teaming
Outpost24
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Alert Logic
 
Outpost24 webinar - Winning the cybersecurity race with predictive vulnerabil...
Outpost24
 
Outpost24 webinar: Security Analytics: what's in a risk score
Outpost24
 
Next-Generation SIEM: Delivered from the Cloud
Alert Logic
 
Outpost24 Webinar - To agent or not to agent
Outpost24
 
Disección de amenazas en entornos de nube
Cristian Garcia G.
 
Cybersecurity Training for Nonprofits
Community IT Innovators
 
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Outpost24
 
Cisco security 7 jun 17
Yabibo
 
Cisco security 27 jun 17
Yabibo
 
Unified threat management cisco 1 july 17
Yabibo
 
Unified threat management cisco 21 jun 17
Yabibo
 

Similar to Outpost24 webinar - Enhance user security to stop the cyber-attack cycle (20)

PPTX
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24
 
PPTX
Outpost24 webinar - Cybersecurity readiness in the post Covid-19 world
Outpost24
 
PPTX
INFORMATION SECURITY PPT.pptx ON CYBER SECURITY
mee23nu
 
PPTX
Tsc2021 cyber-issues
Ernest Staats
 
PDF
Power Plants Security Webinar Presentation
Certrec
 
PDF
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
James Anderson
 
PPTX
Daily Cybersecurity Tips and Tricks with solutions
Bert Blevins
 
PDF
Wfh security risks - Ed Adams, President, Security Innovation
Priyanka Aash
 
PDF
cyber attacks In-depth Report on five organizations affected by cyber attacks
pinterestjos
 
PDF
cyber attacks analysis top five organization affected by cyber attacks
pinterestjos
 
PPTX
So You Want a Job in Cybersecurity
2nd Sight Lab
 
PDF
cybersecurity-careers.pdf
RakeshKumar442494
 
PDF
What-is-Cyber-Security.pdf n
mishrasaket1028
 
PPTX
New Developments in Cybersecurity and Technology for RDOs: Howland
nado-web
 
PPTX
Cyber Security Case Studies
Moksha Kalyan Ram Abhiramula
 
PPTX
Cybersecurity…real world solutions
ErnestStaats
 
PDF
Hunting for cyber threats targeting weapon systems
Fidelis Cybersecurity
 
PDF
Today's Cyber Challenges: Methodology to Secure Your Business
JoAnna Cheshire
 
DOCX
Riordan Network VulnerabilitiesVulnerabilityThreatProbabil.docx
joellemurphey
 
PPTX
CyberSecurity SONI CHANDAN TEACHER TRAINING MATERIALS
SoniChandan
 
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24
 
Outpost24 webinar - Cybersecurity readiness in the post Covid-19 world
Outpost24
 
INFORMATION SECURITY PPT.pptx ON CYBER SECURITY
mee23nu
 
Tsc2021 cyber-issues
Ernest Staats
 
Power Plants Security Webinar Presentation
Certrec
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
James Anderson
 
Daily Cybersecurity Tips and Tricks with solutions
Bert Blevins
 
Wfh security risks - Ed Adams, President, Security Innovation
Priyanka Aash
 
cyber attacks In-depth Report on five organizations affected by cyber attacks
pinterestjos
 
cyber attacks analysis top five organization affected by cyber attacks
pinterestjos
 
So You Want a Job in Cybersecurity
2nd Sight Lab
 
cybersecurity-careers.pdf
RakeshKumar442494
 
What-is-Cyber-Security.pdf n
mishrasaket1028
 
New Developments in Cybersecurity and Technology for RDOs: Howland
nado-web
 
Cyber Security Case Studies
Moksha Kalyan Ram Abhiramula
 
Cybersecurity…real world solutions
ErnestStaats
 
Hunting for cyber threats targeting weapon systems
Fidelis Cybersecurity
 
Today's Cyber Challenges: Methodology to Secure Your Business
JoAnna Cheshire
 
Riordan Network VulnerabilitiesVulnerabilityThreatProbabil.docx
joellemurphey
 
CyberSecurity SONI CHANDAN TEACHER TRAINING MATERIALS
SoniChandan
 
Ad

More from Outpost24 (19)

PPTX
Outpost24 webinar - A fresh look into the underground card shop ecosystem
Outpost24
 
PDF
Outpost24 webinar Why API security matters and how to get it right.pdf
Outpost24
 
PPTX
Outpost24 webinar - How to protect your organization from credential theft
Outpost24
 
PDF
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework
Outpost24
 
PPTX
Outpost24 webinar: best practice for external attack surface management
Outpost24
 
PPTX
Outpost24 webinar - Api security
Outpost24
 
PDF
Outpost24 Webinar - CISO conversation behind the cyber security technology
Outpost24
 
PDF
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24
 
PDF
Outpost24 webinar - How to secure cloud services in the DevOps fast lane
Outpost24
 
PPTX
Outpost24 webinar - Demystifying Web Application Security with Attack Surface...
Outpost24
 
PPTX
Outpost24 webinar mastering container security in modern day dev ops
Outpost24
 
PPTX
Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...
Outpost24
 
PPTX
Outpost24 webinar - Understanding the 7 deadly web application attack vectors
Outpost24
 
PPTX
Outpost24 webinar - Securing DevOps in Cloud Environments
Outpost24
 
PDF
Outpost24 webinar - Covid-19: Driving application security resilience in time...
Outpost24
 
PDF
Outpost24 webinar - preventing wireless attacks with device visibility and t...
Outpost24
 
PDF
Outpost24 webinar - risk based vulnerability management - what's in a risk score
Outpost24
 
PPTX
Outpost24 webinar mit oder ohne agenten
Outpost24
 
PDF
Outpost24 Webinar - cloud security controls best practice
Outpost24
 
Outpost24 webinar - A fresh look into the underground card shop ecosystem
Outpost24
 
Outpost24 webinar Why API security matters and how to get it right.pdf
Outpost24
 
Outpost24 webinar - How to protect your organization from credential theft
Outpost24
 
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework
Outpost24
 
Outpost24 webinar: best practice for external attack surface management
Outpost24
 
Outpost24 webinar - Api security
Outpost24
 
Outpost24 Webinar - CISO conversation behind the cyber security technology
Outpost24
 
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24
 
Outpost24 webinar - How to secure cloud services in the DevOps fast lane
Outpost24
 
Outpost24 webinar - Demystifying Web Application Security with Attack Surface...
Outpost24
 
Outpost24 webinar mastering container security in modern day dev ops
Outpost24
 
Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...
Outpost24
 
Outpost24 webinar - Understanding the 7 deadly web application attack vectors
Outpost24
 
Outpost24 webinar - Securing DevOps in Cloud Environments
Outpost24
 
Outpost24 webinar - Covid-19: Driving application security resilience in time...
Outpost24
 
Outpost24 webinar - preventing wireless attacks with device visibility and t...
Outpost24
 
Outpost24 webinar - risk based vulnerability management - what's in a risk score
Outpost24
 
Outpost24 webinar mit oder ohne agenten
Outpost24
 
Outpost24 Webinar - cloud security controls best practice
Outpost24
 
Ad

Recently uploaded (20)

PPTX
Milwaukee Marketo User Group - Summer Road Trip: Mapping and Personalizing Yo...
bbedford2
 
PDF
Technical-Careers-Roadmap-in-Software-Market.pdf
Hussein Ali
 
PDF
Top Agile Project Management Tools for Teams in 2025
Orangescrum
 
PDF
AI + DevOps = Smart Automation with devseccops.ai.pdf
Devseccops.ai
 
PPTX
iaas vs paas vs saas :choosing your cloud strategy
CloudlayaTechnology
 
PDF
UITP Summit Meep Pitch may 2025 MaaS Rebooted
campoamor1
 
PPTX
Function & Procedure: Function Vs Procedure in PL/SQL
Shani Tiwari
 
PPTX
AEM User Group: India Chapter Kickoff Meeting
jennaf3
 
PPTX
Help for Correlations in IBM SPSS Statistics.pptx
Version 1 Analytics
 
PPTX
OpenChain @ OSS NA - In From the Cold: Open Source as Part of Mainstream Soft...
Shane Coughlan
 
PDF
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
PPTX
Change Common Properties in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PPTX
Comprehensive Risk Assessment Module for Smarter Risk Management
EHA Soft Solutions
 
PDF
IObit Driver Booster Pro 12.4.0.585 Crack Free Download
henryc1122g
 
PPTX
Coefficient of Variance in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PDF
Generic or Specific? Making sensible software design decisions
Bert Jan Schrijver
 
PPTX
Smart Doctor Appointment Booking option in odoo.pptx
AxisTechnolabs
 
PDF
Add Background Images to Charts in IBM SPSS Statistics Version 31.pdf
Version 1 Analytics
 
PDF
AI Prompts Cheat Code prompt engineering
Avijit Kumar Roy
 
PDF
TheFutureIsDynamic-BoxLang witch Luis Majano.pdf
Ortus Solutions, Corp
 
Milwaukee Marketo User Group - Summer Road Trip: Mapping and Personalizing Yo...
bbedford2
 
Technical-Careers-Roadmap-in-Software-Market.pdf
Hussein Ali
 
Top Agile Project Management Tools for Teams in 2025
Orangescrum
 
AI + DevOps = Smart Automation with devseccops.ai.pdf
Devseccops.ai
 
iaas vs paas vs saas :choosing your cloud strategy
CloudlayaTechnology
 
UITP Summit Meep Pitch may 2025 MaaS Rebooted
campoamor1
 
Function & Procedure: Function Vs Procedure in PL/SQL
Shani Tiwari
 
AEM User Group: India Chapter Kickoff Meeting
jennaf3
 
Help for Correlations in IBM SPSS Statistics.pptx
Version 1 Analytics
 
OpenChain @ OSS NA - In From the Cold: Open Source as Part of Mainstream Soft...
Shane Coughlan
 
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
Change Common Properties in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
Comprehensive Risk Assessment Module for Smarter Risk Management
EHA Soft Solutions
 
IObit Driver Booster Pro 12.4.0.585 Crack Free Download
henryc1122g
 
Coefficient of Variance in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
Generic or Specific? Making sensible software design decisions
Bert Jan Schrijver
 
Smart Doctor Appointment Booking option in odoo.pptx
AxisTechnolabs
 
Add Background Images to Charts in IBM SPSS Statistics Version 31.pdf
Version 1 Analytics
 
AI Prompts Cheat Code prompt engineering
Avijit Kumar Roy
 
TheFutureIsDynamic-BoxLang witch Luis Majano.pdf
Ortus Solutions, Corp
 

Outpost24 webinar - Enhance user security to stop the cyber-attack cycle

  • 1. Outpost24 Template 2019 Enhance User Security to Stop the Cyber-Attack Cycle Bob Egner Darren James Outpost24 Specops Software Classification: Open November 23, 2021
  • 2. The speakers 2 Bob Egner Outpost24 Head of Products Darren James Specops Software Product Specialist and Technical Lead
  • 3. • Identify and manage cyber-security exposure • Full stack security assessment • Pen testing and Red teaming 3 • Manage digital risk as quickly as the threat landscape changes • Automated and targeted cyber- Threat Intelligence • Protect your business data by blocking weak passwords • Authentication & Password Management • Desktop Management solutions Outpost24 Group
  • 4. Today’s topic Business disruption Know the hacker Practical strategies for securing users Takeaways 4
  • 5. Disruption Verizon’s brand for digital natives No stores, app for all customer care Hacked accounts compromised by credential stuffing Theft of phones, disruption to users, impact to reputation BillyPenn.com – INSTAGRAM / @KC_TINARI / #BILLYPENNGRAM, November 10, 2018 5
  • 7. The security leader’s imperative 7 Identify Protect Detect Respond Recover Cybersecurity Framework
  • 8. The security leader’s imperative 8 Identify Protect Detect Respond Recover Endpoints Network Cloud Application Data Users Cybersecurity Framework
  • 9. The security leader’s imperative 9 Identify Protect Detect Respond Recover Endpoints Network Cloud Application Data Users What’s real? What’s dangerous? What’s important? Cybersecurity Framework
  • 11. Types of hackers Cyber-criminals - profit Nation-State - geopolitical Thrill seeker - lulz Hacktivist - ideological Insider - discontent 11 11
  • 12. Cyber Kill Chain 12 Lockheed Martin https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
  • 13. Ransomware Kill Chain – attacker’s view 13 Lockheed Martin https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html Outsourced Outsourced Outsourced Outsourced Outsourced Outsourced
  • 14. • 61% of breaches involve credentials for initial access • Over 15 billion compromised credentials in hacker forums • Increasing use of password spray attacks targeting privileged cloud accounts 14 Delivery - initial access Verizon Data Breach Investigation Report (DBIR), 2021
  • 15. pass·​word en·​tro·​py ˈpas-ˌwərd ˈen-trə-pē • Is the measure of password strength or how strong the given password is. It is a measure of effectiveness of a password against guessing or brute- force attacks. 15 • Hard to brute-force passwords longer than 8 characters • Easier if you sniff network traffic for hashes and compare to “easy to guess” hashed passwords • Or – just buy compromised credentials Password entropy https://www.geeksforgeeks.org/password-entropy-in-cryptography/
  • 16. Shrink the attack surface • No such thing as “perfect security” • Objective is to slow the attacker down • Evaluate exposed services • Patch regularly • Manage access 16
  • 18. “Over 80% of breaches involve brute force or lost and stolen credentials” Verizon’s Data Breach Investigations Report “Over 70% of employees reuse passwords at work ” 18
  • 19. Attacks against passwords are a way to breach a network AND a data source that can be sold for future attacks Cyber attacks involving passwords: • Brute force • Key logging • Phishing • Social engineering • Ransomware • Supply chain • Dictionary • Password spraying • Credential stuffing Cyber threats and user access 19
  • 20. • Colonial Pipeline was breached on April 29, 2021 • Hackers gained access through a VPN account that was no longer in use, but still active • The VPN password was found in a list of leaked passwords on the dark web • There was no MFA in place on the VPN Critical infrastructure breach 20
  • 21. Securing user access • Implement MFA where possible • Security awareness training and enforcement • Secure user passwords • Block breached passwords • Tell users why their chosen passwords fail • Implement passphrases • Use a password manager Best practices 21
  • 22. • Audit your Active Directory passwords via a simple scan with Password Auditor • Identifies accounts using leaked passwords • Accounts with blank passwords • Accounts sharing the same passwords • Accounts not requiring passwords • …and many more • Results available in interactive dashboard • Export to CSV and detailed PDF • More secure and easy to implement • World class support • Updated regularly Getting Started: Free Audit 22
  • 25. Takeaways Risk - Focus on potential disruption to your business Hygiene - Constantly work to reduce attack surface Users - The most common vector for initial access Try it – download the Password Auditor 25

Editor's Notes

  • #6: Verizon’s new low-cost brand “Visible” for digital natives No stores, online only – No customer care phone service, only text and chat Victim of credential stuffing attack (credentials purchased through an Initial Access Broker (criminal) Take over user accounts - order phones, disrupt users Besides customer disruption, stolen phones, it’s a reputation issue for parent Verizon who has built a brand around cyber security expertise Annual Verizon DBIR (Data Breach Investigation Report) Because it was credential stuffing, Verizon denies it was a breach
  • #7: Explosion of ransomware from CryptoLocker in 2013 to REvil in 2020 and Dopplepayment in 2020 Constantly in the news Common elements – first access, then spread, and demand a double extortion > expose data, hold data for ransom Factoids about average cost / payment (Verizon DBIR)
  • #8: Organizations that have a cyber security staff may be familiar with this framework of activities But many are looking for an easier way (buy your way out) with security technology Or even outsource to a managed security provider But the starting point is good security practices that can be implemented by IT teams of any size
  • #9: The focus is often split by the type of technology asset you need to evaluate For the user area, we often think of access control – do we have something in place to limit access But the human dimension is harder to evaluate
  • #10: What do you own, where is it weak, what are you going to do about it? The objective is to “shrink the attack surface” to make it harder for the attacker to get in There is no such thing as perfect security To save time / cost, you have to focus on what’s important to the business and things you can fix
  • #12: Types of threat actors Nation-state: motivated by geopolitical outcomes Cyber criminals : profit motive Hacktivist: ideological Terrorists: ideological violence For the lulz (thrill seeker): satisfaction Insider: discontent
  • #13: Getting in (delivery, exploitation) and exfiltration (mission goal) are not the hard (or time consuming parts Assume you will be attacked, and they will be successful – what next? Focus on dwell time Industry stats show 3-7 months, we have worked with clients experiencing multiple years Some of you may owner fewer security tools than the hacker has in their arsenal TTPs – Tactics Techniques and Procedures Ex. token stealing and pass-the-hash, or Windows Management Interface (WMI) and Mimikatz NotPetya used some code / concepts from Mimikatz to accelerate spread (delivery)
  • #14: Initial access attacks – according to Verizon (DBIR 2021 fig 20) Phising – gain access by tricking user Stolen credentials – using known credentials to “walk right in” The former is address by security awareness training (partner AwareGO) The latter by monitoring for compromised passwords Exploitation is moving files (for extortion) to a temporary location and encrypting those on the endpoint https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2017/ransomware-analysis-executions-flow-and-kill-chain https://www.alertlogic.com/assets/checklists/Ransomware_KillChainShort.pdf
  • #15: A few months ago, I saw a figure of 15 billion compromised credentials and passwords were for sale on hacker forums (5 billion of which were unique) Initial access broker (criminal) Couple that with the average user with over 100 services, each requiring a user name and password (I have 134 in my password manager) Reuse at work and home is likely – this is the beginning of the password management challenge Average cost $15-$20 per credential (bank/financial average more) Direct access to organizations through administrator credentials are even more, averaging over $3000 Last month Microsoft DART (Detection and Response Team) issued guidance about an increasing number of password spray attacks targeting privileged cloud accounts
  • #16: Password complexity – use passwords of more than 8 characters (12 is good) or passphrases where you can reach 32 characters Common practice to use “easy” passwords on the internal network because users think they are well-protected in their castle – low entropy Superior cracking method can make hundreds of thousands to millions of hash calculations per second on ordinary PC equipment