Why THEY want
your digital devices

Stephen Cobb, CISSP
Security Evangelist
To own your
network?
36 ways to abuse hacked devices
•   Phishing site                                                •   Spam zombie
•   Malware download site                                        •   DDoS extortion zombie
•   Warez piracy server            Web                Botnet     •   Click fraud zombie
•   Child porn server              server             activity   •   Anonymization proxy
•   Spam site                                                    •   CAPTCHA solving zombie

•   Harvest email contacts                                       •   eBay/PayPal fake auctions
•   Harvest associated accounts                                  •   Online gaming credentials
•   Access to corporate email      Email             Account     •   Website FTP credentials
•   Webmail spam                   attacks        credentials    •   Skype/VoIP credentials
•   Stranded abroad scams                                        •   Encryption certificates


•   Online gaming characters                                     •   Bank account data
•   Online gaming goods/$$$        Virtual          Financial    •   Credit card data
•   PC game license keys           goods          credentials    •   Stock and 401K accounts
•   OS license key                                               •   Wire transfer data


•   Facebook                                                     •   Fake antivirus
•   Twitter                        Reputation        Hostage     •   Ransomware
•   LinkedIn                       hijacking          attacks    •   Email account ransom
•   Google+                                                      •   Webcam image extortion


Based on original work by Brian Krebs: krebsonsecurity.com
MONEY    ADVANTAGE    IMPACT




        CREDENTIALS
720 breaches by size of organization (employees)

    Over 100,000
10,001 to 100,000
  1,001 to 10,000
     101 to 1,000
        11 to 100
           1 to 10
                                                                        SMBs
                     0      100       200       300        400   500   600
               Verizon 2012 Data Breach Investigations Report
The SMB sweet spot for the cyber-
          criminally inclined

                                      Big enterprise

Assets
                                      SMB “sweet spot”
worth
looting
                                      Consumers



                Level of protection
How do they get to your devices?
1. Malware involved in 69% of breaches
2. Hacking* used in 81% of breaches
    Breaches combining malware and hacking: 61%

*80% of hacking is passwords:
default, missing, guessed, stolen, cracked



   Verizon 2012 Data Breach Investigations Report
Tools of the trade
Why do THEY want your digital devices?
Thriving markets for credentials
Hot markets for hacked devices
All driven by proven business strategies
So how do you defend your devices?
 Two main attacks….        …and
 defenses
      Malware                Scanning


     Hacking                 Authentication
Scanning requires proper implementation

Measures in use at a sample of healthcare facilities

   Require AV on mobile devices

Scan devices prior to connection

   Scan devices while connected

                                          0%          10%         20%         30%    40%

 Ponemon Institute Third Annual Benchmark Study on Patient Privacy & Data Security
Authentication requires more than passwords

   Passwords exposed in 2012: 75,000,000
   And those are just the ones we know about
   Need to add a second factor to authentication
The defenses you need

   Malware                     SMART Scanning


   Hacking                     STRONG Authentication


   Plus polices and training to implement effectively
Thank you!




Stephen Cobb  stephen.cobb@eset.com
         WeLiveSecurity.com

More Related Content

PPTX
Enjoy Safer Technology and Defeat Cyber Criminals
PDF
Any Information Can be Valuable and Other Lessons from the JP Morgan Breach
PPTX
Spiceworld 2011 - AppRiver breakout session
PPTX
10 Fun Short IT Horror Stories
PPT
Phishing-Updated
PDF
Awareness of Sim Swap Attack
PDF
Sim swapping
PDF
Tips for safe purchasing on the web
Enjoy Safer Technology and Defeat Cyber Criminals
Any Information Can be Valuable and Other Lessons from the JP Morgan Breach
Spiceworld 2011 - AppRiver breakout session
10 Fun Short IT Horror Stories
Phishing-Updated
Awareness of Sim Swap Attack
Sim swapping
Tips for safe purchasing on the web

What's hot (17)

PPTX
Phishing
PPTX
Cybercrime IN INDIA , LAW AND ORDER
PPTX
E business internet fraud
PDF
Online Scams and Frauds
PPTX
Cyber fraud a threat to E commerce
PPTX
Chapter 17 a fraud in e commerce Jen
PDF
Securing Internet Payment Systems
PDF
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
PDF
Mr SIM Swap Gone Phishing
PPTX
E commerce fraud chapter 17 B Ahmed
PPTX
Identity theft pp presentation
PDF
Identity Theft: Evolving with Technology
PDF
Cyber safe girl e book
PPTX
ELECTRONIC FRAUD TACTICS
PDF
Cyber fraud in banks
PDF
2015 Labris SOC Annual Report
Phishing
Cybercrime IN INDIA , LAW AND ORDER
E business internet fraud
Online Scams and Frauds
Cyber fraud a threat to E commerce
Chapter 17 a fraud in e commerce Jen
Securing Internet Payment Systems
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
Mr SIM Swap Gone Phishing
E commerce fraud chapter 17 B Ahmed
Identity theft pp presentation
Identity Theft: Evolving with Technology
Cyber safe girl e book
ELECTRONIC FRAUD TACTICS
Cyber fraud in banks
2015 Labris SOC Annual Report
Ad

Similar to Why do THEY want your digital devices? (20)

PPTX
Safer Technology Through Threat Awareness and Response
PDF
Data security best practices for risk awareness and mitigation
PDF
Data Loss Prevention: Challenges, Impacts & Effective Strategies
PPTX
Telesign impermium webinar deck-121312
PPTX
Protect against id fraud workshop 2 of 2
PDF
Wk online trust solutions overview january 2012
PPTX
User Authentication for Government
PPTX
Cyber crime and cyber security
PDF
Stronger/Multi-factor Authentication for Enterprise Applications
PDF
Web Application Security with PHP
PPTX
Owasp e crime-london-2012-final
PPTX
Cyber attacks Dark Web Session - I4Cv1.pptx
PDF
PPT
Driving Payment Innovation - Know Your Enemy
PPTX
Taveau cartes2012 speaker
PDF
Why and how to implement strong authentication on the web cartes 2010 - pat...
PPTX
Phishing--The Entire Story of a Dark World
PPTX
Fraud Presentation with legal disclaimer 2025 AFP data (002).pptx
KEY
What is-flame-miniflame
PDF
Identity Theft
Safer Technology Through Threat Awareness and Response
Data security best practices for risk awareness and mitigation
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Telesign impermium webinar deck-121312
Protect against id fraud workshop 2 of 2
Wk online trust solutions overview january 2012
User Authentication for Government
Cyber crime and cyber security
Stronger/Multi-factor Authentication for Enterprise Applications
Web Application Security with PHP
Owasp e crime-london-2012-final
Cyber attacks Dark Web Session - I4Cv1.pptx
Driving Payment Innovation - Know Your Enemy
Taveau cartes2012 speaker
Why and how to implement strong authentication on the web cartes 2010 - pat...
Phishing--The Entire Story of a Dark World
Fraud Presentation with legal disclaimer 2025 AFP data (002).pptx
What is-flame-miniflame
Identity Theft
Ad

More from ESET (20)

PDF
ESET Cybersecurity students
PDF
ESET Cybersecurity training
PDF
How to implement a robust information security management system?
PDF
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
PDF
Visiting the Bear Den
PDF
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
PDF
ESET Quick Guide to the EU General Data Protection Regulation
PDF
Bootkits: Past, Present & Future - Virus Bulletin
PDF
Operation Buhtrap - AVAR 2015
PPTX
Advanced Persistent Threats
PDF
Shopping Online
PDF
Banking Online
PPTX
Is Anti-Virus Dead?
PDF
Is Linux/Moose endangered or extinct?
PDF
Unpack your troubles*: .NET packer tricks and countermeasures
PPTX
ESET: #DoMore With Our Comprehensive Range of Business Products
PPTX
ESET: Delivering Benefits to Enterprises
PPTX
ESET: Delivering Benefits to Medium and Large Businesses
PPTX
#DoMore with ESET
PPTX
2014: Mid-Year Threat Review
ESET Cybersecurity students
ESET Cybersecurity training
How to implement a robust information security management system?
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
Visiting the Bear Den
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
ESET Quick Guide to the EU General Data Protection Regulation
Bootkits: Past, Present & Future - Virus Bulletin
Operation Buhtrap - AVAR 2015
Advanced Persistent Threats
Shopping Online
Banking Online
Is Anti-Virus Dead?
Is Linux/Moose endangered or extinct?
Unpack your troubles*: .NET packer tricks and countermeasures
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to Medium and Large Businesses
#DoMore with ESET
2014: Mid-Year Threat Review

Recently uploaded (20)

PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PPTX
Configure Apache Mutual Authentication
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
Comparative analysis of machine learning models for fake news detection in so...
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
giants, standing on the shoulders of - by Daniel Stenberg
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PPTX
Microsoft User Copilot Training Slide Deck
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
Improvisation in detection of pomegranate leaf disease using transfer learni...
Rapid Prototyping: A lecture on prototyping techniques for interface design
Configure Apache Mutual Authentication
Early detection and classification of bone marrow changes in lumbar vertebrae...
Comparative analysis of machine learning models for fake news detection in so...
Custom Battery Pack Design Considerations for Performance and Safety
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
Auditboard EB SOX Playbook 2023 edition.
Lung cancer patients survival prediction using outlier detection and optimize...
Convolutional neural network based encoder-decoder for efficient real-time ob...
LMS bot: enhanced learning management systems for improved student learning e...
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Co-training pseudo-labeling for text classification with support vector machi...
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
giants, standing on the shoulders of - by Daniel Stenberg
Basics of Cloud Computing - Cloud Ecosystem
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Microsoft User Copilot Training Slide Deck

Why do THEY want your digital devices?

  • 1. Why THEY want your digital devices Stephen Cobb, CISSP Security Evangelist
  • 3. 36 ways to abuse hacked devices • Phishing site • Spam zombie • Malware download site • DDoS extortion zombie • Warez piracy server Web Botnet • Click fraud zombie • Child porn server server activity • Anonymization proxy • Spam site • CAPTCHA solving zombie • Harvest email contacts • eBay/PayPal fake auctions • Harvest associated accounts • Online gaming credentials • Access to corporate email Email Account • Website FTP credentials • Webmail spam attacks credentials • Skype/VoIP credentials • Stranded abroad scams • Encryption certificates • Online gaming characters • Bank account data • Online gaming goods/$$$ Virtual Financial • Credit card data • PC game license keys goods credentials • Stock and 401K accounts • OS license key • Wire transfer data • Facebook • Fake antivirus • Twitter Reputation Hostage • Ransomware • LinkedIn hijacking attacks • Email account ransom • Google+ • Webcam image extortion Based on original work by Brian Krebs: krebsonsecurity.com
  • 4. MONEY ADVANTAGE IMPACT CREDENTIALS
  • 5. 720 breaches by size of organization (employees) Over 100,000 10,001 to 100,000 1,001 to 10,000 101 to 1,000 11 to 100 1 to 10 SMBs 0 100 200 300 400 500 600 Verizon 2012 Data Breach Investigations Report
  • 6. The SMB sweet spot for the cyber- criminally inclined Big enterprise Assets SMB “sweet spot” worth looting Consumers Level of protection
  • 7. How do they get to your devices? 1. Malware involved in 69% of breaches 2. Hacking* used in 81% of breaches Breaches combining malware and hacking: 61% *80% of hacking is passwords: default, missing, guessed, stolen, cracked Verizon 2012 Data Breach Investigations Report
  • 8. Tools of the trade
  • 10. Thriving markets for credentials
  • 11. Hot markets for hacked devices
  • 12. All driven by proven business strategies
  • 13. So how do you defend your devices? Two main attacks…. …and defenses Malware Scanning Hacking Authentication
  • 14. Scanning requires proper implementation Measures in use at a sample of healthcare facilities Require AV on mobile devices Scan devices prior to connection Scan devices while connected 0% 10% 20% 30% 40% Ponemon Institute Third Annual Benchmark Study on Patient Privacy & Data Security
  • 15. Authentication requires more than passwords Passwords exposed in 2012: 75,000,000 And those are just the ones we know about Need to add a second factor to authentication
  • 16. The defenses you need Malware SMART Scanning Hacking STRONG Authentication Plus polices and training to implement effectively
  • 17. Thank you! Stephen Cobb [email protected] WeLiveSecurity.com

Editor's Notes

  • #5: Money + Access + Kicks = Credentials