Prezentace aplikace PowerPoint - e

Download Report

Transcript Prezentace aplikace PowerPoint - e

Ransomware, Internet
of Things and Botnets
vs. Control
Presented by
Martin Šimek
Agenda
• Ransomware
• The Internet of Things
• Botnets
Ransomware
Ransomware – definition
• Ransom
 The practice of holding a prisoner or item to
extort money to secure their release.
• Ransomware
 Malicious software holding your files as
prisoners to extort money to secure their
release.
Cryptolocker
• Encrypts your files
 Files are present but unreadable
 No need of transfer and remote storage
 Files can be decrypted only by private key
• You must pay money to get the key
 Bitcoins
 TOR sites
Cryptolocker – Email infection
“Image: works.jpeg” http://fickmonster.blogspot.cz/2015/09/howransomware-spreads-and-how-it-works.html
Cryptolocker – Fake update site
Cryptolocker – Ramification
Cryptolocker – sequels
Ransomware – workstation protection
• Up-to-date antivirus
 Emails and websites are transferred
encrypted
 Endpoint workstation can see them plain
• Up-to-date software
 Zero day vulnerabilities elimination
• Employee training
 Learn to swim and don't swim in wild river
Ransomware – webfilter
+
Ransomware – Intrusion prevention system
Ransomware – Application awareness
Ransomware – Protocol inspection
Ransomware – Antivirus
The Internet of Things
The Internet of Things
• Home
 Wi-fi router, fridge, lightbulb, printer,
extension cord, thermostat
• Bussines
 NAS, printer, IP phone, air condition, window
blinds
The Internet of Things – pitfalls
• Low cost chips, small RAM, unprotected OS
 No spare resources for self-defense
• Rapid development
 Small to no focus on security
• Linux based
 full-featured computer
The Internet of Things – Attack
The Internet of Things – Recovery
•
•
•
•
Disconnect thing immediately
Re-flash firmware or replace Thing
Set strong password
Perform system audit
 Logs
 Scan other systems
The Internet of Things – Prevention
• Strong password for Thing's administration
• Update Thing's firmware regularly
• Don’t buy second hand devices
 Saving few euros might not pay off
The Internet of Things – Multiple interfaces
The Internet of Things – Access
• Don't expose Thing's web interface
 Use VPN to access network behind firewall
and then access Thing's web interface locally.
 If exposing is necessary, use Reverse proxy
The Internet of Things – Reverse Proxy
• Only web port is exposed
• Firewall can see and filter all requests
Botnet
Botnet
• Set of computers enslaved by malware
performing tasks assigned by master
 Spam, DDoS Attack, Malware distribution,
Bitcoin mining, clickfraud, spying on user
• Tasks are issued by command & control center
Botnet – attack
“Image:Botnet.svg” https://commons.wikimedia.org/wiki/File:Botnet.svg
Botnet – recovery
• Scan computers in LAN by up-to-date antivirus
• Perform audit of firewall logs
• Negotiate blacklist removal if botnet operation
gets your IP address there
Botnet – prevention
• Forbid access to the Internet underground
 Webfilter & Content Rules
• Forbid botnet to call home
 Blacklists, Security rules
Botnet – Blacklists & Security rules
Summary