Cyber Security Threats
and What you can do
Agenda
• Threat History
• Current Threats
• Breakdown of a Common Attack
• What you can do
– Incident Response
– Resources Available
CTS Security Operations Center
Provides centralized information sharing, monitoring, and
analysis of Washington State security posture while mitigating
risk and minimizing incident exposure.
•Alerting
•Risk Analysis
•Incident Response
•Vulnerability Management
•Education and Awareness
Awareness Test:
http://www.youtube.com/watch?v=oSQJP40PcGI
Cyber Security in the News
1999 Threat - Melissa
• Sent copies of an
infected Word
Document to up to
50 people
• No damage to
computers or files
• Overwhelmed Mail
Servers
http://www.cert.org/advisories/CA-1999-04.htm
2003 Threat – Slammer
• SQL Server Stack
buffer overflow
vulnerability
• Code execution at
System user level
http://www.cert.org/advisories/CA-2003-04.htm
2008 Threat – Conficker
• Windows server
service vulnerability
• Multiple variants
• Quickly took over
millions of computers
• Disabled windows
services
• Locked out users
Today’s Threats
Persistent
•44% increase in breach incidents 2010-11 across multiple verticals
(Source: Poneman Institute, 2011)
Sophisticated
•Use of advanced techniques and tactics points to growing nation-state
sponsorship and resourcing
Targeted
•Shift to targeting of commercial sectors and government supply-chain
providers
•Larger attack plane
•Consumerization of IT with pervasive use of social media, mobile devices ,
big data and cloud infrastructures
What I see at WA State
Reporting
Period:
1Q 2013
What I deal with
Reporting Period: 3/1/13 – 3/15/13
• Web Site Defacement by Turkish Muslim Group
• Attempted breach of VPN account
• Multiple workstations attempting to communicate to Zeus
command and control servers
• Web server participating in DDoS attack against foreign national
• Multiple workstations attempting to communicate to Zero Access
command and control servers
• Web site content management server software exploited
• Anomalous traffic at agency firewall indicating insider threat
• Open mail relay detected
• Multiple SQL injection attempts of web application
• Penetration test erroneously configured causing alerts
Advanced
Persistent
Threats
Sophisticated attacks
and well resourced
adversaries
Nation State
Actors
Cyber Criminals
Open Source
Intelligence
Collection
Foreign
Nationals
Black Markets
Non-Nation State
Sub Contractors
Supply Chain
Tampering
Third Countries
The Age of the APT
Phishing emails
A member of your staff
receives a phishing email
which may be personalized to
attract their interest.
Common Attack
Drive-by download
The employee clicks on the
link and gets infected by
Trojan from drive-by
download.
Adversary uses machine
to gain access to internal
network systems
Trojan installs backdoor which allows
reverse connection to infected machine
Hacker dumps password hash and gains
access to a critical server via RDP.
RDP
Data ex-filtration
Attacker encrypts sensitive files found on
the critical server and transfers out data
Phishing emails
Attack Anatomy
ď‚§Discovery of Company email Addresses
ď‚§Jigsaw
ď‚§Come up with a Scenario
ď‚§OWA Upgrade
ď‚§Security Alert
ď‚§Build Phishing Message
ď‚§Save .html file locally
ď‚§Use a kit such as SET
ď‚§Set up a real temporary domain
ď‚§Monitor effectiveness with scripts
ď‚§Discovery of Company email Addresses
ď‚§Jigsaw
ď‚§Come up with a Scenario
ď‚§OWA Upgrade
ď‚§Security Alert
ď‚§Build Phishing Message
ď‚§Save .html file locally
ď‚§Use a kit such as SET
ď‚§Set up a real temporary domain
ď‚§Monitor effectiveness with scripts
Drive-by download
ď‚§Packing utilities / Metasploit /
Backtrack
ď‚§Alternately, purchase a SDK
and sign the executable so that
it is trusted
ď‚§Test the executable or payload with
free Antivirus packages
ď‚§Microsoft Security Essentials
ď‚§AVG
ď‚§Await acknowledgement response
from machine
ď‚§Packing utilities / Metasploit /
Backtrack
ď‚§Alternately, purchase a SDK
and sign the executable so that
it is trusted
ď‚§Test the executable or payload with
free Antivirus packages
ď‚§Microsoft Security Essentials
ď‚§AVG
ď‚§Await acknowledgement response
from machine
Adversary uses machine
to gain access to internal
network systems RDP
ď‚§Passwords enumerated and cracked
ď‚§Mapping of other network devices
ď‚§Active directory queries
ď‚§Access attempts with credentials
ď‚§Passwords enumerated and cracked
ď‚§Mapping of other network devices
ď‚§Active directory queries
ď‚§Access attempts with credentials
Data ex-filtration
ď‚§Data is compressed
ď‚§Data is encrypted and sent
over a common port such as
80 or 443
ď‚§Transmission is rate-limited
to avoid detection
ď‚§Data is used for criminal
purposes or to damage
reputation
ď‚§Data is compressed
ď‚§Data is encrypted and sent
over a common port such as
80 or 443
ď‚§Transmission is rate-limited
to avoid detection
ď‚§Data is used for criminal
purposes or to damage
reputation
Recommendations
1. Build a strong security foundation
2. Have an Incident Response Plan ready
3. Know who to call
Build a Security Foundation
• SANS Top 20 Controls
• Australia DOD Mitigations
• NIST Guidelines
Develop Incident Response Mechanisms
• Have a plan
– NIST 800-61.2
• Know the priority of your
assets
• Exercise your plan
– 15 minute tabletops
– Functional exercise every 6
months
• Recognize that you will not
be able to contain the
incident yourself in many
cases
Establish Partnerships
• MS-ISAC
– Forensic Analysis
– Log Analysis
– Malware reverse engineering and disassembly
– Vulnerability Scanning (Application and Host)
• FBI Cyber Task Force (CTF)
– Incident Response
– Threat assessment
– Information Sharing
• EMD
– Significant Cyber Event Response
Questions

More Related Content

PDF
Security Implications of the Cloud - CSS Dallas Azure
PDF
Security Implications of the Cloud
PPTX
Cyber security issues
PDF
Cambodia CERT Seminar: Incident response for ransomeware attacks
 
PPTX
Cryptography and Network security # Lecture 3
PPTX
Advanced persistent threat (apt)
PPTX
Malicious Client Detection using Machine learning
PPTX
Network Situational Awareness using Tripwire IP360
Security Implications of the Cloud - CSS Dallas Azure
Security Implications of the Cloud
Cyber security issues
Cambodia CERT Seminar: Incident response for ransomeware attacks
 
Cryptography and Network security # Lecture 3
Advanced persistent threat (apt)
Malicious Client Detection using Machine learning
Network Situational Awareness using Tripwire IP360

What's hot (20)

PPTX
Fingerprinting healthcare institutions
PPT
Networking and penetration testing
PPTX
Virus and its CounterMeasures -- Pruthvi Monarch
PPTX
Tripwire Adaptive Threat Protection
PPTX
Ethical Hacking n VAPT presentation by Suvrat jain
PDF
Introduction to the advanced persistent threat and hactivism
PPTX
Web application security part 01
ODP
Network Security Topic 1 intro
PPT
Network Security Tools and applications
PDF
Web Application Penetration Testing
PPTX
Ethical hacking/ Penetration Testing
PPT
Info Security - Vulnerability Assessment
PPT
Ethical hacking
PPT
Ethical h
PPT
Ethical hacking
PPTX
NETWORK PENETRATION TESTING
PDF
Penetration testing & Ethical Hacking
PPTX
Mobile platform security models
PPTX
Advanced Persistent Threat: come muoversi tra il marketing e la realtĂ ?
PPTX
CS8792 - Cryptography and Network Security
Fingerprinting healthcare institutions
Networking and penetration testing
Virus and its CounterMeasures -- Pruthvi Monarch
Tripwire Adaptive Threat Protection
Ethical Hacking n VAPT presentation by Suvrat jain
Introduction to the advanced persistent threat and hactivism
Web application security part 01
Network Security Topic 1 intro
Network Security Tools and applications
Web Application Penetration Testing
Ethical hacking/ Penetration Testing
Info Security - Vulnerability Assessment
Ethical hacking
Ethical h
Ethical hacking
NETWORK PENETRATION TESTING
Penetration testing & Ethical Hacking
Mobile platform security models
Advanced Persistent Threat: come muoversi tra il marketing e la realtĂ ?
CS8792 - Cryptography and Network Security
Ad

Similar to Port of seattle security presentation david morris (20)

PDF
Today's Cyber Challenges: Methodology to Secure Your Business
PDF
Cyber Defense - How to be prepared to APT
PPTX
Tsc2021 cyber-issues
PDF
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
PPTX
Cybersecurity…real world solutions
PPTX
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
PPTX
Advanced Persistent Threats (APTs) - Information Security Management
PDF
Today's Breach Reality, The IR Imperative, And What You Can Do About It
PPTX
HackersAttackersCriminals_2014
PDF
Advanced Threats and Lateral Movement Detection
PDF
cybersecurity-careers.pdf
PPTX
So You Want a Job in Cybersecurity
PPTX
Incident Response: Validation, Containment & Forensics
PPT
Edith Turuka: Cyber-Security, An Eye Opener to the Society
PDF
Anatomy of a cyber attack
PDF
RSA: Security Analytics Architecture for APT
PPT
Event - Internet Thailand - Total Security Perimeters
PPTX
Cybersecurity - Sam Maccherola
PPTX
Your cyber security webinar
PPTX
Cybersecurity Basics of awareness presentation .pptx
Today's Cyber Challenges: Methodology to Secure Your Business
Cyber Defense - How to be prepared to APT
Tsc2021 cyber-issues
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cybersecurity…real world solutions
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Advanced Persistent Threats (APTs) - Information Security Management
Today's Breach Reality, The IR Imperative, And What You Can Do About It
HackersAttackersCriminals_2014
Advanced Threats and Lateral Movement Detection
cybersecurity-careers.pdf
So You Want a Job in Cybersecurity
Incident Response: Validation, Containment & Forensics
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Anatomy of a cyber attack
RSA: Security Analytics Architecture for APT
Event - Internet Thailand - Total Security Perimeters
Cybersecurity - Sam Maccherola
Your cyber security webinar
Cybersecurity Basics of awareness presentation .pptx
Ad

Recently uploaded (20)

PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
Architecture types and enterprise applications.pdf
PPT
What is a Computer? Input Devices /output devices
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
CloudStack 4.21: First Look Webinar slides
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PPTX
Build Your First AI Agent with UiPath.pptx
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PPTX
Training Program for knowledge in solar cell and solar industry
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Comparative analysis of machine learning models for fake news detection in so...
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
Configure Apache Mutual Authentication
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Final SEM Unit 1 for mit wpu at pune .pptx
UiPath Agentic Automation session 1: RPA to Agents
Architecture types and enterprise applications.pdf
What is a Computer? Input Devices /output devices
sustainability-14-14877-v2.pddhzftheheeeee
Taming the Chaos: How to Turn Unstructured Data into Decisions
CloudStack 4.21: First Look Webinar slides
Basics of Cloud Computing - Cloud Ecosystem
Consumable AI The What, Why & How for Small Teams.pdf
Build Your First AI Agent with UiPath.pptx
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Training Program for knowledge in solar cell and solar industry
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
A contest of sentiment analysis: k-nearest neighbor versus neural network
Comparative analysis of machine learning models for fake news detection in so...
Microsoft Excel 365/2024 Beginner's training
A review of recent deep learning applications in wood surface defect identifi...
Configure Apache Mutual Authentication

Port of seattle security presentation david morris

  • 1. Cyber Security Threats and What you can do
  • 2. Agenda • Threat History • Current Threats • Breakdown of a Common Attack • What you can do – Incident Response – Resources Available
  • 3. CTS Security Operations Center Provides centralized information sharing, monitoring, and analysis of Washington State security posture while mitigating risk and minimizing incident exposure. •Alerting •Risk Analysis •Incident Response •Vulnerability Management •Education and Awareness Awareness Test: http://www.youtube.com/watch?v=oSQJP40PcGI
  • 4. Cyber Security in the News
  • 5. 1999 Threat - Melissa • Sent copies of an infected Word Document to up to 50 people • No damage to computers or files • Overwhelmed Mail Servers http://www.cert.org/advisories/CA-1999-04.htm
  • 6. 2003 Threat – Slammer • SQL Server Stack buffer overflow vulnerability • Code execution at System user level http://www.cert.org/advisories/CA-2003-04.htm
  • 7. 2008 Threat – Conficker • Windows server service vulnerability • Multiple variants • Quickly took over millions of computers • Disabled windows services • Locked out users
  • 8. Today’s Threats Persistent •44% increase in breach incidents 2010-11 across multiple verticals (Source: Poneman Institute, 2011) Sophisticated •Use of advanced techniques and tactics points to growing nation-state sponsorship and resourcing Targeted •Shift to targeting of commercial sectors and government supply-chain providers •Larger attack plane •Consumerization of IT with pervasive use of social media, mobile devices , big data and cloud infrastructures
  • 9. What I see at WA State Reporting Period: 1Q 2013
  • 10. What I deal with Reporting Period: 3/1/13 – 3/15/13 • Web Site Defacement by Turkish Muslim Group • Attempted breach of VPN account • Multiple workstations attempting to communicate to Zeus command and control servers • Web server participating in DDoS attack against foreign national • Multiple workstations attempting to communicate to Zero Access command and control servers • Web site content management server software exploited • Anomalous traffic at agency firewall indicating insider threat • Open mail relay detected • Multiple SQL injection attempts of web application • Penetration test erroneously configured causing alerts
  • 11. Advanced Persistent Threats Sophisticated attacks and well resourced adversaries Nation State Actors Cyber Criminals Open Source Intelligence Collection Foreign Nationals Black Markets Non-Nation State Sub Contractors Supply Chain Tampering Third Countries The Age of the APT
  • 12. Phishing emails A member of your staff receives a phishing email which may be personalized to attract their interest. Common Attack
  • 13. Drive-by download The employee clicks on the link and gets infected by Trojan from drive-by download.
  • 14. Adversary uses machine to gain access to internal network systems Trojan installs backdoor which allows reverse connection to infected machine Hacker dumps password hash and gains access to a critical server via RDP. RDP
  • 15. Data ex-filtration Attacker encrypts sensitive files found on the critical server and transfers out data
  • 16. Phishing emails Attack Anatomy ď‚§Discovery of Company email Addresses ď‚§Jigsaw ď‚§Come up with a Scenario ď‚§OWA Upgrade ď‚§Security Alert ď‚§Build Phishing Message ď‚§Save .html file locally ď‚§Use a kit such as SET ď‚§Set up a real temporary domain ď‚§Monitor effectiveness with scripts ď‚§Discovery of Company email Addresses ď‚§Jigsaw ď‚§Come up with a Scenario ď‚§OWA Upgrade ď‚§Security Alert ď‚§Build Phishing Message ď‚§Save .html file locally ď‚§Use a kit such as SET ď‚§Set up a real temporary domain ď‚§Monitor effectiveness with scripts
  • 17. Drive-by download ď‚§Packing utilities / Metasploit / Backtrack ď‚§Alternately, purchase a SDK and sign the executable so that it is trusted ď‚§Test the executable or payload with free Antivirus packages ď‚§Microsoft Security Essentials ď‚§AVG ď‚§Await acknowledgement response from machine ď‚§Packing utilities / Metasploit / Backtrack ď‚§Alternately, purchase a SDK and sign the executable so that it is trusted ď‚§Test the executable or payload with free Antivirus packages ď‚§Microsoft Security Essentials ď‚§AVG ď‚§Await acknowledgement response from machine
  • 18. Adversary uses machine to gain access to internal network systems RDP ď‚§Passwords enumerated and cracked ď‚§Mapping of other network devices ď‚§Active directory queries ď‚§Access attempts with credentials ď‚§Passwords enumerated and cracked ď‚§Mapping of other network devices ď‚§Active directory queries ď‚§Access attempts with credentials
  • 19. Data ex-filtration ď‚§Data is compressed ď‚§Data is encrypted and sent over a common port such as 80 or 443 ď‚§Transmission is rate-limited to avoid detection ď‚§Data is used for criminal purposes or to damage reputation ď‚§Data is compressed ď‚§Data is encrypted and sent over a common port such as 80 or 443 ď‚§Transmission is rate-limited to avoid detection ď‚§Data is used for criminal purposes or to damage reputation
  • 20. Recommendations 1. Build a strong security foundation 2. Have an Incident Response Plan ready 3. Know who to call
  • 21. Build a Security Foundation • SANS Top 20 Controls • Australia DOD Mitigations • NIST Guidelines
  • 22. Develop Incident Response Mechanisms • Have a plan – NIST 800-61.2 • Know the priority of your assets • Exercise your plan – 15 minute tabletops – Functional exercise every 6 months • Recognize that you will not be able to contain the incident yourself in many cases
  • 23. Establish Partnerships • MS-ISAC – Forensic Analysis – Log Analysis – Malware reverse engineering and disassembly – Vulnerability Scanning (Application and Host) • FBI Cyber Task Force (CTF) – Incident Response – Threat assessment – Information Sharing • EMD – Significant Cyber Event Response

Editor's Notes

  • #12: Key Takeaways CIRC, SOC and SIEM are not always interchangeable terms. In some organizations their responsibilities are different and distinct. ***************************** To address APTs the security organization is faced with some growing and changing responsibilities. First and foremost, the need for a CIRC capability has become evident in many organizations. Responsibilities include the need to be able to identify anomalies, predict attacks and respond to incidents. This drives a need for additional intelligence. Traditional SOC responsibilities have included security help desk capabilities and the day-to-day administration of key technical controls including firewall, VPNs, access controls, AV, etc.. Another key capability includes SIEM. This is where many of the reports and alerts that are so important to the CIRC originate. Click: What does all this mean for you sitting here today? It means different stakeholders may have new and different needs but a unified strategy is needed to deal with new threats. Click: Traditional responsibilities across the board are undergoing review. This more than just updating technical responsibilities and controls. This requires updating our Business and Operations models to deal with new Enterprise dimensions.
  • #13: The first step in this attack was phishing, or more accurately “spear phishing,” meaning that the attack targets specific people .
  • #14: Zero-Day attack in this case was launched when one user opened the email . The zero day then installed a backdoor (variant of the POISON IVY remote access Trojan) which then immediately set about reconnaissance and cultivation. It’s important to note as well that the attacker was creating layers of resilience and was making maximum use of the window of exposure.
  • #15: The zero day then installs a backdoor which then immediately sets about reconnaissance and cultivation. During this time, the attacker can creating layers of resilience and was making maximum use of the window of exposure.
  • #16: The attacker encrypts sensitive files found on the critical server and transfers out via an FTP These attacks are focused and coherent: the timing is choreographed and the attacker moves rapidly and unerringly. They know what to get and the order to get items in. This type of attack can take months or perhaps years of preparation prior to staging the attack itself. It reflects an ability to move with exacting precision.
  • #17: The first step in this attack was phishing, or more accurately “spear phishing,” meaning that the attack targets specific people .
  • #18: Zero-Day attack in this case was launched when one user opened the email . The zero day then installed a backdoor (variant of the POISON IVY remote access Trojan) which then immediately set about reconnaissance and cultivation. It’s important to note as well that the attacker was creating layers of resilience and was making maximum use of the window of exposure.
  • #19: The zero day then installs a backdoor which then immediately sets about reconnaissance and cultivation. During this time, the attacker can creating layers of resilience and was making maximum use of the window of exposure.
  • #20: The attacker encrypts sensitive files found on the critical server and transfers out via an FTP These attacks are focused and coherent: the timing is choreographed and the attacker moves rapidly and unerringly. They know what to get and the order to get items in. This type of attack can take months or perhaps years of preparation prior to staging the attack itself. It reflects an ability to move with exacting precision.