How to kill a plant

24
Per Söderqvist Sales Engineer Per Söderqvist Senior Team leader – Sales Engineer “How to kill a plant”

Transcript of How to kill a plant

Page 1: How to kill a plant

Per SöderqvistSales EngineerPer Söderqvist

Senior Team leader – Sales Engineer

“How to kill a plant”

Page 2: How to kill a plant

RansomwareFirst Wave

Page 3: How to kill a plant

Ransomware First Wave

Cryptolocker

Locky

Cryptowall

TorrentLocker

CryptoMix

HydraCrypt

UmbreCrypt AlphaCrypt

Locker Cerber

TeslaCrypt

Page 4: How to kill a plant

My Top 3 list

Ransomware

Page 5: How to kill a plant
Page 6: How to kill a plant

The Popcorn Ransomware

Page 7: How to kill a plant

ThunderCrypt

Page 8: How to kill a plant

RansomwareSecond Wave

Page 9: How to kill a plant

WannaCry / NotPetya

Page 10: How to kill a plant

RansomwareThird Wave

?

Page 11: How to kill a plant

11

Page 12: How to kill a plant

Problems with IoT

12

• Security is expensive therefore not many suppliers of IoT devices invest in that.

• Demand for IoT devices has increased so much that the suppliers rush the product on to the market.

• No common platform/OS or API, that could be used to protect these devices

Page 13: How to kill a plant

IoT - Mirai botnet

• “In September 2016, hackers used 152,000 consumer IoT devices to initiate a distributed denial of service (DDoS) attack on French hosting provider OVH. They were able to inundate the company with 1Tbps of traffic, causing mayhem for customers around the world.”

• The Mirai botnet was first found in August 2016 by MalwareMustDie, a whitehat malware research group

Page 14: How to kill a plant

14

Page 15: How to kill a plant

Bluetooth – BlueBorne exploit

15

• Doesn't even need to pair their device with that of the victim.• exploit cleverly attacks portions of the software needed to establish a

connection to hijack the Bluetooth stack itself

• Currently not in the Wild.

• Apple, Google, and Microsoft have all patched the exploit.

Page 16: How to kill a plant

Bluetooth Low Energy aka Bluetooth Smart

16

• Toothbrushes• Lamps• Alarm clocks• Coffee makers• Headphones

• Speakers some with built in Microphone• Smart Watches• Medical devices• Alarms• Door locks• Padlocks• etc

Page 17: How to kill a plant

Demo

Page 18: How to kill a plant

Internet Of Things will not go away!

Page 19: How to kill a plant

Next Generation of Security

Page 20: How to kill a plant

Evolution of Client Security – The game of Cat and Mouse

1971

First Malware

“First” Ransomware

Cloud based lookup

First Polymorphic

malware

2011 2008 2010

Heuristic and Behavior analysis

20031987

Signature based

Detection

1989

Anti-Spam

1990

Spam

2013

Artificial Intelligence

1991 2013

AntiExploit

2017

First Worm like ransomware

2016

Exploit kits

20

Malware Samples per day reaches

100 000+

Page 21: How to kill a plant

Machine Learning vs Deep Learning

CAR

CAR

Page 22: How to kill a plant

Machine Learning, Deep Learning and Artificial Intelligence

22

CAT

Page 23: How to kill a plant

One Final Thought…

Page 24: How to kill a plant