Who clicked Who Cares

63
Who Clicked? Who Cares? 24, March 2015 right now Chris Nickerson Founder Lares

description

Why phishing is done wrong today and the metrics people are collecting are making programs WORSE not better.

Transcript of Who clicked Who Cares

Page 1: Who clicked Who Cares

Who Clicked? Who Cares? 24, March 2015

right now

Chris Nickerson

Founder

Lares

Page 2: Who clicked Who Cares

hi. =)

Page 3: Who clicked Who Cares

Thanks

Page 4: Who clicked Who Cares
Page 5: Who clicked Who Cares
Page 6: Who clicked Who Cares
Page 7: Who clicked Who Cares
Page 8: Who clicked Who Cares

Trigger Warnings

• Cursing• Racism

• Religious Prejudice• Sex

• Drugs• Daddy /

Abandonment issues • Socio Economic Hate

crimes• Thin Skin

• Lack of sense of humor

• Sexual orientation• Sexism

• Violence• Vomiting

• Abuse• Truth

• Honesty• Facts

Page 9: Who clicked Who Cares
Page 10: Who clicked Who Cares

·Anyway...

Page 11: Who clicked Who Cares

· I’m Chris

AKA

@indi303

[email protected]

https://vimeo.com/laresconsulting

http://www.scribd.com/Lares_

Page 12: Who clicked Who Cares
Page 13: Who clicked Who Cares
Page 14: Who clicked Who Cares
Page 15: Who clicked Who Cares
Page 16: Who clicked Who Cares
Page 17: Who clicked Who Cares
Page 18: Who clicked Who Cares

LARES

Page 19: Who clicked Who Cares
Page 20: Who clicked Who Cares
Page 21: Who clicked Who Cares
Page 22: Who clicked Who Cares
Page 23: Who clicked Who Cares
Page 24: Who clicked Who Cares
Page 25: Who clicked Who Cares

Custom Services

OSINTSIGINT

TSCM/ Bug SweepingExploit Development

Tool CreationAttack Planning

Offensive ConsultationAdversarial IntelligenceCompetitive Intelligence

Attack ModelingBusiness Chain Vuln

AssessmentsCustom Physical Bypass

Tool DesignReverse Engineering

Other stuff I can’t write down…

Page 26: Who clicked Who Cares

What Do We Know?

· www.socalengineer.org

Page 27: Who clicked Who Cares

Dumpster Diving

Page 28: Who clicked Who Cares

Shoulder Surfing

Page 29: Who clicked Who Cares

Phishing

Page 30: Who clicked Who Cares

Target PHONE Support Staff

Page 31: Who clicked Who Cares

Human Resources

Page 32: Who clicked Who Cares

Smoking is Bad

Page 33: Who clicked Who Cares

Transit Systems

Page 34: Who clicked Who Cares

Social Functions

Page 35: Who clicked Who Cares

Client Side Attacks

Page 36: Who clicked Who Cares

But that’s not phishin’ chris….

Phishing is all about EMAIL!

Page 37: Who clicked Who Cares
Page 38: Who clicked Who Cares

Directed Phishing

Page 39: Who clicked Who Cares

· lath

er ·Choos

e an attack · R

inse ·Send

out an attack, get basic metrics

· Rep

eat ·Send

em a cbt and phish em again

Page 40: Who clicked Who Cares

Slide 41

CLICKS

Page 41: Who clicked Who Cares

Slide 42

huh?

Page 42: Who clicked Who Cares

Slide 43

Page 43: Who clicked Who Cares

Slide 44

Page 44: Who clicked Who Cares

Slide 45

PHISHING

CLICK RATIO

Page 45: Who clicked Who Cares

Slide 46

Training Metrics Testing of layered defense Creating durability Testing Identification skills EXPERIENCE Solidarity USER EMPOWERMENT BUSINESS

What’s it about then?

Page 46: Who clicked Who Cares

Slide 47

Page 47: Who clicked Who Cares

Slide 48

“If it weren’t for the users we would be secure” – Some idiot in infosec who should have taken a job as a used car salesperson

“Users are our BIGGEST vulnerability” – Some Infosec “professional” who diesn’t know what vulnerability means

Page 48: Who clicked Who Cares

Slide 49

Page 49: Who clicked Who Cares

Slide 50

Page 50: Who clicked Who Cares

Slide 51

Intelligence Leakage

Contact info emails [userID] phone numbers Metadata Dox reference checks

Pastebin, support forums, wikis, etc

Page 51: Who clicked Who Cares

Slide 52

Mail Configuration

Pure vanilla spoof (forged internal from Internet) Validate/verify addresses

Recipient and Sender MX, SPF, RBL, Spam Block known bad senders/Blacklists Throttle after X in an hour

Page 52: Who clicked Who Cares

Slide 53

Spam/Proxy Configuration

In line spam detection Proxy in use Content inspection Content filtering

Exceptions Inspect (Decrypt) SSL

Page 53: Who clicked Who Cares

Slide 54

Malicious Attachments/Content

Malicious Attachments Java applet Excel macros Calendar invites PDFs Executables and more

Linked (hosted) executables

Page 54: Who clicked Who Cares

Slide 55

Browser Attacks

Corporate Standards Vulnerable type/version Frame injection/Keyloggers 3rd party add-ons/Plugins Mobile platforms Credential theft (SCORING) Integration with Red Team

Page 55: Who clicked Who Cares

Slide 56

Malicious Detection

IPS/NIPS/HIPS AV process protection 100% coverage File integrity monitoring System process protection Injection migration

Page 56: Who clicked Who Cares

Slide 57

Ingress/Egress Filtering

Can an attacker call home? What are all the ways?

Page 57: Who clicked Who Cares

Slide 58

On Device Vulnerability

Does the user have rights Can you priv esc Can you get to the “Mothership” Is there IP I can take? Can I pivot and “Go for the gold”

Page 58: Who clicked Who Cares

Slide 59

Post Phish Value Did your IR team catch it? How long did it take to kick in response How effective was response Is there skill gaps What do you need to do

to close the gaps?

Page 59: Who clicked Who Cares

Slide 60

What other metrics do you need to be tracking to make informed

decisions and ACTUALLY reduce the risk of phishing

Page 60: Who clicked Who Cares

Slide 61

User data (Demographics) User Role Position Paygrade Education level Etc.

Automated Defensive measurements Technology effectiveness

REAL METRICS REAL DECISIONS

Page 61: Who clicked Who Cares

Slide 62

Response timing Time for emails to get delivered Time til first detection Time til enterprise notification Time required to create incident team Time to identify threat vectors Time required to identify/quarantine threat

Time to analyze indicators accurately Mean time to incident eradication

REAL METRICS REAL DECISIONS

Page 62: Who clicked Who Cares

Slide 63

After we analyze metrics we need to make a REAL plan to stop this from happening the SAME way again

Increased user training Increased technology and automated defenses Process improvement opportunities Blue team Improvement IR process review War boarding advanced threat Always asking, WHAT IF we didn’t get it ALL!

FOLLOW THROUGH

Page 63: Who clicked Who Cares

THANK YOU!

[Chris Nickerson,

[email protected]]

Please Remember To Fill Out Your

Session Evaluation Forms!