This was the most interesting of the sessions I attended. Paller is super knowledgable at a technical level, and at a global level. I could've gone to ten of these.
Allan Paller, SANS
How cybercrime has changed
- Moved from ameteur to full-time professional
- From recreational "explorers" to financial
- From hackers to killers
- From individuals to organized groups
- From financial criminals to terrorists and nation-states
How do they make money?
- Spam from zombies
- Identity theft for stealing bank balances or credit card fraud
- Web defacement
A huge source of extortion - threaten a gambling site with further DoS if they don't pay up. Many are paying multiple extortionists.
How widespread is Cybercrime?
"Any organized crime group that isn't using these techniques should be sued for malpractice"
Extortion in Government
Amundsen-Scott South Pole Station. Romanian Pair. Extorted Money from NSF. Why worry?
Identity Theft: Viruses, Phishing
Why worry? Keyloggers Spyware. Botnets.
SANS Threat Map
What can attackers do with this?
About anything they want.
Normal users should not be admins. Some applications force it - QuickBooks, for example.
Financial use of zombies
- Collect zombies
- Zombies can be rented for really cheap DDoS/extortion attack and spamming
- Zombies can be infected with spyware
- Can be used to compromise VPN channels
Changing "official information". Changed information on the front page to not believe something else on the site, which altered the stock price.
US State Department Reports
Terrorists raise money for bombs using the same techniques. Imam Samudra - al Qaeda in Indonesia is a hacker who's using hacking to earn money for al Qaeda. Wrote a really good book on how to be a hacker.
US Government Computers Hacked
British Government first disclosed it - lots of information available in the Ukraine.
Where are the bad guys going now?
Changing targets because there are so many of them (bad guys) that there's no space. So the attackers are working to innovate.
Attacks are now moving to the web application space. There aren't any users left to get, so the attackers are going after the applications.
@RISK - Weekly vulnerabilities list
Application vulnerabilities outnumber Windows and Unix vulnerabilities 4 to 1
Where will they go next?
Places they can extort money if they own them. Where they can get in to unprotected resources. Appliances (printers, for example).
Strategies for dealing with the new attacks
- Secure Programming Skills
Webapp security testing
Vulnerability testers that stay up to day
Can your programmers code secure web applications?
SANS is working on an exam to determine if a company's developers are capable of writing secure code.