160 likes | 264 Views
Delve into the intricate world of cyber investigations to identify actors and methods involved in breaching security measures. This detailed report sheds light on external, internal, and partner agents, their demographics, tactics, and timelines. Learn about the top attack methods and how breaches are discovered and contained.
E N D
ECI: Anatomy of a Cyber Investigation Who Are the Actors
Who is Doing it? • 70% of breaches involved External agents • 48% of breaches involved Internal agents • 11% of breaches involved Partner agents • Any breach can involve multiple individuals • E.g. An employee of a subcontractors steals Credit Card numbers and delivers the Credit Card Numbers to an external 3rd party
Who is Doing it? • External Agents (70% breaches, 98% of lost data) • 24% Organized Criminal Group • 21% Unaffiliated Person(s) • 3% External Systems or Sites • 5% Others (Former Employee, Partner, Competitor, Customer) • 45% Unknown
Who is Doing it? Internal Agents (48% of Breaches, 3% of records) Demographics (90% Deliberate ) • 51% Regular Employees / end user • 12% Finance / Accounting • 12% System Admin • 7% Upper management • 8% Other ( Help desk, Software Dev, Auditor) • 9% Unknown
Who is Doing it? • Partner Agent (11% of Breaches, 1% of records) • 3rd party “hijack” Partner, • Deliberate act of Partner “Organization that outsource their IT management and support also outsource a great deal of trust to these partners. … poor governance, lax security, and too much trust is often the rule “ Verizon Data Breach Investigation Report (p. 19)
How Are They Doing it?
How did insiders do it? • Inter-connected factors and events • 48% of breaches included Misuse of privilege • 40% of breaches were by Hackers • 38% of breaches used of Malware • 28% of breaches used Social Engineering • 15% of breaches were Physical attacks A single attack can may combine multiple vulnerabilities.
How did Outsiders do it? • Hackers methods • Web Applications 54% • Remote Access 34% • Backdoors 23% • Network file sharing 4% • Others (physical access, Wireless Network, unk)
Top 5 Methods of Attack • Webpage Access • Un / Improperly Secured Access • Trusted network connections • Trojans / Malware / Spyware • Employee Malfeasance
Top 5 Methods of Attack • Web Pages • Unsecured web pages access • SQL Injection • Improperly designed website • Oops - errors
Top 5 Methods of Attack • Un / Improperly Secured Access • Abandoned / Unguarded computers. • Computers with too many connections • Brute Force • Backdoors
Top 5 Methods of Attack • Trusted network connections • Sub contractor / Sister company or agency
Top 5 Methods of Attack • Trojans / Malware / Spyware • E-mail of a Trojan • Social Engineering • Telephone Contact • Email Contact • Internet contact (Chat, IM, etc) • Customized Malware (Largest attacks) • Back doors
Top 5 Methods of Attack • Employee Malfeasance • Abuse of system access • Use of un-approved hardware / device • Rogue networks • Improperly handled data
Timelines facts • How long To Compromise Data • Most took days to months • 31% took only Minutes • Time to Discovery • Most took weeks or months • 5% took minutes • Time to Containment • Most took days to weeks *some even months
Some thoughts • 98% came from servers (duh) • 85% an not very difficult • 61% Discovered by a 3rd party • 86% had evidence in log files about attack