1 of 45

Cybersecurity Update 2022: The Weakest Link

James M. Dodmead, USN Retired X 2

2 of 45

Contents

This presentation provides some high level background and recommendations for you. This briefing should not be viewed as all inclusive and as you know, cybersecurity is a rapidly changing area. Contents of this presentation are listed below:

  • Personal Cyber-Hygiene
  • General
  • Email
  • Social Media
  • Mobile Devices
  • At Home
  • At Work

  • 2022 Update
  • 2022 Scams
  • Center for Internet Security
  • Workshop
  • Final Exam

3 of 45

Data Breach Overview (2022 Verizon Data Breach Investigations Report)

From the latest Verizon DBIR, company analysts have examined 23,896 security incidents (5,212 of which were confirmed breaches) between November 1, 2020 and October 31, 2021, and found that:

  • External actors are 4 times more likely to cause breaches in an organization than internal ones (internal actors can contribute by “clicking that link” or “opening that file”)
  • Roughly 4 in 5 breaches can be attributed to organized crime
  • “Financial gain” is the number one motive for the overwhelming majority of data breaches, “espionage” is in the second spot
  • Over half of breaches involved the use of either remote access or web applications
  • 62% of system intrusion incidents came through an organization’s partner (mostly due to single supply chain breaches)
  • 82% of analyzed breaches over the past year involved a human element (human error, misuse of privilege, social engineering attacks, etc.)
  • The vast majority of breaches include only a handful of steps, with three actions being most common (Phishing, Downloader, and Ransomware)

4 of 45

Location, location, location

  • When you are on the internet you are no longer in the USA; you are in Yemen, Nigeria, Russia, Iran, China and other dubious places where hacking you is not illegal; all at the same time 
  • You are only protected by U.S. Law when you are connecting to U.S. Companies which are physically located in the U.S.A.
  • If you get an email that you didn’t ask for, they are trying to hack you.

5 of 45

Personal Cyber-Hygiene

  • Review your credit report annually. Reviewed at no charge https://www.annualcreditreport.com/index.action
  • Never use the same password for multiple sites, Check https://haveibeenpwned.com/ to see if your account has been compromised
  • Keep your operating system, browser, anti-virus and other software up to date
  • Verify the authenticity of requests from companies or individuals by contacting them, using independently obtained contact information
  • Pay close attention to website URLs. Malicious websites can use a variation in spelling (for example, .com instead of .net) to deceive unsuspecting computer users. Look for: mypaypal.com instead of paypal.com or myusaa.com instead of usaa.com, amazon.org, etc.
  • Set secure passwords and don't share them with anyone.

6 of 45

Personal Cyber-Hygiene

7 of 45

Multi Factor Authentication

  • Multi Factor Authentication (Pick 2)
        • Something You Know (PIN/Password)
    • Something you have (Hardware Token)
    • Something you are (Fingerprint or Iris)
    • Time Based One Time Password (text, email, phone call)
    • Password Manager
  • Regular Password Changes
  • Complex Passwords (12 Characters; upper, lower, number, special character good for 3,000 years)

8 of 45

General Guidance

  • Turn on Security features and read the setup instructions
  • Put IoT devices on a different network than your computers use (Most modern Wireless Access Points (WAP) have a second “guest” network which is isolated)
  • ALWAYS change default password on devices when placing them on your network
  • https://datarecovery.com/rd/default-passwords/
  • Ask the vendor or manufacturer for a secure configuration guide
  • Keep IoT software/firmware up to date

9 of 45

Email

  • Turn off the option to automatically download attachments
  • Never click on a link in an email you are unsure about. Carefully verify the URL, then copy and paste it into the navigation bar of your browser client.
  • Save and scan any attachments before opening them. If you have to open an attachment before you can verify the source, take the following steps:
                • Be sure your operating system and anti-virus software is up to date
                • Save the file to your computer or a disk
                • Run an anti-virus scan on it using your computer’s software

10 of 45

Email

  • Never click on a link in an email you are unsure about. Carefully verify the URL, then copy and paste it into the navigation bar of your browser client.
  • Hover over it and view the link to verify it.
  • Never click on a link in an email you are unsure about.

11 of 45

Email

12 of 45

Social Media

  • Limit the amount of personal information you post. Do not post information that would make you vulnerable, such as your address or information about your schedule, routine or location
  • If a friend posts information about you, make sure the information is something that you are comfortable sharing with strangers. If not, ask them to remove it.
  • Take advantage of privacy and security settings. Use site settings to limit the information you share with the general public online.
  • Be wary of strangers and be cautious of potentially misleading or false information.

13 of 45

Mobile Devices

  • Only access the Internet over a secure network or a VPN Connection. Public networks may expose your login information
  • Maintain the same vigilance you use on your computer on your mobile device
  • Be suspicious of unknown links or requests sent through email or text messages. Do not click on unknown links or answer strange questions sent to your mobile device, regardless of who the sender appears to be or what the application is
  • Download only trusted applications from reputable sources or marketplaces
  • Make sure you understand your exposure if you use your phone for financial transactions (CC number vis a vis direct access to bank account/ATM card or especially a business ATM Card)
  • Consider Disabling Push Notifications

14 of 45

At Home

  • Talk to your children about Internet safety
  • Keep your family’s computer in an open area and talk to your children about what they are doing online, including who they’re talking to and what websites they’re visiting
  • Discuss appropriate internet behavior that is suitable for the child's age, knowledge, and maturity

15 of 45

My Data

  • According to an EU Study, the Average American’s Data is Put up for bid 747 Times a day
  • This Bidding Generated $117 billion last year
  • Your Credit Card Info goes for $8-70, Your SSN is $0.20-$5, ID, Passport, Driver’s License $1-$50 (Depending on Quality of Info)

16 of 45

At Work

  • Restrict access and secure personal information for employees and customers to prevent identity theft.
  • Be suspicious of unsolicited contact from individuals seeking internal organizational data or personal information
  • Verify a request’s authenticity by contacting the requesting entity or company directly via independent means (telephone call)
  • Immediately report any suspected data or security breaches to your supervisor, manager or law enforcement

17 of 45

At Work (continued)

  • Be aware that both smart phones and personal assistants (e.g., Alexa, Siri, Google, etc.) are listening devices
  • Do not conduct sensitive conversations with Smartphones or Personal Assistants in the room
  • Vulnerability Summary https://www.kb.cert.org/vuls/bypublished/desc/
  • Print Nightmare
  • Pulse Secure VPN
  • Patch, Patch, Patch

18 of 45

18 Secrets from People that Never Get Hacked�Wired Magazine: Joe McKinley Updated: Feb. 02, 2022

  1. They never shop on a website with an “http” URL
  2. They only use trusted apps
  3. They use a VPN
  4. They don’t use debit cards for online purchases
  5. They use two-step verification
  6. They protect their credit card info
  7. They lock out lost devices
  8. They protect their passwords
  9. They use password managers
  10. They don’t click unknown links
  11. They avoid connecting to public Wi-Fi
  12. They take precautions when using connected devices
  13. They are aware of data breaches
  14. They are wary of random outreach
  15. They don’t use public chargers
  16. They update their security software regularly
  17. They come up with creative answers to security questions
  18. They keep things manual

19 of 45

2022 Update Topics: Vulnerabilities

20 of 45

2022 Update Topics: Network Sharing

Sidewalk

  • Amazon Sidewalk is a shared network that helps devices like Amazon Echo devices, Ring Security Cams, outdoor lights, motion sensors, and Tile trackers work better at home and beyond the front door
  • Amazon just decided that they would start sharing your wireless network with other Echo/Ring users in your area
  • It can be disabled
  • Recent research revealed Alexa and other voice assistants monitor and record conversations up to 19 times a day

https://www.zdnet.com/article/working-from-home-switch-off-amazons-alexa-say-lawyers/

21 of 45

2022 Update Topics: Devices

Monitoring Devices

  • Computer with Camera
  • Television With Camera
  • Smartphones
  • Fitness Watches
  • Game Consoles with Cameras and/or microphones
  • Tablets with Camera
  • Smart Speakers
  • Smart Doorbells
  • Automobiles with Onstar or similar services
  • MP3 players with microphones
  • Smart Appliances responding to voice commands
  • Next Year: Who Knows?

22 of 45

2022 Update Topics: Ransomware

Ransomware: https://ransomwhe.re/

  • $128,102,319.80 paid in ransom as of 9/21/2022

1. MAKE SURE YOUR ANTIVIRUS SOFTWARE IS UP TO DATE

2. UNDERSTAND WHAT'S HAPPENING ACROSS THE NETWORK

3. SCAN AND FILTER EMAILS BEFORE THEY REACH YOUR USERS

4. HAVE A PLAN FOR HOW TO RESPOND TO A RANSOMWARE ATTACK, AND TEST IT

5. THINK VERY LONG AND HARD BEFORE YOU PAY A RANSOM

6. UNDERSTAND WHAT YOUR MOST IMPORTANT DATA IS AND CREATE AN EFFECTIVE BACKUP STRATEGY

7. UNDERSTAND WHAT'S CONNECTED TO YOUR NETWORK

8. MAKE IT HARDER TO ROAM ACROSS YOUR NETWORKS

9. TRAIN STAFF TO RECOGNIZE SUSPICIOUS EMAILS

10. CHANGE DEFAULT PASSWORDS ACROSS ALL ACCESS POINTS

11. APPLY SOFTWARE PATCHES TO KEEP SYSTEMS UP TO DATE

23 of 45

2022 Update Topics: Brushing

Brushing Scam: If you receive an unexpected package, you may be the victim of a Brushing Scam

  • Vendors may send a package in order to bolster their reviews
  • This practice is illegal in the U.S.
  • It may indicate that your personal information has been compromised
  • If you receive an unsolicited package you can keep it, discard it or try to return it
  • Monitor your financial accounts (bank and credit cards) to ensure that you were not charged for the item

24 of 45

2022 Update Topics

Identity Theft, Phishing and Pharming: Scammers gain access to your confidential information, like social security numbers, date of birth and then use it to apply for credit cards, loans and financial accounts. Typically, the victim receives an email that appears to be from a credible, real bank or credit card company, with links to a website and a request to update account information. But the website and email are fakes, made to look like the real website.

Phone scams: Scammers call anyway, of course, and they've even found a way to scam consumers by pretending to be a government official calling to sign you up or confirming your previous participation on the Do Not call list! A good example of this is the "Your Microsoft license key has expired" scam call - which you can hear and read about on this page: https://www.microsoft.com/security/blog/2014/06/26/is-that-call-from-microsoft-a-scam/ .

25 of 45

2022 Update Topics: Zelle

  • Zelle is a free phone app that allows transfering funds between bank accounts at no charge
  • Zelle Users have Lost Thousands of Dollars in Money-transfer Scams
  • In 2021 users sent $490 Billion through Zelle ($230 Billiion in Venmo)
  • Generally the Scams begin with Social Engineering and an urgent need for a funds transfer such as having your power cut off
  • Protect Yourself:
        • Don’t Respond to Unsolicited Texts or Emails
    • Watch for Urgent Requests from new Respondents
    • Never Give Anyone Your Two Factor Authentication Code
    • Use Zelle for Transfers only to People or Businesses that you know and trust

26 of 45

2022 Update Topics: QR Codes

  • Quick Response (QR) Codes can be used to take you to a restaurant menu, a business website, a phone number, email address and so on
  • Within the past few years, the popularity of QR codes has exploded. Not only do you see them in many stores at the local mall, but now they are scattered across magazines (and even junk mail)
  • QR codes are a specially formulated bar code that a smart phone’s camera/operating system converts into an Internet hyperlink to display something onscreen
  • Criminals can also use QR codes to steer victims towards malicious websites – and some QR code apps have been found to contain malware

https://gcn.com/cybersecurity/2022/04/how-qr-codes-work-and-what-makes-them-dangerous-computer-scientist-explains/364152/

27 of 45

2022 Update Topics

Internet merchandise scams: You purchase something online, but it is either never delivered or it is not what they claimed it was, or is defective. Online shopping, and other shop from home, such as catalog, mail and phone shopping scams are on the rise. Remove your Personal Information From Google Search:

Type something into the world’s most popular search engine and you will likely find it – to include some of your PII. Google has long-provided a mechanism to remove data from its search engine database – but now has expanded that capability to permit individuals to request their PII to be removed (good news for INFOSEC-minded individuals) https://support.google.com/websearch/answer/4628134?hl=en#zippy=%2Cremove-image-with-sensitive-financial-medical-or-national-id-info

28 of 45

2022 Update Topics

Credit Bureaus and related credit scams: �Credit/debit card fees, pay day loans, credit repair companies and unauthorized use of credit/debit cards. Some of these complaints involved hidden fees and billing disputes as well. Phishing/Spoofing Emails: �Emails that pretend to be from a company, organization or government agency but ask you to enter or confirm�your personal information

Online Credit Card Processing: �Since 2019 Tens of Millions of $s have been charged via fake websites using stolen credit card numbers. BE SURE TO REGULARLY REVIEW YOUR CREDIT CARD STATEMENTS!!!

29 of 45

2022 Scams: More Information

30 of 45

2022 Scams: Don’t Say “Yes”

Voice Recording: Can you hear me? If you hear that, just hang up. The person on the other end will be recording the call, and would then use the track of you saying “yes” to access your sensitive information. How? The three-letter word is used frequently by companies to confirm account changes, security settings, and purchases, giving the scammer extensive access to your stuff.

https://www.rd.com/article/four-word-phone-scam/?_cmp=readuprdus&_ebid=readuprdus422021&_mid=408088&ehid=e3eaae2d9e21610b7f3b5290e7d22d6a573ca180

31 of 45

Workshop

  • What shall I do with this email?

32 of 45

What did we learn?

Final Exam

Question 1

  • What are the two main takeaways from this presentation?

33 of 45

What did we learn?

Independently verify any transaction (text, email, voice mail, etc.) before acting on it.

34 of 45

What did we learn?

Do Not Click on that Link!

(Unless you are sure about it)

35 of 45

What did we learn?

Final Exam

Question 2

  • What is the cybersecurity weakest link?

36 of 45

What did we learn?

You

(the user)

37 of 45

Got Questions?

Questions?

Secure@CYBERDEF.BIZ

Cybersecurity Assessment, Staff training, IT Consulting,

System Hardening, Data Recovery, Intellectual Property/Data Loss

38 of 45

CSAM 2022

39 of 45

Got Questions?

Backup Slides

40 of 45

History

The Wild, Wild West

  • 1903 A magician “trolls” John Fleming's demonstration of wireless telegraphy by sending insulting Morse code messages
  • 1939 Polish cryptologists developed the “Bombe” to break the Enigma machine reliably
  • 1943 René Carmille, comptroller general of the French Army, hacked the punched card system used by the Nazis to locate Jews
  • 1957 Joe "Joybubbles" Engressia, a blind 7 year-old boy with perfect pitch discovered that whistling 2600 Hz opened AT&T's telephone systems, creating “phreaking”
  • 1967 The first network penetration took place when a computer club at a Chicago high school was given access to IBM's network

41 of 45

History

  • The Creeper virus detected on the Advanced Research Project Agency Network (ARPANET) in the early 1970s.
  • In 1985 a coworker and I unknowingly hacked into a highly classified system in the Philippines
  • The Iloveyou virus that was all over the news in the year 2000. This worm originated in the Philippines and as daybreak moved west to Hong Kong, to Europe, and finally to the U.S. The outbreak cost $5.5-8.7 billion in damages and another $15 billion to remove the worm.
  • Russia's 2007 cyber attack on Estonia is considered be the first volley in cyber warfare, U.S. officials concluded that cyber attacks had become a staple of modern warfare.

42 of 45

Evolution

Organized Crime

  • 1989 The detection of AIDS (Trojan horse) is the first ransomware detection.
  • 1994 Russian crackers siphon $10 million from Citibank and transfers the money to accounts in Finland and Israel. He is sentenced to three years in prison and authorities recover all but $400,000 of the stolen money
  • 2003 The hacktivist group Anonymous was formed
  • 2004 North Korea claims to have trained 500 hackers who successfully crack South Korean, Japanese, and their allies' computer systems
  • 2004 A spear phishing incident at the Office of the Secretary of Defense steals sensitive defense information, leading to significant changes in identity and message-source (HSPD 12)

43 of 45

Evolution

Dawning of the Age of Cyber-Warfare (Nation States)

  • 2008 Around 20 Chinese hackers claim to access to the world's most sensitive sites, including The Pentagon. They operated from an apartment on a Chinese Island.
  • 2010 The Stuxnet worm is found. Stuxnet was unusual in that while it spread via Windows computers, its payload targeted just one specific model and type of SCADA system. It slowly became clear that it was a cyber attack on Iran's nuclear facilities
  • 2012 Computer hacker sl1nk announced that he has hacked a total of 9 countries' SCADA systems. The proof includes 6 countries: France, Norway, Russia, Spain, Sweden and the United States (almost all major utilities, ships, cities, airlines, etc. use SCADA)
  • 2016 July 22: WikiLeaks published the documents from the 2016 Democratic National Committee email leak

44 of 45

Risks and Mitigations (Overview)

  • Ransomware: Criminals Encrypt your data

Resulting in Loss of access to data.

              • Can be mitigated through Frequent File Backups
  • Loss of Intellectual Property: Someone steals your work.
  • To mitigate Encrypt and/or Isolate from network and users
  • Critical National Infrastructure: Damage to Power, telecommunications, highways,

water, hospitals, fire departments,

police departments

  • Isolate from Global Network Access

And “Bake In” security

45 of 45

Risks and Mitigations (Overview)

  • Cyber Warfare: Critical to National Defense; DHS, DoD and Each service now have a Cybersecurity Organization to monitor and defend government/commercial/military cyber resources
  • Financial Institutions: Inability to conduct commerce could

Wreak Havoc on our Country

  • Need to significantly improve security on banking and other financial networks. (Smart Cards/Multi Factor Authentication via email or text)
  • National Intelligence: Every time there is a loss of intelligence

documents we lose invaluable national resources

  • Stop the leaks