Module 1 - CASEBOOK
Module 1 - CASEBOOK
Module 1 - CASEBOOK
COURSE NOTES
MODULE 1 - Casebook
Cyber Risk Academy [email protected]
Document Classification: Class 1 - General
INTRODUCTION
In this module, we explore the cyber threat landscape and gain an understanding of the
key threat actors, their motivations, and techniques.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 2
Cyber Risk Academy [email protected]
TUTORIAL VIDEO 1 – TRANSCRIPT
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 3
Cyber Risk Academy [email protected]
Video Reference (00:01:11):
So, in other words, I have to get beside it. I have to get my hands physically on your
laptop in order to steal it and carry out that action. The chances are that there will be
witnesses because I'm in a physical environment, there may be CCTV surveillance, if
there is and you notice that the asset is gone, that is has been stolen. When you see
your laptop is missing you can contact law enforcement they can investigate.
Potentially, I would be arrested, brought to court to face attribution and justice and
that is normally the way things work in theory in the real physical world.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 4
Cyber Risk Academy [email protected]
Video Reference (00:02:29):
But first of all, let's have a quick overview. This infographic shows a nice break down of
all of the different main cyber threat groups. So, for example you've got cyber
criminals and their motivations may be to make money. You have nation states who
may carry out nefarious cyber activity for geopolitical reasons. You may have
hacktivists, who want to do something for ideological reasons. You may have terrorist
cells, who are doing things in order to support propaganda, violence, spreading terror,
recruitment and so on. You may have thrill seekers who just want to do for the fun and
of course you may have discontented insiders who may carry out activities for various
reasons.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 5
Cyber Risk Academy [email protected]
Video Reference (00:03:56):
Here in this infographic, we can see a different perspective on that. We can see the
different groups, down at the end see you’ve got your thrill seekers, you’ve got your
hacktivists, you’ve got your insider’s, your terrorists, your organised crime, and your
state sponsored groups. Again, this is not all of the groups, but this infographic is more
to give you an idea of the different skill levels involved, the different motivations and
examples of the kind of techniques that they would use.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 6
Cyber Risk Academy [email protected]
Video Reference (00:04:44):
So, in the physical world, the traditional entry to the world of criminality was the ability
or the propensity to be violent and that's essentially your ticket in. If you were a violent
person and you had a criminal notion about you, you entered into that world and that
was your ticket to get in. It is completely different in the world of cyber criminality
because what we find is, at the top end of the cyber-criminal groups a lot of the guys
first of all are not very technical but what they are, they are “people persons” you know
that there are highly organised they're great at collaborating, bringing the projects
together, essentially entrepreneurs and that's what you get at the top end of the chain.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 7
Cyber Risk Academy [email protected]
Video Reference (00:06:05):
So, if you were to go to for example at a site like YouTube and type in the word
“CARDING” C – A – R - D – I – N – G. First you will learn how to shear our friend here
and turn the fleece into wool because that's what “carding” means in the real physical
world. However, in the cyber world “carding” relates to the sub industry of stealing
credit card details and monetising them. So, what you'd find is, lots of videos that are
not just on YouTube but on lots of different websites to teach you how to become a
“CARDER”. How to use carding forums, how to use carding software and that's
everything from you know from teaching waiters or waitresses how to skim credit
cards, to teaching people how to monetise the data when it's been stolen.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 8
Cyber Risk Academy [email protected]
Video Reference (00:07:31):
There is an insatiable demand for the product but just like in the real physical world the
fresher the product the more expensive it is. In other words, if you have stolen
credentials, stolen usernames, passwords, or credit card details, what we refer to as a
“FULLZ” data F – U- L – L- Z . Which is a more complete database record of somebody.
So, for example their billing address, their account number, their balances, their
mother's maiden name, that kind of data builds up what we call a “fullz record”. That
data is far more valuable and the fresher it is, in other words that it hasn't been
reported and it's not out there a very long time, then the higher the chance of the bad
guy being successful in using it as part of a scam, therefore the price is higher. So, you
need to think of it like a marketplace. When you actually see these marketplaces, you
learn very quickly how sophisticated they are. They have rating engines on them, to
rate the other criminals because it is axiomatic you can’t trust another criminal.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 9
Cyber Risk Academy [email protected]
Video Reference (00:09:57):
So that advertisement, for those of you recognize that flash animation is well over ten
years old and it shows you the sophistication of how these sites developed.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 10
Cyber Risk Academy [email protected]
Video Reference (00:10:57):
You didn’t have to part of a criminal group you could be an independent contractor, in
the world of cybercrime. You could work through sites like this. You could obtain any
of the other pieces of the puzzle for example that you were looking for yourself. So,
you might be an expert in one particular area, but you didn't have the other data, or the
other skills and you could rent hire or buy whatever you needed to do that. This was a
key step in the development of it.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 11
Cyber Risk Academy [email protected]
Video Reference (00:12:50):
But let's have a look at one other sort of one of many thousands of promo videos of
sort of scary tactic videos will put out there to get the points across.
We are prepared to unleash a full-scale global blackout of these websites including networks
in exactly seventy-two hours after we send this message if Megaupload is not reinstated to is
not the internet. We have access to banking and credit card information of millions of
citizens.
But it's for the citizens do not fear for your accounts will not be compromised this is simply a
raising awareness, a demonstration to those who doubted our abilities, to those who support
certain people, to those congressmen who want to vote yes on these bills. We are not fucking
playing; you have been warned operation global blackout part one engaged.
We are Anonymous.
We are legion.
We do not forgive.
We do not forget.
Expect us.”
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 12
Cyber Risk Academy [email protected]
Video Reference (00:14:40):
So, these groups, it’s important to understand the background to them because there's
up to date versions of these with different names around all the time and a lot of the
techniques can still be carried out by different types of entities that get behind them.
We talk about that certainly in relation to things like supply chain hacking and so on
and hacktivism and an ideology.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 13
Cyber Risk Academy [email protected]
Video Reference (00:16:47):
So, LulzSec, the name itself was originally short for “LOL - laugh out loud – Security”
and it was to point out the fact that all of the hacks they did were unsophisticated and
were showing how laughable the security was of these big corporations. But this stuff
isn’t to be dismissed or laughed at lightly because the fact is, if you can raise thousands
of people around the world behind your cause whatever that is, you effectively have an
online army to carry out whatever that activity is and a lot of them feel they can remain
anonymous, feel that there is no price to be paid for whatever activity they carry out.
So again, we get this disconnection between the real physical world and the cyber
world.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 14
Cyber Risk Academy [email protected]
Video Reference (00:19:34):
And of course the person, the target, the victim turns around and goes “I will I’ll
comply, I’ll comply” but they don't believe them so in order to get them to believe
them, to become pawned or owned, they will get them to take their shoe off, put it on
their head and take a photograph and post it. That was a clear sign that they were then
under the control of the hacker to carry out because if they were willing to do
something as ridiculous as that post a photograph they felt they were then in a
psychological phase of compliance that they would carry out whatever.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 15
Cyber Risk Academy [email protected]
Video Reference (00:21:18):
So what we have is what they call C – A – A – S. which is Crime As A Service, where you
can rent a hacker or hacker services or bad guy services to carry out whatever the
particular action or tactic that you want to be carried out. And here you can see that I
can buy data, I can buy services, I can buy attack tools, whatever I want and this is just a
sample of different products and an averaged out price in euros after what we've seen
recently and in some of these cybercriminal websites.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 16
Cyber Risk Academy [email protected]
Video Reference (00:22:49):
You have “Cashiers” who control drop accounts who provide names and accounts to
other criminals for a fee. You have “Money Mules” these guys complete the electronic
transfer so they’re clean bank accounts, I'm going to talk a little bit more about them in
a moment. You have “Tellers” who were charged with transferring and laundering
illicitly gained proceeds. Inevitably this is often done now with crypto currencies this is
done through different apps that can actually launder the cash online into
cryptocurrencies and into tumblers. These tumblers are effectively like you can almost
think of them like washing machines, where they will throw in different bitcoins from
different people and it will come out the other side and they tumbler system itself will
charge a varying percentage in order to wash that cryptocurrency.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 17
Cyber Risk Academy [email protected]
Video Reference (00:25:14):
So, let's have a look at money mules. So, this is an email purporting to hook people in
for a job application in Credit Suisse in Australia and this is quiet an effective one. You
can see that the website looks pretty legitimate and thousands of Australians fell for it.
But the reality here is, when it comes and you often see these signs around in the
physical world from the point of view of “hey, work from home earn extra cash” and
these or you see ads in newspapers saying “international company wants to open up a
country manager” and have a site in a particular country they want to use somebody.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 18
Cyber Risk Academy [email protected]
Video Reference (00:26:27):
And then all of a sudden, the story changes. That story may be that they haven't had
time to open up their corporate bank account in the country and they want to deposit a
substantial amount of money into your clean bank account which isn't being
monitored, isn’t being tracked in anyway by the banking system and they want you to
send the majority of that balance on maybe via Western Union or through
cryptocurrency but effectively laundered that money.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 19
Cyber Risk Academy [email protected]
Video Reference (00:27:56):
Some of the sample titles we see: You get the point here; these are almost too good to
be true. Earning cash, extra significant money, and part time from home and so people
need to be aware of this not to become part of that underground economy of cyber-
crime as well and to be aware that this is how the everyday business of laundering
money is drawn on by different levels of the cybercriminal community.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 20
Cyber Risk Academy [email protected]
Video Reference (00:29:16):
One of the biggest catalysts that has transformed the world of cybercrime is the
development of crimeware making it easy. Making it for everybody. And that it
becomes ubiquitous that anybody who wants to get involved in any element of
cybercrime can do that because you can simply buy a tool that will carry out whatever
that activity is. So, you no longer need to be that hacker in the toga, eating smarties,
drinking cans of coke with empty pizza boxes beside you those days are gone. These
are everyday people as well that can hire something or just disgruntled with somebody
maybe and want to carry out something or a cheating spouse whatever and these tools
are for sale openly in many cases on the, what I call the surface web. That is the
internet that you gain from the likes of Google and so on you gain access to. Also, in in
the darker areas of the deep web that we refer to as the dark web, as I say we're going
into more detail on that over time.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 21
Cyber Risk Academy [email protected]
Video Reference (00:30:16):
So, in theory somebody goes to the hackers marketplace they decide what tools they
want, and they go to take that tool, whether they want to hire it or whether they want
to buy it and carry out the activity themselves as related to that. So, the example I am
going to use is a tool called SpyEye tool which is a crimeware tool for stealing credit
card details but also does a lot more things and I think it's a great tool to illustrate some
of the characteristics of how crimeware works. This tool is probably a decade old at
this stage, it used to sell for about US$500 and had many different aspects to it which
I’ll go through.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 22
Cyber Risk Academy [email protected]
Video Reference (00:31:22):
But first let me explain to you some of the ecosystem they use. They use something
that we refer to as botnets. So what botnets are, are a network of infected computers
or devices. So, you start off where somebody wants to build up a botnet or a network
of infected computers and we refer to that person as a botnet herder. A botnet herder
will then send out a piece of malware to somebody that they click on a link maybe in an
email or they visit an affected website and it starts infecting their computer whether
it's a PC, whether it's a laptop, even a phone, whatever happens it to be and they'll
build up this network by hiding this piece of software in the background.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 23
Cyber Risk Academy [email protected]
Video Reference (00:32:46):
These botnets are into the tens of thousands and even hundreds of thousands of
infected computers that these guys can call up and use for whatever they want. And
the way they do that is they install what we call a “C2 server” or a “Command and
Control Server” and that is often on an infected environment. So, in other words, that
could be somebody else's network that they have hacked into. They've installed the
administration panels up to there as the command controls server of SpyEye and they
will have access then through what we call proxies.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 24
Cyber Risk Academy [email protected]
Video Reference (00:34:17):
Okay so let's go back to the SpyEye toolkit and let have a look at examples of how that
could be potentially used. So, you’ve got your botnet herders they’ve got the command
and control server and they go into the admin panel and they set up what they want it
to do. Now formidably SpyEye was used and designed for stealing credit card details
but can also put through lots of different transactions and so on there's so many
different configurations of it that can be carried out. This became the Swiss Army Knife
or tool of bad guys that they were able to do all sorts of different things they wanted.
They could test the environment of their victims machines to see what was on them,
they could monitor looking for keystrokes for passwords, they could as I say take
credit card details or take other information that they need to carry out whatever they
need to do.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 25
Cyber Risk Academy [email protected]
Video Reference (00:35:00):
So, one of the things they would do for example is every time a credit card was used on
those infected computers those credit card details would be sucked up onto the
command and control server and would start building on the database. Then that
database, of course in theory, would be sold off on the marketplace, on the criminal
marketplace. So, they got hundreds of thousands of computers out there infected and
not alone are they becoming these machines that can be used as part of a criminal
army, but they’re also the data being used by the victims on them is being stolen and
sold, so they’re really swelling the asset here.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 26
Cyber Risk Academy [email protected]
Video Reference (00:36:45):
Then what will happen is they we do this in a relatively short period of time so that
they would get paid out by the legitimate site that has mistakenly sold something that
they didn’t realize wasn't owned or wasn't a copyright or the intellectual property of
the entity that has been selling it online.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 27
Cyber Risk Academy [email protected]
Video Reference (00:37:55):
One interesting thing was, and we see here that one of the competitors to SpyEye was
something called Zeus and I'll talk more about this as we would go on but what the bad
guys would do is they would make sure that they didn't want other bad guys in their
territory. So, one of the key things when they were installing SpyEye was that when
they infected a computer they would look to see if any of their competitors were on
their environment and if they were it could kill off the competitors. So, you can see the
whole mentality here criminal mentality of owning the territory, protecting it, making
sure nobody else got in, if someone else is in there essentially digitally bullying them
out of it by killing off the competitor's software and then protecting that environment
as part of their investment as part of something that they were doing.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 28
Cyber Risk Academy [email protected]
Video Reference (00:39:30):
So, they were able to take out the competition use lots of different stuff. Here we can
see with the billing hammer module, they would use Irish credit cards in Ireland, U. K.
based ones in the UK and so on, all around the world and right down to the locality they
knew where that infected computer was and they would put the transaction through
pretending to be from that infected computer.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 29
Cyber Risk Academy [email protected]
Video Reference (00:41:12):
So this is why cyber warfare is something that they can hide behind an awful lot, they
can carry it out quite easily and the economist refers to it as the fifth domain – so
you’ve got land, air, sea, space and now cyber space as being the fifth domain of
warfare.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 30
Cyber Risk Academy [email protected]
Video Reference (00:43:03):
Okay let's have a look at project Aurora from 2007 we can delve a little bit deeper.
Steve Kroft Of all the critical components of the US infrastructure the power grid is one of
the most vulnerable to cyber-attack. That's because the power grid is run and
regulated by private utilities which are unbeholden to the government security
decree.
John Mulder: I walk through the steps a hacker might take.
Steve Kroft Here the Sandia national laboratories department of energy specialists like John
Moulder try to hack into the computer systems of power and water companies
and other sensitive targets in order to figure out the best way to sabotage.
Steve Kroft It's all done with the company's permission in order to identify their
vulnerabilities. This is a graphic demonstration of how they could have distorted
oil refinery by sending out codes that caused a crucial component to overheat.
John Mulder The first thing you would do is turn it to manual control so that your automatic
controls aren’t protecting it.
Steve Kroft What would be your main target here?
John Mulder They see elements and the recirculator pump. If we could malfunction both of
those, we could cause an explosion
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 31
Cyber Risk Academy [email protected]
Steve Kroft But the companies are under no obligation to fix the vulnerabilities which was
graphically demonstrated in a much more realistic fashion at the Idaho National
Labs two years ago in a project called Aurora. The group of scientists and
engineers at the department of energy facility wanted to see if they could
physically blow up and permanently disable a twenty-seven-tonne power
generator using the internet.
Jim Lewis If you can hack into that control system you can instruct the machine to tear
itself apart and that's what the Aurora test was.
Jim Lewis Then if you’ve seen the video it's kind of interesting because the machine starts
to shudder you know it's clearly shaking, and smoke starts to come out. It
destroys itself.
Steve Kroft And what would be the real-world consequences of this?
Jim Lewis The generators that we depend on for electrical power are 1) expensive 2) no
longer made in the US, and 3) require a lead time of three or four months to
order.
Jim Lewis So, it’s not like if we break one, we can go down to the hardware store to get a
replacement. If somebody really thought about this, they could knock a
generator out they could knock power pipe out for months and that's the real
consequence.
Speaker 5 : This is the leap from theory to reality
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 32
Cyber Risk Academy [email protected]
Video Reference (00:46:19):
So, rather than drop missiles or knock back the nuclear power program of Iran the best
recorded facts around this is that this was a joint effort between the Israeli
government and American government where they created a piece of, effectively what
we call Code Warfare, it was a weaponized piece of software called Stuxnet and
Stuxnet used zero day vulnerabilities and zero day vulnerabilities are the most
expensive vulnerabilities to cybercriminals would sell and they sell for hundreds of
thousands of dollars in many cases. And it’s zero day because nobody knows the
vulnerabilities exist therefore is most powerful kind vulnerability to use because there
is no control or safeguard against it. So, whoever pulled together this software to carry
out the attack on the Natanz uranium enrichment facility money wasn't a motivator
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 33
Cyber Risk Academy [email protected]
Video Reference (00:48:37):
Let's talk a little bit about ransomware getting back to the more to do some kind of
threats that are hidden in organizations. Ransomware has been around a long time but
again because it's become so pedestrian it's become a commoditized to the point that
these bad guys are signing up using crimeware to carry out ransomware attacks.
Ransomware being the fact that you lose availability of your assets so you click on
something it installs the malware onto your machine that malware starts encrypting all
of the information on your machine and any other machine any other data that your
machine has access to in theory and locks things down. And all of a sudden a message
pops up and says “Hey if you want access to your data again you have to pay a ransom
in cryptocurrency. Pay this much by then otherwise the rate goes up and if you don't
pay by X date you will lose your data completely.”
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 34
Cyber Risk Academy [email protected]
Video Reference (00:50:23):
There is another kind of threat we talked about and you hear an awful lot about it, but I
want to put in perspective. They are more surgical, and they’re called APT's - Advanced
Persistent Threats. Generally, there's a nation state behind an Advanced Persistence
Threat because what it means is that they’re using a disproportionate amount of effort
to carry out their game.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 35
Cyber Risk Academy [email protected]
Video Reference (00:51:43):
We see the development of the cyber threats in a massive way. So, at the moment
we're looking at these sorts of ultrasonic threats which are coming out which will send
out sounds from people's phones and so on that will call up other devices. So, you won’t
be able, a human can't even hear the pitch of what comes out but it's able to call up
other devices in a room, get it to carry out activities. We've even seen in the non-
criminal world, if you like, we've seen organizations such as Burger King uses
techniques like this to call up internet-of-things devices in people's homes within TV
advertisements and so on. So, they call up Siri or call up Alexa or whatever and get
them to do certain things.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 36
Cyber Risk Academy [email protected]
Video Reference (00:52:46):
So, I mention nation state groups and APT and there's lots of different APT types of
groups. Generally, the poster child for the bad guys in this area is the People's
Liberation Army of China and that is just because that suits the narrative of other
nation states to point the finger in just one particular direction of what's going on. So
here we have the FBI looking to arrest and putting out warrants for or even military
soldiers which has never been done before who are carrying out certain activities and
it's not always the military units themselves, but they are sophisticated.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 37
Cyber Risk Academy [email protected]
Video Reference (00:53:25):
One of the most famous cases is Unit 61398 of the People's Liberation Army, which is
effectively an army whose job every day is to go in in full uniform and work in a military
base just to carry out these kinds of activities. We've also seen this from North Korea,
we’ve seen this of course from pretty much all of the other countries around the world
who say they do it for security reasons, but the reality is we have to think that they do
for economic reasons at times as well.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 38
Cyber Risk Academy [email protected]
Video Reference (00:55:00):
So you see that all of the time my key point here for you is that in today's world if
you're going to effectively manage cybersecurity risk in an organization you have to
understand the geopolitical links because what happens in the real physical world
immediately impacts the cyber threat world and we see this all the time. Whatever's
happened politically in the world the dials if you like will change in the control panels of
all the threat monitoring around because you'll see different nation states taking on
different activities at someone as it goes round so it's very important to understand
that link between both sides of things.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 39
Cyber Risk Academy [email protected]
Video Reference (00:55:47):
Then we see old stuff in a new way. So here we have the pangolin, the most trafficked
animal in the world. We see animal traffickers; we see human traffickers and so on
carrying out their nefarious activity by using the ecosystem of the cybercriminal world.
Hiding messages, sending payments, processing, laundering funds, secret
communications, all of those kinds of things are using the cybercriminal ecosystem to
carry out this kind of stuff. Not just with animals as I say there is people trafficking,
there is floral fauna, everything you can think of is being carried out on that basis.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 40
Cyber Risk Academy [email protected]
Video Reference (00:56:24):
And one of the reasons for that proliferation is the dark web. So, the dark web let me
give you a quick breakdown on what the dark web is. So, the United States Navy has
hundreds and hundreds of what we call analysts and those analysts’ job is to monitor
different organizations around the world, different entities, different people and what
they're doing. And they realized that people understood that it was the United States
Navy because of the IP address range and so on, all the time. So, it's very easy to spot
that you are being surveilled, so if you were somebody that was hiding something from
the United States military it was quite easy to understand that it was the United States
Navy network had just visited your website or just visited your organization because
they would leave the footprints if you like the digital footprints of IP addresses and
logs and so on.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 41
Cyber Risk Academy [email protected]
Video Reference (00:57:57):
So, when we look at the surface web that is the internet that you access through your
favourite search engine, say for example Google, you're probably getting a 3 – 5% of
the entire internet because that is the part of the internet you're seeing that Google
has decided is worth indexing and worth showing to people but there's so much more
so much more. It's only a tiny fraction of what the internet is, and all those other parts
of the web are what we call the deep web.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 42
Cyber Risk Academy [email protected]
Video Reference (00:59:51):
Here I'm showing you some examples of screen shots from the dark web. You can see
that any kind of drugs can be bought and again this is a rip off from the point of view of
rip off sites because it's a community based; they are selling because they are
successful. In the top right hand, there we see Silk Road. Silk Road did over one billion
in its first year of trade. These guys are using cutting edge technology. So, on the big
red box in the centre you can see this is a murder website where you were able to hire
somebody to murder people, to cripple them, to rape them, to bomb them, or to beat
them. And you see the price range depending on whether they were regular person, a
public person, how many guards they had.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 43
Cyber Risk Academy [email protected]
Video Reference (01:01:20):
So, you can see this is an evil evil area and one of areas we see within that is even organ
harvesting. Ways that you can order different organs and of course they are coming
from people who are either being trafficked, kidnapped, street kids whatever happens
to be, so this is an evil part of humanity connected in the dark web.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 44
Cyber Risk Academy [email protected]
Video Reference (01:01:36):
So, let me now give you a quick overview of the anatomy of a standard kind of attack.
Okay, so all hacks and attacks are a little bit different but what I'm going to do here
now is I'm going to walk you through the standard sort of protocol or steps which I
think will open up your eyes to see how well organized these guys are and how they
operate. It'll pull all the pieces together that we’ve just gone through.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 45
Cyber Risk Academy [email protected]
Video Reference (01:03:06):
They now go into the next phase which is weaponization. So, weaponization is choose
your weapon for whatever they have decided to do. So, let's say for example they
decided that they want to hack into a retailer, steal all the credit card details, whatever
they will start “well hey, we're going to need a phishing website, we're going to need
some targeted emails, we're going to need to put on some malware, we’re going to
need to exfiltrate that data out. And they will break down all the different things they
need and all the different weapons they do. They may decide that they want to do a
DDoS attack as part of what we call a blended attack. A DDoS attack would be a
Distributable Denial of Service attack which is effectively sending tons and tons of
traffic at somebody’s website or somebody's web facing resources in order to make it
fail. That of course would discombobulate the security teams in the retailer, it would
distract them and therefore the bad guys may be able to carry out whatever the real
plan is. We see that as part of an awful lot of attacks.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 46
Cyber Risk Academy [email protected]
Video Reference (01:05:34):
So effectively this infected workstation is now phoning home to the bad guys at
command centre on will accept commands. And as soon as it does that the command
may be to start sniffing around the network. So, again it's sitting like this lady in front
of her workstation, it's able to see whatever she can see on the network and it will start
sniffing round, moving laterally across the network. It may decide to bring down more
malware from the internet and install more tools rootkits and so on that can be used so
these are other toolkits used by the bad guys to carry out more reconnaissance
internally on the network. Because they got, their foot in the door by getting her to
click on the link once they got their foot in the door, they can happen down anymore
tools and things that they need and have control over what's going on. They also have
probably full control over her machine at this stage, so they are monitoring her
keystrokes, they’re picking up her passwords. They're getting everything they need,
and they are building up all the profile of what's going on.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 47
Cyber Risk Academy [email protected]
Video Reference (01:08:12):
So, one if these things this is as I say they protect your environment they, don't want to
let the bad guys in, but they also have an alarm systems to make sure bad guys don't
get in and the good guys don't detect that they are there.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 48
Cyber Risk Academy [email protected]
Video Reference (01:08:41):
So, let's look at a case study sample here. It's June the 3rd, Friday 2017, and it's ten
o'clock in the evening and in London city people are enjoying after a hard week work a
meal a couple of drinks and so on. All of a sudden, these guys pull up in a white Renault
van and they jump out with fake bomb vests on and machetes and start chopping
people up. They kill eight people, injured forty-eight
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 49
Cyber Risk Academy [email protected]
Video Reference (01:09:07):
My point that I want to focus in, is of this individual called Rachid Redoune. Rashid was
also part of the cybercriminal network; he was involved in invoice fraud and he worked
in the cell actually out of Ireland and this is how they financed and communicated and
used an awful lot of activity. And this mirrors the overall approach that was taken by
ISIS in order to communicate, in order to build different cells and techniques around
the world, in order to radicalize people and so on and even for lone wolf attacks was to
use this.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 50
Cyber Risk Academy [email protected]
Video Reference (01:09:40):
So, we can see that this isn't just about somebody really clever breaking into a bank
and stealing money and almost with a Robin Hood effect. This is about evil being
connected and being able to carry these things out. So if you are defending your
organization against people stealing data you’re effectively stopping people who are
trafficking children, who are selling organs, who were selling endangered species of
animals, who are blowing up human beings, you are defeating evil by effectively
managing cyber security risk within an environment.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 51
Cyber Risk Academy [email protected]
Video Reference (01:10:14):
So, at that point I conclude with our key lesson - your adversary is highly organized and
effective; the cyber bad guys network, they collaborate and assist each other. Their
global ecosystem supports a trillion-dollar underground economy, so this is real. And
this is just our background to the reason why it's so important for all of us to
understand how to develop cyber risk management techniques and tools in order to
protect not just ourselves and our organizations but society itself.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 52
Cyber Risk Academy [email protected]
MODULE 1 CASE STUDY– TRANSCRIPT
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 53
Cyber Risk Academy [email protected]
Video Reference (00:00:54):
To begin, let us put some of the characters into context. We have Hillary Clinton.
Hillary Clinton is a want to be 2016 presidential candidate. And you can think of Hillary
as being essentially the CEO of a business when it comes to this because winning an
election, running a presidential campaign is a business. And for that purpose, she had
hired John Podesta, 66-year-old who had vast experience in not alone the politics of
the United States, but in running such campaigns and in working with Hillary's
husband, Bill. He was hired as chief of staff, AKA the COO or Chief Operating Officer
in January 2015. The campaign itself relied on thousands and thousands of staff. The
staff were some of them were highly experienced. A lot of them were interns. Some of
them were suppliers and they were broken up of a different number of fundraising
committees and so on. There was an elaborate complex ecosystem of entities involved
behind the Democratic presidential campaign for 2016.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 54
Cyber Risk Academy [email protected]
Video Reference (00:02:25):
Let's go to the 15th of March 2016. The DNC campaign was feeling the pressure.
Hillary had just won by the narrowest of margins against Bernie Sanders in Missouri.
That was at a 0.02% margin. And we need to remember that during these campaigns
that they're not initially going against their opposition parties, they're fighting to see
who's going to be nominated by their own party. Secrecy of information is really, really
important because essentially your colleague may get the jump on you and be able to
ask you awkward questions in debates, may be able to bring out those salient points or
positive points ahead of you.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 55
Cyber Risk Academy [email protected]
Video Reference (00:04:02):
Then on the 19th of March, an email was received, and it was received into John
Podesta's email. John Podesta, again, you've got to think of John as being the number
two, the COO, the chief operating officer who was running everything the day to day
operations of the business. And this started off almost like a bobsleigh. This started up
all the activity that we're going to talk about.
This email came in and it looked like it was from Google and it said the following,
The details and the IP address and that IP address is of a telco in the Ukraine. It was
obviously very suspicious and there was a link there saying, "Click on this to change
your password." Now, that is essentially a phishing email. The from email address look
fairly legitimate. The layout of the email looked legitimate. But this isn't hacking, this is
a phishing email. This is an email received in trying to dupe somebody, trying to fool
somebody into doing something. And in this case, obviously what they wanted the
recipient to do, John Podesta email, who was the targeted recipient, was to click on
change password. Now, one thing to note at this point is that there was actually at least
three people had the credentials to John's email account. These were his staff and they
were able to access his email and send on behalf of him from that email account.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 56
Cyber Risk Academy [email protected]
Video Reference (00:05:09):
Well, let's talk very quickly about email itself. We often refer to email as being the
cockroach of the internet, because we can almost see a generational divide here about
the sort of tools that are used and the apps that are used for communication between
different generations. But still email just survives despite the fact that technically it
really should be gone. There's no encryption, it's difficult to verify senders ID.
Repudiation of knowing who you're dealing with is very, very difficult. It's easily to be
tapped, or somebody to circumvent your information and to be able to read the
information because it's essentially not secure. And it's hard to know if a message has
been received or read, it's difficult.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 57
Cyber Risk Academy [email protected]
Video Reference (00:06:43):
This email was received and Sara Latham at 9:29 that morning forwarded to her IT
support colleague who was Charles Delavan because she thought it was suspicious.
And she just forwarded on to see what Charles, who was more expert in this area
would revert with some advice and he did, but unfortunately, he was not very careful
when he was typing his response.
"Sara, this is a legitimate email. John needs to change his password immediately and ensure
that two factor authentications is turned on in this account."
All this happened within 30 minutes of the email. He was quite responsive. He got
back; he sent the correct link on how to do that. But unfortunately, as he claimed after
that, he mistyped and he meant to say that this is an illegitimate email, not a legitimate
email.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 58
Cyber Risk Academy [email protected]
Video Reference (00:07:41):
He wasn't careful on the integrity of the texts that he was sending with the advice. But
let's look at this. Something he didn't spot was that the text in the subject of the email
is not, that you can see the characters are a little bit different because what's been
done here is a technique that bad guys often do to circumvent, ending up in a spam
filter, where they use different kinds of characters to look like letters, this Unicode,
characters, you don't need to understand too much technically about it. But it is
essentially about to the eye, that looks like someone S-O-M-E-O-N-E, but actually
there are different sort of Cyrillic characters and so on in there that with a quick glance
looks like the right word, but it's not and the computer, just interpreted and displays it
in that way. And that becomes very important as we go on to understand.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 59
Cyber Risk Academy [email protected]
Video Reference (00:08:36):
Also, what gave them confidence, I suppose when they were looking at these things
that it was also verified by DKIM. And well, DKIM is an authentication system. We'll
talk a little bit about it in a second, but it's often used to prevent email spoofing. For
example, Google themselves would use DKIM to stop people spoofing and pretending
that they are from Google when they're sending out emails. The problem with this is
that it doesn't always work. It depends on how it's been configured and the different
parties and so on that are in there. I think for the purpose of this, what you really need
to understand is that the Domain Keys Identified Mail is an email authentication
method designed to detect forged sender addresses in emails. It's a technique called
email spoofing that's used in phishing and email spam. These are safeguards, but they
are not fool proof, as we see in this case.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 60
Cyber Risk Academy [email protected]
Video Reference (00:09:32):
Let's look further into the anatomy of this email. You remember that link that was in
the original email that Sara received, and it said, "Change your password." That email
was being sent to John; Sara opened it and there was a nice button there saying,
"Change your password." Well, behind that button was a link, and this is the link. And it
used a service called Bitly – B-I-T-L-Y. Bitly is one of these services where you can use
it to shorten a link from a very long set of characters into something much shorter. And
it was being used to do that. But when we actually zone in on that, we see that the
actual link was to a domain ending in “.TK”
Now, I don't think Google would be sending people legitimate password reset emails
from Tokelau, which is a territory of New Zealand in the South Pacific, a small island.
That straight away to somebody who's analysing it, a security professional or an IT
professional, could see that this is a bogus email. This is from an illegitimate source and
it actually shouldn't be carried out. It's one thing pretending to be another. And what's
really interesting, when we run the stats across the Bitly account that was used to
create these links, we can see the wholesale attack that was going on against Hillary
Rodham Clinton. We see that there was actually 3,900 associated people that were
being targeted using over 19,000 different links between October 2015 and May
2016. That's vast, so you can see this was an orchestrated campaign, absolutely
massive orchestrated campaign, and targeting anybody that had anything to do with
the target.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 61
Cyber Risk Academy [email protected]
Video Reference (00:11:32):
Now, Charles had suggested to use two-factor authentication. What exactly is that?
We often refer to it as 2FA or two-factor authentication, or TOTP, which is “Timed
One-Time Password.” And there's generally two variants of this. There's a variant
where you have an app on your phone and it creates a unique code, and you can use
that code with your password to go in. You're using two factors, your password, and
this code in order to gain access to whatever the resource is. Google Authenticator is
probably one of the most well-known ones that people can use with their Gmail
account. And it adds a layer of security because every 30 seconds the password
changes or the number changes, the code that you use to go in. And there's another
version which can be done over texting, which isn't that secure, because texting can be
spoofed. The identity of the sender can be spoofed.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 62
Cyber Risk Academy [email protected]
Video Reference (00:13:20):
Let's look at phishing a little bit more in detail. This email was an attack technique
known as phishing. There are many forms of phishing, but if we look at what phishing is
in its raw state it's these spoofed emails that we're sending out when people are
pretending to be something. And I think it's important to realize the difference
between, phishing is not itself hacking.
That can be used as part of it. Some would refer to it as a hacking technique. It's part of
an overall campaign, if you like, it's part of the process of hacking, but receiving the
email itself, the phishing email, is not necessarily the act of hacking. The computer
hasn't been hacked. It has simply received an email.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 63
Cyber Risk Academy [email protected]
Video Reference (00:14:48):
We also have spear phishing. That's tailored a specific victim or a group of victims using
personal details. For example, if somebody knows something about the target that
they can use in that email, that might make them psychologically more prone to click
on the link in the email. For example if she knows the name of their dog, knows the
name of their boss, knows the name of the area where they live, those kinds of pieces
of information can be used in an email, in the text of the email, to try and get somebody
to trust the email more and to click on it.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 64
Cyber Risk Academy [email protected]
Video Reference (00:16:44):
Generally speaking, the hit rate on these kinds of things is about 0.05%. There are 3.4
billion emails, phishing emails, sent a day. That's eye watering, and it's probably
growing since we've looked at the statistics here. About 10% of those get through.
Only one in 10, actually get through the filters. 50% of those are opened that get
through the filters. 10% are clicked upon. And that relates to 17,000,000 credentials
being phished a day. It's an absolutely massive number. We're looking at nearly
2,000,000,000 credentials hacked a year through these techniques. The reason the
guys do it is because it works, and this is probably the number one way that bad guys
try to circumvent your systems is through phishing emails. And that's why educating
staff, getting them to become cyber savvy in relation to the techniques these people
use to carry a smishing attacks, phishing, whaling, all of these kind of things is so
important in an organization because this is what lets people down. Around 90% of
breaches start off with a phishing attack.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 65
Cyber Risk Academy [email protected]
Video Reference (00:18:43):
And we can see that those groups were the same groups that were involved in even
and were caught red handed, so to speak, hacking the World Anti-Doping Agency. This
is real. This is what goes on in the everyday world. These military units, if you like,
these state backed and condoned units are out there hacking, and we've seen more
and more in the media, and more and more on a geopolitical response, that countries
are trying to extradite them, get them arrested, which is an absolute paradigm shift
and approach on how these things are done, because it's essentially trying to arrest a
soldier in another country. And we’ve got to remember what the motivations are with
a lot of these people who are members of these groups, it's national pride. These
people are hacking for their country. This is equivalent of being in the Olympics, that
they're representing their country when they're doing this. Their motivation isn't
necessarily money, but it's often national pride and a sense of their duty to what
they're doing for their country.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 66
Cyber Risk Academy [email protected]
Video Reference (00;20:20):
Now, this is very similar to the warnings that everyday businesses get as well about
that these hacks are happening. And sometimes people take heed and sometimes they
don't, but this is intelligence. And good intelligence is actionable intelligence. That is
information that you can do something with. That's good intelligence. If it's just noise,
you want to avoid it because that can make people extremely busy, but not very
productive in what they're doing. What I am saying, we'll learn more as we go through
is that you want to source your intelligence from credible sources, because intelligence
should be something that you can react to, that you can work with, and that can make a
difference to what you're doing in every day.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 67
Cyber Risk Academy [email protected]
Video Reference (00:23:07):
On June the 15th, a character known as Guccifer 2.0, and I say a character because
often what you'll see in the world of cyber threats and cyber risks is these character
names come out of these handles that describe a particular hacker. And Guccifer, the
original Guccifer was somebody who claimed that he had hacked Hillary before, he was
a Romanian hacker, but this version of Guccifer came out and really we're not sure
whether this was an individual or this was a group of people pretending, but what all
the evidence points to because of the use of Cyrillic keyboards, because of their
version of Microsoft Office they used, because of the fact that when on chats online,
this Guccifer 2.0, character, couldn't even speak Romanian. And we know that Guccifer
was Romanian.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 68
Cyber Risk Academy [email protected]
Video Reference (00:25:04):
Now we're right up to the cusp of the November elections we're into October. And
there's a period of politics in the US known as the October Surprise which basically
started after Nixon and Kissinger where just before the election each side would bring
out potentially embarrassing information on each other. Let's have a look at what
happened in October, just before the 2016 elections. And what we're really going to
focus on here are some of the issues around potentially fake news on the impact that
may have had on the elections, on the outcomes and what was going on.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 69
Cyber Risk Academy [email protected]
Video Reference (00:25:43):
From fake news, we're looking at the different conspiracy theories that were going out
there. The different fake narratives that were being put up, the different resources
that were being used through social media and so on to actually convince people of
what was going on. Let's walk through October.
• October the 7th, it's 2016 and the Director of National Intelligence that is
effectively the NSA, the CIA and FBI put out a statement accusing the Russians
of hacking the DNC. They're obviously pretty certain that there's Russian entity
behind these attacks and they know that with a lot of detail, forensic detail,
technical fingerprints, what we often call indicators of compromise, the
different details have been picked up, the different techniques that are used or
often tracked, in that regards.
• The same day at four o'clock, the Trump video, that famous Trump video or the
Access Hollywood Tape as it is referred to where Trump was coming out and
talking about sexually harassing women and so on was leaked.
We can see the game is starting to play. That obviously wasn't the Republican
put that out, that obviously wasn't the Russian put that out. But somebody
leaked out that tape at that particular time, obviously somebody who was pro
Democrat at that stage.
• October the 7th, one hour later, WikiLeaks responded by releasing 170
documents and 2,000 more emails. This tit-for-tat started, they were holding
the good stuff back until now, if you like.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 70
Cyber Risk Academy [email protected]
Video Reference (00:27:31):
An organization known as the Internet Research Agency also known as the IRA, and
they have a couple of other nicknames such as Glavset, they're also known as the Trolls
from Olgino, commence their aggressive campaign. Who are these guys?
• October the 12th, it's 8:31, and WikiLeaks made a phone call to Donald Trump
Jr. And within 15 minutes of that, Trump was tweeting about the Podesta
emails and WikiLeaks because we saw more content coming out.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 71
Cyber Risk Academy [email protected]
Video Reference (00:30:18):
Here we can see a heat map of exactly the parts of the ends that were taken down. If I
switched back quickly, we see that the sites that were impacted were Twitter, the BBC,
CNN, The Boston Globe, DirecTV, Fox News, New York Times, Netflix, all the
communication organizations were knocked off the air. There was a group called New
World Hackers claimed responsibility and we could see that absolutely massive
impact. On the graphic on the right is the amount of ISPs and the amount of infections
within those that were being carried on. At this point, WikiLeaks came out with a
statement and said, "Mr. Assange is still alive and a WikiLeaks is still publishing. We ask
the supporters to stop taking down the US internet. You proved your point."
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 72
Cyber Risk Academy [email protected]
Video Reference (00:31:20):
I mentioned the internet-of-things and the IOT devices, and this is effectively, these
are the top selling IOT devices. Everything from light bulbs that you can contact from
the internet to turn them on, to turn them off, you've got doorbells, you've got Alexa,
you've got all of these kinds of different devices. And the reality is that we buy these
things, we bring them home and put them in our offices, put them in our homes and
there is little to no security built within them. And therefore, if a hacker can gain
control of that, he can gain control of the device and uses bandwidth as part of an
attack. And that's exactly what we saw with the 300,000 devices that were used in
those massive myriad pertinent attacks that went on.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 73
Cyber Risk Academy [email protected]
Video Reference (00:32:59):
What the likes of Shodan does is allow people to search for devices by simply just
typing in a word or typing in a location, whatever. It's fool proof as you to find it. And
what people often see, almost for amusement is, that they can find say for example,
CCTV cameras or nanny cams and they will be set with the default username or the
default password. Very quickly they click on them, they put in username “admin,”
password “admin,” and they log into the device. What I have here is a sample screen
that the day after the British Airways got a quarter of a billion Euro fine for their GDPR
breach and they also in the same day lost a quarter of a billion in their share price, I
typed in the word British Airways into Shodan to seek could I find any device. And
what I found was a server advertising itself as being available as their FTP server.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 74
Cyber Risk Academy [email protected]
Video Reference (00:34:17):
Now let's revert back quickly to the DNC cyber hack itself. Glen Caplin came onto the
news on MSNBC and he said, "We are not going to confirm the authenticity of stolen
documents released by Julian Assange." In that statement itself, he had confirmed the
documents were stolen, he had confirmed the validity of those documents. And that
was a big school boy error mistake because what he was essentially saying was the
documents that Assange sent out and we found out after a lot of them went being
edited, and a lot being changed and so on like that. But he was basically saying to the
world, "Yes, they are our documents and Assange has them and he is releasing them
through WikiLeaks."
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 75
Cyber Risk Academy [email protected]
Video Reference (00:35:02):
Now we're into the final countdown of the run-up to what happened around the DNC
hack. Podesta's iCloud password was actually in one of his emails and therefore
towards the end of this scenario, they wiped his phone. There you can actually see the
screenshot of them wiping his phone. You can see his Apple ID account of a screenshot
of it there, all of the details.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 76
Cyber Risk Academy [email protected]
Video Reference (00:36:11):
Essentially by October 28th, Letter to Congress. Comey said that he had “learned of
the existence of the emails that appeared to be pertinent to the investigation” into
previous hacking allegations and so on. At this point, the game is over for the
Democrats. They've lost all credibility. They were already getting over the mud that
was slung over a previous situation where Hillary Clinton’s server where she used a
personal email server and for official emails, there was again, no evidence of that being
hacked, but all of this was just perception is reality and people the term email, the term
hacking, the credibility factor, everything had enough of an impact to effectively
change or have an impact on what was going on.
My point here is that the smallest change in a variable on the input can have a massive
variable on the outcome of something. We have to understand that the smallest
controls that we can put in place can have a massive impact on safety. And this is really,
really important when it comes to cybersecurity and risk management, to understand
those things.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 77
Cyber Risk Academy [email protected]
Video Reference (00:37:26):
Let's have a quick look at 10 key takeaway lessons.
1. Be prepared for phishing. Phishing happens every single day. I've gone through
some of the scary figures there, some of the eye-watering numbers and you can
see they do it because it's successful. There are different kinds of phishing
techniques aimed at different audiences. Therefore make sure that your people
at the right level receive the right kind of training around these kind of phishing
emails and how they work, how they work inside of a commercial environment
and outside of the commercial environment and what they can lead to.
2. Do not rely just on text message authentication. It is much easier to spoof this
and spoof phone passwords, sorry, phone numbers and so on when you're using
this as a technique. It's very important that you don't just rely on that. There's
nothing fool proof. This is all about layered security. This is all about defensive
layers. You need to know a number of things. But if you have a choice, you use
an app for creating your two-factor authentication.
3. Do not send passwords in email at any stage to anybody. You see, that was a big
mistake made by John Podesta and ultimately the most humiliating for him
when they erased his phone, they compromised his Twitter account and so on,
and they took over his identity online.
4. Do not share account credentials. John Podesta had at least three people who
worked for him, who he trusted to log in as him and represent him. When you
think of that, that's three people who themselves could be compromised from a
human element or even just from a technical environment they could be
hacked, and they can circumvent those systems. The risk had been spread by
doing that as well.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 78
Cyber Risk Academy [email protected]
6. Someone should be responsible for cyber security. Here we have the DNC
presidential campaign, millions and millions and millions of dollars. Thousands
of people are involved. Only four people with responsibility around running that
entire ecosystem and none of them a cyber security or risk professional, none of
them. Writing was on the wall; it was almost a perfect storm. Something was
going to happen, and it did. And the safeguards were not put in place. The
strategy that they had as a business was to win the election and everything,
they were doing to do that. But what they didn't do was match that with a cyber
risk management strategy to manage the risks around protecting them so that
they could meet their goals and fulfil their vision.
7. Know your enemy, perform a risk assessment. Because when you look back at
this, and hindsight it is 20/20, but when you look back on this of what happened,
you could see so much that could have been prevented and controlled. Because
things will happen, but we need to manage the narrative. We need to manage
the crisis. We need to have the proper playbooks in place, proper incident
response procedures to manage whatever has happened. Breaches will happen.
They will happen. People will be hacked, data will be mislaid, get lost, so on.
These things happen. But it's how you handle those things and be able to
recover from those situations is so important. A lot of these things were
controllable and preventable.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 79
Cyber Risk Academy [email protected]
Video Reference (00:41:39):
Our conclusion, the key lesson. The key lesson is passwords are like underwear –
Thank you.
That's the end of our case study.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 80
Cyber Risk Academy [email protected]
JARGON BUSTER SECTION
TERM EXPLANATION
1 TB (Terabyte) Storage capacity for approximately 500 hours worth of movies
2FA Two Factor Authentication
(Two factor e.g. 1 TOTP (Timed One Time Password)
Authentication) e.g. 2 Withdrawing of money from an ATM; only with the
correct combination of a bank card (something the user
possesses) and a PIN (something the user knows)
APT Usually the threat actor is a nation state and they engage a
(Advanced prolonged and targeted cyberattack in which the intruder
Persistent Threat) gains access to a network and remains undetected for an
extended period of time
Attack Vector A path or route used by the adversary to gain access to the
target (asset)
Backdoor A means of regaining access to a compromised system by
installing software or configuring existing software to enable
remote access under attacker defined conditions
Bastion A system heavily fortified against attacks
Black hat Hacker A hacker who breaks into a computer system or network with
malicious intent
Botnet A term derived from "robot network;"
A network of private computers infected with malicious
software and controlled as a group without the owners'
knowledge, e.g. to send spam
A large automated and distributed network of previously
compromised computers that can be simultaneously
controlled to launch large-scale attacks such as a denial-of-
service attack on selected victims.
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 81
Cyber Risk Academy [email protected]
TERM EXPLANATION
CISO The senior-level executive within an organisation responsible
(Chief Information for establishing and maintaining the enterprise vision,
Security Officer) strategy, and program to ensure information assets and
technologies are adequately protected.
Clear text Data that is not encrypted
Crimeware A class of malware designed specifically to automate
cybercrime.
Cyberwarfare Actions by a nation-state to penetrate another nation's
computers or networks for the purposes of causing damage or
disruption
Data Exfiltration Unauthorised transfer of data, data extrusion, data
exportation, or data theft
DDoS Attack An attack that involves sending multiple requests to the
attacked web resource‚ with the aim of exceeding the
website's capacity to handle multiple requests and prevent the
website from functioning correctly.
Deep Web The part of the World Wide Web that is not discoverable by
means of standard search engines.
Disgruntled The motivating factor for cyber insiders
Distributors In the Underground Economy of Cybercrime, the entity that
trade and sell stolen data and act as escrows for the goods
provided by other specialists
DKIM An email authentication method designed to detect forged
(Domain Keys sender addresses in emails (email spoofing)
Identified Mail)
Egress Traffic The network traffic that begins inside a network and proceeds
through its routers to a destination somewhere outside of the
network
Encryption The process of converting information or data into a code,
especially to prevent unauthorised access
Fraudsters In the Underground Economy of Cybercrime, the individuals
that create and deploy various social engineering schemes,
such as phishing and spam
Geopolitical As a cyber threat actor group, this is the main motivating
factor for Nation States
Hackers In the Underground Economy of Cybercrime, the individuals
that search for and exploit applications, systems and network
vulnerabilities
Hacktivists Threat actor group most motivated for ideological reasons
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 82
Cyber Risk Academy [email protected]
TERM EXPLANATION
Hosted System In the Underground Economy of Cybercrime, those that offer
Provider safe hosting "bullet proof hosting" of illicit content servers and
sites
Ingress Traffic The data communications and network traffic originating from
external networks and destined for a node in the host network
IoT Taking all the "Things" in the world and connecting them to the
(Internet-of- Internet
Things)
Money Mules In the Underground Economy of Cybercrime, the individuals
that complete electronic transfers between bank accounts
Organisational In the Underground Economy of Cybercrime, the individuals
Leaders that are often "People Persons" without technical skills, they
often assemble the team and choose the target.
Profit The main motivation for cybercriminals
Programmers In the Underground Economy of Cybercrime, the individuals
who develop the exploits and malware to commit cybercrimes
Proxy A server application or appliance that acts as an intermediary
for requests from clients seeking resources from servers that
provide those resources
Ransomware A specific type of malicious software designed to block access
to a computer system until a sum of money is paid
SCADA A control system architecture comprising computers,
(Supervisory networked data communications and graphical user interfaces
Control and Data (GUI) for high-level process supervisory management, while
Acquisition) also comprising other peripheral devices like programmable
logic controllers (PLC) and discrete proportional-integral-
derivative (PID) controllers to interface with process plant or
machinery.
Smishing The fraudulent practice of sending text messages purporting
to be from reputable companies in order to induce individuals
to reveal personal information
SPAM Irrelevant or unsolicited messages sent over the Internet,
typically to a large number of users, for the purposes of
advertising, phishing, spreading malware, etc
Spear Phishing The practice of sending fraudulent emails purporting to be
from reputable companies in order to induce individuals to
reveal personal information tailored to a specific victim or
group of victims using personal details
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 83
Cyber Risk Academy [email protected]
TERM EXPLANATION
Tech Experts In the Underground Economy of Cybercrime, the entities that
maintain the criminal enterprise's IT infrastructure, including
servers, encryption technologies, databases and more
Tellers In the Underground Economy of Cybercrime, the entities that
are charged with transferring and laundering illicitly gained
proceeds through digital/crypto currency services and
different world currencies
TLD The highest level in the hierarchical Domain Name System of
(Top Level Domain) the Internet e.g. .com or .ie
VPN This normally uses encryption and extends a private network
(Virtual Private across a public network and enables users to send and receive
Network) data across shared or public networks as if their computing
devices were directly connected to the private network.
White hat hacker An ethical computer hacker, or a computer security expert,
who specialises in penetration testing and in other testing
methodologies that ensures the security of an organisation's
information systems
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 84
Cyber Risk Academy [email protected]
CCRO COURSE FORMAT V1.1 - COPYRIGHT 2020 – ALL RIGHTS RESERVED – ICTTF LTD 85
Cyber Risk Academy [email protected]