The State of Cybersecurity – Year in Review

RSA Conference
6 May 202421:09

Summary

TLDRКевин Мандиа, CEO Mandiant и эксперт по кибербезопасности, предоставил обзор ключевых выводов, сделанных на основе более чем 1100 расследований, проведенных за год. Он отметил ускорение инноваций в области атак, эволюцию шифрования данных и растущий интерес советников к кибербезопасности. Мандиа также подчеркнул важность совместной работы государства и частного сектора, а также необходимость модернизации международных договоров и наложения рисков на преступников. Он выделил пять основных выводов, включая низкий уровень риска для злоумышленников, улучшение китайской разведки, изменение методов атак, преодоление многофакторной аутентификации и улучшение оперативной безопасности. Мандиа призвал к дальнейшему совершенствованию защитных мер и координации усилий между правительствами и частным сектором.

Takeaways

  • 📈 **Угрозы и последствия**: В последние годы не видно значительного увеличения рисков и последствий для злоумышленников, что приводит к ускорению инноваций в области кибератак.
  • 🔒 **Ранговый шифр**: РангуэрWARE продолжает развиваться, и теперь включает в себя не только шифрование данных, но и кражу данных, выкуп и возможное обеспечение.
  • 🏢 **Активность советов директоров**: Советы директоров становятся более вовлеченными в вопросы кибербезопасности, что связано с угрозами и регулированием.
  • 🤝 **Сотрудничество**: Годовой опыт показывает, что сотрудничество между правительствами и частным сектором улучшилось и стало более эффективным.
  • 🔍 **Анализ инцидентов**: За последние 12 месяцев были проведены более 1100 расследований, что позволило сделать выводы о текущих трендах и методах кибератак.
  • 💡 **Инновации в атаках**: Зафиксировано увеличение числа уязвимостей (нулевые дней), что указывает на инновации в атаках и более эффективные методы злоумышленников.
  • 🛡️ **Предотвращение атакам**: Необходимость улучшения обороны, включая управление поверхностью атаки, управление патчами и работу с инцидентами после нарушения.
  • 🔑 **Криптовалюта и анонимность**: Обсуждение потенциальных проблем с анонимностью криптовалюты и способами отслеживания транзакций.
  • 🌐 **Международное сотрудничество**: Требуется модернизация существующих договоров и установление атрибуции для повышения риска для преступников.
  • 📉 **Время обнаружения**: Снижение времени обнаружения инцидентов, что указывает на улучшение систем мониторинга и реагирования на инциденты.
  • 🛠️ **Технологический прогресс**: Обсуждение необходимости использования более современных технологий и методов для обеспечения безопасности, включая улучшение многофакторной аутентификации.

Q & A

  • Какие выводы Кевин Мандия сделал на основе исследований за последний год?

    -Основные выводы Кевина Мандии включают: мало рисков и последствий для киберпреступников, ускорение инноваций в нападениях, эволюция рэнсомвэра до кражи данных и вымогательства, увеличенное вовлечение совета директоров и улучшенное сотрудничество между государством и частным сектором.

  • Как Кевин Мандия описывает проблему киберпреступности и рэнсомвэра?

    -Мандия описывает, что киберпреступники почти не сталкиваются с рисками или последствиями своих действий, что ведет к увеличению активности. Он также отмечает, что рэнсомвэр эволюционировал до кражи данных и вымогательства, а затем и к другим формам преступной деятельности.

  • Какие меры Кевин предлагает для борьбы с киберпреступностью?

    -Мандия предлагает улучшить защиту, пересмотреть использование криптовалют в качестве средства платежа для выкупов и модернизировать международные договоры для лучшей атрибуции и наказания преступников.

  • Что такое 'нулевой день' и как они связаны с кибербезопасностью по данным Кевина Мандии?

    -Нулевой день описывает атаку, для которой еще не существует патча. Кевин отмечает резкий рост обнаружения таких атак, с 97 нулевыми днями в последнем году, что указывает на усиление активности атакующих.

  • Как изменения в стратегиях фишинга влияют на современную кибербезопасность?

    -Мандия отмечает, что из-за улучшений в обучении пользователей и безопасности почтовых шлюзов атакующие перешли на использование других коммуникационных каналов для фишинга, что требует новых подходов к обнаружению и предотвращению таких атак.

  • Каковы основные способы обхода многофакторной аутентификации, упомянутые Кевином Мандией?

    -Кевин говорит о 'усталости от push-уведомлений', где атакующие заставляют жертву принять аутентификацию, и о временных одноразовых паролях, которые также могут быть перехвачены или обойдены.

  • Какие изменения в методах кибершпионажа Китая отмечает Кевин?

    -Кевин указывает на улучшение кибершпионажа Китая, особенно через использование нулевых дней и атак на сетевое оборудование.

Outlines

00:00

📈 Инновации в кибератаках и их последствия

Глава Mandiant, Kevin Mandia, обсуждает результаты из 1100 расследований, проведенных за год. Он подчеркивает отсутствие серьезных рисков и последствий для киберпреступников, ускорение инноваций в области атаки, эволюцию шифрования, более активное участие корпоративных советов и улучшение сотрудничества между государством и частным сектором. Он также обсуждает необходимость улучшения защиты, мониторинга криптовалюты и современизации международных договоров для наложения риска на преступников.

05:01

🔍 Увеличение числа уязвимых точек и рекомендации по обеспечению безопасности

Анализируется увеличение числа нулевых дней (zero days) и рассматриваются различные теории, объясняющие этот прирост. Обсуждаются методы атаки, включая использование эксплоитов, а также значимость предотвращения и реагирования на такие инциденты. Рассматриваются также стратегии кибершпионажа, улучшение методов фишинга и преодоление многофакторной аутентификации (MFA).

10:02

🚨 Повышенное внимание корпоративных советов к кибербезопасности

Обсуждаются улучшения в области кибербезопасности, в том числе более активное участие корпоративных советов, влияние законодательства и нормативных актов, а также совместные усилия государства и частного сектора по защите от кибератак. Уделяется внимание рекомендациям по улучшению безопасности облачных сервисов и прозрачности в отношении практики безопасности.

15:02

🛡️ Развитие технологий защиты и адаптация к новым методам атак

Рассматриваются стратегии и рекомендации по защите от растущего числа кибератак, включая использование логов веб-прокси для обнаружения новых техник фишинга, улучшение многофакторной аутентификации и предотвращение социальной инженерии. Также обсуждаются методы обнаружения и реагирования на аномальные действия, такие как использование PowerShell, аномальное сетевое трафик и перемещение по периметру сети.

20:05

⏱️ Сокращение времени обнаружения и реагирования на инциденты

Анализируется сокращение времени обнаружения инцидентов (dwell time) и улучшение способностей обнаружения собственных инцидентов до вмешательства третьих сторон. Обсуждаются примеры адаптации и реагирования на растущий уровень угроз, включая подготовку к возможному шифрованию и сокращение области пострадавшего сектора.

Mindmap

Keywords

💡Кибербезопасность

Кибербезопасность - это меры и технологии, направленные на защиту информационных систем от несанкционированного доступа, утечки, изменения или уничтожения данных. В видео упоминается, что доски директоров стали более активно участвовать в вопросах кибербезопасности из-за угроз, таких как шифрование данных и эксторшн.

💡Шифрование данных

Шифрование данных - это процесс преобразования информации с использованием специального ключа, чтобы сделать ее недоступной без знания этого ключа. В контексте видео, шифрование данных является одной из технологий, используемых угрозами, такими как расширением рамзоновых программ и киберэксторшн.

💡Эксторшн

Эксторшн - это угроза распространения конфиденциальной информации, если требования злоумышленников не будут удовлетворены. В видео говорится о том, что расширение рамзоновых программ и эксторшн стали новыми аспектами киберпреступности.

💡Анализ угроз

Анализ угроз - это процесс оценки потенциальных угроз для информационной системы или организации. В видео упоминается, что основанный на анализе угроз и предотвращении кибератак, компании могут улучшить свои меры защиты.

💡Криптовалюта

Криптовалюта - это электронная форма денежной единицы, которая использует криптографию для регулирования генерации единиц货币 и проверки транзакций. В видео обсуждаются проблемы, связанные с использованием криптовалюты в контексте киберэксторшн и необходимость отслеживания транзакций.

💡Анонимная валюта

Анонимная валюта - это денежная единица, которая не требует идентификации владельца для транзакций. В видео упоминается, что некоторые люди считают небезопасным использование анонимной валюты, так как она может быть использована для незаконных транзакций.

💡Атрибуция кибератак

Атрибуция кибератак - это процесс определения источника или ответственного за кибератаку. В видео подчеркивается важность атрибуции для наложения угроз и рисков на преступников в области киберпреступности.

💡Обновление программного обеспечения

Обновление программного обеспечения - это процесс установки последних версий программного обеспечения, включая исправления ошибок и уязвимостей. В видео говорится о необходимости обновления программного обеспечения для защиты от нulеOfDay атак.

💡Уязвимости нulеOfDay

Уязвимости нulеOfDay - это уязвимости в программном обеспечении, которые не имеют доступных исправлений или патчей на момент открытия. В видео упоминается, что количество уязвимостей нulеOfDay увеличилось, что требует от организаций более эффективных мер защиты.

💡Атака через зеркало

Атака через зеркало (Living off the land) - это техника кибератак, при которой злоумышленники используют инструменты и компоненты, уже доступные в системе, для проведения атаки. В видео подчеркивается, что использование этой техники делает атаки более скрытными и сложными для обнаружения.

💡Многофакторная аутентификация (MFA)

Многофакторная аутентификация - это метод проверки подлинности, который требует предоставления двух или более форм учетных данных. В видео говорится о том, что злоумышленники обходят MFA, и поэтому организациям необходимо использовать более безопасные методы аутентификации.

Highlights

Kevin Mandia, CEO of Mandiant, shared insights from over 1,100 investigations and several hundred red team exercises.

There's an observed acceleration in offensive innovation, particularly in ransomware tactics.

Ransomware has evolved from simple data theft to extortion and potential harassment.

Boards of directors are increasingly engaged in cybersecurity matters, partly due to regulatory pressures.

The partnership between the government and the private sector in cybersecurity has never been stronger.

The number of zero-day vulnerabilities discovered has significantly increased, with 97 found in the last year.

Attackers are targeting a broader range of vendors, with 31 vendors impacted by zero-day attacks.

The primary method of intrusion has shifted back to exploitation from spearphishing.

Chinese Nexus espionage has improved, with a significant increase in zero-day exploits attributed to them.

Attackers are now using more sophisticated methods to bypass multifactor authentication systems.

Better operational security (OPSEC) and evasion techniques are being employed by threat actors.

The dwell time for detecting breaches has significantly decreased, indicating improved defensive capabilities.

Boards are more proactive in cybersecurity due to increased media coverage and regulatory requirements.

The Cyber Safety Review Board issued 25 recommendations for cloud service providers and the US government to enhance security.

There's a push for secure by design in software development, prompted by government and legal actions.

CISOs are focusing on a range of themes including secure by design, better logging, identity and access management, and transparency.

Mandia emphasized the need for continuous improvement in security operations to detect post-breach activities.

The top five tactics used by attackers post-breach were identified, including anomalous PowerShell use and lateral movement via RDP.

Transcripts

00:11

>> ANNOUNCER: Please welcome CEO Mandiant, Google

00:14

Cloud, Kevin Mandia

00:27

>> KEVIN MANDIA: Good afternoon.

00:28

I'm your second to last speaker today and then we

00:31

all have dinner to go to.

00:32

I've got about nineteen and a half minutes.

00:34

What I want to do is kind of brief you on the conclusions, at

00:37

least part of the conclusions that I have based on over 1,100

00:41

investigations we did during the year, based on several hundred

00:45

red teams we did during the year, the threat intelligence

00:48

that came from the threat analysis group, as well as

00:51

Mandiant's threat intelligence group, and then all the advisory

00:54

services that we did.

00:55

So, I did my best to collect those conclusions.

00:57

We will go through them very quickly.

00:58

And it's not just admiring the offense.

01:01

We are also going to do some things because we all

01:03

came here to learn how to defend our network, so

01:05

we're going to do that.

01:07

This is five of the conclusions that we have based on all of our

01:09

observations really right up until a few minutes ago.

01:12

I changed a few while I was backstage.

01:15

The reality is first and foremost, the conclusion when

01:18

looking at the last twelve months of incidents, it doesn't

01:21

feel like there's a lot of risks or repercussions to

01:24

compromising the enterprises that we see globally.

01:27

We see an acceleration on the innovation on offense.

01:29

I don't know if it's really accelerated but we saw good

01:32

innovation by offensive attackers and threat actors.

01:36

Ransomware has evolved to data theft, to extortion, to

01:40

potentially even now harassment and other things.

01:43

The board is more engaged.

01:44

And then I think we had the best year ever between the privacy –

01:49

or I mean the partnership between the government

01:51

and the private sector.

01:53

So, it's worked really well.

01:54

So, I will drill down on each one of these.

01:55

First and foremost, the few risks or repercussions

01:58

to the threat actors.

02:00

When we look at this, I think every modern nation understands

02:04

there is going to be spying and that you probably can't prevent

02:06

espionage and it's hard to come up with rules for espionage.

02:09

So, my theme here of imposing risk is on the criminal actors,

02:14

the folks that may have come to a height or a threshold where it

02:19

feels almost intolerable.

02:21

So, when you look at the slide behind me, I wanted you to see

02:23

the numbers, and these represent the lowest bounds

02:26

of the criminal enterprise compromising and doing

02:29

ransomware and extortion.

02:30

You get the chain analysis slide on the Bitcoin paid.

02:34

That seems to be tied to extortion or ransomware.

02:37

But more importantly, just the impact on private companies or

02:41

publicly traded companies that are just doing their jobs, and

02:45

we are seeing damages equating to 100 million, 800 million, and

02:50

these are the lower bounds.

02:52

The damages from this tends to go up and to the right.

02:55

So, the question that we always have is what do we do about it?

02:58

You know, and when you look at the ransomware problem, there is

03:00

a lot of folks in the camp of we have to do better defense.

03:04

I get that, and that's why we're all here.

03:06

We all want to do better defense.

03:07

The second thing we probably have to look at is

03:10

cryptocurrency and the means and ways in which we

03:13

can track cryptocurrency.

03:15

Some people think it's not always a great idea to have an

03:18

anonymous currency that can be paid thousands of miles

03:22

apart from one another.

03:23

The third thing we have to do is we have to look at the treaties

03:27

we have and modernize some of these treaties.

03:30

We need to have attribution and impose risk.

03:35

So, I would ask that all of the folks in law enforcement, in the

03:37

intelligence community, and in the private sector revisit some

03:41

of the ways we do attribution; and for the folks in different

03:43

governments globally, to look at what are the safe harbors and

03:48

safe havens for the criminal actors and can we modernize

03:51

treaties with those nations so that we can impose

03:54

more risks or costs?

03:55

I think the time has come where we have to continue to think it.

03:58

I know we have lots of task forces globally and we have lots

04:02

of groups working on this problem and we all look

04:05

forward to progress being made in that regard.

04:09

We have seen the acceleration of innovation and I will go

04:12

through each one of these categories individually, so

04:15

let's hop right into it.

04:16

And it's not necessarily bad news.

04:18

When you see innovation on offense, you really go right to

04:21

the zero day account, and we had a long run of tracking this from

04:24

1998 right up until now.

04:26

And it used to be between ten to fifteen zero days

04:29

a year were found.

04:31

And a zero day, of course, attack with no patch.

04:33

Now you're looking at we found ninety-seven zero days in the

04:37

last year in the wild, about a third of them found

04:40

by Mandiant and Google.

04:42

What I found most interesting about these zero days is really

04:45

shown on this slide, and I know there's a bunch of numbers here

04:47

but focus in on the amount of vendors impacted, and that also

04:52

includes like freeware.

04:53

I guess we just call it different libraries, a vendor.

04:57

But when you look at this, thirty-one vendors impacted, and

05:00

there's always the big three.

05:01

You're going to have Microsoft, you're going to have Google,

05:03

you're going to have Apple.

05:04

But then in addition to those, we have got twenty-eight other

05:07

organizations that there were zero day attacks against them.

05:10

To put that in perspective, there were about four companies

05:13

impacted outside of the big three in 2018.

05:17

So, the number of vendors being attacked is phenomenal.

05:21

Now, why are there this many zero days?

05:24

There is a whole bunch of rampant theories on it.

05:26

Maybe we got better at defense and so you have to

05:29

break in with zero days.

05:31

Maybe the offense is so well funded now they just

05:33

come up with them more.

05:34

Maybe AI is helping the offense find vulnerabilities faster.

05:39

Maybe we are all just shipping really bad software and not

05:42

trying hard enough to patch it.

05:43

I actually think maybe it's a combination of some of that, but

05:47

it's actually because the impact of the breach if you do

05:49

espionage, you get what you want, and if you do crime, you

05:53

get what you want.

05:54

Cyber intrusions are paying off.

05:57

That's why I think you are seeing this happen.

05:59

But again, what this means is you have got to have a way to

06:04

respond to the zero day.

06:07

This slide shows that globally, when we looked at every incident

06:11

we responded to, the number one way people broke in

06:13

was in fact an exploit.

06:16

What this means is all of us have to think – assume breach.

06:20

Do attack surface management, do patch management, and then

06:25

really have great rules for what happens post those things.

06:30

The assumed breach mentality.

06:32

I just saw Jeetu say segmentation is hard, updating

06:36

is hard, and patching is hard.

06:38

That's okay.

06:39

We've got to do them.

06:40

There will always be a zero day.

06:42

And you hear people say we are going to do secure by design and

06:45

get it down to zero, but zero day is not just software.

06:48

At some point in time when you assume breach, you also make the

06:51

assumption maybe you have an insider that can create

06:54

havoc on the network.

06:55

So, the bottom line: this trend is different.

06:58

From 1998 to approximately 2019, the number one way people were

07:04

breaking in is spearphishing and exploiting human trust.

07:08

It has changed since 2020 back to what it was like from 1993 to

07:12

1998, which is exploitation.

07:15

For those who just need to see what are they

07:16

exploiting, there you go.

07:17

There's the top three things that were exploited

07:19

in 2023 for us.

07:21

Chinese Nexus espionage improved during the year.

07:25

And I think the biggest improvement here I could dive

07:27

into, they had twelve zero days and the next nation we could do

07:30

attribution for had only two.

07:32

In my career, I usually saw Russia was number one with the

07:35

zero day exploitation and China started making that list around

07:39

2005, 2006, but now they are leading in that list.

07:43

When we look at the majority of the zero days that we

07:46

see for espionage, we cannot attribute them to the nation

07:49

behind them, which means maybe the espionage is being

07:52

surreptitious when they do it.

07:54

When you look at that go from the zero days, I can combine the

07:57

next two bullet points that you need custom code

08:01

when you hack edge devises.

08:03

When you hack edge devices, you are

08:05

circumventing EDR space.

08:06

You're circumventing the end point protections that we have.

08:09

We've seen Chinese cyber espionage do this two years ago.

08:12

They did it again throughout 2023, specifically compromising

08:18

things like VPNs, email gateways, and other network

08:22

devices that we rely on to defend our networks.

08:24

So – and then whenever you see LOTL, that stands

08:28

for living off the land.

08:30

That is a technique that I think every red team aspires to and

08:34

every offense or threat actor aspires to.

08:36

That is simply breaking in and accessing your networks the way

08:39

your people do because that is the most effective way

08:43

to remain surreptitious and hide in the noise.

08:45

So, the Chinese Nexus Espionage improved throughout the year.

08:48

I would argue all trade craft did and I'll have another

08:51

slide on that shortly.

08:53

The evolution of spearphishing is interesting to me.

08:56

Part of it was driven by, I think, Microsoft disabled the

08:59

default running of macros in documents in Office containers.

09:05

That was a great step.

09:06

We all got better at end user training.

09:09

Our secure email gateways got better.

09:11

We went to more multifactor authentication.

09:14

So, it's my opinion that attackers now are spearphishing

09:17

through other coms channels.

09:20

That simple.

09:21

What I would tell you, probably the fastest way to cut through

09:25

this because I have eleven minutes and I have a lot I want

09:27

to cover, is the attacks that I saw successful, you could detect

09:32

all of them if you have web proxy logs, because

09:35

what you need to detect is the downloading.

09:37

Like nobody knows how much inspection your

09:40

secure email gateway does.

09:41

If you get a document with a link in it, you don't know how

09:43

deep the secure email gateway is going to go tracking

09:46

what you link to.

09:48

So, you want to make sure you are not downloading .EXEs,

09:52

.BATs, .COM, .VS, all the different executable files.

09:56

The other technique was to have compressed archives that were

09:59

password protected, different secure email gateways.

10:01

We really don't publish how to handle some of those things so

10:04

you want to go to your web proxy logs and set up rules for that.

10:07

And the third most effective rule, and we gave you twelve in

10:10

our M-Trends Report, twelve different rules to use to detect

10:14

the new techniques of spearphishing, is if you don't

10:17

normally use third party storage like OneDrive or SharePoint or

10:21

Google Drive, drive.Google.com, set up rules to look for what

10:25

you're downloading from these places.

10:27

Attackers are circumventing the secure email gateway with links

10:30

and trying to get you to download and execute things.

10:33

So, we can catch that and everybody has gotten a lot

10:35

better at that.

10:37

Overcoming MFA.

10:38

We have seen this happen enough that I wanted to put

10:40

a slide in here on this.

10:41

It's really the first two things on this slide.

10:44

It's the push notification fatigue where, and that's

10:48

happened in cases we responded to, where we just keep jamming,

10:52

if you are an attacker, jam a bunch of push notifications to

10:54

somebody until they just hit yes, I will take

10:56

that push negotiation.

10:58

Most of us don't have that problem anymore because we're

11:00

aware of ways to circumvent it.

11:01

Second thing is one-time passwords are timed

11:04

one-time passwords.

11:05

That's been overcome as well.

11:07

And the other three is where you want to go.

11:10

So, it's not good enough to say, yes, we do

11:12

multifactor authentication.

11:14

We have to do multifactor authentication that prevents

11:17

help desks from giving away one-time passwords or to prevent

11:22

the SIM swaps, because I'll tell you two things I can't fix with

11:26

rules and alerts, SIM swapping and your help desk is designed

11:31

to help people.

11:32

We are responding to some of the most devastating breaches

11:36

because bold, aggressive English native speakers are calling help

11:40

desks and helpers are trying to help them.

11:43

And they are getting one-time passwords set to access networks

11:47

and wreak havoc afterward.

11:49

So, make sure your MFA can withstand the social engineering

11:53

attacks that have gotten way better than in the past.

11:55

Better OPSEC and evasion.

11:57

I really just want to go to probably the infrastructure.

12:00

You know, I can tell you when people write malware, they don't

12:03

write malware that logs.

12:05

Fine.

12:06

And then the customized malware that we are seeing is starting

12:08

to leverage the – when they compromise edge devices,

12:12

it's leveraging code that's already there.

12:14

It's actually like appending Python to other, pre-existing

12:17

code so you can create a new URI to download to or something.

12:21

I would focus on the infrastructure.

12:23

We are seeing modern espionage groups and even criminal

12:26

elements recognize it is best to compromise your victim/target

12:31

from local IP addresses or same nation IP addresses.

12:35

And then another problem that we're seeing is really

12:38

compromising people when they are outside the enterprise.

12:41

And we all need to figure out a way to make sure we can protect

12:44

our employees when they are accessing enterprise resources

12:48

from outside the enterprise, from non-enterprise resources.

12:51

Compromising their homes, getting the key logger in there,

12:54

seeing the account information posted on different telegram

12:57

sites, is a real problem.

12:59

But when I look at this, the infrastructure is creating a lot

13:02

more difficult attribution, difficult rule sets.

13:05

And then living off the land techniques, almost every threat

13:08

group is starting to go to this.

13:09

Long story made short, we need better security operations

13:13

because we are going to have to be able to detect after the zero

13:16

day, after the exploit, what the attackers are doing the second,

13:19

third, and fourth stages of the MITRE attack chain.

13:22

Which brings me to this slide, which is to what are the top

13:25

five things we are seeing used or the TTPs after the breach.

13:29

You see them right here.

13:30

Detecting anomalous use of power shell, very important.

13:34

Detecting HTTP traffic or HTTPS traffic that's anomalous on your

13:38

network, very important.

13:40

Knowing lateral movement via RDP or noticing remote RDP from

13:44

outside your network, very important as well.

13:47

And service execution.

13:48

I haven't figured out a good one and maybe one of my folks will

13:51

catch them in the hallway on noticing file deletion,

13:54

but it is the fifth one.

13:56

And – but you need rules to detect, if you assume breach,

13:59

these things without a doubt.

14:02

So, that was a lot of bad news, right?

14:04

It's like attackers are innovating faster,

14:06

there's no risks or repercussions to attackers.

14:08

The reality is we are detecting attacks sooner than ever before.

14:12

We started recording dwell time – well, you can see it here.

14:14

In 2011, on every case that we responded to, and Mandiant

14:18

traditionally gets hired for the cases that are out of the scale

14:22

and scope where people do need our help.

14:24

So, we don't respond when people are five minutes

14:26

behind the problem.

14:28

Dwell time went all the way from 416 down to ten.

14:31

I think part of the reason the dwell time went from sixteen

14:33

days days down to ten is we did respond a little

14:35

bit more to ransomware.

14:36

People tend to notice when they have been ransomed.

14:41

Then the detection by source – I showed this slide to somebody

14:44

and they were like, is that good or bad?

14:46

I want to make this unequivocal.

14:48

You'd rather detect your own incidents than have a third

14:51

party detect it because they you can handle it

14:53

discreetly and on your terms.

14:55

Usually when you know from a third party, you've got to

14:57

wonder how many third parties know what happened to you.

15:00

But this is a great trend and you can see.

15:02

It was amazing to me.

15:03

When we first started responding to breaches in 2004, 2005, it

15:07

was basically 100% third party notification of

15:09

the breach to people.

15:11

You get down to 54%, I think that's real good.

15:13

I think that defense operations has improved about as well as

15:18

the offense is innovating.

15:20

So, not a bad year for either side.

15:23

Ransomware has evolved, no question about it.

15:26

There's a lot of reasons for this.

15:26

Every company has heard of ransomware.

15:28

Most companies, even including going from the 1A

15:31

enterprises down to small to medium businesses, are

15:33

preparing for it.

15:34

You have companies that have said we've identified

15:36

our assets that matter.

15:37

We have backed up those assets.

15:39

Those assets include active directory and configuration

15:41

files for critical components of our business.

15:44

We have made sure our backups are safe.

15:47

We have done tabletop exercises with the board that has us

15:51

literally simulate having the worst ransomware we could ever

15:55

have happen to us.

15:56

We have gone to our identities and looked at creep and scope

16:00

and we've shrunk our identity access for a lot

16:03

of different accounts.

16:04

And you get the idea.

16:05

We network segmented.

16:06

And you go through all the things.

16:08

I can tell you where people are at.

16:10

Not many companies have now dry runned how do we operate the

16:14

business if we get ransomed and we don't have

16:17

these 10,000 servers?

16:19

And I can tell you the number one question every board has and

16:22

every executive has once ransomware does hit you, how

16:25

long before we're up?

16:27

It's hard to answer that question until you have to but I

16:30

think almost every company that we work with, and 1A enterprise,

16:34

has gotten to that stage of we know what we'll do when there's

16:37

a ransomware attack and we've done our best to

16:39

reduce the blast radius.

16:41

So, we've gotten good.

16:42

However, the TTPs have evolved and it's creating more pain

16:49

through dealing with if they do get in and do get data, sharing

16:54

data with reporters, making it so that the pain for executives

16:58

is exceptionally high.

16:59

I don't want to give too many examples of this because it's

17:01

too many good ideas for threat actors but it's just amazing to

17:05

me now when you have been ransomed, it's more likely than

17:08

not you will be extorted and it's more likely than not you

17:11

will start getting other activities and communications

17:14

from the ransomware actors.

17:15

Boards are definitely more engaged than ever

17:17

before in cybersecurity.

17:19

That's a trend that's been going like this all along.

17:20

I think there's a couple of reasons but very

17:22

first and foremost, boards read the headlines.

17:24

There's a lot of headlines right now.

17:26

Second thing is boards go where sometimes there is regulation.

17:30

When you see the US government's Security and Exchange Commission

17:34

saying to every publicly traded company, over 4,500 companies,

17:37

you have to have the following reporting requirements annually

17:41

on your risk management for cyber and your governance for

17:45

cyber, you get the board's attention.

17:47

Boards are there to provide oversight to companies.

17:50

And we are seeing that that oversight has been mandated and

17:54

we have to communicate it.

17:55

But there's just a lot of reasons why globally, between

17:58

sovereign data laws, privacy laws, and cybersecurity

18:03

standards, legislation, and regulations that are emerging,

18:06

boards are very engaged.

18:09

And I think this has been the best year in my career, I

18:14

started working in cybersecurity in 1993, that I saw the defense

18:19

accelerate with public and private sharing.

18:23

And I will go through two examples.

18:25

I can only pick one to elaborate on.

18:26

Probably the second one.

18:28

First one is secure by design.

18:30

Every nation, when you are a software vendor, you are

18:33

thinking about this.

18:34

There is a lot of reasons for it.

18:35

One, the government is saying, hey, here is secure by design.

18:38

It's signed by many different agencies.

18:39

The second reason for it actually is a civil complaint

18:42

filed against SolarWinds where they kind of say your software

18:47

development lifecycle was below the line period.

18:51

So, when you see those sort of things, companies take notice

18:55

and decide we are going to take it seriously.

18:56

But one of the things that happened within the last month,

18:59

month and a half, is the Cyber Safety Review Board here in the

19:01

United States under the Department of Homeland Security

19:04

issued a report on a breach that occurred in 2023 to a cloud

19:09

provider that – where there was a key, a token signing cert that

19:15

was seven years old used to mint tokens and one-time

19:18

authentication for a really, really big scope for

19:21

the access of email.

19:23

But what I want to focus in on is the twenty-five

19:25

recommendations that was done in that report for all of the cloud

19:28

service providers as well as the US government.

19:32

And I can kind of sum them up but one of the things

19:34

was do victim notification.

19:36

If you are a cloud service provider, tell people

19:39

when you believe they have been compromised.

19:41

Find a method to do that.

19:42

There is another one called how about great logging that comes

19:46

with what you are paying for so that you can audit security

19:51

events in your network.

19:52

Better identity and access management was

19:55

throughout the report.

19:56

And then transparency.

19:58

The thought that if you have a vulnerability as a cloud service

20:01

provider, you've got to provide it, and you should share with

20:04

all of your customers what your security practices are.

20:07

So, I put recommendation seven in the report right in the slide

20:10

so you can see it because when I read it, I went,

20:12

wow, that's something.

20:14

That is a recommendation that says every year, the major cloud

20:19

providers that provide services to the government are going to

20:22

say here is our security practices and here is how we are

20:25

doing on your recommendations, so that all of us can make

20:27

choices based not just on availability, but make choices

20:31

based on security.

20:33

And very quickly because I'm over time, we get to talk to

20:36

CISOs when they are under duress.

20:38

For all the CISOs in the room, this is only seven or eight of

20:41

the constant themes that come up every time.

20:44

And I didn't put them in any particular order at all.

20:49

So, if these are the things you are thinking about as a CISO,

20:51

you are right on par with thousands of CISOs.

20:54

With that, I would like to thank all of you for your time.

Rate This

5.0 / 5 (0 votes)

Связанные теги
КибербезопасностьУгрозыРансомウェアАтакаЗащитаАнализТехнологииУязвимостиАтака ноль-дняКибератакаЗащита данныхКонференцияПрограммное обеспечениеКомпьютерные сетиАнализ угрозКорпоративные рискиКриптовалютаКиберпреступностьСовместная борьбаРегуляторыСотрудничествоОбучениеРазвитиеСпециалистыУлучшениеИнновации