Information Security
Starts In Your Head

Michał "rysiek" Woźniak
https://rys.io/

for Tactical Tech Collective / Exposing the Invisible
https://tacticaltech.org/projects/exposing-the-invisible/

Presenter Notes

Who am I

Formerly

  • CISO / Head of Infrastructure at OCCRP

Presenter Notes

Ground rules

I have no way of knowing your exact needs and specific threats.

One size does not fit all.

As such, this is all illustrative and general.

Presenter Notes

Ground rules

Do listen to specific advice from information security experts working with you or for your organization.

If your organization does not have such a person, it should (even if just part-time/pro-bono).

I will also list some organizations providing more specific infosec advice for people at risk.

Presenter Notes

Everything is Broken

Presenter Notes

"It’s hard to explain to regular people how much technology barely works, how much the infrastructure of our lives is held together by the IT equivalent of baling wire.

Computers, and computing, are broken."

Presenter Notes

"Dynamic Data Exchange (DDE) was frst introduced in 1987 with the release of Windows 2.0"

"As part of the December 2017 Patch Tuesday, Microsoft has shipped an Office update that disables the DDE feature in Word applications, after several malware campaigns have abused this feature to install malware."

Presenter Notes

"Dynamic Data Exchange (DDE) was frst introduced in 1987 with the release of Windows 2.0"

"As part of the December 2017 Patch Tuesday, Microsoft has shipped an Office update that disables the DDE feature in Word applications, after several malware campaigns have abused this feature to install malware."

Presenter Notes

"Antivirus products riddled with security faws, researcher says"

"Critical vulnerability found in Microsoft Malware Protection Engine"

Presenter Notes

"Antivirus products riddled with security faws, researcher says"

"Critical vulnerability found in Microsoft Malware Protection Engine"

Presenter Notes

"How to crash any iPhone or iPad within WiFi range"

"Experts show how to run malware on chips of a turned-off iPhone"

Presenter Notes

"How to crash any iPhone or iPad within WiFi range"

"Experts show how to run malware on chips of a turned-off iPhone"

Presenter Notes

"[Security Researchers] Remotely Kill A Jeep On The Highway – with Me In It"

"Vehicle manufacturers dismissed prior warnings about flawed security"

Presenter Notes

"[Security Researchers] Remotely Kill A Jeep On The Highway – with Me In It"

"Vehicle manufacturers dismissed prior warnings about flawed security"

Presenter Notes

"[R]esearchers have managed to [break into] and gain access to the self-aiming sniper rifle's computer system."

"IoT worm can [exploit vulnerabilities in] Philips Hue lightbulbs, spread across cities"

"[Cybercriminals] stole a casino's high-roller database through a thermometer in the lobby fish tank"

Presenter Notes

"Paris Orly airport had to close temporarily last Saturday after the failure of a system running Windows 3.1 – yes, the operating system from 1992 – left it unable to operate in fog."

"Cyberattack Forces a Shutdown of a Top U.S. Pipeline"

Presenter Notes

Don't Panic

Presenter Notes

Don't Panic

  • Thinking about digital security (and staying sane)
  • Risk assessment and threat modelling
  • Evaluating tools
  • Staying safe in groups
  • The broader picture
  • Where to get help

Presenter Notes

"You don’t have to run faster than the bear to get away.
You just have to run faster than the guy next to you."

  • — Jim Butcher

Presenter Notes

Threat modeling

Disclaimer: this is a very simplified and quite naïve take on threat modeling; it is used here only as an illustrative example.

Presenter Notes

Threat modeling

  • Know your threats
    (the bear)
  • Know your resources
    (how fast you can run)

Presenter Notes

Threat modeling

Instead of focusing on particular security tools or practices,
start with questions:

  • Who might target you?
  • What might they want?
  • What can they do?
  • How hard/costly is it for them?

  • What are you trying to protect?

  • What can you do to prepare?

Presenter Notes

Who might target you?

Standard background threats

  • Ransomware, random malware/botnets, Bitcoin miners…
  • General phishing
  • Low effort, "shotgun" attacks
  • Usually not specifically targeted

Presenter Notes

Who might target you?

Somewhat targeted threats

  • Script kiddies, pranksters, groups like Anonymous, etc.
  • For the lulz/glory/fun/thrill, maybe an axe to grind
  • Potentially some targeted phishing
  • Medium effort, medium skill

Presenter Notes

Who might target you?

Well-resourced, persistent threats

  • Advanced Persistent Threats (APTs), "government-backed attackers", Pegasus, etc.
    • also: industrial actors, organized crime, etc.
  • Well-funded, well-resourced
  • Very targeted, long-term
  • Want to stay hidden

Presenter Notes

China: Scarlet Mimic, C0d0so, SVCMONDR, Big Panda, Electric Panda, Eloquent Panda, Pale Panda, Sabre Panda, Spicy Panda, Hammer Panda, Wisp Team, Mana Team, TEMP.Zhenbao, SPIVY, Mofang, PassCV, DragonOK, Group 27, Tonto Team, TA459, Tick, Lucky Cat, TEMP.Periscope, BARIUM, LEAD

Russia: Sofacy, APT 29, Turla Group , Energetic Bear, Sandworm, Anunak, FIN7, Inception Framework, TeamSpy Crew, BuhTrap, Carberb, FSB 16th & 18th Centers, Cyber Berkut, WhiteBea, GRU GTsST

North Korea: Lazarus Group, APT 37, Bluenorof, Andariel, Kimsuki, NoName, OnionDog, TEMP.Hermit

Iran: Cutting Kitten, Shamoon, Clever Kitten, Madi, Cyber fghters of Izz Ad-Din Al Qassam, Chafer, Cadelle, Prince of Persia, Sima, Oilrig, CopyKittens, Charming Kitten, Greenbug , Magic Hound, Rocket Kitten, ITSecTeam, MuddyWater, Mabna Institute

Israel: Unit 8200, Duqu Group, SunFlower, NSO Group

NATO: Equation Group, Snowglobe, Slingshot

Middle East: Molerats, AridViper, Volatile Cedar, Syrian Electronic Army (SEA), Cyber Caliphate Army (CCA), Ghost Jackal, Corsair Jackal, Extreme Jackal, Dark Caracal

Others: Corsair Jackal, The Mask, El Machete, Patchwork, Hellsing APT, Wild Neutron, Sykipot, Platinum, Magnetic Spider, Danti, SVCMONDR, Transparent Tribe, Singing Spider, Union Spider, Andromeda Spider, Dextorous Spider, APT 32, BlackOasis, NEODYMIUM, PROMETHIUM, Boson Spider, Carbon Spider, Hound Spider, Indrik Spider, Mimic Spider, Pizzo Spider, Shark Spider, Static Spider, Wicked Spider, Wold Spider, Zombie Spider, Cobalt Spider, Overlord Spider, Bamboo Spider, Monty Spider, Wizard Spider, Curious Jackal, Extreme Jackal, Gekko Jackal, Shifty Jackal, Dundeon Spider, Mummy Spider, Skeleton Spider, Mythic Leopard

Presenter Notes

What might they want?

  • Specific private or sensitive information
  • Casting a wide net, just "listening in"
  • Destruction or manipulation of information
  • Denial of service
  • Targeting someone else
    (It's not just about you!)

Presenter Notes

What might they want?

  • Specific private or sensitive information
  • Casting a wide net, just "listening in"
  • Destruction or manipulation of information
  • Denial of service
  • Targeting someone else
    (It's not just about you!)

Presenter Notes

What can they do?
And how hard/costly is it for them?

  • Harass?
  • Threaten physically?
  • Surveil online?
  • Remotely compromise devices?
  • Abuse the legal system?

Presenter Notes

What can they do?
And how hard/costly is it for them?

Cost can be financial

…but it can also be related to reputation or political damage.

Presenter Notes

What can they do?
And how hard/costly is it for them?

"One such firm, Zerodium, acquired an exploit chain similar to the Trident for one million dollars in November 2015."

"[A] zero-click (no user interaction) exploit chain for Android can get hackers and security researchers up to $2.5 million in rewards. A similar exploit chain impacting iOS is worth only $2 million."

Presenter Notes

What can they do?
And how hard/costly is it for them?

Cost can be financial

…but it can also be related to reputation or political damage.

Presenter Notes

What can they do?
And how hard/costly is it for them?

"Israeli spyware company NSO Group placed on US blacklist"

"The Macedonian surveillance scandal that brought down a government"

Presenter Notes

What are you trying to protect?

  • Confidentiality
  • Integrity
  • Availability

These are often conflicting concerns!

Presenter Notes

What can you do to prepare?

Presenter Notes

Security as economics

  • No such thing as perfect security
  • The closer to perfect you get, the harder and more costly it becomes

  • No need for perfect, just good enough
    ("running from a bear...")

Presenter Notes

Security as economics

  • No such thing as perfect security
  • The closer to perfect you get, the harder and more costly it becomes

  • No need for perfect, just good enough
    ("You don’t have to run faster than the bear…")

Presenter Notes

Security as collective hygiene

  • Security is like hygiene, not surgery
  • Security is a process, not a state
  • We’re all in this together
  • Small improvements matter

Presenter Notes

Security fatigue

  • What you're feeling right now
  • Thinking about security is exhausting
  • One mistake is often enough

Presenter Notes

Security fatigue

  • Minimize hassle
  • Maximize effect
  • Very few "moving parts"
    • which are well-understood

Presenter Notes

Paranoia and stress

  • It's good to be a tiny bit paranoid
  • Too much puts you at risk
  • ...and makes it easy to miss details

Presenter Notes

Paranoia and stress

  • Stress causes "tunnel vision"
  • Phishing and social engineering rely on that

Presenter Notes

Urgency, Curiosity, Fear

"Ryszard, vote in our poll about our Senate candidate! It's ending very soon!
<malicious link>"

"New secrets about torture of Emiratis in state prisons
<malicious link>"

"We find that phishing attack traffic skyrocketed to 220% of its pre-COVID-19 rate, exceeding typical seasonal spikes, with attackers exploiting victims’ uncertainties about and fears of the pandemic"

Presenter Notes

Urgency, Curiosity, Fear

  • Emotional response is a red flag
  • When in doubt:
    • take a deep breath
      (almost any task can wait a few minutes)
    • talk to someone
      (using a different channel)

Presenter Notes

Example: phishing

  • Person received an e-mail:

    I have shared an urgent document with you in Dropbox
    <link>

  • E-mail apparently sent by their acquaintance
  • Person clicks, provides credentials

Presenter Notes

Example: phishing

Presenter Notes

Example: phishing

Presenter Notes

Example: phishing

Presenter Notes

Example: phishing

Presenter Notes

Example: phishing

Presenter Notes

Example: phishing

  • Plenty of red flags…
    • first time ever the acquaintance shared a Dropbox link
    • Wrong domain, no HTTPS
    • This is not how login-via-Google works

Presenter Notes

Example: phishing

  • …All missed due to tunnel vision
    • "urgent"
    • curiosity
    • person was too focused on the task ("get the document")
      to notice problems with the process

Presenter Notes

Example: phishing

  • Turned out to be a run-of-the-mill, non-targeted phishing campaign
  • Acquaintance's e-mail account had been compromised first
  • Attackers then targeted contacts gathered from their e-mails

Presenter Notes

We're all in this together

Best way to attack you might be through your friends/colleagues.
Best way to attack your friends/colleagues might be through you.

Your security practices have material effect on the security of others in your environment.

It's not just about you.

Presenter Notes

We're all in this together

Best way to attack you might be through your friends/colleagues.
Best way to attack your friends/colleagues might be through you.

Your security practices have material effect on the security of others in your environment.

It's not just about you.

Presenter Notes

Practical fundamentals

  • Disk or memory encryption
  • Regular and tested backups
  • Password managers
  • Multifactor authentication
  • Regular updates
  • Compartmentalization of information

Presenter Notes

Disk and memory encryption

  • Memory encryption on your mobile devices
  • Full disk encryption on your laptop

  • Doesn't help if someone grabs your unlocked device!

Presenter Notes

Backups

  • Untested backup is no backup at all
  • Stale backup is a useless backup
  • Encrypt your backups

Presenter Notes

Passwords

1. 123456 6. 12345678
2. 123456789 7. 111111
3. 12345 8. 123123
4. qwerty 9. 1234567890
5. password 10. 1234567

https://nordpass.com/most-common-passwords-list/

Presenter Notes

Passwords

  • You will forget your password
    • password you forget is useless
  • If you don’t forget your password, it's probably too weak
  • Use a password manager

Presenter Notes

Password management

  • Generate different random passwords for different services
    • No matter how "unimportant" the service is
  • When you have to remember, use passphrases
    • Make sure to use them regularly, to not forget
  • Never re-use passwords
  • Multifactor authentication on everything

Presenter Notes

Passphrases

Presenter Notes

Multifactor authentication

  • Any is better than none
  • Time-based codes (TOTP, "authenticator apps")
    better than SMS/voice call codes
  • Use hardware keys / security tokens when possible

Presenter Notes

Regular updates

"Citizen Lab said it reported its findings to Apple on
September 7."

"Today, September 13th, Apple is releasing an update that patches CVE-2021-30860. We urge readers to immediately update all Apple devices."

"Attacks like the ones described are highly sophisticated, cost millions of dollars to develop, often have a short shelf life, and are used to target specific individuals"

Presenter Notes

Regular updates

"Citizen Lab said it reported its findings to Apple on
September 7."

"Today, September 13th, Apple is releasing an update that patches CVE-2021-30860. We urge readers to immediately update all Apple devices."

"Attacks like the ones described are highly sophisticated, cost millions of dollars to develop, often have a short shelf life, and are used to target specific individuals"

Presenter Notes

Regular updates

"Citizen Lab said it reported its findings to Apple on
September 7."

"Today, September 13th, Apple is releasing an update that patches CVE-2021-30860. We urge readers to immediately update all Apple devices."

"Attacks like the ones described are highly sophisticated, cost millions of dollars to develop, often have a short shelf life, and are used to target specific individuals"

Presenter Notes

Compartmentalization
of information

  • …by organizational means
    • need-to-know
  • …by technical means
    • different devices
    • different browsers
    • different channels
    • different accounts

Presenter Notes

Example:
targeted phishing

  • Targeted phishing attack successfully tricks a person
    • Phishing site almost a pixel-perfect copy of a real internal service
    • Phishing site used a look-alike domain with HTTPS
  • The person tries multiple passwords, unsure which one is the "right one"
  • One of the provided passwords then used to sign into their e-mail account

Presenter Notes

Example:
targeted phishing

  • Password re-use made the person unsure "which password was the right one", and thus try several
  • Using a password manager would have:
    • stopped the person from sharing more than one password
    • helped raise a red flag: "why doesn't my password work"

Presenter Notes

Example:
targeted phishing

  • Multifactor authentication would have stopped the attackers from actually signing into the e-mail account
  • E-mail encryption helped, sensitive e-mails were encrypted and remained inaccessible to the attacker
  • Later analysis showed at least 3 months of attack preparation

Presenter Notes

Example:
targeted phishing

A different, but just as sophisticated attack was thwarted later, because the targeted person "had a hunch" and just… asked to verify.

Three-month preparation down the drain.

Trust your hunches.

Presenter Notes

Example:
targeted phishing

A different, but just as sophisticated attack was thwarted later, because the targeted person "had a hunch" and just… asked to verify.

Three-month preparation down the drain.

Trust your hunches.

Presenter Notes

Evaluating tools

These are guidelines and potential red flags, not strict rules.

For example, there are tools that are closed source and just fine. There are also tools that are open-source, and completely crap.

This list has no particular order. Importance of items changes depending on the particular situation.

Presenter Notes

Evaluating tools

  • Is the code/protocol open?
    Has it been audited?
  • Is it safe by default?
    Is it easy to use correctly?
  • Who controls the (meta)data?
    Where does it run?
  • Buzzwords ("cloud", "cyber", "military-grade", etc)?
    Deceptive or deceitful communication?
  • Does it fit my threat model and needs?

Presenter Notes

Example: Telegram

Open, audited?

Presenter Notes

Example: Telegram

Safe by default?
Easy to use correctly?

Presenter Notes

Example: Telegram

Who controls the (meta)data?
Where does it run?

Presenter Notes

Example: Telegram

Buzzwords?
Deceptive or deceitful communication?

Presenter Notes

Example: Telegram

Does it fit my threat model and needs?

Presenter Notes

Example: Telegram

  • Would I generally recommend Telegram?
    absolutely not
    • Deceptive communication around encryption
    • Easy to forget to enable end-to-end encryption
    • Suspect metadata collection practices

Presenter Notes

Example: Telegram

  • Would I consider using it if in Russia?
    possibly
    • Having Signal or Briar installed might be seen as suspicious by the police
    • If used carefully and being mindful of it's problems, Telegram might be good enough in these very specific circumstances

Presenter Notes

The Broader Picture

Presenter Notes

"[T]he WannaCry ransomware attack crippled more than 300,000 machines in 150 countries, including 80 [NHS] hospitals in Britain that were forced to divert patients"

"The WannaCry ransomware attack (...) propagated through EternalBlue"

"EternalBlue is an exploit developed by the [NSA] according to testimony by former NSA employees. It was leaked by the Shadow Brokers"

Presenter Notes

"[T]he WannaCry ransomware attack crippled more than 300,000 machines in 150 countries, including 80 [NHS] hospitals in Britain that were forced to divert patients"

"The WannaCry ransomware attack (...) propagated through EternalBlue"

"EternalBlue is an exploit developed by the [NSA] according to testimony by former NSA employees. It was leaked by the Shadow Brokers"

Presenter Notes

"[T]he WannaCry ransomware attack crippled more than 300,000 machines in 150 countries, including 80 [NHS] hospitals in Britain that were forced to divert patients"

"The WannaCry ransomware attack (...) propagated through EternalBlue"

"EternalBlue is an exploit developed by the [NSA] according to testimony by former NSA employees. It was leaked by the Shadow Brokers"

Presenter Notes

"In June 2017, a new variant of Petya was used for a global cyberattack, primarily targeting Ukraine. The new variant propagates via the EternalBlue exploit. (…)
Kaspersky Lab referred to this new version as NotPetya."

"How NotPetya accidentally took down global shipping giant Maersk"

Presenter Notes

"In June 2017, a new variant of Petya was used for a global cyberattack, primarily targeting Ukraine. The new variant propagates via the EternalBlue exploit. (…)
Kaspersky Lab referred to this new version as NotPetya."

"How NotPetya accidentally took down global shipping giant Maersk"

Presenter Notes

This story again:

US National Security Agency's security failure provided criminal ransomware groups and Russian cyber-sabotage agencies with weaponized vulnerabilities affecting globally used software.

Their attacks forced hospitals to turn away patients and adversely affected global logistics.

NSA could have informed the vendors about vulnerabilities found in their products, instead of weaponizing them, which would have helped make critical software more secure.

Presenter Notes

"[Security Researchers] Remotely Kill A Jeep On The Highway
– with Me In It"

"Vehicle manufacturers dismissed prior warnings about flawed security"

Presenter Notes

"Hackers Remotely Kill A Jeep On The Highway
– with Me In It"

"Vehicle manufacturers dismissed prior warnings about flawed security"

Presenter Notes

"[R]esearchers have managed to [break into] and gain access to
the self-aiming sniper rifle's computer system."

"IoT worm can [exploit vulnerabilities in] Philips Hue lightbulbs,
spread across cities"

"[Cybercriminals] stole a casino's high-roller database through a
thermometer in the lobby fish tank"

Presenter Notes

"[R]esearchers have managed to hack and gain access to
the self-aiming sniper rifle's computer system."

"IoT worm can hack Philips Hue lightbulbs,
spread across cities"

"Hackers stole a casino's high-roller database through a
thermometer in the lobby fish tank"

Presenter Notes

This story again:

Internet of Things devices hilariously and dangerously insecure.

Jeep, Philips, other IoT device manufacturers sell faulty, potentially life-threatening products, ignore warnings from security researchers.

Presenter Notes

  • Framing matters
  • Language matters
  • Don't write…
    • …"hackers" when you mean "cybercriminals"
    • …"hack" when you mean "compromise"

Presenter Notes

How we talk about problems
defines how we think about solutions.

Presenter Notes

Where to get help

Presenter Notes

Where to get help

Useful resources

Presenter Notes

Where to get help

Useful resources

Presenter Notes

Where to get help

These are community-driven, and should not be seen as a replacement for dedicated information security experts working with you on a regular basis.

However, they may be a good place to find volunteers that could help.

Presenter Notes

Stay safe!

Presenter Notes