VB ‘securing your organization in the age of cybercrime’ Seminar

2010-12-01

Helen Martin

Virus Bulletin, UK
Editor: Helen Martin

Abstract

Helen Martin reports from the first VB Seminar in London.


Table of contents

For more than 20 years, Virus Bulletin has run the annual international Virus Bulletin conference, allowing experts in the anti-malware field to share research interests, discuss methods and emerging technologies, as well as network with their peers and meet with those who put their technologies into practice in the real world.

From very positive delegate feedback at these international security events grew the concept of a series of small, one-day seminars. As a result, last month saw the inaugural VB Seminar in central London, UK.

The Seminar was held at the historic Institute of Engineering and Technology (IET) – the foundation stone of which was laid by Queen Victoria – on the banks of the River Thames in the heart of the capital. Despite its historic pedigree, the venue’s facilities were perfect for our needs, providing a modern, yet intimate space for the seminar sessions.

With snow forecast for much of the country, the organizers breathed a sigh of relief when all the speakers and delegates reached the venue safely on a cold morning in late November, and the bad weather stayed away long enough for the day’s proceedings to run uninterrupted.

Programme

Alex Shipp kicked off the programme with a look at targeted attacks and digital espionage, detailing some of the social engineering tricks used by attackers and the crafty ways in which they get their malware past security barriers. He gave an indication of the types of organization most likely to be affected and some tips on how companies can defend against such attacks, advising IT security professionals above all to stay vigilant.

Next up, DC Bob Burls of the Police Central e-Crime Unit presented an overview of botnets, explaining how they have evolved, what they are capable of, and how they are currently being used in the criminal world. He highlighted the importance of collaboration between the IT industry and law enforcement, emphasizing that it is vital for security incidents to be reported to the police in order for them to build up evidence against the perpetrators.

ESET’s Juraj Malcho was next to take to the podium, bringing a slightly more technical flavour to the proceedings with a look at the various vulnerabilities that have been in the news this year – of course devoting a fair portion of his time to discussing the headline-hitting Stuxnet vulnerabilities.

After a brief break for coffee, Andrew Lee stepped up to highlight the many ways in which social engineering can trick users into giving away valuable information, and what impact that can have for an enterprise. During his presentation Andrew ran some live demonstrations, including one in which he used Firesheep to expose delegates using the venue’s free WiFi connection who had left their Facebook IDs open. He concluded that social networking is the single biggest threat facing computer users today – there was a murmur of agreement from members of the audience.

Bryan Littlefair, CISO of the Vodafone Group, was next to take the stage. As one of the world’s largest organizations and best known brands, Vodafone typically suffers 1,000 DDoS attacks per month, and the organization invests more than £300 million in security globally. Bryan shared some of the strategies and programs that have worked for the company, stressing that a successful security team should support the business, not block new initiatives, and must operate strategically.

The last of the morning’s presentations came from David Evans of the Information Commissioner’s Office (ICO), who presented the ICO’s view on data security. David highlighted the results of a survey in which protecting personal information was shown to be a greater public concern in the UK than the NHS and national security. (He pointed out that, inevitably, the same people expressing concern about their personal data would be posting status updates and detailed information on Facebook, Twitter, et al.) David outlined the ICO’s roles, policies and procedures, and his advice for reducing privacy risk was to use personal information only where strictly necessary, and to adopt a ‘data minimization’ approach.

A lunch break followed, in which delegates were able to relax, network, and appreciate the stunning views from the IET’s Riverside Room – indeed several braved the chill to step out on the terrace for a better view of the Thames.

After lunch, delegates returned to their seats in time for IBM’s Martin Overton to start the afternoon’s proceedings with a look at how to detect the unknown. He presented an overview of the tools, tricks and techniques that can be used to help establish the true state of a suspect system.

Richard Martin of the UK Payments Administration followed, with a look at the lessons learned from online banking attacks. UK bank brands were targeted by 7,000 phishing attacks in October 2010, and surveys indicate that the number of users who click the links contained in phishing emails or otherwise act on them has increased over the last five years – with under 24s twice as likely to act on them as other age groups. Richard’s advice to other businesses was to expect the full attention of criminals, not to assume that the challenge ends at the perimeter, and overall to expect the unexpected – with banks having learned a lot over the last few years, he asked: what happens when the bad guys move on to easier targets?

Sophos’s Graham Cluley rounded off the day’s presentations in his trademark flamboyant style with another look at the security risks of social networks. In an illustration of just how easy it is for attackers to gather detailed information from these sites – and how little regard users have for the risks of sharing personal data – he reported the results of an experiment in which two fictitious Facebook users were created: 21-year-old ‘Daisy Felettin’ and 56-year-old ‘Dinette Stonily’. Each sent out 100 friend requests to randomly chosen Facebook users within their age group and after just two weeks 95 strangers had chosen to become friends with either Daisy or Dinette. Within the older age group there were even eight Facebook users who had befriended Dinette without having received an invitation from her. Of those who accepted the friend request, 89% of the younger age group and 57% of older age group revealed their full date of birth, while 46% of the younger group and 31% of the older group gave away personal information about their friends and family. Graham reiterated Andrew Lee’s conclusion from earlier in the day – that social networks are the greatest threat facing computer users today.

Finally, to bring the event to a close, delegates posed their questions to a panel of the day’s presenters. The experts squeezed onto the stage with the questions and answers deftly coordinated by Sophos’s Stuart Taylor.

Overall, the seminar was a resounding success. Without exception, the presentations were engaging and informative, and a good mix of delegates from UK businesses and government organizations made for some excellent networking opportunities. We hope to be able to repeat the event in the not too distant future, so watch out for details.

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest articles:

Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

Aditya Sood & Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited to compromise the C&C panel in order to gather threat intelligence, and present a model of mobile AppInjects.

Cryptojacking on the fly: TeamTNT using NVIDIA drivers to mine cryptocurrency

TeamTNT is known for attacking insecure and vulnerable Kubernetes deployments in order to infiltrate organizations’ dedicated environments and transform them into attack launchpads. In this article Aditya Sood presents a new module introduced by…

Collector-stealer: a Russian origin credential and information extractor

Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In this article, researchers Aditya K Sood and Rohit Chaturvedi present a 360…

Fighting Fire with Fire

In 1989, Joe Wells encountered his first virus: Jerusalem. He disassembled the virus, and from that moment onward, was intrigued by the properties of these small pieces of self-replicating code. Joe Wells was an expert on computer viruses, was partly…

Run your malicious VBA macros anywhere!

Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.