Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?
Transcript of Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?
![Page 1: Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?](https://reader036.fdocuments.us/reader036/viewer/2022062820/58a6dc561a28abef698b5aab/html5/thumbnails/1.jpg)
© LIFARS 2016
Ondrej KREHEL
HACKING AS A SERVICE
Presented for the land of U2 and Guinness
![Page 2: Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?](https://reader036.fdocuments.us/reader036/viewer/2022062820/58a6dc561a28abef698b5aab/html5/thumbnails/2.jpg)
© LIFARS 2016
This Presentation Was Prepared by LIFARS’ Marketing Team
![Page 4: Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?](https://reader036.fdocuments.us/reader036/viewer/2022062820/58a6dc561a28abef698b5aab/html5/thumbnails/4.jpg)
© LIFARS 2016
“Let There Be Light”
![Page 5: Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?](https://reader036.fdocuments.us/reader036/viewer/2022062820/58a6dc561a28abef698b5aab/html5/thumbnails/5.jpg)
© LIFARS 2016
“Let There Be Code”
“Let There Be Code”
![Page 6: Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?](https://reader036.fdocuments.us/reader036/viewer/2022062820/58a6dc561a28abef698b5aab/html5/thumbnails/6.jpg)
© LIFARS 2016 Digital Firefighters: 212 - 222 - 7061
![Page 7: Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?](https://reader036.fdocuments.us/reader036/viewer/2022062820/58a6dc561a28abef698b5aab/html5/thumbnails/7.jpg)
© LIFARS 2016
At The Edge Of The Glory – The Bitter End
.
Hacking at the edge of glory. Your average attacker.We all have college education, smartphones, cars and houses, feel smart.We all made mistakes.
![Page 8: Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?](https://reader036.fdocuments.us/reader036/viewer/2022062820/58a6dc561a28abef698b5aab/html5/thumbnails/8.jpg)
© LIFARS 2016
FBI Cyber’s Most Wanted
![Page 9: Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?](https://reader036.fdocuments.us/reader036/viewer/2022062820/58a6dc561a28abef698b5aab/html5/thumbnails/9.jpg)
© LIFARS 2016
FBI Cyber’s Most Wanted
![Page 10: Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?](https://reader036.fdocuments.us/reader036/viewer/2022062820/58a6dc561a28abef698b5aab/html5/thumbnails/10.jpg)
© LIFARS 2016
![Page 11: Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?](https://reader036.fdocuments.us/reader036/viewer/2022062820/58a6dc561a28abef698b5aab/html5/thumbnails/11.jpg)
© LIFARS 2016
Who Would You Bet On?
![Page 12: Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?](https://reader036.fdocuments.us/reader036/viewer/2022062820/58a6dc561a28abef698b5aab/html5/thumbnails/12.jpg)
© LIFARS 2016
AlienSpy: Hacking-as-a-Service Evolved
Hacking-as-a-Service Platform
Plans starting at $19.99Highly customer-oriented, easy-to-use toolAllowed anyone to perform sophisticated attacksEvolved over time from the Frutas > Adwind > Unrecom AlienSpy malware adopted by organized cybercrime gangs
![Page 13: Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?](https://reader036.fdocuments.us/reader036/viewer/2022062820/58a6dc561a28abef698b5aab/html5/thumbnails/13.jpg)
© LIFARS 2016
Spear Phishing Example
Real phishing email example
Discovered leaked on PasteBin
![Page 14: Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?](https://reader036.fdocuments.us/reader036/viewer/2022062820/58a6dc561a28abef698b5aab/html5/thumbnails/14.jpg)
© LIFARS 2016
AlienSpy Interface
Easy to navigate and very user-friendly AlienSpy interface makes it a very attractive and easy-to-use tool (even for non-tech savvy criminals)
https://www.youtube.com/watch?v=k3oZEJyWHBw
![Page 15: Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?](https://reader036.fdocuments.us/reader036/viewer/2022062820/58a6dc561a28abef698b5aab/html5/thumbnails/15.jpg)
© LIFARS 2016
Evolution of the AlienSpy RAT
![Page 16: Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?](https://reader036.fdocuments.us/reader036/viewer/2022062820/58a6dc561a28abef698b5aab/html5/thumbnails/16.jpg)
© LIFARS 2016
Observed AlienSpy Forensic Analysis
![Page 17: Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?](https://reader036.fdocuments.us/reader036/viewer/2022062820/58a6dc561a28abef698b5aab/html5/thumbnails/17.jpg)
© LIFARS 2016
Observed AlienSpy Forensic Analysis
![Page 18: Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?](https://reader036.fdocuments.us/reader036/viewer/2022062820/58a6dc561a28abef698b5aab/html5/thumbnails/18.jpg)
© LIFARS 2016
Observed AlienSpy Forensic Analysis
Malware loaded into memory
AlienSpy malware loaded from the buffer
![Page 19: Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?](https://reader036.fdocuments.us/reader036/viewer/2022062820/58a6dc561a28abef698b5aab/html5/thumbnails/19.jpg)
© LIFARS 2016
Assessment Tools
How do you know that you are hacked?
What to do when you or your company is hacked?
How does one recover and remediate situation?
![Page 20: Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?](https://reader036.fdocuments.us/reader036/viewer/2022062820/58a6dc561a28abef698b5aab/html5/thumbnails/20.jpg)
© LIFARS 2016
How Do You Know When You Are Hacked?
![Page 21: Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?](https://reader036.fdocuments.us/reader036/viewer/2022062820/58a6dc561a28abef698b5aab/html5/thumbnails/21.jpg)
© LIFARS 2016
What Should You Do When You Are Hacked?
![Page 22: Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?](https://reader036.fdocuments.us/reader036/viewer/2022062820/58a6dc561a28abef698b5aab/html5/thumbnails/22.jpg)
© LIFARS 2016
How to Remediate a Hacking Incident?
![Page 23: Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?](https://reader036.fdocuments.us/reader036/viewer/2022062820/58a6dc561a28abef698b5aab/html5/thumbnails/23.jpg)
© LIFARS 2016
Welcome to the Cybersecurity Casino! (Whether you like it or not)
![Page 24: Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?](https://reader036.fdocuments.us/reader036/viewer/2022062820/58a6dc561a28abef698b5aab/html5/thumbnails/24.jpg)
© LIFARS 2016
To shun this approach is to meddle with the primary forces of the Internet, Mr. Beale. The hackers won’t have it. They’ll take millions out of your business and put nothing back in. It is ebb and flow, tidal gravity. It is the new cyber world balance.
![Page 25: Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?](https://reader036.fdocuments.us/reader036/viewer/2022062820/58a6dc561a28abef698b5aab/html5/thumbnails/25.jpg)
© LIFARS 2016
Q & A
Sign up for CyberNews: LIFARS.com/cybernews
Tim, did you read the latest CyberNews yet?
Of course! I just signed up for free! Good content and funny jokes, I
love it!