Internal Cybersecurity Risks

29
Office of the Washington State Auditor Internal Cybersecurity Risks Peg Bodin, CISA – Local IS Audit Program Manager Michael Hjermstad – Local IS Audit Assistant Manager Joseph Clark - Performance Auditor

Transcript of Internal Cybersecurity Risks

Page 1: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r

Internal Cybersecurity Risks

Peg Bodin, CISA – Local IS Audit Program ManagerMichael Hjermstad – Local IS Audit Assistant Manager

Joseph Clark - Performance Auditor

Page 2: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r

The risk

2

BEC = Business Email Compromise

EAC = Email Account Compromise

Source: IC3 (Internet Crime Complaint Center)

Page 3: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r

Phishing emails

3

Your W-2 is available online, click here (sent in mid- to late January)

Win Seahawks tickets!

Phishing Campaign:Open: 1 minute, 40 secondsClick: 3 minutes, 45 seconds

Source: Verizon 2016 DBIR

Page 4: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r

Business email and email account compromise scams

4

I’m your boss, please respond to me, via return email, an employee report (with SSNs)

I’m your boss, I need you to transfer $$$ to this bank account

I’m your vendor, pay this invoice and send the $$$ to this bank account

Page 5: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r

Phishing really works — well

5

“most successful variety [of social engineering] is phishing”

“30% of phishing messages were opened”

Reliance on employees for advanced phishing detection

Phishing as a service is twice as profitable as traditional phishing

Page 6: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r

What is phishing?

6

http://madhatmedia.com.au

Page 7: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r

Executive email scam

7

Executive email impersonation chain of events

Page 8: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r

Executive email scam example

8

Sanitized sample of an email used in this campaign to trick targets into wiring funds to the attacker's account

The attached PDF contains instructions for the wire transfer, including the destination account

Page 9: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r

Mitigations to consider

9

Have a system for reporting phishing

Provide training that emphasizes:

Know who to contact; quicker is better

Pick up a phone before acting on the email

Be wary of suspicious phone calls

Do not use a website connected to the email

Page 10: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r

Mitigations to consider

10

Set up an internal phishing program

Use email system rules

Scrutinize all e-mail requests for fund transfers to determine if the requests are out of the ordinary

Patch systems for critical vulnerabilities

Page 11: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r

Business credentials compromise scams

11

I’m from your IT department, I need you to confirm your password by going to this site

Page 12: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r

Business credentials compromise

12

Computerworld: Hacker steals teacher’s direct deposit paycheck

KrebsOnSecurity: Crooks hijack retirement funds via SSA portal

Employee provides bank

account

Agency creates ACH payment file

Agency transmits file

to bank

Page 13: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r

Phishing for credentials?

13

When you “mouse over” the hidden link

Page 14: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r

Phishing for credentials for HR system

14

A compromised website with a fake Washington HRMS web link

Page 15: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r

After putting in credentials

15

Convincing web page to make victim think everything is OK

Page 16: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r 16

Political phishing

Source: Symantec Internet Security Threat Report

Page 17: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r

Mitigations to consider

17

Only conduct financial or secure transactions on a secure webpage with encryption

Verify by hovering

Page 18: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r

Mitigations to consider

18

Reputable organizations do not ask for personal information via email

Spam email filters reduce phishing email

Dual-factor authentication

No password multi-use

Risk assessment

Incident response

Page 19: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r 19

Mission critical systems

Emergency communications

Air traffic control

Electrical systems

Heating/cooling systems

Water/sewer systems

What else?

Mission critical systems

Page 20: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r 20

Major events

Ransomware

Exfiltrated confidential information

Serious impacts

Page 21: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r

Serious impacts

21

Costs

Loss of trust

Breach notifications (multi-state)

Lawyers

Security experts

Lost revenue

Page 22: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r

Phishing and ransomware

22

Page 23: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r

Ransomware

23

Page 24: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r

Have bitcoin?

24

Page 25: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r

Phishing as point of entry to ‘pivot’ a network

25

Standard employee account compromised Mission critical systems?

Standard employee account

Data breach?

Page 26: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r

Mitigations and other considerations

26

Back up your critical information (air gapped)

Limit user access to only what employees need

Least-privilege rule or role-based security

Segment the network – not all systems have access to all other systems

Devise a continuity-of-operations plan; identify key systems

Complete and test an IT data recovery plan

Page 27: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r

Reporting incidents

27

For government agencies, report fraud or theft to our Office: http://portal.sao.wa.gov/saoportal/public.aspx/LossReport

Data breach notification:http://www.atg.wa.gov/data-breach-notifications

File a complaint with FBI Internet Crime Complaint Center:www.ic3.gov (regardless of loss size)BEC.IC3.gov (business email compromises)

Consumers can report identity theft to Federal Trade Commission: IdentityTheft.gov

Page 28: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r

Audits

28

Performance audits

Financial statement audits

Accountability audits

Backups

User access

IT vendor management/contracts

Current policies and procedures

Federal financial assistance audits

Page 29: Internal Cybersecurity Risks

O f f i c e o f t h e W a s h i n g t o n S t a t e A u d i t o r 29

Questions?

Websites: www.sao.wa.gov https://auditconnectionwa.org/Facebook: https://www.facebook.com/WAStateAuditorsOfficeTwitter: www.twitter.com/WAStateAuditor

Pat McCarthyState Auditor

(360) [email protected]

Mike HjermstadAssistant Audit Manager

(253) [email protected]

Peg Bodin, CISALocal IS Audit Program Manager

(360) [email protected]

Joseph ClarkPerformance Auditor

(360) [email protected]