SlideShare a Scribd company logo
LARGE SCALE ATTACKS
          Lessons learnt
Proposals for National and EU Policy

                 Ferenc Suba J.D., MA
                 Chairman of the Board
                 PTA CERT-Hungary
                 Vice-chair of the MB
                 ENISA
Large scale attacks

1. Large phishing attack against Hungarian banks:
7 banks in HU, for 2 weeks, „foreign” attacks from
international botnet administered by 4 virtual domain name
servers (all abroad, from Asia, Europe, Americas)
2. Attacks on Estonia (international aspects):
attacks from 4000 compromised machines (cca. 50% from
the Americas, 12 from HU)
Day 1   Large Scale Attacks
The response

Phishing in HU (national+ international response):
- PTA-CERT Hungary as coordinator
- With the help of CERT community+ HU Banking ISAC
- Localisation +shutting down of VDNS (all abroad)
- Within 4-12 hours
- Notification of ISPs via national CERTs
- Notification of clients from the banks
- Filing a case against unknown persons at the police
Estonian crisis (international response):
- Finnish national CERT + US CERT as coordinators
- With the help of CERT community
- Localisation + cleaning of compromised machines
- Within 2 weeks (after FIRST and TF-CSIRT involvement)
- Notification of ISPs, system administrators via national
CERTs
Lessons learnt
          Proposals for National Policy
Not enough or lacking:
- Preparedness
- Early warning
- Manpower
- Coordination
- Communication with international partners
- Media work
National policy:
- Goverment support (national strategy, responsible HLO, money)
- Crisis management plan
- Early warning system
- National CERT
- National coordination body (private sector, policy makers, law
enforcement, CERTs)
- Involvement of international CERT community
- Communication plan
- Regular exercises
Financial ISAC in Hungary

- History: joint comexes with banks since early 2006
- Great leap forward: large phising attacks in Dec 2006
- Constituents: CERT-HU, Law Enforcement, Banking Assoc.
of HU, Financial Supervisory Authority
- Activity: information sharing, exercises, recommendations,
coordination
- Results: TLP, Advisory, complex exercises (simulated DDos
attack, insider attack)
- Future: FSA recomm. on the security of internet banking,
coop. with similar ISACs (GOVCERT.NL, AUSCERT, DHS)
CIIP in Energy Sector

Reason: proprietary systems are vulnerable, too!
Keywords: CO-OPERATION, COMMUNICATION, EXERCISE
USA: ISAC Model (branch specific co-op. under DHS)
Europe: EU-SCSIE (Shell, Electrabell, Swissgrid, EDF, CERN,
SEEMA, Melanie, CERT-Hungary)
Global: Meridian Process Control WG
Hungary: CIIP WG (MOL, Paks, MAVIR, Telco, CERT-Hungary)
Legal instruments of International Collaboration,
                       future


- No legally binding international agreements
- Basic instrument: Memorandum of Understanding for co-
operation
- reasons: legally binding procedures too slow + flexibility
- FIRST: two faces: association incorporated according to
Californian law + conference = annual general meeting
- ICAAN: association incorporated according to Californian
law
- Future at international level: Governments enter into this
area of international co-operation (national cybersecurity
strategies, NATO Cyberdefence Policy)
- Future at national level: Act on Information Security,
Government Network Security Centres
Thank you!
ferenc.suba@cert-hungary.hu
PTA CERT-Hungary
www.cert-hungary.hu
Puskás Tivadar Közalapítvány
www.neti.hu
ENISA
www.enisa.europa.eu

More Related Content

PDF
European Cyber Crime Centre EC3
PDF
002-MAVIS - International agreements to combat electronic crimes
PPTX
Sher bahadur budha
PDF
EU policies and legal instruments on counter terrorism
PDF
Microsoft contribution to combating sexual abuse of children on the Internet
PPT
CTO-Cybersecurity-Forum-2010-Peter Burnett
PDF
Marie-Ange Kalenga (2) - PWYP Montreal Conference 2009
PDF
Peter Fatelnig - EU Delegation to USA - Content Matters & EU Leadership - Sta...
European Cyber Crime Centre EC3
002-MAVIS - International agreements to combat electronic crimes
Sher bahadur budha
EU policies and legal instruments on counter terrorism
Microsoft contribution to combating sexual abuse of children on the Internet
CTO-Cybersecurity-Forum-2010-Peter Burnett
Marie-Ange Kalenga (2) - PWYP Montreal Conference 2009
Peter Fatelnig - EU Delegation to USA - Content Matters & EU Leadership - Sta...

What's hot (19)

PPTX
CTO-CyberSecurityForum-2010-Philip Victor
PPTX
Anti Trafficking - The Rules
PDF
Africa Security commission Meeting
PDF
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
PPT
Mr. Yannis Sirros
PPTX
PPTX
Muraszkiewicz
PDF
National cyber security strategies
ODP
Monitoring European Police
PPT
Why Europe should accept asylum seekers and refugees? Is this only a moral du...
PDF
Keeping Pace: Whistleblowing and the Response of Government, Mark Worth, Inte...
PPT
cyber policy in Latvia
PDF
Cybersecurity Event 2010
PPT
CTO-CybersecurityForum-2010-Trilok-Debeesing
PPT
Cyber
PDF
Summary-ECSM_4edition
DOCX
Border security of the southern parts of both the us and the european union
PDF
Corruption and Economic Crime - News letter issue 1 fed 2012
CTO-CyberSecurityForum-2010-Philip Victor
Anti Trafficking - The Rules
Africa Security commission Meeting
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
Mr. Yannis Sirros
Muraszkiewicz
National cyber security strategies
Monitoring European Police
Why Europe should accept asylum seekers and refugees? Is this only a moral du...
Keeping Pace: Whistleblowing and the Response of Government, Mark Worth, Inte...
cyber policy in Latvia
Cybersecurity Event 2010
CTO-CybersecurityForum-2010-Trilok-Debeesing
Cyber
Summary-ECSM_4edition
Border security of the southern parts of both the us and the european union
Corruption and Economic Crime - News letter issue 1 fed 2012
Ad

Viewers also liked (8)

PDF
Day 2 Dns Cert 4c Malicious Use
PDF
Day 1 From CERT To NCSC
PDF
Day 2 Dns Cert 4 Scenarios
PDF
Day 1 Coop Banks
PDF
Dealing With Security Threats
PDF
Cyber Security Strategies and Approaches
PDF
Day 1 Enisa Setting Up A Csirt
PDF
Anatomy of a CERT - Gordon Love, Symantec
Day 2 Dns Cert 4c Malicious Use
Day 1 From CERT To NCSC
Day 2 Dns Cert 4 Scenarios
Day 1 Coop Banks
Dealing With Security Threats
Cyber Security Strategies and Approaches
Day 1 Enisa Setting Up A Csirt
Anatomy of a CERT - Gordon Love, Symantec
Ad

Similar to Day 1 Large Scale Attacks (20)

PPTX
Cybercrime Risks Eu
PPTX
National cyber security policy final
PPT
Hackers in the national cyber security
PDF
North European Cybersecurity Cluster - an example of the regional trust platf...
PDF
How Estonia is helping to shape cyber resilience
PDF
Protecting Europe's Network Infrastructure
PDF
CTO Cybersecurity Forum 2013 Mario Maniewicz
PPTX
Cybersecurity response in the Pacific
PPTX
CNCERT Conference 2017: Capacity development in the Asia Pacific
PDF
Noah Maina: Computer Emergency Response Team (CERT)
PPT
Capabilities of Cyber-Trerrorists - POTENTIAL ATTACKS - Possibility, Likelyho...
PDF
Internet safety and security strategies for building an internet safety wall
PDF
Global Partnership Key to Cyber Security
PDF
APNIC Outreach Activities in Cyber Security
PPT
Cyber(in)security: systemic risks and responses
PPT
Systemic cybersecurity risk
DOCX
Estonia After the 2007 Cyber Attacks Legal, Strategic and O
PDF
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
ODP
Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...
PDF
International CERTs/CSIRTs Collaboration
Cybercrime Risks Eu
National cyber security policy final
Hackers in the national cyber security
North European Cybersecurity Cluster - an example of the regional trust platf...
How Estonia is helping to shape cyber resilience
Protecting Europe's Network Infrastructure
CTO Cybersecurity Forum 2013 Mario Maniewicz
Cybersecurity response in the Pacific
CNCERT Conference 2017: Capacity development in the Asia Pacific
Noah Maina: Computer Emergency Response Team (CERT)
Capabilities of Cyber-Trerrorists - POTENTIAL ATTACKS - Possibility, Likelyho...
Internet safety and security strategies for building an internet safety wall
Global Partnership Key to Cyber Security
APNIC Outreach Activities in Cyber Security
Cyber(in)security: systemic risks and responses
Systemic cybersecurity risk
Estonia After the 2007 Cyber Attacks Legal, Strategic and O
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...
International CERTs/CSIRTs Collaboration

Recently uploaded (20)

PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Getting Started with Data Integration: FME Form 101
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Mushroom cultivation and it's methods.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
Tartificialntelligence_presentation.pptx
Enhancing emotion recognition model for a student engagement use case through...
A comparative analysis of optical character recognition models for extracting...
Getting Started with Data Integration: FME Form 101
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Zenith AI: Advanced Artificial Intelligence
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
NewMind AI Weekly Chronicles - August'25-Week II
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Mushroom cultivation and it's methods.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Encapsulation_ Review paper, used for researhc scholars
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation theory and applications.pdf
cloud_computing_Infrastucture_as_cloud_p
Unlocking AI with Model Context Protocol (MCP)
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Tartificialntelligence_presentation.pptx

Day 1 Large Scale Attacks

  • 1. LARGE SCALE ATTACKS Lessons learnt Proposals for National and EU Policy Ferenc Suba J.D., MA Chairman of the Board PTA CERT-Hungary Vice-chair of the MB ENISA
  • 2. Large scale attacks 1. Large phishing attack against Hungarian banks: 7 banks in HU, for 2 weeks, „foreign” attacks from international botnet administered by 4 virtual domain name servers (all abroad, from Asia, Europe, Americas) 2. Attacks on Estonia (international aspects): attacks from 4000 compromised machines (cca. 50% from the Americas, 12 from HU)
  • 4. The response Phishing in HU (national+ international response): - PTA-CERT Hungary as coordinator - With the help of CERT community+ HU Banking ISAC - Localisation +shutting down of VDNS (all abroad) - Within 4-12 hours - Notification of ISPs via national CERTs - Notification of clients from the banks - Filing a case against unknown persons at the police Estonian crisis (international response): - Finnish national CERT + US CERT as coordinators - With the help of CERT community - Localisation + cleaning of compromised machines - Within 2 weeks (after FIRST and TF-CSIRT involvement) - Notification of ISPs, system administrators via national CERTs
  • 5. Lessons learnt Proposals for National Policy Not enough or lacking: - Preparedness - Early warning - Manpower - Coordination - Communication with international partners - Media work National policy: - Goverment support (national strategy, responsible HLO, money) - Crisis management plan - Early warning system - National CERT - National coordination body (private sector, policy makers, law enforcement, CERTs) - Involvement of international CERT community - Communication plan - Regular exercises
  • 6. Financial ISAC in Hungary - History: joint comexes with banks since early 2006 - Great leap forward: large phising attacks in Dec 2006 - Constituents: CERT-HU, Law Enforcement, Banking Assoc. of HU, Financial Supervisory Authority - Activity: information sharing, exercises, recommendations, coordination - Results: TLP, Advisory, complex exercises (simulated DDos attack, insider attack) - Future: FSA recomm. on the security of internet banking, coop. with similar ISACs (GOVCERT.NL, AUSCERT, DHS)
  • 7. CIIP in Energy Sector Reason: proprietary systems are vulnerable, too! Keywords: CO-OPERATION, COMMUNICATION, EXERCISE USA: ISAC Model (branch specific co-op. under DHS) Europe: EU-SCSIE (Shell, Electrabell, Swissgrid, EDF, CERN, SEEMA, Melanie, CERT-Hungary) Global: Meridian Process Control WG Hungary: CIIP WG (MOL, Paks, MAVIR, Telco, CERT-Hungary)
  • 8. Legal instruments of International Collaboration, future - No legally binding international agreements - Basic instrument: Memorandum of Understanding for co- operation - reasons: legally binding procedures too slow + flexibility - FIRST: two faces: association incorporated according to Californian law + conference = annual general meeting - ICAAN: association incorporated according to Californian law - Future at international level: Governments enter into this area of international co-operation (national cybersecurity strategies, NATO Cyberdefence Policy) - Future at national level: Act on Information Security, Government Network Security Centres
  • 9. Thank you! ferenc.suba@cert-hungary.hu PTA CERT-Hungary www.cert-hungary.hu Puskás Tivadar Közalapítvány www.neti.hu ENISA www.enisa.europa.eu