SlideShare a Scribd company logo
Security FIRST
- International Cooperation in Cyber Security -
School of Information Security, Korea University
former Special Adviser to the President for National Security
Lim, Jong In
2015.06.13. FIRST
/ 25
$81 million dollar deposit was stolen via a forged message instructing that
some of the Bangladesh Central Bank’s deposit in the Federal Reserve Bank
of New York should be transferred
Recent Issues – SWIFT Hacking
Bangladesh Cyber Theft
 Feb. 2016. Hackers stole $81 million
from the Bangladesh Central Bank’s
official account at the Federal
Reserve Bank of New York
 New York Fed announced that the
transfer of the money had been
“fully authenticated” by
SWIFT(international financial
messaging system)
 Bangladesh's central bank was
vulnerable to hackers because it did
not have a firewall and used second-
hand, $10 switches for network
computers connected to SWIFT
Source : NYT, Reuter
2
/ 25
Continuous hacking attempts against
SWIFT and assumed mastermind
 According to the malicious code analysis
by IssueMakersLab in Korea, the file
deletion function codes of the following
malicious codes are similar, making us
assume that the attacks were launched by
the same group:
- February 2016 :Bangladesh Central Bank
- December 2015 : Vietnam’s Commercial Bank
- November 2014 : Sony Pictures
- June 2013: Press in Korea
 Since the analysis results of Symantec
also show high similarity to the Sony
Pictures malicious code, North Korea is
assumed to be the mastermind
There were SWIFT hacking attempts against 8 banks besides Bangladesh Central Bank.
The incident is believed to be the work of North Korean hackers, judging from the
similarity of the malicious code to that in the Sony Pictures hacking incident.
3
Recent Issues – SWIFT Hacking
/ 25
Korea is experiencing a social problem due to the spread of ransomware
that exploits the vulnerability of major online community advertising banners
Spread of ransomware targeting
online communities in Korea
 Distributing ransomware among major online
communities in Korea
- Crypt0L0cker randomware was distributed on
Clien.net in April 2015
- UltraCrypter randomware was distributed on
PPOMPPU.co.kr in June 2016
 Both sites are representative online communities
in Korea (ranked 12th and 13th in web traffic
volume), and several hundred million worth of
damages were reported
 Both malicious codes require BitCoin deposit,
and it is difficult to respond due to difficulty in
tracing back
 Since BitCoin deposit is not confirmed for
UltraCrypter, recovery is expected to be
impossible
Recent Issues - Ransomware
4
/ 25
Korea is the third affected countries of the LOCKY ransomware
Recent Issues - Ransomware
5
Source : FireEye
/ 25
Sony Pictures Entertainment was hacked before its release of
‘The Interview’, a movie that plans to assassinate North Korea’s leader
Overview of the Sony Pictures Hacking
• Sony Pictures Entertainment’s internal
system was breached and some of its
data was leaked in November, 2014.
• Leaked data includes, among others:
- personal information of employees
- e-mails among employees
- information on executive salaries
- copies of unreleased Sony films
• The hackers called themselves the
"Guardians of Peace" and demanded the
planned release of the film ‘The
Interview’, a comedy on a plot to
assassinate North Korean leader Kim
Jong-un, be cancelled
6
Recent Issues – Sony Pictures
/ 25
The U.S. attributed the Sony Picture hack to North Korea, calling
it ‘Cyber Vandalism,’ and took a series of actions in response
U.S. Government’s Reaction
• On December 19th, 2014, F.B.I. published
an investigative report on the hack, in
which it identified North Korea as the
perpetrator
• President Obama called the hack ‘Cyber
Vandalism’ and claimed that the U.S.
weighed proportionate response to the
attack
• North Korean websites were shut down,
allegedly by cyber attacks orchestrated
by the U.S.
• President Obama sanctioned North
Korea’s Directorate of Reconnaissance
7
Recent Issues – Sony Pictures
/ 25
Korea Hydro & Nuclear Power(KHNP) was threatened to be destroyed
by a hacker who claimed to have hacked its control system
KHNP Hacking Overview
 In December 2014, a hacker who
claimed to be against nuclear power
development posted some of KHNP’s
confidential data on his internet blog
 The hacker claimed that he had
breached into KHNP’s internal control
system and threatened that he would
destroy KHNP’s nuclear power plants
unless it shut them down itself
 Investigation by South Korean
government and KHNP found no
evidence of intrusion into KHNP’s
control system. There has not been
any cyber attack on the Nuclear
Power plant thereafter
Recent Issues – KHNP
8
/ 25
South Korean government’s investigation unit alleged North Korea
of having perpetrated the hack with a Chinese IP address
South Korean Government’s Reaction
 On December 20th, 2014, a government
team was assembled to probe into the
hack
 The team found that the hacker had
accessed VPN in South Korea via proxy
IP address in Shenyang, China. Having
failed to hack KHNP directly, the hacker
sent phishing emails to partners of
KHNP and retired employees
 On December 24th, 2014, the
investigation team requested cooperation
from the Chinese Police
 On March 17th, 2015, the government
team presented an interim probe result,
which suggested that North Korea had
orchestrated the hack
Hacker in
North Korea
VPN in
South Korea
Access via
Proxy IP Address
in Sunyang, China
Hacking Failed
(Sent 6,000
Phishing Emails)
Hacked partners of
KHNP and retired
employee’s of KHNP
Used vulnerabilities of
Hangul (Wordprocessor)
9
Recent Issues – KHNP
/ 25
Case of South Korea - Cyber Threats that S.Korea faces
South Korea has had numerous cyber attacks since 2009, but
failed to identify and prosecute suspects for any of the attacks
Year Cyber attacks on S.Korea
2003
 1.25 Internet Intrusion : Korea's major internet networks went down due to the Slammer Worm taking
advantage of vulnerabilities of Microsoft's SQL servers
2009
 7.7 DDoS Attack : Three DDoS attacks from July 7th to 10th paralyzed the major government sites
including website of the Presidential Office
2010
2012
 GPS Disturbance : From 2010 to 2012, GPS disturbance occurred annually, causing signal interference
and damage to GPS receivers in private and military sectors, including those in Korea
Telecom's base stations
2011
 3.4 DDoS Attack : DDoS attacks on 40 local websites, including those of major portals, government
offices, the Ministry of National Defense and financial institutions
2011
 NH Bank's Cyber Terror : NH Bank's internal data and server system were damaged. Service
access paralyzed entirely or partially
2013  3.20 Cyber Terror : Major local broadcasters' and six financial institutions' computer networks went down
2013
 6.25 Cyber Terror : The Presidential Office website, major government websites, media and
political parties’ websites were under cyber attacks
2014
 Hacking on KHNP : KHNP's blueprints and operating methods for nuclear power stations were leaked
on the internet
~
10
/ 25
South Korea established a comprehensive national system to counter
cyber threats, controlled and coordinated by the Presidential Office
Case of South Korea – Countering Cyber Threats
Presidential Office
National Security Council
National Cyber
Defense
Secretary to the President
for National Cyber Security
National
Cyber Security
Center
Ministry of
Defense
Cyber Crime
National Police
Agency
Cyber Security
for Civil Sector
Ministry of
Science, ICT and
Future Planning
Privacy,
Cyber Security
For Public Sector
Ministry of
Gov Administration
and Home Affairs
Cyber Terror,
CIP
National
Intelligent Service
11
/ 25
While receiving cyber attacks continuously, the Korean government is
endeavoring to strengthen national cyber security continuously by setting up
strategies and plans to respond to such cyber attacks
• Recognized the necessity of responding to information security issues including
personal information protection due to the Auction hacking incident in 2008
• Aimed to establish a social safety network by improving policies and building infrastructure by 2010
• It was recognized that a cyber attack can threaten national security due to the 7.7 DDoS attack in 2009
• Obtained good results, such as establishment of the cyber security government system and
definition of roles and responsibilities by department
• Recognized the necessity of an effective response method due to the 3.4 DDoS Incident and
Nonghyup Computer Problems in 2011
• Obtained good results, such as awareness improvement, outsourcing company management,
and implementation of the S/W security vulnerability diagnosis system
• Recognized the necessity of integrating cyber capabilities distributed among government
departments due to the 3.20 and 6.25 Cyber Terror
• Established the organizational structure (the Blue House plays the role of control tower, and the
National Intelligence Service supervises hands-on work) and prepared personnel fostering plans
• Recognized the necessity of protecting cyberspace safely following the Korea Hydro & Nuclear
Power hacking incident
• Strengthened the cyber security control tower function of the National Security Office, newly
established a dedicated pan-government cyber security organization
Mid-term
comprehensive
information security
plan (2008)
Comprehensive
measures
against the national
cyber crisis (2009)
National cyber security
master plan (2011)
Comprehensive
national cyber security
measures (2013)
National cyber security
posture and capability
strengthening plan
(2015)
Case of South Korea – Countering Cyber Threats
12
/ 25
 High volume, high velocity, high variety
information assets that require new forms of
processing to make more meaningful information
 Data Volume : 2.7 ZB (2012) → 7.9 ZB (2015)
 Model for enabling ubiquitous, convenient,
on-demand network access to a shared pool of
configurable computing resources
 IaaS(Infra), PaaS(Platform), SaaS(Service)
 Network of physical objects or "things" embedded
in electronics, software, sensors and connectivity
 26 billion devices on the IoT by 2020 (Gartner)
 Wearable Devices, Smart Car, etc.
ICT Development and Evolving Cyber Threats
As ICT development begets new technologies such as
IoT, Big Data, and Cloud Computing
ICT
Development
Connection
Personalized
Data
Digitalized
Convergence
IoT
Cloud
Computing
Big
Data
13
/ 25
ICT Development and Evolving Cyber Threats
European Commission’s Next Generation Computing predicts that ICT
will evolve to IoT Environment through Embedded system and CPS
Vision : Internet of Things, Data & Services
(e.g. Smart Cities)
Cyber-Physical Systems
(e.g. Intelligent Networked Road Junction)
Network Embedded System
(e.g. Autonomous Aviation)
Embedded Systems
(e.g. AirBag)
Source : NGC Study, 2013, EUTEMA
14
/ 25
ICT Development and Evolving Cyber Threats
In a hyperconnected society where various new ICT applications are
adopted, threats to the new applications are anticipated
Smart Home Appliance
 ICT added home appliances for remote
control and efficiency, and convenience
 Hacked or Demonstrated Cases
- Refrigerator hacked to send spam emails (2014)
- Philips LED Lighting hacking demonstration
(Dhanjani, 2013)
- Web Camera Exposed (BBC, 2014)
Smart Healthcare
 Using body-measured information by using
wearable devices and medical equipment
 Hacked or Demonstrated Cases
- Breakpoint Security Conference, Pacemaker
Hacking Demonstration (2012)
- BlackHat USA, Insulin Pump Hacking
Demonstration (2013)
Smart Car
 IT component and services are integrated
into automobiles for information gathering
and remote control
 Hacked or Demonstrated Cases
- U.S. EmbeddedSecurityCenterDemonstration(2010)
- Korea University Demonstration (2012)
- BlackHat USA Demonstration (2014)
Smart Energy
 Increasing energy efficiency by managing
information such as SmartGrid, Smart
Buildings
 Hacked or Demonstrated Cases
- Puerto Rico SmartMeter Tempering (2009)
- ‘Dragonfly’ Backdoors in U.S. and Europe Power
Grid Control Systems (2014)
Threats
in a
Hyperconnected
Society
15
/ 25
Cyber Threat Trends
Cyber threat is becoming more intentional, destructive, targeted,
and external in origin
Accidental Intentional
Failure Attack
Random Targeted
Internal Origin External Origin
Technical Human
Source : Korea Internet & Security Agency
16
/ 25
Cyber-related threats are selected as a high-priority risk factor in the “Global Risks
Report 2016” published by the World Economic Forum (World Risk) in Jan., 2016
Source : World Economic Forum
Global Risk Report 2016
- About 750 experts in each area selected global
risks that can affect the world economy based on
likelihood and impact
- Among the 29 global risks presented, technological
threats include adverse consequences of
technological advancement, breakdown of critical
information infrastructure, cyber attacks, and data
fraud and theft
- As dependency on cyber increases, the likelihood
and impact of risk related to cyber were rated
significantly high; risk connectivity and mutual
impact with other major threats were rated highly
as well
- The evaluation suggests that cyber attacks can
affect the economy considerably, and that the
financial industry is required to have the response
capability and level matching the risk level
Cyber Threat Trends
17
/ 25
International Cooperation
International cooperation ha are being developed, yet the outcome of
cooperation is insufficient to countering cyber threats
 Cooperation between two States that have common interests
e.g.) US – China Cyber Working Group
Bilateral
Cooperation
 Cooperation among States in the region
e.g.) ASEAN Regional Forum
Regional
Cooperation
 Cooperation through International Organizations e.g.) UN GGE
 Conventions, Treaties or Laws e.g.) Convention on Cybercrime
International
Cooperation
 Cooperation in Military or National Defense Aspects
e.g.) NATO Cooperative Cyber Defense Centre of Excellence
EU Cyber Defence Policy Framework
ANZUS Treaty applies to Cyber attacks
China - Russia Non Aggression Pact for Cyberspace
Military
Aspect
Cooperation
18
/ 25
International Cooperation
Budapest Convention on Cybercrime came into force in 2001, which includes
substantial/procedural articles of cybercrime regulation and international
cooperation procedure
< Status as of May, 2016 >< Major Implications>
• The First legally-binding international
instrument to comprehensively
address the cybercrime issues
• Scope of the Convention
- Criminalising Conduct
: Illegal Activities / Fraud / Interference /
Child Pornography / etc.
- Procedural tools
: Preservation / Search and Seizure /
Interception of Data
- International Cooperation
: Mutual Legal Assistance Treaties, Point of
Contact
49 13
68
6
19
/ 25
International Cooperation
Seoul Framework on ‘Seoul Conference on Cyberspace 2013’ , UN GGE
Recommendations & Reports can be the base of international cooperation
< Seoul Framework > < UN GGE Report A/70/174 >
• Cyberspace
- Economic Growth, Social and Cultural Benefits
• International Security
- Promote voluntary confidence-building and
transparency measures
• Cybercrime
- Law enforcement cooperation in the investigation
and prosecution of international cases
• Capacity Building
- Enhance efforts to close the digital divide
• Responsible behaviour of States
- Voluntary, non-binding norms of responsible
State behaviour
• Confidence-building measures
- Adopt existing Guidelines for CBM
• ICT Security Capacity-Building
- International community to work together for assistance
• International Law applies to Cyberspace
- The adherence by States to international law is
an essential framework
20
/ 25
Capacity Building
Effort to build capacity to defend one’s own cyberspace
Governance,
Role & Responsibility
 Setting a national cyber security
governance framework
 Identify the role and jurisdiction
of each agency within the cyber
security governance structure
Research & Development
 Acquisition of various cyber security
technologies
- Digital forensic and cyber
investigation tools
- Cyber genome or cyber map
- Count cyber threat technologies
Education
 Cultivating and securing cyber
security experts is key to promoting
national cyber security
- Cyber education for teens
- Cyber security department in
university
- Training course for employees
Cooperation
 State-level cooperation
- Inter-agency cooperation
- Public-private partnership
 International-level cooperation
- International organizations, Conventions
or cooperation between States
Cyber
Security
Capacity
Building
21
/ 25
Conclusion
To deter the rapid growth of cyber threats, it is important for each State
to build its own capacities and yet cooperate internationally
Each State’s Effort to Deter Cyber Threats
Evolving Cyber Threats Increasing Dependence on ICT
· Cyber threats are getting more
sophisticated and targeted
· Cyber threats are one of the most
serious threats that most States face
· New technologies such as IoT, Big
Data and Cloud computing are
being used
· States’ increasing dependence on ICT
International
Cooperation
Capacity
Building
22
/ 2523
FIRST is a multi-stakeholder network participated in by more than 350 CERT teams
in 75 countries, and it can play a key role in global cyber security cooperation.
Conclusion - Possibility of FIRST
/ 25
The achievement and role of FIRST in cyber security and the developmental
direction as a major subject of global cyber security need to be sought
Counter-
Threat
Cooperation
Information
Sharing
Capacity
Building
Private
Public
Partnership
Security
FIRST
Cooperation in responding
to cyber threats
Information sharing such as
infringement status and
exemplary cases related to cyber
infringement and threat
Infringement/Threat
information sharing
Laying the basis for the
private/public cooperation system
as a cooperation organization of
the multi-stakeholder CERT
Basis of private/public
cooperation system
Strengthening the overall cyber
security level by training and
providing technical support to
the less capable CERTs
Support capacity building
Possibility of joint response
based on voluntary cooperation,
if cyber threats occur
Conclusion - Possibility of FIRST
24
Thank you
jilim@korea.ac.kr

More Related Content

PDF
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
PPTX
Cyber terrorism
DOCX
Cyber crime
PPTX
Cyber Crime Investigation
PDF
Countering the Cyber Espionage Threat from China
PDF
Social Engineering 2.0
PPT
DOCX
Final Copy Cyber Crime Research Essay
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
Cyber terrorism
Cyber crime
Cyber Crime Investigation
Countering the Cyber Espionage Threat from China
Social Engineering 2.0
Final Copy Cyber Crime Research Essay

What's hot (20)

PPTX
ppt on child pornography and cyber crime
PPTX
Cybercrime 111205224958-phpapp02
PDF
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
PPT
cyber terrorism
PPTX
Cyberterrorism
PDF
SEO2India - Cyber crime
PDF
Cybercrimes (Against Children)
PPTX
Cyber crime against children
PPT
Protecting children in cyberspace
PPTX
Traditional Problems Associated with Computer Crime
PPT
Learn More About Cyber Crime Investigation
PPT
Hacking
PPT
Cyberterrorismv1
PPTX
Evil Geniuses: How organized cybercriminals could take over the world
PPT
Social Engineering | #ARMSec2015
PPTX
Attacks Types
PPT
Cyber crime and fraud
PPT
Cyber Crime and Security
PPTX
cybercrime landscape for moldova
PPTX
I want to be a cyber forensic examiner
ppt on child pornography and cyber crime
Cybercrime 111205224958-phpapp02
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
cyber terrorism
Cyberterrorism
SEO2India - Cyber crime
Cybercrimes (Against Children)
Cyber crime against children
Protecting children in cyberspace
Traditional Problems Associated with Computer Crime
Learn More About Cyber Crime Investigation
Hacking
Cyberterrorismv1
Evil Geniuses: How organized cybercriminals could take over the world
Social Engineering | #ARMSec2015
Attacks Types
Cyber crime and fraud
Cyber Crime and Security
cybercrime landscape for moldova
I want to be a cyber forensic examiner

Viewers also liked (20)

PDF
The relation between internet of things, critical infrastructure and cyber se...
PPTX
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
PPTX
Current Threat Landscape, Global Trends and Best Practices within Financial F...
PPTX
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
PDF
Ericsson ConsumerLab: Wearable technology and the internet of things
PDF
Flashpoint hacking forisis_april2016
PDF
7 Pillars of Growth Hacking - Chris Out from RockBoost
PDF
Hacker House August Proposal
PDF
rpt-world-eco-forum Final
PDF
Cyber Security in Manufacturing
PPTX
CyberSecurity Medical Devices
PPTX
The Foundations of Social Media Risk Management
PPTX
Hacking Mobile Apps
PDF
CNIT 128 Ch 1: The mobile risk ecosystem
PDF
Wearing safe: Physical and informational security in the age of the wearable ...
KEY
OPSEC for hackers
PPTX
Over-the-air (OTA) updates and the Connected car
PPTX
Security Challenges in Emerging Technologies
PDF
CNIT 128 Ch 2: Hacking the cellular network
DOCX
Ethical hacking
The relation between internet of things, critical infrastructure and cyber se...
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
Current Threat Landscape, Global Trends and Best Practices within Financial F...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
Ericsson ConsumerLab: Wearable technology and the internet of things
Flashpoint hacking forisis_april2016
7 Pillars of Growth Hacking - Chris Out from RockBoost
Hacker House August Proposal
rpt-world-eco-forum Final
Cyber Security in Manufacturing
CyberSecurity Medical Devices
The Foundations of Social Media Risk Management
Hacking Mobile Apps
CNIT 128 Ch 1: The mobile risk ecosystem
Wearing safe: Physical and informational security in the age of the wearable ...
OPSEC for hackers
Over-the-air (OTA) updates and the Connected car
Security Challenges in Emerging Technologies
CNIT 128 Ch 2: Hacking the cellular network
Ethical hacking

Similar to Focus on cyber threats in hacking cycle (20)

PPTX
Cyber warfare Threat to Cyber Security by Prashant Mali
PDF
Fail To Plan
PPT
28658043 cyber-terrorism
PPT
Cyber Wars And Cyber Terrorism
PPTX
Event: George Washington University -- National Security Threat Convergence: ...
PPTX
Cybercrime
PPTX
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
PPTX
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
PDF
Profiling an enigma: The mystery of North Korea’s cyber threat landscape
PPTX
Cyber Wars.pptx
PDF
A Biggest Threat to India – Cyber Terrorism and Crime
PDF
GARRIE.REEVES.37.5
PDF
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
DOCX
Katherine Neal_Written Brief 1
PDF
Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015
PDF
Cyber terrorism fact or fiction - 2011
PDF
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
PPTX
Attack on Sony
PDF
UN Presentation - 10-17-2018 - Maccaglia
PDF
A View Of Cyberterrorism Five Years Later
Cyber warfare Threat to Cyber Security by Prashant Mali
Fail To Plan
28658043 cyber-terrorism
Cyber Wars And Cyber Terrorism
Event: George Washington University -- National Security Threat Convergence: ...
Cybercrime
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Profiling an enigma: The mystery of North Korea’s cyber threat landscape
Cyber Wars.pptx
A Biggest Threat to India – Cyber Terrorism and Crime
GARRIE.REEVES.37.5
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Katherine Neal_Written Brief 1
Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015
Cyber terrorism fact or fiction - 2011
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
Attack on Sony
UN Presentation - 10-17-2018 - Maccaglia
A View Of Cyberterrorism Five Years Later

More from David Sweigert (20)

PDF
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
PDF
Law Enforcement Cyber Incident Reporting
PDF
Sample Network Analysis Report based on Wireshark Analysis
PDF
National Cyber Security Awareness Month poster
PDF
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
PDF
National Cyber Security Awareness Month - October 2017
PDF
California Attorney General Notification Penal Code 646.9
PDF
Congressional support of Ethical Hacking and Cyber Security
PDF
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
PDF
Application of Racketeering Law to Suppress CrowdStalking Threats
PDF
Canada Communications Security Establishment - Threat Vector Chart
DOCX
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
PDF
Cyber Incident Response Team NIMS Public Comment
PDF
Cyber Incident Response Team - NIMS - Public Comment
PDF
National Incident Management System (NIMS) NQS DRAFT
PDF
National Incident Management System - NQS Public Feedback
DOCX
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
PDF
National Preparedness Goals 2015 2nd edition
PDF
Healthcare Sector-wide Disaster Prepardness Plan
PDF
Cyber Risk Assessment for the Emergency Services Sector - DHS
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
Law Enforcement Cyber Incident Reporting
Sample Network Analysis Report based on Wireshark Analysis
National Cyber Security Awareness Month poster
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
National Cyber Security Awareness Month - October 2017
California Attorney General Notification Penal Code 646.9
Congressional support of Ethical Hacking and Cyber Security
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
Application of Racketeering Law to Suppress CrowdStalking Threats
Canada Communications Security Establishment - Threat Vector Chart
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team - NIMS - Public Comment
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System - NQS Public Feedback
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
National Preparedness Goals 2015 2nd edition
Healthcare Sector-wide Disaster Prepardness Plan
Cyber Risk Assessment for the Emergency Services Sector - DHS

Recently uploaded (20)

PPTX
Inferenceahaiajaoaakakakakakakakakakakakakaka
DOCX
Alexistogel: Solusi Tepat untuk Anda yang Cari Bandar Toto Macau Resmi
PDF
2025 Shadow report on Ukraine's progression regarding Chapter 29 of the acquis
PDF
Creating Memorable Moments_ Personalized Plant Gifts.pdf
PPTX
sepsis.pptxMNGHGBDHSB KJHDGBSHVCJB KJDCGHBYUHFB SDJKFHDUJ
PDF
ISO-9001-2015-internal-audit-checklist2-sample.pdf
PDF
Item # 3 - 934 Patterson Final Review.pdf
PDF
The Detrimental Impacts of Hydraulic Fracturing for Oil and Gas_ A Researched...
PPTX
SOMANJAN PRAMANIK_3500032 2042.pptx
PPTX
Portland FPDR Oregon Legislature 2025.pptx
PPTX
Vocational Education for educational purposes
PDF
Population Estimates 2025 Regional Snapshot 08.11.25
PPTX
Social_Medias_Parents_Education_PPT.pptx
PDF
ISO-9001-2015-gap-analysis-checklist-sample.pdf
PPTX
DFARS Part 249 - Termination Of Contracts
PPTX
Introduction_to_the_Study_of_Globalization.pptx
PPTX
26.1.2025 venugopal K Awarded with commendation certificate.pptx
PPTX
GSA Q+A Follow-Up To EO's, Requirements & Timelines
PPT
generalgeologygroundwaterchapt11-181117073208.ppt
PDF
Item # 4 -- 328 Albany St. compt. review
Inferenceahaiajaoaakakakakakakakakakakakakaka
Alexistogel: Solusi Tepat untuk Anda yang Cari Bandar Toto Macau Resmi
2025 Shadow report on Ukraine's progression regarding Chapter 29 of the acquis
Creating Memorable Moments_ Personalized Plant Gifts.pdf
sepsis.pptxMNGHGBDHSB KJHDGBSHVCJB KJDCGHBYUHFB SDJKFHDUJ
ISO-9001-2015-internal-audit-checklist2-sample.pdf
Item # 3 - 934 Patterson Final Review.pdf
The Detrimental Impacts of Hydraulic Fracturing for Oil and Gas_ A Researched...
SOMANJAN PRAMANIK_3500032 2042.pptx
Portland FPDR Oregon Legislature 2025.pptx
Vocational Education for educational purposes
Population Estimates 2025 Regional Snapshot 08.11.25
Social_Medias_Parents_Education_PPT.pptx
ISO-9001-2015-gap-analysis-checklist-sample.pdf
DFARS Part 249 - Termination Of Contracts
Introduction_to_the_Study_of_Globalization.pptx
26.1.2025 venugopal K Awarded with commendation certificate.pptx
GSA Q+A Follow-Up To EO's, Requirements & Timelines
generalgeologygroundwaterchapt11-181117073208.ppt
Item # 4 -- 328 Albany St. compt. review

Focus on cyber threats in hacking cycle

  • 1. Security FIRST - International Cooperation in Cyber Security - School of Information Security, Korea University former Special Adviser to the President for National Security Lim, Jong In 2015.06.13. FIRST
  • 2. / 25 $81 million dollar deposit was stolen via a forged message instructing that some of the Bangladesh Central Bank’s deposit in the Federal Reserve Bank of New York should be transferred Recent Issues – SWIFT Hacking Bangladesh Cyber Theft  Feb. 2016. Hackers stole $81 million from the Bangladesh Central Bank’s official account at the Federal Reserve Bank of New York  New York Fed announced that the transfer of the money had been “fully authenticated” by SWIFT(international financial messaging system)  Bangladesh's central bank was vulnerable to hackers because it did not have a firewall and used second- hand, $10 switches for network computers connected to SWIFT Source : NYT, Reuter 2
  • 3. / 25 Continuous hacking attempts against SWIFT and assumed mastermind  According to the malicious code analysis by IssueMakersLab in Korea, the file deletion function codes of the following malicious codes are similar, making us assume that the attacks were launched by the same group: - February 2016 :Bangladesh Central Bank - December 2015 : Vietnam’s Commercial Bank - November 2014 : Sony Pictures - June 2013: Press in Korea  Since the analysis results of Symantec also show high similarity to the Sony Pictures malicious code, North Korea is assumed to be the mastermind There were SWIFT hacking attempts against 8 banks besides Bangladesh Central Bank. The incident is believed to be the work of North Korean hackers, judging from the similarity of the malicious code to that in the Sony Pictures hacking incident. 3 Recent Issues – SWIFT Hacking
  • 4. / 25 Korea is experiencing a social problem due to the spread of ransomware that exploits the vulnerability of major online community advertising banners Spread of ransomware targeting online communities in Korea  Distributing ransomware among major online communities in Korea - Crypt0L0cker randomware was distributed on Clien.net in April 2015 - UltraCrypter randomware was distributed on PPOMPPU.co.kr in June 2016  Both sites are representative online communities in Korea (ranked 12th and 13th in web traffic volume), and several hundred million worth of damages were reported  Both malicious codes require BitCoin deposit, and it is difficult to respond due to difficulty in tracing back  Since BitCoin deposit is not confirmed for UltraCrypter, recovery is expected to be impossible Recent Issues - Ransomware 4
  • 5. / 25 Korea is the third affected countries of the LOCKY ransomware Recent Issues - Ransomware 5 Source : FireEye
  • 6. / 25 Sony Pictures Entertainment was hacked before its release of ‘The Interview’, a movie that plans to assassinate North Korea’s leader Overview of the Sony Pictures Hacking • Sony Pictures Entertainment’s internal system was breached and some of its data was leaked in November, 2014. • Leaked data includes, among others: - personal information of employees - e-mails among employees - information on executive salaries - copies of unreleased Sony films • The hackers called themselves the "Guardians of Peace" and demanded the planned release of the film ‘The Interview’, a comedy on a plot to assassinate North Korean leader Kim Jong-un, be cancelled 6 Recent Issues – Sony Pictures
  • 7. / 25 The U.S. attributed the Sony Picture hack to North Korea, calling it ‘Cyber Vandalism,’ and took a series of actions in response U.S. Government’s Reaction • On December 19th, 2014, F.B.I. published an investigative report on the hack, in which it identified North Korea as the perpetrator • President Obama called the hack ‘Cyber Vandalism’ and claimed that the U.S. weighed proportionate response to the attack • North Korean websites were shut down, allegedly by cyber attacks orchestrated by the U.S. • President Obama sanctioned North Korea’s Directorate of Reconnaissance 7 Recent Issues – Sony Pictures
  • 8. / 25 Korea Hydro & Nuclear Power(KHNP) was threatened to be destroyed by a hacker who claimed to have hacked its control system KHNP Hacking Overview  In December 2014, a hacker who claimed to be against nuclear power development posted some of KHNP’s confidential data on his internet blog  The hacker claimed that he had breached into KHNP’s internal control system and threatened that he would destroy KHNP’s nuclear power plants unless it shut them down itself  Investigation by South Korean government and KHNP found no evidence of intrusion into KHNP’s control system. There has not been any cyber attack on the Nuclear Power plant thereafter Recent Issues – KHNP 8
  • 9. / 25 South Korean government’s investigation unit alleged North Korea of having perpetrated the hack with a Chinese IP address South Korean Government’s Reaction  On December 20th, 2014, a government team was assembled to probe into the hack  The team found that the hacker had accessed VPN in South Korea via proxy IP address in Shenyang, China. Having failed to hack KHNP directly, the hacker sent phishing emails to partners of KHNP and retired employees  On December 24th, 2014, the investigation team requested cooperation from the Chinese Police  On March 17th, 2015, the government team presented an interim probe result, which suggested that North Korea had orchestrated the hack Hacker in North Korea VPN in South Korea Access via Proxy IP Address in Sunyang, China Hacking Failed (Sent 6,000 Phishing Emails) Hacked partners of KHNP and retired employee’s of KHNP Used vulnerabilities of Hangul (Wordprocessor) 9 Recent Issues – KHNP
  • 10. / 25 Case of South Korea - Cyber Threats that S.Korea faces South Korea has had numerous cyber attacks since 2009, but failed to identify and prosecute suspects for any of the attacks Year Cyber attacks on S.Korea 2003  1.25 Internet Intrusion : Korea's major internet networks went down due to the Slammer Worm taking advantage of vulnerabilities of Microsoft's SQL servers 2009  7.7 DDoS Attack : Three DDoS attacks from July 7th to 10th paralyzed the major government sites including website of the Presidential Office 2010 2012  GPS Disturbance : From 2010 to 2012, GPS disturbance occurred annually, causing signal interference and damage to GPS receivers in private and military sectors, including those in Korea Telecom's base stations 2011  3.4 DDoS Attack : DDoS attacks on 40 local websites, including those of major portals, government offices, the Ministry of National Defense and financial institutions 2011  NH Bank's Cyber Terror : NH Bank's internal data and server system were damaged. Service access paralyzed entirely or partially 2013  3.20 Cyber Terror : Major local broadcasters' and six financial institutions' computer networks went down 2013  6.25 Cyber Terror : The Presidential Office website, major government websites, media and political parties’ websites were under cyber attacks 2014  Hacking on KHNP : KHNP's blueprints and operating methods for nuclear power stations were leaked on the internet ~ 10
  • 11. / 25 South Korea established a comprehensive national system to counter cyber threats, controlled and coordinated by the Presidential Office Case of South Korea – Countering Cyber Threats Presidential Office National Security Council National Cyber Defense Secretary to the President for National Cyber Security National Cyber Security Center Ministry of Defense Cyber Crime National Police Agency Cyber Security for Civil Sector Ministry of Science, ICT and Future Planning Privacy, Cyber Security For Public Sector Ministry of Gov Administration and Home Affairs Cyber Terror, CIP National Intelligent Service 11
  • 12. / 25 While receiving cyber attacks continuously, the Korean government is endeavoring to strengthen national cyber security continuously by setting up strategies and plans to respond to such cyber attacks • Recognized the necessity of responding to information security issues including personal information protection due to the Auction hacking incident in 2008 • Aimed to establish a social safety network by improving policies and building infrastructure by 2010 • It was recognized that a cyber attack can threaten national security due to the 7.7 DDoS attack in 2009 • Obtained good results, such as establishment of the cyber security government system and definition of roles and responsibilities by department • Recognized the necessity of an effective response method due to the 3.4 DDoS Incident and Nonghyup Computer Problems in 2011 • Obtained good results, such as awareness improvement, outsourcing company management, and implementation of the S/W security vulnerability diagnosis system • Recognized the necessity of integrating cyber capabilities distributed among government departments due to the 3.20 and 6.25 Cyber Terror • Established the organizational structure (the Blue House plays the role of control tower, and the National Intelligence Service supervises hands-on work) and prepared personnel fostering plans • Recognized the necessity of protecting cyberspace safely following the Korea Hydro & Nuclear Power hacking incident • Strengthened the cyber security control tower function of the National Security Office, newly established a dedicated pan-government cyber security organization Mid-term comprehensive information security plan (2008) Comprehensive measures against the national cyber crisis (2009) National cyber security master plan (2011) Comprehensive national cyber security measures (2013) National cyber security posture and capability strengthening plan (2015) Case of South Korea – Countering Cyber Threats 12
  • 13. / 25  High volume, high velocity, high variety information assets that require new forms of processing to make more meaningful information  Data Volume : 2.7 ZB (2012) → 7.9 ZB (2015)  Model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources  IaaS(Infra), PaaS(Platform), SaaS(Service)  Network of physical objects or "things" embedded in electronics, software, sensors and connectivity  26 billion devices on the IoT by 2020 (Gartner)  Wearable Devices, Smart Car, etc. ICT Development and Evolving Cyber Threats As ICT development begets new technologies such as IoT, Big Data, and Cloud Computing ICT Development Connection Personalized Data Digitalized Convergence IoT Cloud Computing Big Data 13
  • 14. / 25 ICT Development and Evolving Cyber Threats European Commission’s Next Generation Computing predicts that ICT will evolve to IoT Environment through Embedded system and CPS Vision : Internet of Things, Data & Services (e.g. Smart Cities) Cyber-Physical Systems (e.g. Intelligent Networked Road Junction) Network Embedded System (e.g. Autonomous Aviation) Embedded Systems (e.g. AirBag) Source : NGC Study, 2013, EUTEMA 14
  • 15. / 25 ICT Development and Evolving Cyber Threats In a hyperconnected society where various new ICT applications are adopted, threats to the new applications are anticipated Smart Home Appliance  ICT added home appliances for remote control and efficiency, and convenience  Hacked or Demonstrated Cases - Refrigerator hacked to send spam emails (2014) - Philips LED Lighting hacking demonstration (Dhanjani, 2013) - Web Camera Exposed (BBC, 2014) Smart Healthcare  Using body-measured information by using wearable devices and medical equipment  Hacked or Demonstrated Cases - Breakpoint Security Conference, Pacemaker Hacking Demonstration (2012) - BlackHat USA, Insulin Pump Hacking Demonstration (2013) Smart Car  IT component and services are integrated into automobiles for information gathering and remote control  Hacked or Demonstrated Cases - U.S. EmbeddedSecurityCenterDemonstration(2010) - Korea University Demonstration (2012) - BlackHat USA Demonstration (2014) Smart Energy  Increasing energy efficiency by managing information such as SmartGrid, Smart Buildings  Hacked or Demonstrated Cases - Puerto Rico SmartMeter Tempering (2009) - ‘Dragonfly’ Backdoors in U.S. and Europe Power Grid Control Systems (2014) Threats in a Hyperconnected Society 15
  • 16. / 25 Cyber Threat Trends Cyber threat is becoming more intentional, destructive, targeted, and external in origin Accidental Intentional Failure Attack Random Targeted Internal Origin External Origin Technical Human Source : Korea Internet & Security Agency 16
  • 17. / 25 Cyber-related threats are selected as a high-priority risk factor in the “Global Risks Report 2016” published by the World Economic Forum (World Risk) in Jan., 2016 Source : World Economic Forum Global Risk Report 2016 - About 750 experts in each area selected global risks that can affect the world economy based on likelihood and impact - Among the 29 global risks presented, technological threats include adverse consequences of technological advancement, breakdown of critical information infrastructure, cyber attacks, and data fraud and theft - As dependency on cyber increases, the likelihood and impact of risk related to cyber were rated significantly high; risk connectivity and mutual impact with other major threats were rated highly as well - The evaluation suggests that cyber attacks can affect the economy considerably, and that the financial industry is required to have the response capability and level matching the risk level Cyber Threat Trends 17
  • 18. / 25 International Cooperation International cooperation ha are being developed, yet the outcome of cooperation is insufficient to countering cyber threats  Cooperation between two States that have common interests e.g.) US – China Cyber Working Group Bilateral Cooperation  Cooperation among States in the region e.g.) ASEAN Regional Forum Regional Cooperation  Cooperation through International Organizations e.g.) UN GGE  Conventions, Treaties or Laws e.g.) Convention on Cybercrime International Cooperation  Cooperation in Military or National Defense Aspects e.g.) NATO Cooperative Cyber Defense Centre of Excellence EU Cyber Defence Policy Framework ANZUS Treaty applies to Cyber attacks China - Russia Non Aggression Pact for Cyberspace Military Aspect Cooperation 18
  • 19. / 25 International Cooperation Budapest Convention on Cybercrime came into force in 2001, which includes substantial/procedural articles of cybercrime regulation and international cooperation procedure < Status as of May, 2016 >< Major Implications> • The First legally-binding international instrument to comprehensively address the cybercrime issues • Scope of the Convention - Criminalising Conduct : Illegal Activities / Fraud / Interference / Child Pornography / etc. - Procedural tools : Preservation / Search and Seizure / Interception of Data - International Cooperation : Mutual Legal Assistance Treaties, Point of Contact 49 13 68 6 19
  • 20. / 25 International Cooperation Seoul Framework on ‘Seoul Conference on Cyberspace 2013’ , UN GGE Recommendations & Reports can be the base of international cooperation < Seoul Framework > < UN GGE Report A/70/174 > • Cyberspace - Economic Growth, Social and Cultural Benefits • International Security - Promote voluntary confidence-building and transparency measures • Cybercrime - Law enforcement cooperation in the investigation and prosecution of international cases • Capacity Building - Enhance efforts to close the digital divide • Responsible behaviour of States - Voluntary, non-binding norms of responsible State behaviour • Confidence-building measures - Adopt existing Guidelines for CBM • ICT Security Capacity-Building - International community to work together for assistance • International Law applies to Cyberspace - The adherence by States to international law is an essential framework 20
  • 21. / 25 Capacity Building Effort to build capacity to defend one’s own cyberspace Governance, Role & Responsibility  Setting a national cyber security governance framework  Identify the role and jurisdiction of each agency within the cyber security governance structure Research & Development  Acquisition of various cyber security technologies - Digital forensic and cyber investigation tools - Cyber genome or cyber map - Count cyber threat technologies Education  Cultivating and securing cyber security experts is key to promoting national cyber security - Cyber education for teens - Cyber security department in university - Training course for employees Cooperation  State-level cooperation - Inter-agency cooperation - Public-private partnership  International-level cooperation - International organizations, Conventions or cooperation between States Cyber Security Capacity Building 21
  • 22. / 25 Conclusion To deter the rapid growth of cyber threats, it is important for each State to build its own capacities and yet cooperate internationally Each State’s Effort to Deter Cyber Threats Evolving Cyber Threats Increasing Dependence on ICT · Cyber threats are getting more sophisticated and targeted · Cyber threats are one of the most serious threats that most States face · New technologies such as IoT, Big Data and Cloud computing are being used · States’ increasing dependence on ICT International Cooperation Capacity Building 22
  • 23. / 2523 FIRST is a multi-stakeholder network participated in by more than 350 CERT teams in 75 countries, and it can play a key role in global cyber security cooperation. Conclusion - Possibility of FIRST
  • 24. / 25 The achievement and role of FIRST in cyber security and the developmental direction as a major subject of global cyber security need to be sought Counter- Threat Cooperation Information Sharing Capacity Building Private Public Partnership Security FIRST Cooperation in responding to cyber threats Information sharing such as infringement status and exemplary cases related to cyber infringement and threat Infringement/Threat information sharing Laying the basis for the private/public cooperation system as a cooperation organization of the multi-stakeholder CERT Basis of private/public cooperation system Strengthening the overall cyber security level by training and providing technical support to the less capable CERTs Support capacity building Possibility of joint response based on voluntary cooperation, if cyber threats occur Conclusion - Possibility of FIRST 24