Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Hacktivism: Motivations, Tactics and Threats

1,342 views

Published on

Presented at the Republican National Convention Hacktivism Summit on November 6, 2015 by Eric Vanderburg, Director of Cybersecurity at JURINNOV.

Published in: Technology
  • Very nice tips on this. In case you need help on any kind of academic writing visit website ⇒ www.HelpWriting.net ⇐ and place your order
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Check the source ⇒ www.WritePaper.info ⇐ This site is really helped me out gave me relief from headaches. Good luck!
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Have u ever tried external professional writing services like ⇒ www.HelpWriting.net ⇐ ? I did and I am more than satisfied.
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Hacktivism: Motivations, Tactics and Threats

  1. 1. © 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015 Hacktivism Summit November 6, 2015 Hacktivism Motivations, Tactics, and Threats Eric Vanderburg Director of Cybersecurity, JURINOV eav@jurinnov.com @evanderburg (216) 664-1100
  2. 2. © 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015 Where are we and how did we get here? • Technology makes it easier to disseminate a wide variety of ideologies – Some have caught on: • Freedom of information • Government and organizational distrust • Anonymity of the Internet • Disparity between resources required to attack vs defend
  3. 3. © 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015 How did we get here? • Dark web – skills now optional Image above retrieved from Deepdotweb.com today
  4. 4. © 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015 Hacktivism defined • Hacking to promote a political agenda, religious belief or social ideology. – Political – Religious – Social ideology • Human rights • Free speech • Freedom of information • Hacking “clothed” in moral attire • The morality is subjective
  5. 5. © 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015 Real world comparisons Cyber • Website defacement and redirection • Negative SEO • Denial of Service • Information disclosure Real world (AFK*) • Graffiti on corporate building • Picketing • Sit in / occupy protest • Whistleblowing *Peter Sunde interview for Pirate Bay AFK film
  6. 6. © 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015 How is hacktivism different? • It’s not about monetization – Defense cannot be based on cost to exploit • Hacktivists are willing to spend months on a hack
  7. 7. © 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015 LulzSec (Lulz Security) • Infragard • US Senate • CIA • FBI Cybercrime conference call • Group retired in 2011 • Some members arrested
  8. 8. © 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015 Anonymous • International network of hacktivists • Originated in 2003 • No Leadership • Released names of supposed KKK members to pastebin yesterday
  9. 9. © 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015 Edward Snowden • Published NSA files on phone record collection in 2013 • Charged with espionage Who is your Snowden?
  10. 10. © 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015 Wikileaks • Site that publishes secret information, classified files, and news leaks from anonymous sources
  11. 11. © 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015 Pastebin • Public data repository • Anonymous posting allowed • Commonly find hacker loot and malicious code or copyright infringement source code
  12. 12. © 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015 Stratfor • “Freedom of Information” hack • Hacktivists upset that makes some information public but other information available only to specific clients • Published emails on wikileaks • Result to Stratfor: – PR cost and effort – Rebuild customer relationships
  13. 13. © 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015 Tactics • DDoS • Most common hacking methods • Negative SEO – Google bombing – associate negative keywords with your name – Utilize penalized SEO tactics on your sites / social media • Email flooding • Fax spam • Phishing, Spam and SPIM
  14. 14. © 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015 Action items • Assess PR statements for hacktivism risk • FBI warns law enforcement to limit social media use • You can’t throw money at this problem -- it requires cultural change – Assess your culture • Background checks and personality profiling • Pen test including social engineering
  15. 15. © 2015 JurInnov, Ltd. All Rights Reserved Hacktivism Summit – November 6, 2015 Q&A Don’t be shy…

×