Professional Documents
Culture Documents
Federal-National Security
Federal-National Security
“Cyber security is a ‘Trust’ issue & trust is what “There are only two types of companies,
customers, regulators and citizens want “ Those that have been hacked & those that will be“
Election Systems Cyber Threats
Voter Data Manipulation: Social Media Threats:
Access and change voter Creating paranoia and
Ransomware: registration databases in advance. anarchy through false
Attack that freezes up threats. Day-of-Vote Interruption:
local voter databases. problems with the devices’
connectivity, underlying voter
data & check-in challenges
Actual Vote Manipulation: slowing vote count.
Changing digital vote counts.
o Malware
o Insider Threats
o Social Engineering
The Solution:
A combination of behavioural analysis tools,
blacklisting, and in-memory active protection to
prevent attacks.
Employee
End Point
Security Email Security
Security
Awareness
Open-Source Intelligence(OSINT)
To collect, collate, analyze and disseminate information to LEAs on any given identified threat to National Security.
Leverage coverage of dark web sources to gain visibility & Identify threat actors.
Govt & Telecom Security Services Contd…
Communication Model.
Communication to and from the handler should
take place through three of four intermediate
offshore hops.
WhatsApp
Text messages
Calls - audio available only WeChat
Attack Propagation
Historian Info Server DLL injection
Buffer error Installs RAT
Level 3 DLL Injection
Opens backdoor
DLL injection Pivots to other for remote C&C
Operations machines
Hijacks control
Opens backdoor
Privilege escalation Pivots to OT
Memory attack Network
Local Deposits Trojan Pivots to sensitive
HMI SCADA OT Network (Eternal Blue) Finds more OT machines Pivots to
Level 2 Pivot to other
Corrupts registry Rogue processes vulnerabilities engineering
machines in OT Discovers workstations
Process Network Discovers ICS
Installs drivers Encrypts files controllers
for ransom systems
Attack Surface
Cloud
Infrastructure
Brand
01 02 03 04 05
Darkweb and Open Cybercrime Attack Surface Brand Reputations Third Party Cyber
Internet Monitoring Detection Monitoring Scoring
Intelligence and Hunting
Identify key Detailed reports on Detect imprecise Assess the cyber risks
Discover unknown
cybersecurity events 400+ threat actors domains, malware associated with your
vulnerable assets such
collected from 15 Bn+ and their TTPs, 700+ campaigns related 3rd parties
as exposed objects,
pages on the Internet malware operations. to an organization
code leakages and
and 120 Bn data 35+ Cybercrime associated risks
points from darkweb markets monitored
Digital Brand Management: Social Media Analytics