0% found this document useful (0 votes)
265 views36 pages

Presentation State of Cyber Security in Myanmar

The document discusses Kernellix Co., Ltd., a cybersecurity firm that provides penetration testing, vulnerability assessment, security engineering, and incident response services. It also mentions the founder's skills in Java, C#, Python, and experience in IT, software development, and cybersecurity.

Uploaded by

Dark Web
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
265 views36 pages

Presentation State of Cyber Security in Myanmar

The document discusses Kernellix Co., Ltd., a cybersecurity firm that provides penetration testing, vulnerability assessment, security engineering, and incident response services. It also mentions the founder's skills in Java, C#, Python, and experience in IT, software development, and cybersecurity.

Uploaded by

Dark Web
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

TLP:WHITE : Kernellix Co., Ltd.

• Penetration Testing, Vulnerability Assessment (aka red team)


• Security Engineering, Monitoring and Response (aka blue team)
• Founder/Principal Analyst of a Cybersecurity Firm

• Java, c#, python

• IT, Software Development, Cybersecurity

TLP:WHITE : Kernellix Co., Ltd.


TLP:WHITE : Kernellix Co., Ltd.
https://www.verizonenterprise.com/resources/reports/rp_DBIR_2018_Report_execsummary_en_xg.pdf

TLP:WHITE : Kernellix Co., Ltd.


https://www.verizonenterprise.com/resources/reports/rp_DBIR_2018_Report_execsummary_en_xg.pdf

TLP:WHITE : Kernellix Co., Ltd.


https://www.verizonenterprise.com/resources/reports/rp_DBIR_2018_Report_execsummary_en_xg.pdf

TLP:WHITE : Kernellix Co., Ltd.


https://www.verizonenterprise.com/resources/reports/rp_DBIR_2018_Report_execsummary_en_xg.pdf

TLP:WHITE : Kernellix Co., Ltd.


https://www.verizonenterprise.com/resources/reports/rp_DBIR_2018_Report_execsummary_en_xg.pdf

TLP:WHITE : Kernellix Co., Ltd.


TLP:WHITE : Kernellix Co., Ltd.
The lack of broadband connectivity also affects the amount of
cybercrime—one official we interviewed said that once a country gets
broadband connectivity, usually without adequate defenses,
cybercrime spikes within a few days.

http://www.mcafee.com/ca/resources/reports/rp-economic-impact-cybercrime2.pdf

TLP:WHITE : Kernellix Co., Ltd.


DEFINITION
Business E-mail Compromise (BEC)/E-mail Account Compromise
(EAC) is a sophisticated scam targeting both businesses and
individuals performing wire transfer payments.

The scam is frequently carried out when a subject compromises


legitimate business e-mail accounts through social engineering or
computer intrusion techniques to conduct unauthorized transfers
of funds.

The scam may not always be associated with a request for


transfer of funds. A variation of the scam involves compromising
legitimate business e-mail accounts and requesting Personally
Identifiable Information (PII) or Wage and Tax Statement (W-2)
forms for employees.1

https://www.ic3.gov/media/2018/180712.aspx
TLP:WHITE : Kernellix Co., Ltd.
Most of the BEC scams in Myanmar are not reported.

Lost ranging from USD 10,000 to USD 500,000 per scam

https://www.ic3.gov/media/2018/180712.aspx
TLP:WHITE : Kernellix Co., Ltd.
TLP:WHITE : Kernellix Co., Ltd.
TLP:WHITE : Kernellix Co., Ltd.
TLP:WHITE : Kernellix Co., Ltd.
• Lucky draw pages
• Like and Share

• Few isolated cases leading physical and psychology harm

• Racial, Religious, Politics

• Celebrities accounts, Sextortion


TLP:WHITE : Kernellix Co., Ltd.
TLP:WHITE : Kernellix Co., Ltd.
TLP:WHITE : Kernellix Co., Ltd.
TLP:WHITE : Kernellix Co., Ltd.
TLP:WHITE : Kernellix Co., Ltd.
DMZ 3 Server Farm Corporate Network
UAT Server Network Storage Server CEO Laptop
192.168.100.110 172.80.80.110 5 172.90.90.1

4
2 Email Server Active Directory Server
CIO Laptop
192.168.100.209 172.80.80.120
172.90.80.1

Corporate Website
Accounts Database Server
192.168.100.201 HR Manager Laptop
172.80.80.130
172.90.80.1

Switches / Routers Switches / Routers Switches / Routers


192.168.100.1 172.80.80.1 172.90.80.1

Corporate Network
Data Center Firewall
192.168.100.250
203.000.000.000
1
Attack Map
1. Low Hanging Fruits
2. Pivot
3. Credentials Dumping
4. High Value Assets
5. Target Assets
TLP:WHITE : Kernellix Co., Ltd.
protect detect respond

people process technology

confidentiality integrity availability

TLP:WHITE : Kernellix Co., Ltd.


• Shortage of job opportunities

• At least for the local skilled professionals

TLP:WHITE : Kernellix Co., Ltd.


• Oblivious to common online safety measures
• Vulnerable to social engineering attacks

TLP:WHITE : Kernellix Co., Ltd.


• Respect for own or other privacy

TLP:WHITE : Kernellix Co., Ltd.


TLP:WHITE : Kernellix Co., Ltd.
• Banking
• Telecommunication
• Internet Service Providers
• Online services

TLP:WHITE : Kernellix Co., Ltd.


• Board of Director and Senior Management accountability for Risk Management

• IT Security Awareness

• Technology Risk management Framework

• IT Service Management

• Reliability, Availability and Recoverability


• BCP

• Security Monitoring
• Real-time monitoring capacity (24/7)

• Security Testing
• Annual Penetration Testing

TLP:WHITE : Kernellix Co., Ltd.


• Must implement process and framework to identify critical system

• Maximum of
• unscheduled downtime 4 hours per annum

• Upon system failure


• Recovery Time Objective (RTO) less than 4 hours

• For each incidents


• Notification to authority in 60 minutes
• Root cause and business impact analysis in 14 days

TLP:WHITE : Kernellix Co., Ltd.


• To guide organizations of all size and industry to build Information Security Management System
(ISMS) or information security program

• Formerly British Standard 7799 (BS7799)

• Contains series of documents (guides) for organizations to follow to implement ISMS

• ISO 27001: General Requirement


• The most common of ISO 27000 series

• Per typical ISO implementation


• Implementation (Usually Consulting, Third Party Assisted)
• Third Party Auditing and Certification

• ISO 27015: Financial Sector

TLP:WHITE : Kernellix Co., Ltd.


• The newest and the most recent framework
• 2018

• Originally to improve critical infrastructure cybersecurity


• 16 sectors per US DHS
• Financial services, telecommunication, electricity generation, water supply and etc.

• Vendor neutral
• No compliance, No Certification
• Ideal Self assessment tools
• Free

• Consists of Three Parts:


• Framework Core
• Framework Profile
• Framework Implementation Tiers

TLP:WHITE : Kernellix Co., Ltd.


• Informed by real world attacks
• Developed by global communities
• ASD 35 Mitigation Strategies is the Australian counter part
• Align with top compliance frameworks

• Block initial compromise


• Address detection
• Disruption attackers objectives

• First 5 controls (claims to) deter 85% of cyber attacks

TLP:WHITE : Kernellix Co., Ltd.


• Aka traditional defense

Firewall – NGFW Intrusion Detection


Minimize Administrative Privilege Account Monitoring
Antivirus Incident Response
Patching Regular log review
Network segmentation Lateral Movement Detection

Prevention and detection controls are not mutually exclusive


TLP:WHITE : Kernellix Co., Ltd.
Legend
EPP : Endpoint Protection
NGFW: Next Generation Firewall
SIEM: Security Information Event Management
EDR: Endpoint Detection and Response
TLP:WHITE : Kernellix Co., Ltd.
• Threat actors both domestic and foreign are targeting Myanmar business

• Lack of resources, regulations and guidelines

• Learn and adopt suitable tools

TLP:WHITE : Kernellix Co., Ltd.


TLP:WHITE : Kernellix Co., Ltd.

You might also like