SlideShare a Scribd company logo
1 of 71
Agenda
• USSS Dual Mission – Protection/Investigation
• USSS Resources and Assets to Combat Cyber Crime
• Current Trends in Cyber Crime
– Skimming Technology
– Network Intrusions
– Point of Sale
– Targeted Malware
– Data Breaches
• Network Intrusion Case Study
Dual Mission - Protection
•President
•Vice-President
•Former Presidents
•Foreign Heads of State
•Major Candidates
•Others as designated
Dual Mission - Investigative
•Counterfeit
Currency
Treasury Obligations
•Financial Crimes
Identity Crime
Check Fraud
Access Device Fraud
Bank Fraud
•Electronic Crimes
Computer Crimes
Network Intrusions
Internet Fraud
 1865 - U.S. Secret Service created to fight counterfeit currency
 1901 - Assigned Presidential Protection Duties
 1948 - Title 18 USC Section 470-474 (Counterfeiting and Forgery)
 1984 - Title 18 USC Section 1029 (Access Device Fraud)
 1986 - Title 18 USC Section 1030 (Computer Fraud)
 1990 - Title 18 USC Section 1344 (Bank Fraud)
 1996 - Title 18 USC Section 514 (Fictitious Obligations)
 1998 - Title 18 USC Section 1028 (Identity Theft)
 2001 - PATRIOT Act (Expanded Cyber Crime Responsibilities)
 2004 – Title 18 USC Section 1028A (Aggravated Identity Theft)
Jurisdictional History
6
Cyber Safety
• Social Engineering
• Social Networking Vulnerabilities
• The act of manipulating people into performing actions
or divulging confidential information for the purpose of
information gathering, fraud, or computer system
access.
Social Engineering
8
Types of Social Engineering skills
Following are the few skills to exploit users to get access to your system.
-Impersonating staff
-Playing on users' sympathy
-Intimidation tactics
-Hoaxing
-Creating confusion
-Dumpster diving
-Reverse social engineering
-Mail
-Phishing
-Spearphising
-A phishing technique that has received
substantial publicity of late is “vishing,” or voice phishing
9
So what do they look like?
10
The link sends you to….
Social Engineering Ammo
Anything and Everything is Exploitable
on your computer
• Finances
• Pictures of your family
• Personal letters /
correspondence
• Personal & Business Address
Book - contacts (their title,
their address, contact
numbers, emails, personal
info)
• Calendar / Itinerary
• Vacation Logistics, Etc.
13
Location-based Social Networking
• Location-based social networking is quickly
growing in popularity. A variety of
applications are capitalizing on users’ desire
to broadcast their geographic location.
• Most location-based social networking
applications focus on “checking in” at various
locations to earn points, badges, discounts
and other geo-related awards.
• The increased popularity of these
applications is changing the way we as a
digital culture view security and privacy on
an individual level.
o Skimming Technology
o Network Intrusions
o Point of Sale Breaches
o Malware
o Data Breaches
Current Trends in Cyber
Crime
Skimming Technology
 The equipment is available over the Internet.
 The software and hardware are very user friendly and extremely
mobile
 The skimmed information can be transmitted via e-mail anywhere
in the world within hours after it is skimmed
 Cardholders are not aware that they have been victimized until
they receive statements showing the fraudulent charges
Why is Skimming Popular?
• Common Skimming Locations
– Restaurants
– Hotels
– Gas Stations (affixed to pumps)
– ATMs (affixed to machine)
• Why are these locations so popular?
– Heavy customer volume
– Credit card is common payment method
– Multiple employees (difficult to identify suspect)
– Employee turnover (co-conspirators easy to recruit / emplace)
– Covertly placed (gas pumps and ATMs)
Skimming Locations
Wireless Skimming
 The advent of wireless technology has led to passive wireless
skimming, where perpetrators plant skimming devices that broadcast
account information wirelessly in gas pumps, ATMs, and point of sale
terminals.
 These devices minimize physical interaction with the skimming
device, increasing the odds that the skimmer will operate undetected.
 Even if a wireless skimmer is found, it can be difficult to identify its
owners.
FEATURES
- Wireless access to stored data on all
devices in range
- Remote configuration of reader devices
- Manage multiple devices
- Hardware password protection
Handheld Skimming Devices
Gas Pump Skimming
Skimming Device
PIN hole camera
assembly mount
placed above key pad
to capture PINs
ATM Skimming
PIN hole camera
assembly mount
placed above key pad
to capture PINs
Mounted over original
ATM card reader
ATM Skimming
NEW SKIMMING TECHNIQUES
• Works Around Anti-Skimming Faceplate on
newer ATMS
• Uses more technologically advanced
methods
• Relies on having access to HDD of ATM
POINT OF SALE (POS)
BREACHES
POINT-OF-SALE (POS)
SKIMMING
PCI
Compliance
Computer
Security=
Point-of-sale Skimming Devices
Point-of-sale terminal Altered with skimming electronics
Yellow and green
parasite board. The
yellow board is a
Bluetooth card and
the green board is
the storage board.
Point-of-sale Skimming Devices
Network Intrusions
• Breaches stem from hackers wanting two things:
Information Access
Anatomy of a Hack
30
Point of Sale (POS) System
Port 5631
Port 3389
Ports 5800 & 5900
32
Hackers use weaknesses in Remote
Desktop Program configurations to gain
access!!!!
POS
BOH
SERVER
UltraVNC
Remote Application Vulnerabilities
• Help desk teams love remote-control software because it allows them to:
-Remotely take control of the user's machine
-Copy over files
-Set all application and operating system wrongs to right.
• Attackers love the software too, because it allows them to:
-Avoid sneaking complex Trojan malware onto a targeted PC
-They use previously installed remote control software to do the heavy
lifting for them
-Run attacks from memory, thus making the exploits more difficult to
detect, trace or investigate.
Mathew J. Schwartz, Unpatched Remote Access Tools: Your Gift To Attackers,
http://www.informationweek.com/security/vulnerabilities/unpatched-remote-access-tools-your-gift/240151523
POINT-OF-SALE (POS) Breaches
Problems we have seen with RDP
configurations on POS Servers:
 Weak or no password protection
 Connection remains open all of the time
 Multiple RDPs installed on the Server (sometimes the hacker
installs their own after gaining access)
 No firewall or firewall not configured correctly
POINT OF SALE (POS) SYSTEM CONFIGURATION
Front of House Server
Front of House Server
Front of House Server
Switch
I
N
T
E
R
N
E
T
Back of House Server Cable/DSL Router
KEYSTROKE LOGGER
NETWORK
SNIFFER
MEMORY
DUMPER
Breach Detection
• 71% of victims did not detect a breach themselve
----------------------------------------------------------------
• 58% Regulatory, card brands, merchant banks
• 29% Self-Detection
• 7% Other 3rd Party
• 3% Public Detection
• 3% Law Enforcement
37
Median number of days from initial intrusion
to detection was….
38
87 days
Median number of days from detection to
containment was…
7 days
Common Breach Scenario
InfiltrationAggregationExfiltration
1. POS system is located and attacker enters POS system via
pcAnywhere using default-vendor supplied credentials.
− Username: admin
− Password: password
2. Memory dumper malware is installed on the POS system.
Once installed, track data is captured from RAM and written
to an encrypted output file.
− C:WINDOWSsystem32ccdata.txt
3. Attacker returns periodically via pcAnywhere and uploads output
file (ccdata.txt) containing encrypted track data.
- Automatic uploads, emails the data, FTP’s the data.
 Malware captures track data from credit/debit cards.
 Stolen credit/debit card information sent to hacker.
 Hacker sells this information online (card dumps).
POINT-OF-SALE (POS) Breaches
 Criminals around the world purchase these card
dumps over the internet to resell them or use the
compromised account numbers.
41
What can you do?
• Use updated virus protection software.
• Weary of emails from strangers, especially downloads or hyperlinks.
(Educate your Employees/Family)
• Firewall protection is essential for high-speed connections that leave
your system connected to the internet.
• Secure browsers enable you to encrypt info that you send.
• Resist using automatic log-in features.
• Change your passwords frequently / Use Complex Passwords
(uppercase / lowercase / number / special character)
• Check for open ports by scanning your public facing IP address (nmap)
Incident Response
• Don’t ask “IF” ask “WHEN”
• Have a plan: Know who to involve & call in your initial
responders before it happens:
– Have a central point of contact that has authority to act
• Legal counsel, human resources personnel, corporate security,
IT security
– Establish a smooth flow of communications amongst the
different parties involved
We have learned that cyber crime
investigations must be conducted
quickly. If evidence is not captured
quickly it could be lost and the link to
the suspect can be broken
RESOURCES
• FS-ISAC= Financial Services and Analysis
Center
• NCCIC- National Cybersecurity &
Communications Integration Center
• US-CERT= US Computer Emergency
Readiness Team
• Verizon Data Breach Investigations Report
• www.databreachtoday.com
• Trustwave Global Security Report
Targeted Malware
45
• Malware collects on-line credentials:
– Usually infects machines using a targeted phishing (spearphishing)
attack.
– E-mails are targeted to users suspected to have access to corporate
bank accounts.
– Some variants can spread to other computers on the network.
• Banking credentials used to generate ACH transfers:
– Transfers to money mules, recruited from on-line job hunting websites.
– Mules sign up for a “work from home” program.
– Mules receive ACH transfers into personal bank accounts, and then
send money overseas by wire or Western Union.
Targeted Malware
• Still one of the most widely investigated malware programs by law
enforcement agencies.
– Serving as the model for newer toolkits.
• First detected in early 2007.
• Builder toolkit sold for between $700 - $4,000 on underground forums,
depending on version.
– Older versions usually released for free to the public as advertising for
new versions.
• Modified older versions also sold.
• Capabilities:
– Accessed saved passwords in web browsers.
– Keystroke logging.
– Screenshots (to defeat anti-keystroke logging sites).
– Modification of web sites (can ask for additional information on a bank
login site, such as PIN).
– Installation of additional software.
– Proxy service.
ZeuS
47
• ZeuS is designed to steal more than just
financial data:
48
• Replacing ZeuS as the preferred crimeware toolkit over
the past year.
– ZeuS author turned over code to the author of SpyEye
trojan.
– New ZeuS variants still being developed for VIP
customers.
• Similar in form & function to ZeuS.
• Features:
– Keylogger
– E-mail grabber
– HTTP authentication grabber
– ZeuS-killer module
SpyEye
49
SpyEye
 Gribodemon, creator of SpyEye was interviewed by Malware
Intelligence.
 Claims to make approximately $50 Million per year.
 Sells ONLY SpyEye toolkit.
 Spends 12-13 hours per day coding malware.
 Believes that future versions will include a feature to remove
anti-virus from victim’s computer.
 Does NOT CARE about the financial loss his software causes.
Believes that banks suffer most of the loss.
 Recent trends have seen versions of ZeuS-style
malware written for mobile platforms.
Data Breaches
DATA BREACH 101
• Recognize when ILLICIT events occur
– At the height of “NOISE”
DROP FILES, EXECUTION OF CODE, DATA HARVESTING
• Identify the problem and level of intrusion
PYRAMID OF ATTACKS – virus to root intrusions
• Know your “Back to Business” ETA
• Mitigation Plan should include a decision maker
not just information gatherers – key to keep
decision makers informed.
• Measure, Improve, Measure again
DATA BREACH 101
• How do breaches occur?
– 3rd Party Access (contractor) to systems connected to
servers
– Compromised VPN (ability to login from home)
– Sniffing/Open Ports
– Phishing/Spoof emails targeted to employees (social media
sources)
– Physical Devices (Fake POS terminals with malware injected
onto network)
• Where is your evidence? (local devices, network logs, mobile
devices) -What are your BYOD policies?
-How long do you maintain network logs or back ups?
-Do you maintain a topology of your network?
DATA BREACH CASE STUDY
Health System Company
Intrusion Detection System was installed; within days alerted for unencrypted
PII/PHI as outbound TCP/IP traffic to port 80
• Further analysis (IT) of their network logs showed traffic from 2 internal IP
addresses (locations within their network)
• Application (internet) and System logs from these computers were
forensically examined and cross referenced with date/time/location found
the same Security Identifier (SID) was logged in to each location at the time
of the traffic
• IT intelligence confirmed SID assigned to employee
• Employee timesheets showed he was working at the time of the traffic
transmissions
• Notified LEO IMMEDIATELY and continued to monitor SID traffic with
increased level of granularity – captured larger data –including email
addresses of employee and intended recipient(s).
• Investigation revealed employee was selling PII and PHI for profit.
• Many Cybercriminals are motivated by financial gain.
• Cybercriminals have the technical ability to severely
damage cyber infrastructure and should not be
dismissed since they do not work for sponsored
organizations.
• Cybercrime can be committed by subjects with varying
degrees of technical capabilities.
• Cybercriminals generally target opportunistically.
• Cyber criminals often specialize in a few areas requiring
them to work with others.
Who are Cybercriminals?
Cybercriminal Networks
• Some online criminal networks are highly organized
– Eastern Europe, especially with more than a decade of continued
development and growth
– Certain individuals heading online criminal organizations approaching 15 years
experience and growth
– Wide-ranging ties to real-world financial systems as well as government
structures
• Some online criminal organizations are very sophisticated
– Fielding malware ecosystems on a very high level; some malware systems
survive and even thrive for years (Zeus/SpyEye)
– Repeated successful attacks against financial encryption systems
– No network or institution invulnerable to intrusion from dedicated and
motivated adversary (study of risk/reward)
55
Case Study
56
How Investigations Start
• Contacted by victim
• Industry tip to USSS
• “Common Point of Purchase” analysis
• Multiple compromised accounts
• Unauthorized purchases at common merchant
Special Challenges with Corporate
Data Breach Victims
The problems:
• Need investigative
assistance from victim
– USSS can’t do corporate
“deep dive” forensics
• Victim has incentive not
to investigate
– Civil liability
– Bad press
– Remediation costs
The solutions:
• Recommend hiring
reputable forensics firm
• Recommend hiring
privacy counsel
• Assure confidentiality
– Not named in indictment or
plea
– Not named in press by
USSS
• Consider issuing delayed
notification letter
POS-Hacking Scheme
POS system
KSL
Hacked
business
servers
1. Crack admin password & install
keystroke logger on merchant’s POS
2. Log & upload card data to “dump
sites” for temporary storage
4. Encode data onto blank cards for
use in stores, ATMs, casinos
3. Retrieve & sell card data on
black market
Dirty
servers
Legit
servers
Via FTP
Summary of Data Breach
60
• 250 Branches
• 800 Other Merchants
• 5 Million Cardholders
• $50 Million Unauthorized Charges
Step 1: Investigate Hacked POS
• Network sniffer/image HD and
capture RAM
• Forensics
– Off-the-rack KSL
– Stored card data
– Hard-coded “dump sites”
– Signatures
• File structure & naming
• PWs & usernames (Romanian)
• Matched other POS hacks
• Logs
– ftp “dump site” IPs
Step 2: Investigate “Dump Sites”
• Search warrants
– Stored card data
• Business confirmed
– Stored hacker tools
• Pen/trap orders
– Romanian & proxy IPs
– Hacked server IP
– New victim IPs (notify)
Step 3: Investigate Hacked Server
• Forensics
– Stored card data
– Stored hacker tools
• Sniffer/full PCAP
– Proxy to access e-mail & chat
accounts
– “dump site” IP
– New victim IPs
• Hiccups: partial encryption,
victim’s substitute server
Step 4: Investigate E-Mail/Chat Accounts
• Search warrants
– Stored data on “notepad”
– Transferred stolen card data
• Victim confirmed
– Transferred PWs & tools
– Chat wedding & arrest
– E-mail from hacker acct to
personal account
• Logs show hacker acct = own
personal acct
• Date/time stamp same
Cyclical investigative steps
• Dump site logs identify new
victims
• New victim logs identify
new dump sites
• E-mail identifies new targets
• New target’s e-mail
identifies defendants
Hacked
Hacked
Step 5: Open-Source Investigation
• Facebook
– “Friends” w/ other targets
– Wedding photo of target
– Gambling interest
• Online auctions
– Mag stripe reader
• Linked-in
– Classmates w/other target
Recap of Investigative Steps
What we investigated:
• Step 1: Hacked POS
• Step 2: “Dump sites”
• Step 3: Hacked server
• Step 4: E-mail and chat
accounts
Legal process we used:
• Victim consent
• Search Warrant
• Consent
• Search Warrant
Step 6: Finding the Targets
Target A e-mails self
(with .exe & ccs)
from hacker account
to personal acct
Target B chats
about own recent
wedding and prior
arrest
Target A posts
Target B
wedding
photo
++
Three hacker slip-ups
Closing in on Target A
– E-mail order for Viagra
• Target A’s name & home address
– E-mail to Target A’s work e-mail
address
– Target A’s FB page
• Gives actual name
• Identified personal e-mail account
• Target B’s wedding photo
Closing in on Target B
– Target B chats about his wedding and arrest
• Target A‘s FB post with wedding photo and Target B as
groom
– Romanian LE assistance
• check arrest records in carding cases for Target B
– Has prior arrest
• recognize FB photo as Target B
– Target B’s wife
• Facebook, linked in
Post-Script
• Lured Target A lured to U.S.
– Lures require DOJ/OIA approval.
• Full confessions upon arrest
• Target B extradited from Romania
• Target A received a 7.5 year sentence
• Target B was sentenced to 15 year sentence

More Related Content

What's hot

TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholderskevinwetzel
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Positive Hack Days
 
Nova Technical Services Tscm
Nova Technical Services TscmNova Technical Services Tscm
Nova Technical Services Tscmmjbergstrom
 
Securing embedded systems
Securing embedded systemsSecuring embedded systems
Securing embedded systemsaissa benyahya
 
Phone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden historyPhone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden historyDavid Rogers
 
Global cybersecurity on earth + in space
Global cybersecurity on earth + in spaceGlobal cybersecurity on earth + in space
Global cybersecurity on earth + in spaceDIGIJAKS
 
Global Cyber Security on Earth + in Space
Global Cyber Security on Earth + in SpaceGlobal Cyber Security on Earth + in Space
Global Cyber Security on Earth + in SpaceDIGIJAKS
 
Trends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and ArtifactsTrends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and ArtifactsCellebrite
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011Xavier Mertens
 

What's hot (19)

Cyber Forensics & Challenges
Cyber Forensics & ChallengesCyber Forensics & Challenges
Cyber Forensics & Challenges
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholders
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Nova Technical Services Tscm
Nova Technical Services TscmNova Technical Services Tscm
Nova Technical Services Tscm
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Lecture5
Lecture5Lecture5
Lecture5
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
Securing embedded systems
Securing embedded systemsSecuring embedded systems
Securing embedded systems
 
DNS Cybersecurity in 2012-2015
DNS Cybersecurity in 2012-2015DNS Cybersecurity in 2012-2015
DNS Cybersecurity in 2012-2015
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Phone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden historyPhone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden history
 
Global cybersecurity on earth + in space
Global cybersecurity on earth + in spaceGlobal cybersecurity on earth + in space
Global cybersecurity on earth + in space
 
Global Cyber Security on Earth + in Space
Global Cyber Security on Earth + in SpaceGlobal Cyber Security on Earth + in Space
Global Cyber Security on Earth + in Space
 
Trends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and ArtifactsTrends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and Artifacts
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
 

Similar to Trends in electronic crimes and its impact on businesses like yours

Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Anpumathews
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
Complete notes security
Complete notes securityComplete notes security
Complete notes securityKitkat Emoo
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0Q Fadlan
 
9. Computer Ethics.ppt
9. Computer Ethics.ppt9. Computer Ethics.ppt
9. Computer Ethics.pptasm071149
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfMansoorAhmed57263
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Introduction to hackers
Introduction to hackersIntroduction to hackers
Introduction to hackersHarsh Sharma
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session Splunk
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigationMehedi Hasan
 

Similar to Trends in electronic crimes and its impact on businesses like yours (20)

Hackers
HackersHackers
Hackers
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Web security
Web securityWeb security
Web security
 
How to become Hackers .
How to become Hackers .How to become Hackers .
How to become Hackers .
 
Hackers Cracker Network Intruder
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Ethical hacking (legal)
Ethical hacking (legal)Ethical hacking (legal)
Ethical hacking (legal)
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Complete notes security
Complete notes securityComplete notes security
Complete notes security
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
 
9. Computer Ethics.ppt
9. Computer Ethics.ppt9. Computer Ethics.ppt
9. Computer Ethics.ppt
 
cyber forensics
cyber forensicscyber forensics
cyber forensics
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Introduction to hackers
Introduction to hackersIntroduction to hackers
Introduction to hackers
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session
 
9 - Security
9 - Security9 - Security
9 - Security
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
 

Recently uploaded

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 

Recently uploaded (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 

Trends in electronic crimes and its impact on businesses like yours

  • 1.
  • 2. Agenda • USSS Dual Mission – Protection/Investigation • USSS Resources and Assets to Combat Cyber Crime • Current Trends in Cyber Crime – Skimming Technology – Network Intrusions – Point of Sale – Targeted Malware – Data Breaches • Network Intrusion Case Study
  • 3. Dual Mission - Protection •President •Vice-President •Former Presidents •Foreign Heads of State •Major Candidates •Others as designated
  • 4. Dual Mission - Investigative •Counterfeit Currency Treasury Obligations •Financial Crimes Identity Crime Check Fraud Access Device Fraud Bank Fraud •Electronic Crimes Computer Crimes Network Intrusions Internet Fraud
  • 5.  1865 - U.S. Secret Service created to fight counterfeit currency  1901 - Assigned Presidential Protection Duties  1948 - Title 18 USC Section 470-474 (Counterfeiting and Forgery)  1984 - Title 18 USC Section 1029 (Access Device Fraud)  1986 - Title 18 USC Section 1030 (Computer Fraud)  1990 - Title 18 USC Section 1344 (Bank Fraud)  1996 - Title 18 USC Section 514 (Fictitious Obligations)  1998 - Title 18 USC Section 1028 (Identity Theft)  2001 - PATRIOT Act (Expanded Cyber Crime Responsibilities)  2004 – Title 18 USC Section 1028A (Aggravated Identity Theft) Jurisdictional History
  • 6. 6 Cyber Safety • Social Engineering • Social Networking Vulnerabilities
  • 7. • The act of manipulating people into performing actions or divulging confidential information for the purpose of information gathering, fraud, or computer system access. Social Engineering
  • 8. 8 Types of Social Engineering skills Following are the few skills to exploit users to get access to your system. -Impersonating staff -Playing on users' sympathy -Intimidation tactics -Hoaxing -Creating confusion -Dumpster diving -Reverse social engineering -Mail -Phishing -Spearphising -A phishing technique that has received substantial publicity of late is “vishing,” or voice phishing
  • 9. 9 So what do they look like?
  • 10. 10 The link sends you to….
  • 12. Anything and Everything is Exploitable on your computer • Finances • Pictures of your family • Personal letters / correspondence • Personal & Business Address Book - contacts (their title, their address, contact numbers, emails, personal info) • Calendar / Itinerary • Vacation Logistics, Etc.
  • 13. 13 Location-based Social Networking • Location-based social networking is quickly growing in popularity. A variety of applications are capitalizing on users’ desire to broadcast their geographic location. • Most location-based social networking applications focus on “checking in” at various locations to earn points, badges, discounts and other geo-related awards. • The increased popularity of these applications is changing the way we as a digital culture view security and privacy on an individual level.
  • 14. o Skimming Technology o Network Intrusions o Point of Sale Breaches o Malware o Data Breaches Current Trends in Cyber Crime
  • 16.  The equipment is available over the Internet.  The software and hardware are very user friendly and extremely mobile  The skimmed information can be transmitted via e-mail anywhere in the world within hours after it is skimmed  Cardholders are not aware that they have been victimized until they receive statements showing the fraudulent charges Why is Skimming Popular?
  • 17. • Common Skimming Locations – Restaurants – Hotels – Gas Stations (affixed to pumps) – ATMs (affixed to machine) • Why are these locations so popular? – Heavy customer volume – Credit card is common payment method – Multiple employees (difficult to identify suspect) – Employee turnover (co-conspirators easy to recruit / emplace) – Covertly placed (gas pumps and ATMs) Skimming Locations
  • 18. Wireless Skimming  The advent of wireless technology has led to passive wireless skimming, where perpetrators plant skimming devices that broadcast account information wirelessly in gas pumps, ATMs, and point of sale terminals.  These devices minimize physical interaction with the skimming device, increasing the odds that the skimmer will operate undetected.  Even if a wireless skimmer is found, it can be difficult to identify its owners. FEATURES - Wireless access to stored data on all devices in range - Remote configuration of reader devices - Manage multiple devices - Hardware password protection
  • 21. PIN hole camera assembly mount placed above key pad to capture PINs ATM Skimming
  • 22. PIN hole camera assembly mount placed above key pad to capture PINs Mounted over original ATM card reader ATM Skimming
  • 23. NEW SKIMMING TECHNIQUES • Works Around Anti-Skimming Faceplate on newer ATMS • Uses more technologically advanced methods • Relies on having access to HDD of ATM
  • 24.
  • 25. POINT OF SALE (POS) BREACHES
  • 27. Point-of-sale Skimming Devices Point-of-sale terminal Altered with skimming electronics
  • 28. Yellow and green parasite board. The yellow board is a Bluetooth card and the green board is the storage board. Point-of-sale Skimming Devices
  • 29. Network Intrusions • Breaches stem from hackers wanting two things: Information Access
  • 30. Anatomy of a Hack 30
  • 31. Point of Sale (POS) System Port 5631 Port 3389 Ports 5800 & 5900
  • 32. 32
  • 33. Hackers use weaknesses in Remote Desktop Program configurations to gain access!!!! POS BOH SERVER UltraVNC
  • 34. Remote Application Vulnerabilities • Help desk teams love remote-control software because it allows them to: -Remotely take control of the user's machine -Copy over files -Set all application and operating system wrongs to right. • Attackers love the software too, because it allows them to: -Avoid sneaking complex Trojan malware onto a targeted PC -They use previously installed remote control software to do the heavy lifting for them -Run attacks from memory, thus making the exploits more difficult to detect, trace or investigate. Mathew J. Schwartz, Unpatched Remote Access Tools: Your Gift To Attackers, http://www.informationweek.com/security/vulnerabilities/unpatched-remote-access-tools-your-gift/240151523
  • 35. POINT-OF-SALE (POS) Breaches Problems we have seen with RDP configurations on POS Servers:  Weak or no password protection  Connection remains open all of the time  Multiple RDPs installed on the Server (sometimes the hacker installs their own after gaining access)  No firewall or firewall not configured correctly
  • 36. POINT OF SALE (POS) SYSTEM CONFIGURATION Front of House Server Front of House Server Front of House Server Switch I N T E R N E T Back of House Server Cable/DSL Router KEYSTROKE LOGGER NETWORK SNIFFER MEMORY DUMPER
  • 37. Breach Detection • 71% of victims did not detect a breach themselve ---------------------------------------------------------------- • 58% Regulatory, card brands, merchant banks • 29% Self-Detection • 7% Other 3rd Party • 3% Public Detection • 3% Law Enforcement 37
  • 38. Median number of days from initial intrusion to detection was…. 38 87 days Median number of days from detection to containment was… 7 days
  • 39. Common Breach Scenario InfiltrationAggregationExfiltration 1. POS system is located and attacker enters POS system via pcAnywhere using default-vendor supplied credentials. − Username: admin − Password: password 2. Memory dumper malware is installed on the POS system. Once installed, track data is captured from RAM and written to an encrypted output file. − C:WINDOWSsystem32ccdata.txt 3. Attacker returns periodically via pcAnywhere and uploads output file (ccdata.txt) containing encrypted track data. - Automatic uploads, emails the data, FTP’s the data.
  • 40.  Malware captures track data from credit/debit cards.  Stolen credit/debit card information sent to hacker.  Hacker sells this information online (card dumps). POINT-OF-SALE (POS) Breaches  Criminals around the world purchase these card dumps over the internet to resell them or use the compromised account numbers.
  • 41. 41 What can you do? • Use updated virus protection software. • Weary of emails from strangers, especially downloads or hyperlinks. (Educate your Employees/Family) • Firewall protection is essential for high-speed connections that leave your system connected to the internet. • Secure browsers enable you to encrypt info that you send. • Resist using automatic log-in features. • Change your passwords frequently / Use Complex Passwords (uppercase / lowercase / number / special character) • Check for open ports by scanning your public facing IP address (nmap)
  • 42. Incident Response • Don’t ask “IF” ask “WHEN” • Have a plan: Know who to involve & call in your initial responders before it happens: – Have a central point of contact that has authority to act • Legal counsel, human resources personnel, corporate security, IT security – Establish a smooth flow of communications amongst the different parties involved We have learned that cyber crime investigations must be conducted quickly. If evidence is not captured quickly it could be lost and the link to the suspect can be broken
  • 43. RESOURCES • FS-ISAC= Financial Services and Analysis Center • NCCIC- National Cybersecurity & Communications Integration Center • US-CERT= US Computer Emergency Readiness Team • Verizon Data Breach Investigations Report • www.databreachtoday.com • Trustwave Global Security Report
  • 45. 45 • Malware collects on-line credentials: – Usually infects machines using a targeted phishing (spearphishing) attack. – E-mails are targeted to users suspected to have access to corporate bank accounts. – Some variants can spread to other computers on the network. • Banking credentials used to generate ACH transfers: – Transfers to money mules, recruited from on-line job hunting websites. – Mules sign up for a “work from home” program. – Mules receive ACH transfers into personal bank accounts, and then send money overseas by wire or Western Union. Targeted Malware
  • 46. • Still one of the most widely investigated malware programs by law enforcement agencies. – Serving as the model for newer toolkits. • First detected in early 2007. • Builder toolkit sold for between $700 - $4,000 on underground forums, depending on version. – Older versions usually released for free to the public as advertising for new versions. • Modified older versions also sold. • Capabilities: – Accessed saved passwords in web browsers. – Keystroke logging. – Screenshots (to defeat anti-keystroke logging sites). – Modification of web sites (can ask for additional information on a bank login site, such as PIN). – Installation of additional software. – Proxy service. ZeuS
  • 47. 47 • ZeuS is designed to steal more than just financial data:
  • 48. 48 • Replacing ZeuS as the preferred crimeware toolkit over the past year. – ZeuS author turned over code to the author of SpyEye trojan. – New ZeuS variants still being developed for VIP customers. • Similar in form & function to ZeuS. • Features: – Keylogger – E-mail grabber – HTTP authentication grabber – ZeuS-killer module SpyEye
  • 49. 49 SpyEye  Gribodemon, creator of SpyEye was interviewed by Malware Intelligence.  Claims to make approximately $50 Million per year.  Sells ONLY SpyEye toolkit.  Spends 12-13 hours per day coding malware.  Believes that future versions will include a feature to remove anti-virus from victim’s computer.  Does NOT CARE about the financial loss his software causes. Believes that banks suffer most of the loss.  Recent trends have seen versions of ZeuS-style malware written for mobile platforms.
  • 51. DATA BREACH 101 • Recognize when ILLICIT events occur – At the height of “NOISE” DROP FILES, EXECUTION OF CODE, DATA HARVESTING • Identify the problem and level of intrusion PYRAMID OF ATTACKS – virus to root intrusions • Know your “Back to Business” ETA • Mitigation Plan should include a decision maker not just information gatherers – key to keep decision makers informed. • Measure, Improve, Measure again
  • 52. DATA BREACH 101 • How do breaches occur? – 3rd Party Access (contractor) to systems connected to servers – Compromised VPN (ability to login from home) – Sniffing/Open Ports – Phishing/Spoof emails targeted to employees (social media sources) – Physical Devices (Fake POS terminals with malware injected onto network) • Where is your evidence? (local devices, network logs, mobile devices) -What are your BYOD policies? -How long do you maintain network logs or back ups? -Do you maintain a topology of your network?
  • 53. DATA BREACH CASE STUDY Health System Company Intrusion Detection System was installed; within days alerted for unencrypted PII/PHI as outbound TCP/IP traffic to port 80 • Further analysis (IT) of their network logs showed traffic from 2 internal IP addresses (locations within their network) • Application (internet) and System logs from these computers were forensically examined and cross referenced with date/time/location found the same Security Identifier (SID) was logged in to each location at the time of the traffic • IT intelligence confirmed SID assigned to employee • Employee timesheets showed he was working at the time of the traffic transmissions • Notified LEO IMMEDIATELY and continued to monitor SID traffic with increased level of granularity – captured larger data –including email addresses of employee and intended recipient(s). • Investigation revealed employee was selling PII and PHI for profit.
  • 54. • Many Cybercriminals are motivated by financial gain. • Cybercriminals have the technical ability to severely damage cyber infrastructure and should not be dismissed since they do not work for sponsored organizations. • Cybercrime can be committed by subjects with varying degrees of technical capabilities. • Cybercriminals generally target opportunistically. • Cyber criminals often specialize in a few areas requiring them to work with others. Who are Cybercriminals?
  • 55. Cybercriminal Networks • Some online criminal networks are highly organized – Eastern Europe, especially with more than a decade of continued development and growth – Certain individuals heading online criminal organizations approaching 15 years experience and growth – Wide-ranging ties to real-world financial systems as well as government structures • Some online criminal organizations are very sophisticated – Fielding malware ecosystems on a very high level; some malware systems survive and even thrive for years (Zeus/SpyEye) – Repeated successful attacks against financial encryption systems – No network or institution invulnerable to intrusion from dedicated and motivated adversary (study of risk/reward) 55
  • 57. How Investigations Start • Contacted by victim • Industry tip to USSS • “Common Point of Purchase” analysis • Multiple compromised accounts • Unauthorized purchases at common merchant
  • 58. Special Challenges with Corporate Data Breach Victims The problems: • Need investigative assistance from victim – USSS can’t do corporate “deep dive” forensics • Victim has incentive not to investigate – Civil liability – Bad press – Remediation costs The solutions: • Recommend hiring reputable forensics firm • Recommend hiring privacy counsel • Assure confidentiality – Not named in indictment or plea – Not named in press by USSS • Consider issuing delayed notification letter
  • 59. POS-Hacking Scheme POS system KSL Hacked business servers 1. Crack admin password & install keystroke logger on merchant’s POS 2. Log & upload card data to “dump sites” for temporary storage 4. Encode data onto blank cards for use in stores, ATMs, casinos 3. Retrieve & sell card data on black market Dirty servers Legit servers Via FTP
  • 60. Summary of Data Breach 60 • 250 Branches • 800 Other Merchants • 5 Million Cardholders • $50 Million Unauthorized Charges
  • 61. Step 1: Investigate Hacked POS • Network sniffer/image HD and capture RAM • Forensics – Off-the-rack KSL – Stored card data – Hard-coded “dump sites” – Signatures • File structure & naming • PWs & usernames (Romanian) • Matched other POS hacks • Logs – ftp “dump site” IPs
  • 62. Step 2: Investigate “Dump Sites” • Search warrants – Stored card data • Business confirmed – Stored hacker tools • Pen/trap orders – Romanian & proxy IPs – Hacked server IP – New victim IPs (notify)
  • 63. Step 3: Investigate Hacked Server • Forensics – Stored card data – Stored hacker tools • Sniffer/full PCAP – Proxy to access e-mail & chat accounts – “dump site” IP – New victim IPs • Hiccups: partial encryption, victim’s substitute server
  • 64. Step 4: Investigate E-Mail/Chat Accounts • Search warrants – Stored data on “notepad” – Transferred stolen card data • Victim confirmed – Transferred PWs & tools – Chat wedding & arrest – E-mail from hacker acct to personal account • Logs show hacker acct = own personal acct • Date/time stamp same
  • 65. Cyclical investigative steps • Dump site logs identify new victims • New victim logs identify new dump sites • E-mail identifies new targets • New target’s e-mail identifies defendants Hacked Hacked
  • 66. Step 5: Open-Source Investigation • Facebook – “Friends” w/ other targets – Wedding photo of target – Gambling interest • Online auctions – Mag stripe reader • Linked-in – Classmates w/other target
  • 67. Recap of Investigative Steps What we investigated: • Step 1: Hacked POS • Step 2: “Dump sites” • Step 3: Hacked server • Step 4: E-mail and chat accounts Legal process we used: • Victim consent • Search Warrant • Consent • Search Warrant
  • 68. Step 6: Finding the Targets Target A e-mails self (with .exe & ccs) from hacker account to personal acct Target B chats about own recent wedding and prior arrest Target A posts Target B wedding photo ++ Three hacker slip-ups
  • 69. Closing in on Target A – E-mail order for Viagra • Target A’s name & home address – E-mail to Target A’s work e-mail address – Target A’s FB page • Gives actual name • Identified personal e-mail account • Target B’s wedding photo
  • 70. Closing in on Target B – Target B chats about his wedding and arrest • Target A‘s FB post with wedding photo and Target B as groom – Romanian LE assistance • check arrest records in carding cases for Target B – Has prior arrest • recognize FB photo as Target B – Target B’s wife • Facebook, linked in
  • 71. Post-Script • Lured Target A lured to U.S. – Lures require DOJ/OIA approval. • Full confessions upon arrest • Target B extradited from Romania • Target A received a 7.5 year sentence • Target B was sentenced to 15 year sentence