cb i dh fi ilscybercrime and the financial sector:...

48
Cb i dh Fi ilS Cb i dh Fi ilS Cybercrime and the Financial Sector: Cybercrime and the Financial Sector: The Growing Link The Growing Link Erez Liebermann Erez Liebermann Seth Kosto Seth Kosto Assistant United States Attorneys Assistant United States Attorneys Computer Hacking and Intellectual Property Section Computer Hacking and Intellectual Property Section Computer Hacking and Intellectual Property Section Computer Hacking and Intellectual Property Section District of New Jersey District of New Jersey

Upload: others

Post on 23-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

C b i d h Fi i l SC b i d h Fi i l SCybercrime and the Financial Sector: Cybercrime and the Financial Sector: The Growing LinkThe Growing Linkgg

Erez LiebermannErez LiebermannSeth KostoSeth Kosto

Assistant United States AttorneysAssistant United States AttorneysComputer Hacking and Intellectual Property SectionComputer Hacking and Intellectual Property SectionComputer Hacking and Intellectual Property SectionComputer Hacking and Intellectual Property Section

District of New JerseyDistrict of New Jersey

Page 2: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

Laws and Penalties

• Computer Fraud and Abuse Act• Computer Fraud and Abuse Act• Identity Theft• Access Device Fraud• Wire FraudWire Fraud

Page 3: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

Cyber Crimes

• Hacking • Data BreachesData Breaches• Phishing• Malicious Attacks

Page 4: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

The Most Sophisticated?The Most Sophisticated?

• SQL Injections?• WiFi Breaches?WiFi Breaches?• Botnets?• Trojans?

Page 5: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

They Learned…They Learned…

• The path of least resistance:

•Social Engineering•Social Engineering

Page 6: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

PasswordsPasswords

Page 7: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

Common DefenseCommon Defense

• SODDI

• Some Other Dude Did It

Page 8: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

Evidence Typically Recovered

• Internet Protocol LogsE mail Sea ches• E-mail Searches

• Social Networking Sites / Forums (Facebooks/Myspace)

• Data analysis via pen registers• Data analysis via pen registers• Wire Intercepts

Page 9: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

HELOC

• Fraud• Identity TheftIdentity Theft• New? Same stuff, but…

U i (b d )• Using computers (beyond spam)

Page 10: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

Tracking the FraudTracking the Fraud

• Hear from victim bank about loss… Now what?• Traditional: Follow the Money• New: Follow the PhonesNew: Follow the Phones• New: Follow the IPs

Page 11: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link
Page 12: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

New & Improved Criminals

• Phone in other names• Switching Phonesg

• Hiding IP AddressesWorking away from the house• Working away from the house

Page 13: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link
Page 14: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link
Page 15: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

AHA!

==

Page 16: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link
Page 17: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link
Page 18: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link
Page 19: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link
Page 20: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link
Page 21: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

Did Someone Lose a Cellphone?

Page 22: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

Is it a Conspiracy?Is it a Conspiracy?

• One large ring?• Independent Operators?Independent Operators?• How far does a conspiracy

t d?extend?

Page 23: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

Results?Results?

• 8 Arrested• No BailNo Bail• 8 Convicted• Sentences: Up to 12 years

Page 24: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

Know Your Customer &Trust Your SystemsTrust Your Systems

• “To Err is Human ”• To Err is Human….• Anti-Fraud Measures are Pro-

Customer• Fraudsters Know Your Rules Too!audste s o ou u es oo

Page 25: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link
Page 26: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

Data BreachesData Breaches

Ch ll• Challenges:• International in scope.

• > 70% from overseas

• Victim Cooperation• Sophistication & Patience

Page 27: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

Corporate Fear: $$$Corporate Fear: $$$

•Cost of Data Breach Report:• Per Record Cost: $142$

•Stock Price Rebound:• Approx 60 days• Approx. 60 days• Victims of massive breaches?

Page 28: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

U.S. v. Albert Gonzalez

• Where we meet Albert G l ?Gonzalez?• Arrested for ATM Fraud• 2003

• ShadowcrewS ado c e• Landmark Carding Case• Indictment October 2004Indictment October 2004• 21 Arrested in U.S.; Others Overseas

Page 29: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link
Page 30: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

Gonzalez

Page 31: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

TJX Hacking Investigation

• 2003 to 2008: • TJX• BJ’s Wholesale Club• OfficeMax• Boston Market• Barnes & Noble

Sports Authority• Sports Authority• Forever 21• DSW DSW

• USSS & D. Massachusetts

Page 32: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

Heartland and Others

• Continuing investigation… • More Victims:• More Victims:

• Heartland Payment Systems7 El / Citi• 7-Eleven / Citi

• Hannaford / Food Lion• JCPenney• Wetseal

Page 33: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

Picking the TargetsPicking the Targets

• List of Fortune 500• Visit stores – Identify POS Visit stores Identify POS

TerminalsVi it W b it• Visit Websites

Page 34: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

Executing AttacksExecuting Attacks

• SQL Injections• Foreign Serversg

• MalwareNetwork Recon• Network Recon

• Exfiltration

Page 35: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

Hiding the AttacksHiding the Attacks

• Foreign Proxies• Disabled logging by victimsDisabled logging by victims• Testing against AV programs• Erasing Evidence

Page 36: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

Piecing TogetherPiecing Together

• 5 Victims• Connected?Connected?

• SQL Injection Strings (Hash)• Infiltration IP• Infiltration IP• Exfiltration IP

Page 37: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

Chat FragmentsChat Fragments

• “Planning my second phase against Hannaford”g

• “Core still hasn’t downloaded that Wetseal shit”that Wetseal shit

Page 38: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link
Page 39: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

IndictmentsG l I di t d• Gonzalez Indicted• 3 Districts

• Longest Sentence for a Hacker:• 20 years (and 1 day)20 years (and 1 day)

Page 40: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

Gonzalez’ StatementGonzalez Statement

• “I’m fearful of what the DOJ’s reaction may be if I go on record with the events of the past 10+ years… The motherfu_kers have l d b h already proven to be untrustworthy

and vindictive.”ll• Rolling Stone, June 10, 2010

Page 41: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

SentencingSentencing

• Loss Calculations• Attempt vs. SuccessfulAttempt vs. Successful• Remedial Efforts

Page 42: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

Our Best Practices

• Protect the rights of the victim.• Consult with senior management• Consult with senior management.• Consult with IT staff.• Minimize disruption to the company• Minimize disruption to the company.• Coordinate media releases.• Keep the company informed• Keep the company informed.• Build relationships before an

intrusion.intrusion.

Page 43: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

PreparednessPreparedness

C lti t R l ti hi N• Cultivate Relationships Now• Before: Have a Response Planp

• Accountability and Authority• Independence – Call Someone ElseIndependence Call Someone Else• Logs

Page 44: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

Incident ResponseIncident ResponseIncident ResponseIncident Response

•• Assess Damage RemotelyAssess Damage Remotely•• Limit AccessLimit Access

•• NO ENO E--MAILS! (None. Really.)MAILS! (None. Really.)•• Preserve LogsPreserve Logs•• Preserve LogsPreserve Logs•• Record KeepingRecord Keeping

Page 45: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

Steps to ProtectSteps to Protect

• Separation of Powers• Immediate Cut-offImmediate Cut off• Extra Vigilance

Page 46: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

“Who you gonna call?”

Page 47: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link
Page 48: Cb i dh Fi ilSCybercrime and the Financial Sector: …media.techtarget.com/searchSecurity/downloads/FISD_2010...Cb i dh Fi ilSCybercrime and the Financial Sector: The Growing Link

Questions???Questions???

• Contact Info:• Erez Liebermann

• 973-645-2874• [email protected]

• Seth Kosto• 973-645-2737• [email protected]