fbi cyber presentation andrew p. dodd special agent computer intrusion program fbi new haven field...

17
FBI Cyber Presentation Andrew P. Dodd Special Agent Computer Intrusion Program FBI New Haven Field Office

Upload: juniper-thornton

Post on 01-Jan-2016

353 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: FBI Cyber Presentation Andrew P. Dodd Special Agent Computer Intrusion Program FBI New Haven Field Office Andrew P. Dodd Special Agent Computer Intrusion

FBI Cyber Presentation

Andrew P. DoddSpecial Agent

Computer Intrusion ProgramFBI New Haven Field Office

Andrew P. DoddSpecial Agent

Computer Intrusion ProgramFBI New Haven Field Office

Page 2: FBI Cyber Presentation Andrew P. Dodd Special Agent Computer Intrusion Program FBI New Haven Field Office Andrew P. Dodd Special Agent Computer Intrusion

2

Best Practices

1. Logs are your “internet security cameras”– Point them at what matters!– Store them for a reasonable time– Study them to know what is

normal

2. Know Your Systems3. Accountability4. Patches

ALL PART OF YOUR SECURITY POLICY

Page 3: FBI Cyber Presentation Andrew P. Dodd Special Agent Computer Intrusion Program FBI New Haven Field Office Andrew P. Dodd Special Agent Computer Intrusion

3

Threats on the Rise

• Advanced Persistent Threat (APT)• Nation-States• Long-term, unauthorized access to

your network• Hard to detect (impossible without

logs)• Prevention is great…DETECTION is a

must

• Devastating consequences

Page 4: FBI Cyber Presentation Andrew P. Dodd Special Agent Computer Intrusion Program FBI New Haven Field Office Andrew P. Dodd Special Agent Computer Intrusion

4

APT Signs

• Five signs of APT attacks:• Abnormal logon activity (logs)• Widespread backdoor Trojans (logs)• Unexpected data flows (logs)• Discovering unexpected data

bundles• Hacking tools left behind

Page 5: FBI Cyber Presentation Andrew P. Dodd Special Agent Computer Intrusion Program FBI New Haven Field Office Andrew P. Dodd Special Agent Computer Intrusion

5

Threats on the Rise

• Ransomware• Encrypts your data until you pay a fee to

get it unlocked• Either securely back up your data, or pay

the bad guys and pray…

• Man-in-the-Email• Customer needs urgent transfer of funds• Often the Financial Controller is

tricked• Keep tabs on what you post online

Page 6: FBI Cyber Presentation Andrew P. Dodd Special Agent Computer Intrusion Program FBI New Haven Field Office Andrew P. Dodd Special Agent Computer Intrusion

6

Investigating Internationally

• What to do when the criminals operate exclusively beyond U.S. borders?– Have a law-firm on call (e.g. China)– FBI global law enforcement

presence• FBI Legal Attaches (LEGAT)

– Global coverage from more than 60 embassies

• Interpol• Mutual Legal Assistance Treaties (MLAT)

Page 7: FBI Cyber Presentation Andrew P. Dodd Special Agent Computer Intrusion Program FBI New Haven Field Office Andrew P. Dodd Special Agent Computer Intrusion

7

Case Study

• Case began in June 2005 when an InfraGard member received a phishing e-mail from Peoples Bank– Member did not have an account with

Peoples Bank and immediately recognized it as phishing

• A spoofed e-mail address and graphical images were created to look like the message was truly from Peoples Bank

• Phishing e-mail contained a link to a phishing web site unwittingly hosted in Minnesota

Page 8: FBI Cyber Presentation Andrew P. Dodd Special Agent Computer Intrusion Program FBI New Haven Field Office Andrew P. Dodd Special Agent Computer Intrusion

8

Romanian Phishing Case Study

• Unwitting owner of phishing web site provided copies of files used to produce the web site– From the scripts, it was determined

that phished data was sent to an e-mail collector account, [email protected]

– Search warrants and subpoenas to Yahoo! and various ISPs revealed a connection to Romania

Page 9: FBI Cyber Presentation Andrew P. Dodd Special Agent Computer Intrusion Program FBI New Haven Field Office Andrew P. Dodd Special Agent Computer Intrusion

9

Romanian Phishing Case Study

• Investigative assistance provided by Peoples Bank revealed numerous ATM withdrawals made in Romanian cities using phished data

• The LEGAT in Bucharest was brought into the investigation– The LEGAT worked closely with the

Romanian National Police (RNP) in a joint investigation

Page 10: FBI Cyber Presentation Andrew P. Dodd Special Agent Computer Intrusion Program FBI New Haven Field Office Andrew P. Dodd Special Agent Computer Intrusion

10

Romanian Phishing Case Study

• Timeline– 06/2005 – case begins from e-mail receipt– 08/2005 – first of many search warrants issued– 01/2007 – Seven Romanians indicted in CT– 06/2007 – First arrest made in Bulgaria– November 10, 2010 – fourteen new indictments– Between December 2011 and November 2013,

nine Romanians were arrested and extradited directly from Romania

– 07/2014 – Last subject sentenced to 45 months

Page 11: FBI Cyber Presentation Andrew P. Dodd Special Agent Computer Intrusion Program FBI New Haven Field Office Andrew P. Dodd Special Agent Computer Intrusion

11

Romanian Phishing Case Study

• Results– 13 Arrests

• 1 Bulgaria, 1 Canada, 1 Croatia, 9 Romania, 1 Sweden• None had ever been to the United States

– 13 Extraditions from 5 different countries– 13 Convictions

• 12 guilty pleas and 1 at trial

– 13 Sentences ranging from 7 – 80 months• Average around 50 months

– First extradition for computer crimes committed by someone who had never been to the U.S.

– First extraditions directly from Romania of Romanian citizens

Page 12: FBI Cyber Presentation Andrew P. Dodd Special Agent Computer Intrusion Program FBI New Haven Field Office Andrew P. Dodd Special Agent Computer Intrusion

12

Reaching out to Law Enforcement

• Who• KNOW IN ADVANCE WHO YOU WILL

CALL!!!• Call a known person

• Calling publically listed numbers is BAD PLANNING!

• Verify at least annually your contact information

• What• Computer intrusions and Internet-crimes

• Report regardless of loss

• Share what you know

Page 13: FBI Cyber Presentation Andrew P. Dodd Special Agent Computer Intrusion Program FBI New Haven Field Office Andrew P. Dodd Special Agent Computer Intrusion

13

Reaching out to Law Enforcement

• Why– Because the security of the Internet

is a global community concern• All of us need to work together on this• A secure Internet will boost every

legitimate business• A non-secure Internet may knock out

some competition, but the bottom line of the survivors will not reap the benefits that a secure Internet can provide

Page 14: FBI Cyber Presentation Andrew P. Dodd Special Agent Computer Intrusion Program FBI New Haven Field Office Andrew P. Dodd Special Agent Computer Intrusion

14

Reaching out to Law Enforcement

• Where• Location of intrusion• Where are the computers?

• Location of subject• Often not known until deep into

investigation

• Company headquarters• Often better equipped to assist with

investigation

Page 15: FBI Cyber Presentation Andrew P. Dodd Special Agent Computer Intrusion Program FBI New Haven Field Office Andrew P. Dodd Special Agent Computer Intrusion

15

Reaching out to Law Enforcement

• When– As soon as you can, however…– Collect as much information as you can

before calling law enforcement• Once law enforcement becomes involved,

restrictions on gathering evidence may attach• More information will help to determine if an

investigation will be opened and what, if any, public exposure the victim may face

Page 16: FBI Cyber Presentation Andrew P. Dodd Special Agent Computer Intrusion Program FBI New Haven Field Office Andrew P. Dodd Special Agent Computer Intrusion

16

Reaching out to Law Enforcement

• How– However you had it planned

• Work day, work hours• Work day, after hours• Weekend• Holiday• POC on vacation

Page 17: FBI Cyber Presentation Andrew P. Dodd Special Agent Computer Intrusion Program FBI New Haven Field Office Andrew P. Dodd Special Agent Computer Intrusion

Questions???

SA Andrew P. Dodd203-503-5488

[email protected]

SA Andrew P. Dodd203-503-5488

[email protected]