how to prevent a disaster in cyberspace · 2011-04-11 · how to prevent a disaster in cyberspace ?...

33
How to prevent a How to prevent a disaster in cyberspace ? disaster in cyberspace ? The need for an international approach The need for an international approach to undermine the criminal cyber architecture to undermine the criminal cyber architecture © © 2011 Luc Beirens 2011 Luc Beirens Federal Computer Crime Unit Federal Computer Crime Unit - - Belgian Federal Judicial Police Belgian Federal Judicial Police Direction economical and financial crime Direction economical and financial crime Open-ended intergovernmental expert meeting on cybercrime UNODC Vienna, 19-01-2011

Upload: others

Post on 17-Mar-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

How to prevent a How to prevent a

disaster in cyberspace ?disaster in cyberspace ?

The need for an international approachThe need for an international approach

to undermine the criminal cyber architectureto undermine the criminal cyber architecture

©© 2011 Luc Beirens 2011 Luc Beirens –– Federal Computer Crime Unit Federal Computer Crime Unit -- Belgian Federal Judicial Police Belgian Federal Judicial Police –– Direction economical and financial crimeDirection economical and financial crime

Open-ended intergovernmental expert meeting on cybercrimeUNODC Vienna, 19-01-2011

Page 2: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

Presentation Presentation

�� Luc BeirensLuc Beirens

Chief SuperintendentChief Superintendent

HeadHead of the Federal Computer Crime Unitof the Federal Computer Crime Unit

Belgian Federal Judicial PoliceBelgian Federal Judicial PoliceDirection Economical and financial crimeDirection Economical and financial crime

Chairman of the EU Cybercrime task forceChairman of the EU Cybercrime task force

representing the organization of heads of representing the organization of heads of

national hightech crime units of the EUnational hightech crime units of the EU

Page 3: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

Topics Topics -- overviewoverview

�� General trends todayGeneral trends today

�� Cyber crimes and cyber criminals todayCyber crimes and cyber criminals today

�� What hinders the combat today ?What hinders the combat today ?

�� A proposal for an integrated responseA proposal for an integrated response

�� Belgian experiencesBelgian experiences

Page 4: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

General trends todayGeneral trends today

�� Evolution towards Evolution towards ee--societysociety

�� replace persons by ereplace persons by e--applicationsapplications

�� Interconnecting all systems (admin, industrial, control)Interconnecting all systems (admin, industrial, control)

�� IPIP is is common platform common platform offered by offered by many ISPsmany ISPs

integrating telephony / data / VPN & all new apps integrating telephony / data / VPN & all new apps

=opportunities / Achilles tendon / scattered traces=opportunities / Achilles tendon / scattered traces

�� Poor security Poor security in in legacylegacy applications and applications and

protocols (userid+pw)=> identity fraud is easyprotocols (userid+pw)=> identity fraud is easy

�� EnduserEnduser is not yet educated to act properlyis not yet educated to act properly

Page 5: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

What do criminals want ? What do criminals want ?

Page 6: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

How : cyber crimes todayHow : cyber crimes today

�� ee--fraudfraud => give money to the criminals=> give money to the criminals

�� spamspam => start for eFrauds => start for eFrauds

�� hackinghacking => =>

�� change content of your website (defacing)change content of your website (defacing)

�� transfer money from the hacked systemtransfer money from the hacked system

�� espionnage => know your victimespionnage => know your victim

�� use of hacked system => use of hacked system =>

storage / spam / proxy / DNS / CC / DDOS storage / spam / proxy / DNS / CC / DDOS

�� DDOS DDOS distributed denial of service attacksdistributed denial of service attacks

Page 7: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

How to combat How to combat

cyber criminals ?cyber criminals ?

Analyse their methods and toolsAnalyse their methods and tools

Page 8: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

Webserver / node

InternetInternet

Command &Control Server

Hacker

Access line Access line

blockedblocked

ComputerComputer

CrashCrash

Botnet attack on a webserver / node

My IP is x.y.z.z

Info

Cmd

Page 9: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

Interesting DDOSInteresting DDOS

�� 2004 UK : gambling website down (+ hoster + ISP)2004 UK : gambling website down (+ hoster + ISP)

�� 2005 Netherlands : 2 botnets : millions of zombies2005 Netherlands : 2 botnets : millions of zombies

�� 2005 Belgium : Commercial firm during social conflict2005 Belgium : Commercial firm during social conflict

�� 2006 Sweden : Gov websites after police raid on P2P2006 Sweden : Gov websites after police raid on P2P

�� 2007 Estonia : political inspired widespread DDOS attack2007 Estonia : political inspired widespread DDOS attack

�� 2008 Georgia : cyber war during military conflict2008 Georgia : cyber war during military conflict

�� 2010 Worldwide : Wikileaks cyberconflict2010 Worldwide : Wikileaks cyberconflict

Page 10: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

What are botnets used for ? What are botnets used for ?

Making money !Making money !

�� Sometimes still for Sometimes still for funfun (scriptkiddies)(scriptkiddies)

�� SpamSpam distribution via Zombiedistribution via Zombie

�� Click generationClick generation on banner publicityon banner publicity

�� DialerDialer installation on zombie to make premium rate callsinstallation on zombie to make premium rate calls

�� Spyware / malwareSpyware / malware / ransomware / ransomware installation installation

�� EspionageEspionage : : bankingbanking details / passwords / keyloggingdetails / passwords / keylogging

�� TransactionsTransactions via zombie PCvia zombie PC

�� Capacity for distributed denial of service attacks Capacity for distributed denial of service attacks DDOSDDOS=> disturb functioning of internet device (server/router)=> disturb functioning of internet device (server/router)

Page 11: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

Webserver / node

InternetInternet

Command &Control Server

Hacker

Malware update / knowledge transfer

Collected Info

Knowledge server

Malware update server

MW update

Very frequent MW update request

triggerevent

Page 12: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

Cyber criminalCyber criminal’’s toolboxs toolbox

�� malwaremalware => trojan horses=> trojan horses

�� distribution via mail, p2p, social networks, websitesdistribution via mail, p2p, social networks, websites

�� autoauto--updateupdate & & autoauto--propagation propagation in networkin network

�� very high rate of new versionsvery high rate of new versions

�� remote control of infected systems remote control of infected systems

=> => botnetsbotnets

�� creation of creation of knowledge databasesknowledge databases

�� collected & keylogged info of infected pccollected & keylogged info of infected pc

�� keyservers in keyservers in safe havensafe haven countriescountries

Page 13: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

But the criminal cyber architecture But the criminal cyber architecture

also includes ...also includes ...

�� Underground fora Underground fora and chatroomsand chatrooms

�� Botnets for hire Botnets for hire

�� Malware on demand / off the shelf packagesMalware on demand / off the shelf packages

�� Trade stolen Credit cards / credentials Trade stolen Credit cards / credentials

�� Money laundering servicesMoney laundering services

�� Organized Cyber criminalsOrganized Cyber criminals

�� take over / set up take over / set up ISPISP’’ss

�� infiltrate in infiltrate in development firmsdevelopment firms

Page 14: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

And the victims ?And the victims ?

�� Who ?Who ?

�� Communication networks and service providersCommunication networks and service providers

�� Companies especially transactional websitesCompanies especially transactional websites

�� Every internet userEvery internet user

�� ReactionReaction

�� UnawareUnaware of incidents going on => dark numberof incidents going on => dark number

�� Victims try to solve it themselvesVictims try to solve it themselves

�� Nearly Nearly no complaints no complaints made => dark numbermade => dark number

�� Result ? The hackers go on developing botnetsResult ? The hackers go on developing botnets

Page 15: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

RisksRisks

�� Economical disasterEconomical disaster

�� Large scale : critical infrastructureLarge scale : critical infrastructure

�� Small scale : enterpriseSmall scale : enterprise

�� Individual & corporate (secret) dataIndividual & corporate (secret) data

�� Loss of trust Loss of trust in ein e--societysociety

Page 16: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

Combined threatCombined threat

�� What if abused by terrorists ? Cyber army ?What if abused by terrorists ? Cyber army ?

... simultaniously with a real world attack?... simultaniously with a real world attack?

�� How will you handle the crisis ?How will you handle the crisis ?

Your telephone system is not working !Your telephone system is not working !

Page 17: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

Intermediate conclusionsIntermediate conclusions

�� Society is very dependant of ICTSociety is very dependant of ICT

�� eSociety is very vulnerable for attackseSociety is very vulnerable for attacks

�� Urgent need to reduce risks on critical ICTUrgent need to reduce risks on critical ICT

�� Botnets as criminal cyber infrastructure Botnets as criminal cyber infrastructure

is is common platform common platform for lots of cybercrimesfor lots of cybercrimes

=> => undermine it and you reduce crimeundermine it and you reduce crime

Page 18: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

Traditional way of law enforcementTraditional way of law enforcement

to tackle cybercrimeto tackle cybercrime

�� ReactiveReactive

�� Register complaint => judicial caseRegister complaint => judicial case

�� Hotlines (or cooperation with) Hotlines (or cooperation with)

�� (Eventualy) undercover operations(Eventualy) undercover operations

�� Proactive (?)Proactive (?)

�� Who is doing what, where and how ?Who is doing what, where and how ?

�� Patrolling the net Patrolling the net

�� Effective (?) but not undermining cybercriminalsEffective (?) but not undermining cybercriminals

Page 19: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

What hinders an effective What hinders an effective

combat of cyber crime ?combat of cyber crime ?

�� Unawareness and negligence Unawareness and negligence end user end user

�� LackLack of overall of overall view on risks / incidents view on risks / incidents byby

�� Enterprise managersEnterprise managers

�� Political decision makersPolitical decision makers

�� Combating : Combating : everyone on his owneveryone on his own

�� Lack of specialized investigatorsLack of specialized investigators

�� Jurisdictions limited by Jurisdictions limited by nationalnational bordersborders

�� Subscriber Subscriber identity fraud identity fraud

�� MobilityMobility of the (criminal) services in cloudof the (criminal) services in cloud

Page 20: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

What actions are needed ?What actions are needed ?

EveryoneEveryone plays a role in eplays a role in e--securitysecurity

We have to do it as We have to do it as partners partners

We have to do it in an We have to do it in an integrated wayintegrated way

Page 21: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

Goals for operational Goals for operational

cybercrime action plancybercrime action plan

�� As As ““societysociety”” (= gov & private sector)(= gov & private sector)

improve improve detectiondetection and and get a view get a view andand act act on on

�� criminal cyberinfrastructure especially botnetscriminal cyberinfrastructure especially botnets

�� incidents threatening eSocietyincidents threatening eSociety

�� Strengthen Strengthen robustnessrobustness of ICT eSocietyof ICT eSociety

�� ISPISP’’s / Enterprises / End userss / Enterprises / End users

�� WeakenWeaken and and dismantledismantle

the criminal cyberinfrastructure the criminal cyberinfrastructure

�� Each partner within his role & competenceEach partner within his role & competence

Page 22: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

Webserver / node

InternetInternet

BotnetserversCC, Knowledge, MW

Hacker

Actions against botnet architecture

Preserve evidence

Report incident

Identify critical infrastructure

Alarm procedures

Prevent infection & MW autopropagation

Detect infections & desinfect

Stop activity

Bring to court

Preserve evidence

Analyse to identify hacker& zombies

Take out oforder

Page 23: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

Role of governments & Role of governments &

international organizations international organizations

�� Working according Working according a strategya strategy

�� Develop Develop internationalinternational plans & reaction schemes plans & reaction schemes

for for critical ICT infrastructure protectioncritical ICT infrastructure protection

�� Develop Develop legal framework legal framework

�� ObligationObligation to to reportreport cybercrime incidents cybercrime incidents

�� ObligationObligation to to securesecure your computersystem (?)your computersystem (?)

�� Possibility for ISP to Possibility for ISP to cut off cut off infected machines (?)infected machines (?)

�� Obligation to respond to requests of Gov authorityObligation to respond to requests of Gov authority

when serious incidents happenwhen serious incidents happen

Page 24: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

Telecommunications sectorTelecommunications sector

�� Prevent / reduce SPAMPrevent / reduce SPAM

�� Have to make there infrastructure Have to make there infrastructure robustrobust

�� ReportReport serious incidents to CERT serious incidents to CERT

�� Integrated reaction Integrated reaction with authoritieswith authorities

�� Implement Implement strong authentication strong authentication in in

internet protocols and servicesinternet protocols and services

�� Detect negligent Detect negligent end users end users & react/help/& react/help/cut offcut off

Page 25: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

EnterprisesEnterprises

�� EE--Security = Security = business risk business risk => => management responsibilitymanagement responsibility

�� Think about Think about how to survive how to survive when when ee--systems are under attacksystems are under attack

�� Enforce Enforce detectiondetection of incidents of incidents –– IDS ?IDS ?

�� ReportReport incidents to CERT ? to police ?incidents to CERT ? to police ?

�� Integrate Integrate strong authentication strong authentication in in ee--business applicationsbusiness applications

Page 26: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

DevelopersDevelopers

�� Strong authenticationStrong authentication

�� Use the strongest available but ...Use the strongest available but ...

�� Think as a hacker Think as a hacker

How can a transaction on an infected PC How can a transaction on an infected PC

be intercepted ?be intercepted ?

�� Store Store IPIP--addressesaddresses and timestampsand timestamps

�� of the end user ! not of the router !of the end user ! not of the router !

�� Needed in case of an Needed in case of an incidentincident !!

Page 27: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

Responsibilization of end userResponsibilization of end user

�� AwarenessAwareness raising => mediaraising => media

�� TrainingTraining on eon e--security & attitudesecurity & attitude

�� already at schoolalready at school

�� in the enterprisesin the enterprises

�� Obligation to Obligation to secure his PC properly ?secure his PC properly ?

Page 28: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

Role of police and justice ?Role of police and justice ?

�� Gather intelligence Gather intelligence about Botnetsabout Botnets

�� Dismantle botnet servers Dismantle botnet servers

in your countryin your country

�� Analyse BotnetAnalyse Botnet--servers servers

to find traces to criminalsto find traces to criminals

�� Focus on knowledge servers & CC serversFocus on knowledge servers & CC servers

Page 29: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

Belgian experienceBelgian experience

�� 1 national 1 national FCCUFCCU +25 Regional CCU=175 officers +25 Regional CCU=175 officers

(computer forensics & cybercrime combat)(computer forensics & cybercrime combat)

�� 2 specialized Federal prosecutors2 specialized Federal prosecutors

minimum 1 ICT reference prosecutor / districtminimum 1 ICT reference prosecutor / district

�� FCCU analyses attacks on critical ICT infraFCCU analyses attacks on critical ICT infra

�� BelNISBelNIS Gov Network information securityGov Network information security

�� Develops and organizes ICT security strategyDevelops and organizes ICT security strategy

�� Problem : no central authorityProblem : no central authority

�� Since 2009 : Since 2009 : Cert.be Cert.be for Gov and Critical infrafor Gov and Critical infra

Page 30: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

Belgian experienceBelgian experience

�� eBanking fraud => start of eBanking fraud => start of Malware analysisMalware analysis

�� Gain insight in how itGain insight in how it’’s workings working

�� Leads to detection of botnetLeads to detection of botnet--servers / bogus ISPservers / bogus ISP’’ss

�� Combined team Combined team cybercrime & financial investigatorscybercrime & financial investigators

�� Building trustBuilding trust with law enforcement with other with law enforcement with other

countriescountries

�� Collaboration with several partners and organizationsCollaboration with several partners and organizations

=> Information send to & analysed by => Information send to & analysed by Cert.beCert.be

�� Effective in Effective in dismantling of Botnetdismantling of Botnet--servers servers (50 since (50 since ‘‘09)09)

�� Impact of 1 Malware distribution server ? Analysis showsImpact of 1 Malware distribution server ? Analysis shows

�� 2 months 1,5 million downloads, 300.000 unique IP2 months 1,5 million downloads, 300.000 unique IP’’ss

Page 31: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

ProblemsProblems

�� BotnetBotnet--servers often on servers often on victimvictim’’s serverss servers

�� But is it really a victim ?But is it really a victim ?

�� No knowledgeNo knowledge--servers in BEservers in BE

�� Language problem during analysis CCLanguage problem during analysis CC--serverserver

�� Is it the role of the police / Cert ?Is it the role of the police / Cert ?

�� If Cert does it (eg Finland) If Cert does it (eg Finland)

�� => fast but do we go after criminals afterwards ?=> fast but do we go after criminals afterwards ?

�� Which incidents are severe enough to report to police ?Which incidents are severe enough to report to police ?

�� If police does it If police does it

�� Which botnetWhich botnet--servers do we analyse ?servers do we analyse ?

�� Malware analysis => help from AVMalware analysis => help from AV--industry ?industry ?

Page 32: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

Do we really have an impact ?Do we really have an impact ?

�� Several hundreds of botnetsSeveral hundreds of botnets

�� 5.000 5.000 –– 10.000 botnet servers world wide10.000 botnet servers world wide

�� Millions of infected end usersMillions of infected end users

=> need for action in every country => need for action in every country

Page 33: How to prevent a disaster in cyberspace · 2011-04-11 · How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture

CContact informationontact information

Federal Judicial PoliceFederal Judicial PoliceDirection for Economical and Financial crimeDirection for Economical and Financial crime

Federal Computer Crime UnitFederal Computer Crime UnitNotelaarstraat 211 Notelaarstraat 211 -- 1000 Brussels 1000 Brussels –– BelgiumBelgium

TelTel officeoffice : +32 : +32 2 2 743 74 74743 74 74

Fax Fax : +32 : +32 2 2 743 74 19743 74 19

EE--mailmail : : [email protected]@fccu.be