New Canaan Senior Men's Club

Download Report

Transcript New Canaan Senior Men's Club

An Executive Briefing
Cybercrime
A Private Presentation, 9/16/05
1
Cyberspace 2005 : Growing Opportunities for Crime
•
•
•
•
•
•
•
1 billion people on Internet
10 Billion Web pages accessible on Internet
12% of global trade via Internet
7.7% of U.S. consumer spending
1.4+ Billion Internet Auctions
2.2+ Billion Google searches/month
2+ trillion U.S. e-mails/year
A Private Presentation, 9/16/05
2
Who Are the Attackers?
 Hackers
Robot Network Operators; Phishers; Malware Authors; Spam
 Criminals
 Impersonators; Fraud Operatives; Extortion Rackets
 Spies
Insiders; Corporate Spies; Foreign Intelligence Services
 Terrorists
Spooking Defenses; Denial of Service
A Private Presentation, 9/16/05
3
Part - 1
 Hackers
 Criminals
 Spies
 Terrorists
A Private Presentation, 9/16/05
4
Cops and
Robbers
Share
Identical
Information
A Private Presentation, 9/16/05
5
Tools are Readily Available
SOURCE: http://www.hackershomepage.com/
A Private Presentation, 9/16/05
6
Similar Catalogs Offer A Wide Range of Hacking Tools
A Private Presentation, 9/16/05
7
From Hackershomepage.com Advertisement
• 800b MSR206 MAGNETIC STRIPE CARD
READER/WRITER
• THIS IS THE DEVICE EVERYONE HAS
BEEN ASKING FOR.
• This device will allow you to change the
information on magnetic stripe cards,
on ALL 3 tracks.
• It will also allow you to write to new
cards.
A Private Presentation, 9/16/05
8
From Hackershomepage.com Advertisement
• 701 COMPUTER KEYSTROKE GRABBER
• Use this device to capture ALL
keystrokes on a computer including
user name and password.
• Password will be in plain text and not
echoed like "********". This device will
grab email and system passwords.
A Private Presentation, 9/16/05
9
Partial List How to Make Virus and Criminal Software
123Mania
2020Search
404Search
7FaSSt
A ccessPlugin
A ctualNames
A CXInstall
A dBreak
A dRoar
A dultBox
A dultLinks
A ornum
A proposMedia
A Spam
A utoSearch
A utoStartup
BargainBuddy
BDE
BookedSpace
BroadcastPC
Brow serA id
Brow serToolbar
Bulla
ClearSearch
ClickTheButton
ClientMan
CnsMin
CometCursor
Comload
CommonName
CoolWebSearch
CrackedEarth
CustomToolbar
Cytron
DailyToolbar
DailyWinner
DialerA ctiveX
DialerMaker
DialerOff line
DialXS
Dow nloadPlus
Dow nloadReceiver
Dow nloadWare
E2Give
EasySearchBar
Enconf idence
eStart
eXactSearch
ezCyberSearch
ezSearching
FastV ideoPlayer
FavoriteMan
FlashTrack
FreeScratchA ndWin
FreshBar
GA Msys
Gator
GlobalNetcom
GogoTools
GrandStreet
Gratisw are
Httper
HuntBar
Hyperlinker
IEA ccess
IEDriver
IEMonit
IEPlugin
IETray
IGetNet
ILookup
InetSpeak
InternetOptimizer
InternetWasher
IPInsight
ISTbar
KeenV alue
Keyw ords
LinkReplacer
lop
MagicControl
MarketScore
MasterDialer
MatrixDialer
MediaTickets
MediaUpdate
Meridian
MoneyTree
MoreResults
MyPageFinder
MySearch
Naupoint
NavExcel
nCase
NeoToolbar
NetPal
NetShagg
Netw orkEssentials
New DotNet
New tonKnow s
Now Box
Onf low
OnlineDialer
Perf ectNav
PerMedia
Pow erStrip
Pugi
PurityScan
RapidBlaster
RelatedLinks
RichFind
Roimoi
SaveNow
SCA gent
SearchAndBrow se
Searchex
Searchfst
SearchRelevancy
SearchSprint
SearchSquire
A Private Presentation, 9/16/05
SearchWWW
ShopA tHomeSelect
ShopNav
Sidesearch
SmartBrow ser
SmartestSearch
SpecialOf f ers
SpyBlast
SRE
StarDialer
StripPlayer
SubSearch
Supaseek
SuperBar
SuperSpider
Surf airy
SV A Player
SvcMM
TargetSaver
TinyBar
ToolbarCC
TopConverting
TOPicks
TopText
Transponder
Tubby
TV Media
UCmore
UCSearch
V istaBar
10
Password Cracking Tool
A Private Presentation, 9/16/05
11
Password Cracker Shopping List
A Private Presentation, 9/16/05
12
Example of Malware Marketplace
A Private Presentation, 9/16/05
13
Part - 2
 Hackers
 Criminals
 Spies
 Terrorists
A Private Presentation, 9/16/05
14
What Is the Problem?
• 27.3 Million Americans in last five years were
victims of identity theft.
• 57 Million of US adults who were recipients of
attempts to steal their electronic identification.
A Private Presentation, 9/16/05
15
What’s the Corporate Cost of Cybercrime?
• $48 Billion total loss to businesses.
• $2.6 Billion writeoffs taken by on-line
merchants in 2004. Equals 2% of sales.
• $5.8 Billion cost for business security.
• 75% of the losses caused by insiders.
A Private Presentation, 9/16/05
16
NYTimes,
6/18/05
A Private Presentation, 9/16/05
17
A Long List of Known Compromises
• Loss of tapes by Citigroup, compromising 3.9 million
accounts;
• Theft of account information by former employees of
the Bank of America (108,000 accounts);
• Loss of 16,500 employees' details at MCI, stolen from
laptop in a garage;
• Loss of back-up tapes containing 1.2 million charge
card holder details at the Bank of America;
• Credit information about 145,000 accounts, stolen
from Choicepoint, an information services company.
A Private Presentation, 9/16/05
18
How It Works (Simplified Version)
1. Bank issues credit card to Customer.
2. Customer pays Merchant with credit card.
3. Merchant passes credit card to Payment
Processor.
4. Payment Processor approves Customer
and gives OK to Merchant to deliver.
5. Payment Processor bills Bank.
6. Bank bills Customer.
A Private Presentation, 9/16/05
19
Points of Vulnerability
Customer Applies
Bank Issues Credit Card
Customer Uses Card
Merchant Receives Card
Payment Processor Receives Card
100+ Computers
1,000+ Phone Links
10+ Databases
100M Lines of Code
1,000+ Operators
10,000+ Maintainers
Payment Processor Bills Bank
A Private Presentation,
Customer
Pays 9/16/05
20
Impersonation (Identity Theft) Statistics
• 700,000 identity theft victims a year.
• Most learn about identity theft 12
months after it has occurred.
• More than half of victims report their
cases have been opened an average of
44 months.
• Victims report they've spent an average
of 175 hours actively trying to clear
their names.
SOURCES: FTC Clearinghouse Report, FBI Law Enforcement Bulletin and Security Management Magazine
A Private Presentation, 9/16/05
21
Phishing
• Setting up a fake store front that looks
like the real one to trick people; usually
to steal their personal information.
• 20 million+ attacks/month
• Named after Brien Phish who set up a
credit card scam in the 1980s over the
phone by pretending to be from the
credit card company.
A Private Presentation, 9/16/05
22
Pharming
• A message to a bank is redirected to an
address that the user did not intend.
• Usually done to extract personal
information from the user into the
hands of a hacker.
A Private Presentation, 9/16/05
23
Spear Phishing
From: NAVY.MIL E-MAIL SERVER
HTTP:/WWW.NAVY.MIL
COMNAVSURFLANT
1. MAIN MAILING SERVER WILL BE UNAVAIBLE
FOR NEXT TWO DAYS.
2. TO CONTINUE RECEIVING MAIL YOU HAVE TO
CONFIGURE AUTO-FORWARDING SERVICE.
3. FILL ATTACHED FORM MIL-005698/135.2
A Private Presentation, 9/16/05
24
Fake Security Message
A Private Presentation, 9/16/05
25
A Fake Security Checkup
A Private Presentation, 9/16/05
26
Invitation to Commit a Criminal Act
A Private Presentation, 9/16/05
27
Organization to Exploit Identify Theft (The ShadowCrew Case)
Enforcers (2-6)
Moderators (12-24)
Reviewers (100+)
Make sure payments are made
Administer Discussion “Forums”
offer “Tutorials”. Organize.
Examine offerings, Evaluate
$ gains, Post Reviews
Sellers (100 - 200)
Acquire identity sources,
Advertise and deliver
“merchandise”,
Money Launderers (few)
Conversion to and from
Electronic credits to cash.
A Private Presentation, 9/16/05
28
Sale of Credit Cards
• Forum.carderplanet.net offered credit cards.
• USD $200.00 - 300 USA credit cards without cvv2
code: credit card number, exp. day. cardholder billing
address,zip,state).
• USD $200.00 - 50 USA credit cards with cvv2 code:
credit card number, exp. day. cardholder billing
address & CVV code from the back side of the card).
• Also cards with SSN+DOB at $40 each.
• Minimal deal $200
A Private Presentation, 9/16/05
29
Part - 3
 Hackers
 Criminals

Spies
 Terrorists
A Private Presentation, 9/16/05
30
Parasitic Software
Spyware: Software that leaks information to a
third party.
Adware: Software that shows advertising
materials to its user.
Browser Hijackers: Software that changes
browser settings to point users elsewhere.
Backdoors: Software that can cause other
untrusted software to be installed.
Cookies: A record about browser searches.
A Private Presentation, 9/16/05
31
Worms
• A computer Worm is a self-replicating
computer program.
• A Worm is self-contained and and can selfreproduce itself to other computers.
• A common payload is to install a Backdoor
into the infected computer to convert them to
Zombies.
A Private Presentation, 9/16/05
32
Zombie Computer
• A zombie computer performs malicious tasks
under the direction of the hacker.
• Owners are unaware.
• Over 50% of all spam worldwide is now sent
by zombies.
A Private Presentation, 9/16/05
33
Spyware
Spyware Worms have the ability to selfreplicate without a host program and send
information from a computer to a third party
without the user's permission or knowledge.
A Private Presentation, 9/16/05
34
Flaws in Cyber-Crime Protection
•
•
•
•
•
•
•
•
Banks pass risks to merchants;
Credit cards easy to get;
Privacy laws inhibit fraud detection;
Audits only of financial assets, not data integrity,
Software firms have no liability;
Legal protection of cyber-crime insufficient;
FBI has totally insufficient resources;
Apprehension and then prosecution very hard.
A Private Presentation, 9/16/05
35
Prosecution is Not a Deterrent
Nigeria Woman in $242M E-mail Fraud Case
LAGOS (Reuters)—A Nigerian court has
sentenced a woman to two and half years in jail
…and a $15,000 fine.
A Private Presentation, 9/16/05
36
Do Not Expect Help
A Private Presentation, 9/16/05
37
Part - 4
 Hackers
 Criminals
 Spies

Terrorists
A Private Presentation, 9/16/05
38
What is Cyber-Terror?
• Terrorism is violence to intimidate or coerce
the target.
• Objectives are primarily political and social or
economic in case of extortion.
• Cyber-terror is the exploitation of computing
for acts of terrorism.
A Private Presentation, 9/16/05
39
Global View
of Internet
Connectivity
A Private Presentation, 9/16/05
USA
40
US Internet Backbone Concentrated in a Few Switches
A Private Presentation, 9/16/05
41
Current Prospects
•
•
•
•
Rising U.S. dominance in world trade.
U.S. information superiority.
Rapidly escalating anti-U.S. hostility.
Military actions combined with cyberterrorism
acts.
• Damage U.S. economic power and
functioning of the U.S. civil society through
cyberterrorism.
A Private Presentation, 9/16/05
42
A Cyber-Terror List
•
•
•
•
•
•
•
Stop trading on Stock Exchanges
Interrupt VISA processing
Corrupt Medicare/Medicaid Database
Prevent payments of Social Security
Disable Motor Vehicle registration data
Damage Internet Routing Tables
Deny Internet access to the Military
A Private Presentation, 9/16/05
43
Data on Detected Attacks on the Department of Defense
Number of Cyber-attacks on DoD
80,000
70,000
60,000
50,000
40,000
30,000
20,000
10,000
0
1997 1998 1999 2000 2001 2002 2003 2004
A Private Presentation, 9/16/05
44
Advice
Learn How to Operate in Cyberspace
A Private Presentation, 9/16/05
45
Deploy a Spam and Malware Catchers
A Private Presentation, 9/16/05
46
1,333 Intruders Caught in one Week
A Private Presentation, 9/16/05
47
Allow only Approved Senders to Pass Through
A Private Presentation, 9/16/05
48
Use Rapidly Changing Passwords
A Private Presentation, 9/16/05
49
Keep 495 Members of InfraGard in Connecticut Informed
QuickT ime™ and a
T IFF (Uncompressed) decompressor
are needed to see this picture.
https://secure.infragard-ct.org/
A Private Presentation, 9/16/05
50