How to secure your home network

Download Report

Transcript How to secure your home network

HISTORY AND OVERVIEW
OF COMPUTER CRIME
BY CHUCK EASTTOM
WWW.CHUCKEASTTOM.COM
[email protected]
ABOUT THE SPEAKER
• 18 books (#19 in progress)
• 29 industry certifications
• 2 Masters degrees (#3 in progress)
• 5 Computer patents
• Over 20 years experience, over 15 years
teaching/training
• Frequent consultant/expert witness
www.chuckeasttom.com
[email protected]
TYPES OF COMPUTER CRIME
•
•
•
•
•
•
•
•
•
•
•
•
Identity theft
Cyber stalking/harassment
Unauthorized access to computer
systems or data
Fraud
DOS
Virus
Worm
Logic Bomb
Trojan Horse
Spyware
Child pornography
DNS Poisoning
•
•
•
•
•
•
•
•
•
•
•
•
•
Ransomware
Buffer Overflow
Cyber espionage & terrorism
ID Theft
Social Engineering
Phreaking
SQL Injection
Cross Site Scripting
DNS Poisoning
Session Hijacking
IP spoofing/MAC spoofing
Terrorism
Stolen goods
COMPUTER CRIME STATISTICS
 From January 1, 2009 through December 31, 2009, the Internet Crime
Complaint Center (IC3) Web site received 336,655 complaint submissions
 The Federal Trade Commission found that in 2005, 8.3 million Americans were
the victim of some form of identity theft
 Every second, $3,075.64 is being spent on pornography, 28,258 Internet
viewers are viewing pornography, 372 Internet users are typing adult search
terms into search engines, and every 39 minutes, a new pornographic video is
made in the United States.
 Also according to Enough is Enough, pornography is a 97 billion dollar a year
business, and child pornography is a 3 billion dollar a year business
STATISTICS AS OF 2014
• According to SC Magazine “Cyber crime and economic
espionage cost the global economy more than $445
billion annually, which a report from the Center for
Strategic and International Studies, says puts cyber crime
on par with the economic impact of global drug
trafficking. “
ADDITIONAL STATISTICS
• These are as of 2013
• More than 600,000 FaceBook accounts are compromised
every day.
• 18 Cybercrime victims per second
• Botnets have been using as many as 120,000 infected
“zombie” computers to send out spam each day.
ATTACK TYPES 2013
INDUSTRIES
THE EARLIEST DAYS
•
Mr. Draper was known in hacking circles as ‘Captain
Crunch’. He was repeatedly arrested throughout the
1970’s on charges of phone tampering. This particular
case is very interesting because it highlights the state of
computer related crimes prior to the internet. In those
early days most of the incidents involved tampering with
phone systems. This process is colloquially referred to as
‘phreaking’. Phreaking is really the ancestor of later
hacking, and not surprisingly many of the people
involved in phreaking moved on to become hackers.
John Draper is one of the more famous hackers, and has
since become a computer security consultant.
FIRST COMPUTER CRIME ARREST
The year 1981 was a pivotal year in the history of computer
crime. In this year Ian Murphy was arrested because he and
three accomplices hacked into the AT&T systems and
changed their system’s internal clocks. This change may seem
trivial, but had significant repercussions. People using the
phone system suddenly received late-night discounts in the
afternoon, while others who waited until midnight to use the
phone received larger bills.
FIRST VIRUS
1981 was not only the year of the first arrest for a
computer crime, it was also a pivotal year in the
history of computer viruses. The first widely known
viruses found ‘in the wild’ (i.e. out in the public) where
the Apple 1, 2, and 3 viruses, first discovered in
1981. These viruses targeted the Apple II operating
system and spread initially in the Texas A&M
University systems via pirated computer games.
VIRUSES EVOLVE
•
2000 The "I Love You Virus" wreaks havoc around the world. It is
transmitted by e-mail and when opened, is automatically sent to
everyone in the user's address book
• Jan. 2003: The "Slammer" worm infects hundreds of thousands of
computers in less than three hours
• This virus first appeared in July 2012. It affected Windows systems
ranging from Windows 95 to Windows 7 and Windows server 2003.
This was a fake anti-virus (thus the name FakeAV). It would popup
fake virus warnings. This was not the first such fake anti-virus
malware, but it was one of the more recent ones.
FLAME
No modern discussion of viruses would be complete without
a discussion of Flame. This virus first appeared in 2012 and
was targeting Windows operating systems. The first item
that makes this virus notable is that it was specifically
designed for espionage. It was first discovered in May
2012 at several locations, including Iranian government
sites. Flame is spyware that can monitor network traffic and
take screenshots of the infected system.
THE MODERN VIRUS
• Many types
• Multi partite
• Polymorphic
•
Metamorphic (large due to metamorphic engine)
• Sparse infector
• Macro viruses
• Crypto viruses
THE EARLY DAYS OF CYBER CRIME
Shadow Hawk In 1986, a New Jersey seventeen year old young man named Herbert
Zinn was accused of hacking into the AT&T computer systems. Mr. Zinn later confessed to
the crime. Mr. Zinn, operating with the screen name ‘Shadow Hawk’ worked from his
bedroom in his parents’ house, and stole over fifty computer programs. He was
eventually sentenced to 9 months in jail.
The Morris Worm: In 1988 Cornell University graduate student Robert Morris launches a
worm that spreads to over 6000 computers, clogging networks with an overload of
traffic. The purpose of the worm was to exploit security flaws/holes in the Unix
operating system.
In 1994 a 16 year old boy in the United Kingdom who used the screen name ‘data
stream’ broke into several sensitive systems including Griffith Air Force Base, NASA, and
the Korean Atomic Research Institute. This crime was investigated by Scotland Yard, who
eventually found and arrested the perpetrator.
THINGS GET WORSE
1995 marked the capture of Vladimir Levin, a graduate of St. Petersburg
Tekhnologichesky University. Mr. Leven was the alleged ring leader of an organized
group of Russian hackers. This group was purported to have absconded approximately
10 million dollars from CitbiBank.
1997 Phishing first seen. Now variations like spearphishing and whaling are becoming
more common.
FUGGEDABOUTIT
The middle to late 1990’s saw a new trend. The traditional organized crime
groups, such as the New York Italian Mafia, began to see cyberspace as a rich
new field they could plunder. By 1996 New York Mafia families where involved
in ‘pump and dump’ schemes (described in chapter 1), using the internet to help
inflate and sell the stock. In the mid 1990’s Sovereign Equity Management
Corp., a firm based in Boca Raton Florida, was used as a vehicle for various
pump and dump schemes. The details of the company and the process where
detailed in 1996 by Business Week1. However the essentials are this: the
company was a front to take the money of original investors, put it into low
performing stocks, artificially inflate those stocks, then sell the stocks.
DECEMBER 2009
Hackers broke into computer systems and stole secret
defense plans of the United States and South Korea.
Authorities speculated that North Korea was
responsible. The information stolen included a
summary of plans for military operations by South
Korean and U.S. troops in case of war with North
Korea, though the attacks traced back to a Chinese IP
address. This case is clearly an example of cyber
espionage and a very serious one at that.
CYBER TERRORISM • In 2010 60 minutes broadcast a report on hacking and
cyber terrorism. They clearly showed that our power
plants, and perhaps our hardware is vulnerable.
• Also in 2010 Scientific American had an article on
vulnerabilities in the firmware of chips.
• 2008 CENTCOM is infected with spyware
• 2009 Drone video feed is compromised
CYBER WARFARE 2008-2014
• US government publically acknowledges China supporting
hackers who attack corporate sites. Also claims the Peoples
Liberation Army has information warfare units.
• CIO Magazine, examined the issue of government based cyber
espionage in a 2009 article. Their article discusses the
possibility that the Chinese government was behind a
widespread infiltration of over 1200 computers owned by over
100 countries, with the express purpose of spying on the
activities of those countries. The same article mentions that in
2007 the British government accused China of hacking into the
systems of various British banks.
CHINESE EAGLE UNION
No discussion of cyber terrorism would be complete without a discussion of the
China Eagle Union. This group consists of several thousand Chinese hackers
whose stated goal is to infiltrate western computer systems. There are a number
of web resources regarding this group
http://www.thedarkvisitor.com/2007/10/china-eagle-union/
https://news.hitb.org/node/6164
http://archives.cnn.com/2001/WORLD/asiapcf/east/04/27/china.hackers/in
dex.html
Members and leaders of the group insist that not only does the Chinese
government have no involvement in their activities, but that they are breaking
Chinese law and are in constant danger of arrest and imprisonment. Many
analysts find this claim dubious. Whether the Chinese government is involved in
these attacks or not, some experts consider a state of cyber warfare to
currently exist between China and the United States.
CHINA’S APT
• The security firm, Mandiant tracked several APT's over a
period of 7 years, all originating in China, specifically
Shanghai and the Pudong region. These APT's where simply
named APT1, APT2, etc.
• The attacks were linked to the UNIT 61398 of the China's
Military. The Chinese government regards this units activities
as classified, but it appears that offensive cyber warfare is
one of its tasks. Just one of the APT's from this group
compromised 141 companies in 20 different industries. APT1
was able to maintain access to victim networks for an average
of 365 days, and in one case for 1,764 days. APT1 is
responsible for stealing 6.5 terabytes of information from a
single organization over a 10 month time frame.
HACKING MEDICAL DEVICES
• “One of the briefings at Black Hat this year was a session on
how vulnerable medical devices are to cyber attack, given by
Jay Radcliff. “ – Forbes Magazine 2013
• “A researcher from McAfee, the global tech security company,
was able to hack into an insulin pump and cause the device to
dispense all 300 units of insulin it contained, according to BBC
News. The wireless signals used to communicate with the pump
could compromise the security of the device, researcher Barnaby
Jack said. “We can influence any pump within a 300 foot
range,” Jack told the BBC. “We can make that pump dispense its
entire 300 unit reservoir of insulin and we can do that without
requiring its ID number.” – ABC News 2012
• A single dose of that much insulin can be fatal.
CURRENT TRENDS
• Compromising credit card processing/ATM
• Issues with third party devices
• Dramatic increase in phishing and variations
• Continued sophistication of viruses
• Exploitation of vulnerabilities
• Shellshock, Heartbleed, etc.
FUTURE TRENDS
• More credit breaches (i.e. Target, Home Depot, Kmart)
• More sophisticated attacks (i.e. DNS poisoning, spear
phishing, etc.)
• Increased involvement by governments and other
sophisticated groups