Who s Doing the Hacking?



Similar documents
U. S. Attorney Office Northern District of Texas March 2013

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Preventing, Insuring, and Surviving Fund Transfer Fraud... and Other Cyber Attacks

OCIE Technology Controls Program

Federal Bureau of Investigation

Practical Steps To Securing Process Control Networks

FBI CHALLENGES IN A CYBER-BASED WORLD

I N T E L L I G E N C E A S S E S S M E N T

September 20, 2013 Senior IT Examiner Gene Lilienthal

Cybersecurity Awareness. Part 1

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Working with the FBI

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

Cybersecurity: Protecting Your Business. March 11, 2015

Into the cybersecurity breach

CYBERSECURITY INVESTIGATIONS

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Information Security Summit 2005

Presented By: Corporate Security Information Security Treasury Management

CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

NATIONAL CYBER SECURITY AWARENESS MONTH

Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks

CYBERSECURITY HOT TOPICS

Malicious cyber activity is on the increase at risk. This may involve the loss of critical data and consumer confidence, as well as profits

10 Things Every Web Application Firewall Should Provide Share this ebook

SECURITY. Risk & Compliance Services

Italy. EY s Global Information Security Survey 2013

current and previous addresses name/ssn Medical Insurance info UNCLASSIFIED credit info family info phone & fax #

What keep the CIO up at Night Managing Security Nightmares

Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

The Top Ten of Information Security - For 2015

FACT SHEET: Ransomware and HIPAA

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia

2012 Bit9 Cyber Security Research Report

Middle Class Economics: Cybersecurity Updated August 7, 2015

Directives and Legislation

Internet threats: steps to security for your small business

Cybersecurity Workshop

EXTREME CYBER SCENARIO PLANNING & ATTACK TREE ANALYSIS

Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors. Microsoft Confidential for internal use only

SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness

Cybersecurity: What CFO s Need to Know

Defending Against Data Beaches: Internal Controls for Cybersecurity

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

THE CHANGING FACE OF CYBERCRIME AND WHAT IT MEANS FOR BANKS

Cyber Risks and Insurance Solutions Malaysia, November 2013

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Information Security Addressing Your Advanced Threats

Property of Secure Network Technologies-Do Not Distribute or Post Without Written Permission-Copyrights and Trademark Apply

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Welcome to this ACT webinar

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Cybersecurity. Are you prepared?

Franchise Data Compromise Trends and Cardholder. December, 2010

Remarks by. Thomas J. Curry. Comptroller of the Currency. Before the. Chicago. November 7, 2014

Presented by: Islanders Bank

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Statement for the Record. Errol Weiss. Director of the Cyber Intelligence Center. Citi. Before the. House Financial Services Subcommittee on

DENIAL OF SERVICE: HOW BUSINESSES EVALUATE THE THREAT OF DDOS ATTACKS IT SECURITY RISKS SPECIAL REPORT SERIES

FINAL // FOR OFFICIAL USE ONLY. William Noonan

Cybercrime and Identity Theft: Awareness and Protection 2015 HLC Conference

TLP WHITE. Denial of service attacks: what you need to know

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Cybersecurity Governance Update on New FFIEC Requirements

Surviving the Ever Changing Threat Landscape

Don t Fall Victim to Cybercrime:

A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS

Perspectives on Cybersecurity in Healthcare June 2015

FINRA Publishes its 2015 Report on Cybersecurity Practices

Certified Cyber Security Analyst VS-1160

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

INFORMATION SECURITY FOR YOUR AGENCY

Getting real about cyber threats: where are you headed?

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Cybercrime in Canadian Criminal Law

Breakfast Meeting: Securing your Secured Data Digital Forensics, Fraud and Forensic Advancements

Top Fraud Trends Facing Financial Institutions

How To Protect Yourself From A Dos/Ddos Attack

Establishing a State Cyber Crimes Unit White Paper

Data Breach Response Planning: Laying the Right Foundation

Cyber/ Network Security. FINEX Global

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX. How to create a thriving business through trust

Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

Fostering Incident Response and Digital Forensics Research

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

Incident Response. Six Best Practices for Managing Cyber Breaches.

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments

The Cyber Threat Profiler

Transcription:

Who s Doing the Hacking? 1

HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from individual hackers seeking thrills and bragging rights to hacker groups conducting distributed denial of service (DDoS) attacks and website defacements against government and corporate entities.

Cybercriminal Services Mirror legitimate business processes Executives Recruiters Ground level forces Provide a robust technical support structure Advertise R&D Rent/Buy/Lease Products and Services Credit Card vs PII/EHR Fortinet 2013 Cybercrime Report

Retail Threat Vectors Sophisticated Botnets Point of Sale Malware Fraudulent Payment Methods Mobile Payments Distributed Denial of Service Business Email Compromise 4

Oregon IC3 Reports for September 2015 Acct pics used for escort 2 Bank Fraud 8 Business Email Compromise 13 Breach 1 Credit Card Fraud 7 Scareware / RA 5 DDoS 3 Email Fraud 7 Email Takeover 3 Facebook Fraud 5 Facebook Takeover 2 Hacking/reshipping 3 WalMart Reshipping 5 Identity Theft 16 Misc. Reports 8 Online Car Scam 2 Online Purchase Fraud 10 PC Repair Fraud 11 Phishing 2 Ransom - Ashly Madison 5 Ransom - misc. 4 Romance Fraud 5 Spam 2 Virus 2 Internet Crime Complain Center on ic3.gov 5

Real Oregon Victims: BEC Registers a domain close to the victim domain Proxy Server @0regonbiz.com @oregonbiz.com The following BEC statistics were reported to the Internet Crime Complaint Center from October 2013 to August 2015: Total U.S. Victims: 7,066 Total U.S. exposed dollar loss: $747,659,840.63 CFO or subordinate accounts managers Spoofed e-mail from CEO to CFO requesting wire transfer Will it be caught?

Real Oregon Victims: Malicious Insider Situation: John, a programmer, believes he is going to be fired and wants to punish his employer Writes a program on the file server to delete the files from the server on Friday night if(curr_datetime >= 06/15/2016 20:00:00 ) { system( delete *.* ); } UNCLASSIFIED 7

Real Oregon Victims: Ransomware Reveton, Crypto Locker, Cryptowall and Tesla Crypt Encrypts files and demands payment in return for decryption The only reliable solution is to restore from a back up CLASSIFICATION 8

Advanced Persistent Threat Foreign adversaries use cyber tools as part of traditional intelligence-gathering and espionage activities. These adversaries conduct computer network operations that target military and governmental organizations intellectual property and insider information. Goal: to stay on your network as long as possible to collect as much information as possible without being discovered.

UNCLASSIFIED Challenges in Addressing the Cyber Threat Serious cyber threat actors are usually overseas. Quality of international law enforcement, laws and priorities. Cyber threat is inherently international, actors affect areas throughout the world at the same time. Cyber investigations require specialized investigators with specialized training and tools.

Cyber Task Forces Leverage Federal, State and Local resources MOU s signed between agencies Full background investigations for TS clearance to work criminal and NatSec Provide O/T funding, training and equipment Build a deeper pool of skilled cyber investigators CLASSIFICATION 11

Law Enforcement Mindset the Environment Understand the victim company s perspective of the complex legal and regulatory environment which currently exists with cybersecurity in the United States. Understand the factors which must be considered by the victim s legal team and company leadership before intelligence can be shared, access provided to compromised networks or hosts, and digital evidence collected by investigators. Be proactive and engage with private sector colleagues before a breach occurs, discuss these matters and build trust.

What Questions Will Be Asked by LE? Names, location, and purpose of operating systems involved; Names and location of programs accessed; Highest classification of information stored in the systems; Impact (compromise of information or dollar loss). How intrusion access was obtained; how attack was carried out. Status of attack; Steps taken to mitigate or remediate. Other organizations affected. Potential suspects, such as outsiders or current or former employees/contractors Available evidence to assist in the investigation (i.e., logs, physical evidence)

What to Expect in Victim Notification Dependent upon how the government obtained the breach information Common to both situations (criminal or NatSec) will the request for log data, access to compromised machines and opportunity to interview key personnel LE may request a Consent Monitor under the Trespasser Statute Trespasser Exception [USC Title 18 Section 2511(I)] provides legal authority for the government to monitor only the specified illicit activity on the network Victim companies can expect assistance from LE in possible attribution of the activity and the provision of indicators/signatures to assist with remediation, but not direct involvement in the remediation/eradication and recovery Focus will be on the intrusion, not the regulatory obligations or compliance aspects of data protection

Incident Preparedness Legal Banner/Computer Use Agreement Network Topography Maps Incident Logs (security, host, IDS, web, database) Archived Network Traffic Proper Access Control Business Continuity Planning Disaster Recovery Procedures 15

NIST Framework

PCI DSS Version 3.1

DHS CDM

ISO / IEC International Organization for Standardization (ISO) International Electrotechnical Commission (IEC) Information Security Management Systems Family of Standards: ISO/IEC 27000 ISO/IEC 27001:2013 ISO/IEC 27002 ISO/IEC 27003 ISO/IEC 27004 ISO/IEC 27005

NERC CIP Standards

NIST Cybersecurity Framework Detailed Matrix

OREGON CYBER TASK FORCE Contact Information: 9109 NE Cascades Parkway Portland, Oregon, 97220 (503) 460-8000 octf.pd@ic.fbi.gov CLASSIFICATION 22