Fraud and Phishing Scam Response Arrangements in Brazil



Similar documents
Evolution of Financial Fraud in Brazil

Challenges and Best Practices in Fighting Financial Fraud in Brazil

Phishing and Banking Trojan Cases Affecting Brazil

The Global ecrime Outlook CERT.br National Report

CERT.br: Mission and Services

SpamPots Project: Using Honeypots to Measure the Abuse of End-User Machines to Send Spam

honeytarg Chapter Activities

Information Security Awareness Videos

Incident Response and Early Warning Initiatives in Brazil

Spampots Project First Results of the International Phase and its Regional Utilization

PHISHING IN SEASON TAX TIME MALWARE, PHISHING AND FRAUD

Monitoring the Abuse of Open Proxies for Sending Spam

Current counter-measures and responses by CERTs

Preventing your Network from Being Abused by Spammers

Cybersecurity and Incident Response Initiatives: Brazil and Americas

Simplicity Value Documentation 3.5/5 5/5 4.5/5 Functionality Performance Overall 4/5 4.5/5 86%

Some Perspectives On Cybersecurity. Shernon Osepa Manager Regional Affairs Latin America & Caribbean

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

Spampots Project Mapping the Abuse of Internet Infrastructure by Spammers

Hacker Intelligence Initiative, Monthly Trend Report #14. Assessing the Effectiveness of Antivirus Solutions

Phishing Activity Trends

Phishing Activity Trends Report June, 2006

Secure Your Mobile Workplace

Evolving threats and counter technology

Use of Honeypots for Network Monitoring and Situational Awareness

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Using big data analytics to identify malicious content: a case study on spam s

Development of an IPv6 Honeypot

Phishing Activity Trends Report for the Month of December, 2007

Anti-Phishing Best Practices for ISPs and Mailbox Providers

Phone Fax

Expanded Header: Viewing in Microsoft Outlook

CERT.br Incident Handling and Network Monitoring Activities

SPAM: 101 Cause and Effect

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

The anatomy of an online banking fraud

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat

Security Incidents And Trends In Croatia. Domagoj Klasić

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Incident Response. Proactive Incident Management. Sean Curran Director

Dragonfly: Energy Companies Under Sabotage Threat Symantec Security Response

Win the Internet Security War. Keep Internet Criminals Out of Your Network and Protect Your Business

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud

Evolving Threats and Attacks: A Cloud Service Provider s viewpoint. John Howie Senior Director Online Services Security and Compliance

A Multistakeholder Effort to Reduce Spam The Case of Brazil

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

DNS POISONING, AKA PHARMING, MAKES THE HEADLINES IN NOVEMBER S NEWS

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May TrustInAds.org. Keeping people safe from bad online ads

Payment Fraud and Risk Management

WildFire. Preparing for Modern Network Attacks

DDoS Attacks & Defenses

Phishing Activity Trends Report. 1 st Half Committed to Wiping Out Internet Scams and Fraud

4 Messaging Technology

Web Application Worms & Browser Insecurity

CITADEL TROJAN OUTGROWING ITS ZEUS ORIGINS

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

WEB ATTACKS AND COUNTERMEASURES

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

GFI Product Manual. Administration and Configuration Manual

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank

Evaluating DMARC Effectiveness for the Financial Services Industry

How to Identify Phishing s

Retail/Consumer Client. Internet Banking Awareness and Education Program

Targeted Phishing SECURITY TRENDS

APT Advanced Persistent Threat Time to rethink?

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

Learn to protect yourself from Identity Theft. First National Bank can help.

The State of Spam A Monthly Report August Generated by Symantec Messaging and Web Security

The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness

LACNIC 25 CSIRTs Meeting Havana, Cuba May 4 th, 2016

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Computer Software Bugs and Other IT Threats to Critical Infrastructure: A Preliminary Set of Considerations for IT Governance

Information Security Threat Trends

The Latest Internet Threats to Affect Your Organisation. Tom Gillis SVP Worldwide Marketing IronPort Systems, Inc.

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

The Information Security Problem

Cyber Security Solutions:

How To Protect A Network From Attack From A Hacker (Hbss)

Sérgio Martinho Microsoft Portugal

Advanced Security Methods for efraud and Messaging

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Phishing Past, Present and Future

Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

OIG Fraud Alert Phishing

How To Protect Yourself Online

Prevent Malware attacks with F5 WebSafe and MobileSafe. Alfredo Vistola Security Solution Architect, EMEA

Protecting your business from fraud

MALICIOUS REDIRECTION A Look at DNS-Changing Malware

When visiting online banking's sign-on page, your browser establishes a secure session with our server.

LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains

Government Entity located in St. Louis Serving Government for over 40 Years

September 2009 Report #23. There was a 11 percent increase from the previous month in non-english phishing sites

Advanced Persistent Threats

Best Practices

When registering on a jobsite, first ensure that the site is reputable and has a physical address and landline phone number.

Security Bank of California Internet Banking Security Awareness

Transcription:

Fraud and Phishing Scam Response Arrangements in Brazil Marcelo H. P. C. Chaves mhp@cert.br Computer Emergency Response Team Brazil CERT.br http://www.cert.br/ Brazilian Internet Steering Committee http://www.cgi.br/ October 2005 FIRST Technical Colloquium p.1/25

Overview Financial Sector Statistics Short timeline of Internet bank fraud in Brazil Current trends Current developments Statistics trojan notifications AV vendors efficiency Further developments needed October 2005 FIRST Technical Colloquium p.2/25

Financial Sector Statistics October 2005 FIRST Technical Colloquium p.3/25

Financial Sector Statistics End of 2004: 164 banks 88 national and private 62 foreign and private 14 public 44% of the service network Service Evolution indicators 2000 (%) 2004 (%) indicators number (Mi)* Internet Banking self service automatic debits tellers debit cards 3.7 33.5 27 20.4 1.6 13 32.4 27 12 4.1 checking accounts savings accounts I.B. end users I.B. com. users * end of 2004 73 67 18.1 1.9 Source: Brazilian Bankers Association (FEBRABAN) October 2005 FIRST Technical Colloquium p.4/25

Short Timeline of Internet Bank Fraud in Brazil October 2005 FIRST Technical Colloquium p.5/25

Timeline of Internet bank fraud in Brazil 2001: brute force attacks using easy passwords 2002 2003: increase in phishing with heavy use of compromised DNS servers 2003 2004: increase in sophisticated phishing fraudulent homepages very similar to the real ones data sent from fraudulent homepages to other homepages, that process the data and send results to email accounts October 2005 FIRST Technical Colloquium p.6/25

Current Trends October 2005 FIRST Technical Colloquium p.7/25

Current Trends Traditional phishing and compromised DNS servers are rarely seen. The current scheme is: the criminals send spams using the names of well-known entities or popular sites (government, telecom, airline companies, charity institutions, reality shows, e-commerce, etc) these spams have links to trojan horses hosted at various sites the victim usually never associates the spam with a banking fraud October 2005 FIRST Technical Colloquium p.8/25

Current Trends (cont.) Once installed, the trojan has the hability to: monitor the victim s computer looking for accesses to Brazilian well-known banks capture keystrokes and mouse events, as well as snapshots of the screen overlap portions of the victim s screen, hiding information send captured information, such as account numbers and passwords, to collector sites or email accounts October 2005 FIRST Technical Colloquium p.9/25

Current Trends (cont.) today most trojans are hosted at major ISPs we are seeing an increase in defacers working for the criminals and uploading trojans together with their defacements low profile intrusions with trojans hidden and remaining undetected by the site owners * usually very difficult to find the proper site contact October 2005 FIRST Technical Colloquium p.10/25

Current Developments October 2005 FIRST Technical Colloquium p.11/25

CERT.br Initiatives Trojan notification and submission system emails trojanfilter Extract suspicious URLs from emails URLs sm2av Select new malware from malware s list Send malware copy to each AV vendor that does not detect the malware yet email with the malware copy malware files (confirmed) trojancheck Fetch and store malware candidate Using AV, confirm if file is really a malware Create a list with the confirmed URLs list entry IP, date, URL, AV signature notify Get IP contacts Create email with the list entry data and a email template Send notification asking to remove the malware email with the notification October 2005 FIRST Technical Colloquium p.12/25

CERT.br Initiatives (cont.) notifying sites hosting trojans sending undetected trojan samples to 25 AV vendors aim is to increase AV effectiveness the documents aimed to home users were revised, focusing on Internet frauds and social engineering October 2005 FIRST Technical Colloquium p.13/25

CERT.br Initiatives (cont.) a task force between CERT.br and 9 biggest banks PGP mailing list maintained by CERT.br CERT.br facilitates exchange of technical information banks coordinate efforts with the proper law enforcement agency for each case October 2005 FIRST Technical Colloquium p.14/25

Statistics October 2005 FIRST Technical Colloquium p.15/25

Top Trojan Hosting Domains Number of times a domain was referenced in spams, and was hosting a trojan candidate 2005-04-01 2005-09-20 420266 emails, 541870 URLs number domain 140263 America Online* 26485 gratisweb.com 19655 spectrogariaclips.inf.br 14097 thefilebucket.com 9797 ripway.com 9499 noti-auto.com.ar 8608 atspace.com 7863 cartoesmagicos.com.br 6516 ncren.net 6141 terra.com.br * aol.{co.uk,com.br,de,com.au}, netscape.com, americaonline.com.{ar,mx,br} October 2005 FIRST Technical Colloquium p.16/25

Trojan Notifications Summary: 2005-04-01 2005-09-20 counter number domains 1409 contacts 772 extensions 16 filenames 3424 hosts 2228 IP addresses 1223 country codes 52 e-mails sent 5671 URLs 8540 AV signatures 575 Total amount of URLs notified = 11687 (with repetition) October 2005 FIRST Technical Colloquium p.17/25

Trojan Notifications (cont.) Top 10 domains notified number (%) domain 5245 44.88 America Online* 1154 9.88 gratisweb.com 140 1.20 terra.com.br 134 1.15 100free.com 132 1.13 galeon.com 127 1.09 webcindario.com 124 1.06 pop.com.br 102 0.87 atspace.com 99 0.85 tripod.com.br 91 0.78 yahoo.com.br * aol.{co.uk,com.br,de,com.au}, americaonline.com.{ar,mx,br}, netscape.com October 2005 FIRST Technical Colloquium p.18/25

Trojan Notifications (cont.) Top 12 extensions and country codes (CC) number (%) extension 8860 75.84 exe 2394 20.49 scr 274 2.35 zip 76 0.65 jpg 16 0.14 com 16 0.14 rar 15 0.13 js 11 0.09 txt 10 0.09 html 3 0.03 dll 2 0.02 gif 2 0.02 swf number (%) CC 1836 46.41 US 813 20.55 BR 200 5.06 ES 152 3.84 KR 108 2.73 DE 108 2.73 IT 105 2.65 UK 93 2.35 CA 93 2.35 RU 47 1.19 AR 45 1.14 FR 41 1.04 CN October 2005 FIRST Technical Colloquium p.19/25

AV Vendors Efficiency Period: 2005-04-06 2005-09-21 Sent a total of 6633 samples to AV vendors Antivirus Vendor samples detected Kaspersky 857 87.08 % F-Secure 857 87.08 % Sybari 2001 69.83 % McAfee 2456 62.97 % DrWeb 2706 59.20 % Panda 4265 35.70 % Fortinet 4408 33.54 % etrust-iris 4944 25.46 % AVG 5085 23.34 % ClamAV 5177 21.95 % Symantec 5916 10.81 % etrust-vet 6152 7.25 % October 2005 FIRST Technical Colloquium p.20/25

AV Vendors Efficiency (cont.) Undetected Trojan Samples Sent (06/Apr - 13/Aug) 140 120 100 80 60 40 20 Kaspersky/F-Secure McAfee Panda AVG ClamAV Symantec 0 10/Apr 24/Apr 08/May 22/May 05/Jun 19/Jun 03/Jul 17/Jul 31/Jul 2005 October 2005 FIRST Technical Colloquium p.21/25

AV Vendors Efficiency (cont.) Undetected Trojan Samples Sent (14/Aug - 15/Sep) 140 120 100 80 60 40 20 Federal Police Operation Pegasus (25/Aug) Kaspersky/F-Secure McAfee Panda AVG ClamAV Symantec 0 15/Aug 22/Aug 29/Aug 05/Sep 12/Sep 2005 October 2005 FIRST Technical Colloquium p.22/25

Further Developments Needed October 2005 FIRST Technical Colloquium p.23/25

Further Developments Needed AV software need to better detect trojans most used defense among end users ISPs need to be more proactive check files at upload time more efforts to block spam at its source working in some technical solutions with telcos and ISPs better international cooperation October 2005 FIRST Technical Colloquium p.24/25

Contact Information Computer Emergency Response Team Brazil CERT.br http://www.cert.br/ Brazilian Internet Steering Comittee CGI.br http://www.cgi.br/ Marcelo H. P. C. Chaves <mhp@cert.br> October 2005 FIRST Technical Colloquium p.25/25