Internet Banking Attacks. Karel Miko, CISA DCIT, a.s. (Prague, Czech Republic) miko@dcit.cz



Similar documents
Security Evaluation CLX.Sentinel

Monitoring mobile communication network, how does it work? How to prevent such thing about that?

WEB ATTACKS AND COUNTERMEASURES

The Key to Secure Online Financial Transactions

White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication

Protecting Online Customers from Man-inthe-Browser and Man-in-the-Middle Attacks

How CA Arcot Solutions Protect Against Internet Threats

Top tips for improved network security

Entrust IdentityGuard

Threats to Online Banking

Online security. Defeating cybercriminals. Protecting online banking clients in a rapidly evolving online environment. The threat.

Chip and PIN: two-factor authentication

Multi-Factor Authentication (FMA) A new security feature for Home Banking. Frequently Asked Questions 8/17/2006

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

Tips for Banking Online Safely

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

Smart Card APDU Analysis

Certified Secure Computer User

Information Security Threat Trends

BE SAFE ONLINE: Lesson Plan

Course Content: Session 1. Ethics & Hacking

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Top Online Banking Threats. to Financial Service Providers in 2010

Cyber Security and Critical Information Infrastructure

Phishing Activity Trends Report for the Month of December, 2007

Current Threat Scenario and Recent Attack Trends

ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR

Protecting Your Business from Online Banking Fraud

Layered security in authentication. An effective defense against Phishing and Pharming

Almost 400 million people 1 fall victim to cybercrime every year.

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS

Transaction Anomaly Protection Stopping Malware At The Door. White Paper

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

The Information Security Problem

Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011

How To Protect Your Online Banking From Fraud

VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division

Web Application Attacks and Countermeasures: Case Studies from Financial Systems

Topics in Network Security

Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa

Five Trends to Track in E-Commerce Fraud

BEST SECURITY PRACTICES IN ONLINE BANKING PLATFORMS

Keystroke Encryption Technology Explained

Detailed Description about course module wise:

PortWise Access Management Suite

Protecting your business from fraud

Factoring Malware and Organized Crime in to Web Application Security

Securing Virtual Desktop Infrastructures with Strong Authentication

Remote Access Securing Your Employees Out of the Office

PHISHING & PHARMING Helping Consumers Avoid Internet Fraud Federal Reserve Bank of Boston

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

GlobalSign Malware Monitoring

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL

6. ecommerce Security and Payment Systems. Alexander Nikov. Teaching Objectives. Video: Online Banking, Is It Secure?

A Security Survey of Strong Authentication Technologies

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

Common Cyber Threats. Common cyber threats include:

XYPRO Technology Brief: Stronger User Security with Device-centric Authentication

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Cyber Attack Trend and Botnet

Network Security and the Small Business

Cyber Threats to e-commerce. S.C. Leung CISSP CISA CBCP

An Analysis of the Online Banking Security Issues. Reported by Hole, Moen, and Tjostheim

Trust Digital Best Practices

ISM/ISC Middleware Module

Man-in-the-Middle Attacks against the chiptan comfort Online Banking System

Corporate Account Takeover & Information Security Awareness. Customer Training

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

Securing Your Business s Bank Account

Alexander Nikov. 9. Information Assurance and Security, Protecting Information Resources. Learning Objectives. You re on Facebook? Watch Out!

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

CA ArcotOTP Versatile Authentication Solution for Mobile Phones

A Proposed Architecture of Intrusion Detection Systems for Internet Banking

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Threat Events: Software Attacks (cont.)

Countermeasures against Bots

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

Transcription:

Internet Banking Attacks Karel Miko, CISA DCIT, a.s. (Prague, Czech Republic) miko@dcit.cz

Contents Agenda Internet banking today The most common attack vectors The possible countermeasures What protection is the best? The biggest threats now & near future 2

Electronic banking today (1) Internet banking systems Nowadays nearly every bank provides the clients with an access to their accounts over the internet The other electronic channel Mobile banking (PDAs, mobile phones, ) Phone banking (old-style but still widely used) Non-banking services (not in our scope) Stock (securities) trading online Long existing credit card payments 3

Electronic banking today (2) All banks claims something like this: We take internet security very seriously and use industry standard technology and practices to safeguard your account Is the Internet Banking really safe? 4

How do we define Internet Banking Internet banking does not mean only the bank side - you have to see it a complex Client side (=PC/browser) Network infrastructure (=Internet) Server side (=bank) Every part can be subject of an attack: The hackers will choose the easiest way Generally the easiest seems to be attacking the user or his/her PC 5

Internet Banking hackers A hacker needs Knowledge (if not clever enough he/she can buy it) Motivation (in this case money) A hacker might not be a typical criminal Bank employees no so often (they know better ways, how to commit a fraud) ISP (internet service provider) employees Mobile operator employees 6

Internet Banking frauds (1) First you need an access to victim s bank account but what next? Trading the stolen credentials passwords, PINs, certificates etc. 10-1000 $ per account (compare to credit card: 0.5-20 $) Mule accounts Recruitment of genuine customers to receive the money from fraudulent transactions Pump and dump transactions Dupe victim to unwittingly participate in unprofitable transaction mostly used with stocks trading 7

Internet Banking frauds (2) Comparing to credit card frauds Internet banking frauds significantly lower volume Credit cards more global Internet banking local differences (not only USA vs. EU, also within EU) It is not always about the money: Denial of Service Attacks = making the bank server unavailable to real clients Harming the bank image in other way 8

How do they break in? The main Attack Vectors : Attacking server-side (=bank server) Credential stealing Phishing (social engineering) Pharming Man-in-the-middle Man-in-the-browser Generally attacks utilising Trojan horses Cross-channel Attacks Note: It is not a complete list the area is dynamically evolving 9

Attacking server-side The internet banking servers Mostly protected enough (more or less) Under full control of the bank (unlike the clients PCs) The successful attacks are nowadays quite rare but might happen It is more about stealing clients personal data, transaction history etc. than fraudulent transactions Denial of Service Hardly to protect against especially Distributed DoS Mostly thousands of computers involved (botnets) 10

Credential stealing (1) The oldest and simplest attack Stealing user passwords, PIN, certificates or whatever is needed to access the bank account The success of this kind of attacks depends on authentication method used Vulnerable authentication: static PIN/password; certificate (in a file) + password How does it work? Mostly via malicious SW (virus/trojan) at clients PC (keylogger, browser eavesdropping, ) 11

Credential stealing (2) The attack has two phases 1. Stealing the credential (maybe trading the credentials) 2. Abusing the credentials Stealing vs. Abusing Different times, Different computers Different geographical locations Which makes it possible to detect and/or investigate 12

Phishing (1) What is Phishing Phishing = phreaking + fishing The goal: to get a sensitive information from the genuine bank client (e.g. PINs, passwords, credit card numbers, etc.) Based on social engineering How does it work? Luring the users into a fake website that looks very similarly to the real bank site Mostly via links in email messages 13

Phishing (2) Example (source: http://antiphishing.org) 14

Phishing (3) The real bank cannot do much as it stays aside the attack E-MAIL MESSAGE received by VICTIM From: faked.address@bigcompany.com To: victim@otherdomain.com Subject: You must look at this... Dear Sir, hacker H You have immediately log into your internet banking, otherwise... victim v http://www.bigbank-secure.com/login.asp. 15

Phishing (4) Phishing variants Basic Pure site copy Mostly only login page Fake site usually installed on more than one server This is what we can see nowadays Advanced Phishing proxy Fake domain e.g. www.bigbank.cn + proxy translating all request to the original server www.bigbank.com This is what we will see in the future 16

Pharming (1) After phishing started a ph-fashion another slightly advanced technique appears Pharming = phreaking + fishing The goal: the same as by phishing (stealing PINs, passwords, credit card numbers, etc.) How does it work? Not Based on pure social engineering Some technical tricks involved (DNS reconfiguration) Mostly requires a trojan horse/virus on victims computer 17

Pharming (2) What is the main trick? The attacker again needs to bring the user to the fake site (e.g. fake internet banking server) It is not done via e-mail + link The redirection is done by reconfiguration of some networks settings (on user PC, home internet router etc.) for that an attacker needs a malicious SW. Apart from phishing in case of pharming user sees the correct URL in browser location bar 18

Man-in-the-middle (1) Characteristics: Category of sophisticated attacks Encrypted SSL connection (https:// ) was considered as proof to communication eavesdropping However there are scenarios that allows the hacker to see or even to modify (!) the communication between the client and the bank The attacker needs to have a trojan horse on the victim computer 19

Man-in-the-middle (2) MITM Scenario: victim v user@pc WWW browser 20 https://bank... 192.1.2.3 hacker H 4. hacker can enter the SSL channel 1. standard secure access Encrypted encrypted SSL SSL channel channel SSL 2 2. Trojan horse MITM proxy 166.6.6.6 SSL 1 3. SSL going to a fake server

Man-in-the-browser (1) Characteristics: Category of very sophisticated attacks Even some very advanced technologies are vulnerable to this attacks HW generators of one-time-passwords One-time-passwords sent by SMS Pre-generated password tables (TAN codes) Digital signatures via smartcards (most of them) Again needs a trojan on victim computer The protection is not easy Either expensive or uncomfortable to the users 21

Man-in-the-browser (2) MITB Frauds The fraudulent transaction is done from victim s computer It is made during the time the victim works with internet banking It is done silently without asking the victim for anything Thus extremely hard to detect and/or investigate Not widely used (yet) As today there are still simpler ways 22

Man-in-the-browser (2) MITB Scenario: victim v user@pc WWW browser 23 https://bank... 192.1.2.3 hacker H 1. standard secure access Encrypted SSL channel 2. Trojan horse 3. Trojan horse does malicious actions directly inside the browser 4. Trojan horse can be controlled remotely by attacker

Attacks utilising Trojan horses (1) Trojan Horse = The Ultimate Enemy No.1 Today but also in the future 24

Attacks utilising Trojan horses (2) Trojans (malicious SW) Simple (keyloggers, steal file/password) Sophisticated (remotely controlled, highly organised in botnets) Trends Generic Trojan Horse Kits (make your own custom trojan) Remotely controlled Trojans (dynamically updating the malicious actions performed on victim computer) Rootkit variants extremely hard to detect The old-fashioned antivirus approach (pattern matching) absolutely inefficient 25

Attacks utilising Trojan horses (3) Infection of client computer The old-school E-mail attachments Email with link to malicious URLs Links in social networks / instant messaging (ICQ, Skype) Packed in popular free software. CD-ROM/USB Stick The new-age Drive-by malicious sites (just look at a webpage and you have a problem) vulnerable browser/flash player/ Hide from personal firewalls, antivirus/antispyware SW 26

Cross-channel Attacks The most common scenario Stealing a payment card number + other info through internet banking (via phishing) Later abusing it for payment card fraud Credit card Internet banking Some internet banking systems use the payment cards for authentication (EMV CAP/DPA technology) If badly implemented the physically stolen card can open an access to Internet banking 27

How to protect? (1) There are basically two main area the banks have to handle The user authentication = whether the user is who he/she claims to be The transaction authorisation = whether the user is allowed (authorized) to perform particular transaction The protection of the client side Completely out of bank control The biggest issue thus the primary attack target 28

How to protect? (2) Generally good ideas Using trusted HW devices = HW calculators, HW password generators, smart card readers, mobile phone Assume that the computer is under attacker control (e.g. via Trojan Horse) Using alternate channel (OOB out of band) = SMS messages, phone calls, Assume that all the communication computer Internet is under attacker control However even those Hi-Security technologies might not be enough 29

How to protect? (3) One-time-passwords (OTP) TAN codes, GRID cards, HW tokens, EMV chip OTP Solves only credential stealing. The confirmations codes are not linked with authorising transaction Totally vulnerable to MITM + MITB 30

How to protect? (4) Challenge response technologies HW tokens (or SW calculators) If the challenge is meaningless number then it is vulnerable to MITM + MITB User has to enter the transaction details (account number, amount) into the calculator uncomfortable 31

How to protect? (5) SMS security codes If it is just pure code without additional information it is equivalent to OTP For authorization SMS has to contain transaction details, otherwise vulnerable to MITM + MITB PKI technologies (certificates + signatures) Certificates in a file vulnerable to credential stealing (very easily) Certificates on a smartcard depends on the implementation (mostly vulnerable to MITB) 32

How to protect? (6) A lot of new approaches for example: visual transaction signing (visual cryptogram) http://www.cronto.com/ IBM Zone Trusted Information Channel (ZTIC) 33

How to protect? (7) There are many other technologies Mobile technologies (SIM toolkit) Optical keys Introduced some time ago secure enough but not widely used The main problem of internet banking security technologies Either expensive or uncomfortable for the user 34

How to protect? (8) To Conclude: There is no golden bullet No technology brings the final solution The guys on the other side are very adaptive we are aiming at moving target If technology is not good enough If bank cannot prevent it at least detect it The importance of interne banking fraud detection systems will rise 35

Questions? Questions? 36