Fraud and Data Exfiltration: Defending Against the Mobile Explosion



Similar documents
Tracking Employees Via Mobile Devices: Legal or Not?

Wireless Local Area Network Deployment and Security Practices

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

How To Manage Security On A Networked Computer System

Designing, Securing and Monitoring a/b/g/n Wireless Networks

Ecom Infotech. Page 1 of 6

How To Use Icem

Nine Use Cases for Endace Systems in a Modern Trading Environment

Wireless Networking for Small Businesses, Branches and Home Offices

DataSheet. A complete view of the customer. What is Accanto s icem?

8x8 Virtual Office Mobile User Guide for ios

Cisco Outdoor Wireless Mesh Enables Alternative Broadband Access

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

How To Secure Your Store Data With Fortinet

Case Study: Smart Phone Deleted Data Recovery

Accelerated Cellular Extender: Model 6200-FX Accelerated View Remote Management

Best Practices for a BYOD World

Wireless LANs vs. Wireless WANs

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem

Wireless Tools. Training materials for wireless trainers

MAKING THE RIGHT CONNECTIONS

Smart VoIP Enabling Mobile Operators to Deliver OTT VoIP

WHITE PAPER. Best Practices for Wireless Network Security and Sarbanes-Oxley Compliance

WiFi Anywhere. Multi Carrier 3G/4G WiFi Router. IntraTec Solutions Ltd

Bring Your Own Device. Individual Liable User Policy Considerations

BlackBerry Enterprise Server Express. Why upgrade from your current BlackBerry experience?

Strategically Detecting And Mitigating Employee Fraud

8x8 Virtual Office Mobile User Guide for Android

Connecting your Aiki phone to a network

Small and Midsize Business Protection Guide

End-user Security Analytics Strengthens Protection with ArcSight

Why MVNOs and Carriers Aren t Right for Your M2M Application

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

Using AirWave RAPIDS Rogue Detection to Implement Your Wireless Security and PCI Compliance Strategy

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

Professional Services Overview

Contact: Henry Torres, (870)

VOIP Attacks On The Rise

Getting Ahead of Malware

QTEL MOBILE CORPORATE EDITION

The Key to Successful Monitoring for Detection of Insider Attacks

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

Flexy-ble M2M router for remote access and data services. Industrial M2M Router.

Agenda. Cyber Security: Potential Threats Impacting Organizations 1/6/2015. January 10, 2015 Scott Petree

Adaptive IPS Security in a changing world. Dave Venman Security Engineer, UK & Ireland

Cyber Threats in Physical Security Understanding and Mitigating the Risk

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Business aware traffic steering

Enterprise-grade Mobile Application Quality across your Application Life cycle THE MOBILECLOUD PLATFORM Perfecto Mobile. All rights reserved.

10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group

[Asterisk IP Telephony Solutions]

March

TELECOMS Expense management. Considerations for Large Enterprises Operating in South Africa

Volume 12 Issue 4 Version 1.0 Fabruary 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc.

FIVE PRACTICAL STEPS

Mobile phone security. Prof. Do van Thanh

Italy. EY s Global Information Security Survey 2013

Wi-Fi Calling (and Texting) For Mobile Operators

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Cyber Watch. Written by Peter Buxbaum

Implementing Transparent Security for Desktop Encryption Users

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Privacy and Security in Healthcare

The Hidden Dangers of Public WiFi

Data Challenges of Telcos and Service Providers. HawkEye AP Delivers Impressive Results

Security for NG9-1-1 SYSTEMS

ISO Controls and Objectives

Business Compromise Scam

Cisco SAFE: A Security Reference Architecture

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Cognizant Mobility Testing Lab A state of the art Integrated platform for Mobility QA

Online Payment Fraud. IP Intelligence is one of the top five techniques used to detect and prevent online fraud

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

NIST ITL July 2012 CA Compromise

The Power of Risk, Compliance & Security Management in SAP S/4HANA

Kaspersky Lab Mobile Device Management Deployment Guide

Security Information Management (SIM)

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

Intel Enhanced Data Security Assessment Form

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management

Transcription:

Fraud and Data Exfiltration: Defending Against the Mobile Explosion Aaron Turner N4STRUCT Randy V. Sabett ZwillGen PLLC Session ID: LAW-401 Session Classification: Intermediate

Introductions Aaron Turner Partner at newly-formed Security Consultancy Randy V. Sabett, J.D., CISSP Counsel at the Boutique Law Firm 2

Disclaimer (you HAD to be expecting this ) Nothing we discuss today constitutes legal advice. For any specific questions, seek the independent advice of your attorney. 3

Premise & Format Aaron will play the role of a Fortune 500 CIO ~10,000 employees spread across 12 countries Randy will play the role of outside counsel Will say it depends a lot Role play will revolve around two issues: Company is facing increased costs associated with SMS fraud on company-liable mobile service subscriptions Anecdotal evidence that increasing amounts of corporate data are flowing through mobile networks cross-connected to the corporate network 4

Specific Case 1 Internal audit controls flagged last quarter s payments to mobile service providers as 130% of planned expenditures Audit team informed technology procurement Technology procurement team manually reviewed billing statements Review resulted in finding 1000 s of premium international SMS messages sent from company-liable accounts 5

Specific Case 2 4G WiFi router observed in Guangdon, China offices WiFi monitoring equipment detected presence of WPA-protected signal in/near company office space with the SSID of CARRIER-4G-0254 Despite multiple physical search attempts, device has not been located 6

Specific Case 3 Abnormal 2G reception reported by users at US Headquarters offices Previously, GSM phone users had seen excellent 3G coverage Beginning about 90 days ago, users started noticing 2G coverage throughout the building Significant data synchronization errors noticed at Mobile Synchronization Gateway for users with mobile devices at US HQ 7

Case 1: International Service Fraud 8

Monitoring International Service Fraud Requires some sort of audit function on company-liable lines of service Usually manifests itself as a premium service charge on the monthly statement How it happens User gets a TXT that says You ve been selected as a candidate to get a special incentive from <COMPANY> - reply to this message for more details Reply-to SMS # is formatted as something like +97285412314 (if HQ is in Dallas for example) Financial impact Some Premium-rate SMS responses can charge up to $10 per message depending on Carrier controls/agreements 9

CIO Gets the Bill Potential for Claw-back? Over the last 90 days CIO gets report of $12,500 in international premium service charges Initial investigation appears to have uncovered a targeted SMiShing campaign asking users to register for a corporate pilot program +97225846548: Reply now to be eligible for COMPANY s ipad2 pilot program 1000 s of users affected, but difficult to quantify precisely how many targeted beyond BES-connected users Perpetrators appear to have a comprehensive list of companyassociated mobile # s (copy of the GAL?) What potential for Claw-back is there for Company with Carriers? 10

Attorney lays out the SMiShing options No laws covering this type of attack (yet) Even if there were, would mostly focus on consumer In a commercial setting, most recourse questions will come down to the contract Does the K address fraudulent use of carrier network? What about the SLA? Can company report SMiShing? If so, any recourse? Think about all of these PRIOR to provisioning!! Also, don t forget about putting SMiShing in your training program 11

Case 2: Rogue 4G WiFi Hotspot 12

State of 4G/WiFi monitoring Fairly mature technologies available for WiFi monitoring Very few organizations that are enforcing WiFi security policies VERY immature technologies available for enterprise 4G monitoring Explosion of low-cost, high-speed personal WiFi devices with 4G capabilities For the price of a monthly home high-speed internet connection, people can take their internet with them wherever they go Real-world Impact In 5 Fortune 500 firms last year, 100 s of 4G devices detected all over the world 13

CIO gets an incident report Business group has been informed that much of their intellectual property has been found on opensource sites Root cause analysis of network flows traced significant data flows to 3 individuals in the group Additional investigation from HR reveals that those 3 are all leaving the company for various reasons WiFi monitor logs show MiFi-esque SSID in the area of the 3 employees Employment-law action underway Are there technology options to monitor for this in the future? 14

4G MiFi detection options WiFi detection is very mature Detailed reporting options Most organizations do not have the maturity/culture to take automated action upon detection MiFi s can be tethered, thereby avoiding the WiFi detectors What do you do to find a tethered 4G device? USB device policies? Bluetooth restrictions? The root cause is 4G We have not seen enterprises with 4G detection capabilities deployed for real-time reporting Monitoring technology exists, but vendors are anxious at letting it loose to enterprises 15

Attorney lays out the 4G options Aaron called it for this one I m going to use the ol fallback of it depends There s that pesky 18 U.S.C. 2510 (ECPA) that prevents eavesdropping, BUT there are exceptions (some of which depend on the role): Consent most important one in an enterprise setting Safety activity which is a necessary incident to the rendition of [the] service or to the protection of the rights or property of the provider of that service Hate to say it, but again back to the contract (in this case the original employment contract) 16

Case 3: 2G Service Anomalies 17

Mobile service anomalies at US HQ For the last 90 days, users have seen significant service degradation Poor data service and many dropped calls Mobile device synchronization logs show many failed sync attempts 2G service degradation integrity indicator? 3G is hard to crack, so all mobile service hackers force a service downgrade to 2G and then intercept the traffic Most hackers-for-hire do not have the equipment necessary to handle all of the TCP/IP that is flowing through, resulting in significant GPRS/EDGE protocol errors which then cause strange TCP/IP traffic Information Security impact Most 2G security incidents are voice/sms driven 18

Can a CIO even monitor voice/sms integrity? Technology is available to monitor cellular integrity, but has not been deployed by enterprises Can an enterprise monitor licensed radio spectrum? What new paradigms will emerge based on mobile communications integrity challenges? Can an enterprise own the spectrum within their building? On their property? 19

Attorney lays out the 2G integrity options Similar to 4G use case ECPA generally prevents monitoring of these kinds of signals but can look to exceptions Consent Safety Ownership of spectrum a remote possibility but few companies likely can pursue this under the current procedures 20

BUT WAIT A MINUTE!?!? 21

What to do now 22

Immediate action items Initiate a mobile service audit Invest in a mobile service billing platform Negotiate premium rate service controls with carriers Make employees aware of SMiShing risks Design a MiFi controls plan WiFi controls Tethering controls Engage legal to do a contracts audit 4G/2G controls Stay tuned lots happening in the next 12-18 months 23

Contact info Aaron Turner aaron.turner@n4struct.com www.n4struct.com @integricell Randy Sabett randy@zwillgen.com www.zwillgen.com blog.zwillgen.com 24