Property of Secure Network Technologies-Do Not Distribute or Post Without Written Permission-Copyrights and Trademark Apply

Similar documents
Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

FSOEP Web Banking & Fraud: Corporate Treasury Attacks

The SMB Cyber Security Survival Guide

Applying the 80/20 approach for Operational Excellence. How to combat new age threats, optimize investments and increase security.

Security Challenges and Solutions for Higher Education. May 2011

Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security

Who s Doing the Hacking?

INDUSTRY OVERVIEW: FINANCIAL

IT Security Risks & Trends

Cyber liability threats, trends and pointers for the future

Information Security Threat Trends

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Innovations in Network Security

Data Center security trends

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Advanced Persistent Threats

Why The Security You Bought Yesterday, Won t Save You Today

Advanced Analytics For Real-Time Incident Response A REVIEW OF THREE KNOWN CASES AND THE IMPACT OF INVESTIGATIVE ANALYTICS

Visa CREDIT Card General Guidelines

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL

Presented by:!!dave Kennedy (RELIK)"!!!!!Ryan Macfarlane "

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Certified Secure Computer User

Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge

Don t Fall Victim to Cybercrime:

Large-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity

MITB Grabbing Login Credentials

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Presented By: Corporate Security Information Security Treasury Management

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Secure Your Mobile Workplace

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

THE CHANGING FACE OF CYBERCRIME AND WHAT IT MEANS FOR BANKS

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Certified Secure Computer User

Summary of the State of Security

1. Ask what your financial institution knows or has personally experienced with regard to internal and external data breaches.

EMERGING TRENDS IN FRAUD: CRIMINALS HAVE FOUND THE WEAKEST LINK

GlobalSign Malware Monitoring

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Looking Behind the Attacks - Top 3 Attack Vectors to Understand in 2015

Online Account Takeover. Roger Nettie

IBM Security re-defines enterprise endpoint protection against advanced malware

Malicious Network Traffic Analysis

Information Security Addressing Your Advanced Threats

How We're Getting Creamed

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

When less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

Description: Course Details:

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

CKAHU Symposium Cyber-Security

The Mile High Denver Chapter of ARMA welcomes you to our virtual meeting!

BE SAFE ONLINE: Lesson Plan

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

Advanced Persistent. From FUD to Facts. A Websense Brief By Patrick Murray, Senior Director of Product Management

Remote Deposit Quick Start Guide

Corporate Account Takeover & Information Security Awareness. Customer Training

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

Online Banking Risks efraud: Hands off my Account!

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence

Defending Against Data Beaches: Internal Controls for Cybersecurity

10 Smart Ideas for. Keeping Data Safe. From Hackers

DATA SHEET. What Darktrace Finds

Certified Ethical Hacker Exam Version Comparison. Version Comparison

The need to protect against file-based attacks

What keep the CIO up at Night Managing Security Nightmares

Contents. 1 Kaspersky Lab

2012 Global Threats and Trends

Cybercrime and Identity Theft: Awareness and Protection 2015 HLC Conference

The Peak of Chaos Shane D. Shook, PhD 10/31/2012

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

A CFO s Perspective. Security. Walt Conway, QSA, CPISM

Evolution of attacks and Intrusion Detection

Prepare Yourself for the Digital Battlefield. Christopher May. 27 Feb 2014

Mobile Malware Network View. Kevin McNamee : Alcatel-Lucent

Current counter-measures and responses by CERTs

Malware & Botnets. Botnets

SECTOR 2015 Malware Activity in Mobile Networks Kevin McNamee (Alcatel-Lucent)

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

State of the Phish 2015

TECHNICAL REPORT. An Analysis of Domain Silver, Inc..pl Domains

Detailed Description about course module wise:

Threat Events: Software Attacks (cont.)

Keeping you and your computer safe in the digital world.

Endpoint & Server Protection. Brent Biernat First Vice President Network Services May 13, 2014

Don t Click That Link and other security tips. Laura Perry Jennifer Speegle Mike Trice

Preventing, Insuring, and Surviving Fund Transfer Fraud... and Other Cyber Attacks

Trends in Advanced Threat Protection

2012 Data Breach Investigations Report

Bad Romance: Three Reasons Hackers <3 Your Web Apps & How to Break Them Up

Perspectives on Cyber Security Strategies & Tactics

ZeuS: A Persistent Criminal Enterprise

Doyourwebsitebot defensesaddressthe changingthreat landscape?

location of optional horizontal pic Corporate and Investment Banking Business Online Information Security

Fighting Advanced Threats

Cyber Security Current Trends & Emerging Threats

Transcription:

Malware - Mules & Money Mobile Edition v2.0 By Steve Stasiukonis

What We Do Security Assessments & Penetration Tests Incident Response Digital Investigation & Forensic Services Technical Surveillance Countermeasure Services

Incident Statistics for 2014 Driven By Crimeware Spear Phishing Attacks Attacks Leveraged Stealing Credentials Sources: 2013Verizon Data Breach Investigations report

Who s Doing This?

Advanced Persistent Threat

The Advanced Persistent Threat Foreign Nationals & Nation States Hacktivists / Anarchists Organized Crime

Foreign Nationals & Nation States

Foreign Nationals & Nation States China Russia France

Foreign Nationals & Nation States

Foreign Nationals & Nation States China APT Group Expanding Their Market

Foreign Nationals & Nation States

Foreign Nationals & Nation States

Hacktivists / Anarchists Cult of the Dead Cow LulzSec Anonymous

Hacktivists / Anarchists

Anonymous

Anonymous Vs.

Anonymous

Anonymous

Anonymous

Organized Crime Vladimir Lenin Citibank $10 Mil Ehud Tenebaum $1.5 Mil Credit Cards Albert Gonzalez Shadow Crew TJ Maxx Dave & Busters Heartland

Hacker Resources

Malware

Why Malware Works

2013 Malware Numbers Over 150,000,000 in 2013 Sources: 9-9-2013 AV-Test, GmBH, av-test.org

2014 Malware Numbers Almost 300,000,000 Variants Sources: 9-9-2013 AV-Test, GmBH, av-test.org

Known vs. Zero Day Malware Internet 10010100010100100101000101010 Matches Signature = SQL Slammer Antivirus Applies Protection

Known vs. Zero Day Malware Internet 0001010100100100101000101010???????? No Signature = Zero Day Antivirus Limited to NO Protection

Crimeware

Low Orbit Ion Cannon Designed for Denial of Service Attacks Designed for Extorting Company Websites Used by Hacktivists (i.e. Anonymous)

High Orbit Ion Cannon Designed for Better Distributed Denial of Service Attacks Designed for Defeating Hardware

Weyland Yutani Designed to turn Mac OSX Computers into Zombies Uses Form Grabbing in Fire Fox, Google Chrome, Safari ipad Version soon to be released

Phoenix Disguised as Adobe & Java Update Designed for the theft of Credit Card Numbers

Phoenix Disguised as Adobe & Java Update Designed for the theft of Credit Card Numbers

SpyEye Designed to scrape Credit Card Numbers from PC s

SpyEye Author Claims Best Customer Service & Rivals Zeus

Zeus Builder Known as the Microsoft of Crimeware Designed to Harvest and Mine Victim Data

Builds Zero Day Exploits Creates and Manages a Bot Net of Infected Systems Steals the Authentication Credentials of Victims

Stats to Review & Manage Bot Net

ZeuS Victims Center View Infected Systems-Use These Proxies To Hide While Stealing From Victims

Zeus: Authentication/Credentials Capture Steal Logins and Passwords

Virtual Keystroke Collector To Capture Masked Passwords

Better Encryption Capability For Hiding the Bot Net

Bot-Nets

ATTACK VECTOR-Bot-Net Building Financial Institution

ATTACK VECTOR-Bot-Net Building HACKER

ATTACK VECTOR-Bot-Net Building Citadel Had Botnets within other Botnets

ATTACK VECTOR-Bot-Net (Distributed Denial of Service) Hardware Fails Data Passes Your Business

ATTACK VECTOR-Bot-Net (SPAM) Your Business

ATTACK VECTOR-Bot-Net (Pivot Point for Financial Theft) Your Business

Customer of a financial institution targeted. Zeus dashboard provides feedback. Hacker spams targets through spear phishing attack. Hacker Targeted Victim Methods of authentication compromised Hacker Collects Banking Credentials Hacker Logs into the Victims Online Account Hacker Moves Money To Mule in USA (2 Transactions) Mule Moves Money Overseas

Hire a Money Mule

Money Mules Types of Jobs Offered Personal Valet / Assistant Payment Processor Money Remittance Associate

Money Mules Common Characteristics Financially Distressed No Conscious Not Worried Scamming Others Average Computer Literacy

Money Mules Recruitment Newspaper Advertisements - Work From Home

Money Mules Recruitment Newspaper Advertisements - Work From Home

Money Mules Recruitment Internet Job Site

Money Mules Recruitment Craigslist

Money Mules Recruitment Street Signs

Money Mules Recruitment Internet Dating Sites

Money Mules Recruitment Almost Always Outside the US

Money Mules Recruitment Western Union 510,000 World Wide Locations

Case Studies

Case Study: Bad AV Fake AV For Protection UPS Email Command & Control MONEY Moved To Mules Loss $50,000

Case Study: Bad AV Physically Went to Banks To Withdraw Cash

Small Business Business PC Polluted with Malware Victim Uses Work Computer To View Inappropriate Content Business Owner Logged into Online Banking Site Command & Control Hackers Logged into Online Banking Site Bank IT Admins See Both Hacker and Business Owner Logged Into Site Kills Access to Both Transactions Processed by Hackers Loss Averted $1,000,000

Large Business Business Employee Clicks on UPS Email Command & Control in Ukraine Hacker Deletes Certificate From Employee Computer Hacker Steals New Certificate & Credentials Bank Re- Issues Certificate With New Credentials Hacker Wires Money to Mule Mule Wires Money Overseas Loss $1,000,000

Large Business-Ransomware Phishing Email Command & Control in Slovakia Displays Ransom Note

Large Business-Ransomware Phishing Email Command & Control in Slovakia Displays Ransom Note Convert Dollars to Bitcoin Loss $5,000 Transferred to ewallet

Questions