OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

Similar documents
Retail/Consumer Client. Internet Banking Awareness and Education Program

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

Learn to protect yourself from Identity Theft. First National Bank can help.

FRAUD ALERT THESE SCAMS CAN COST YOU MONEY

National Cyber Security Month 2015: Daily Security Awareness Tips

Remote Deposit Quick Start Guide

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

Malware & Botnets. Botnets

Cyber Security. Securing Your Mobile and Online Banking Transactions

Don t Fall Victim to Cybercrime:

Protecting your business from fraud

OIG Fraud Alert Phishing

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

VISA International Security Summit. Dr. Colonel Tran Van Hoa Deputy Director Viet Nam Hightech Crime Police Department

Deter, Detect, Defend

Fraud Prevention Tips

Phishing Scams Security Update Best Practices for General User

Guide to credit card security

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

Threat Events: Software Attacks (cont.)

When visiting online banking's sign-on page, your browser establishes a secure session with our server.

Deception scams drive increase in financial fraud

T-CY Guidance Note #4 Identity theft and phishing in relation to fraud

How to stay safe online

Information Security. Annual Education Information Security Mission Health System, Inc.

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection

Avoid completing forms in messages that ask for personal financial information.

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

How to Identify Phishing s

Innovations in Network Security

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Monitoring mobile communication network, how does it work? How to prevent such thing about that?

BE SAFE ONLINE: Lesson Plan

Promoting a cyber security culture and demand compliance with minimum security standards;

ACCEPTABLE USE AND TAKEDOWN POLICY

When registering on a jobsite, first ensure that the site is reputable and has a physical address and landline phone number.

Overview of computer and communications security

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09

3 day Workshop on Cyber Security & Ethical Hacking

ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Corporate Account Takeover & Information Security Awareness. Customer Training

What is Identity Theft?

Introduction to Computer Security

Using big data analytics to identify malicious content: a case study on spam s

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May TrustInAds.org. Keeping people safe from bad online ads

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

Protect yourself online

Identity Theft Protection

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem

Identity Theft: An Introduction to the Scope of the Crime, and Its Prevention, Detection and Remediation

Fraud Trends. HSBCnet Online Security Controls PUBLIC

Network Security & Privacy Landscape

Cybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Acceptable Use Policy. This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered.bayern Domain Name.

Information Security Awareness

Tips for Banking Online Safely

NATIONAL CYBER SECURITY AWARENESS MONTH

Best Practices Guide to Electronic Banking

Anti-Phishing Best Practices for ISPs and Mailbox Providers

When Fraud Comes Knocking

F-Secure Anti-Virus for Mac 2015

Why is a strong password important?

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Payment Fraud and Risk Management

U.S. Cellular Mobile Data Security. User Guide Version 00.01

SAFE ONLINE BANKING. Online Banking, Data Security You. Your Partnership for Safe Online Banking

Internet threats: steps to security for your small business

The SMB Cyber Security Survival Guide

Protect yourself against fraud

Information Security It s Everyone s Responsibility

Transcription:

OVERVIEW 2 1. Cyber Crime Unit organization 2. Legal framework 3. Identity theft modus operandi 4. How to avoid online identity theft 5. Main challenges for investigation 6. Conclusions

ORGANIZATION 3 DIRECTORATE OF COUNTERING ORGANIZED CRIME Trafficking of Human Beings Money Laundering and financing the terrorism Central CyberCrime Unit Drugs Trafficking

CYBER CRIME UNIT - ORGANIZATION 4 Central Service for Countering Computer Crimes 1 st Bureau: E-Commerce Frauds and Payment card frauds 2 nd Bureau: Computer Forensic 3 rd Bureau: Child Pornography 4 rd Bureau: Computer related crimes 15 BCCO Cyber Crime Unit 7-10 police officers 27 County Offices 1-4 cyber police officers

LEGAL FRAMEWORK IN ROMANIA 5 Penal Code! ART. 360 Illegal acces to a computer system! ART. 361 Illegal interception of a computer data transmission! ART. 362 Computer data alteration! ART. 363 Operation disruption of computer systems! ART. 364 Unauthorized data transfer! ART. 365 Illegal operations with digital devices and software! ART. 249 Computer fraud! ART. 374 Child pornography through computer systems! ART. 250 Making fraudulent financial operations! ART. 251 Accepting transactions made fraudulently

IDENTITY THEFT MODUS OPERANDI! AUCTION FRAUDS! PHISHING / PHARMING / SPEARPHISHING! VISHING / SMISHING! SOCIAL NETWORK IDENTITY THEFT! MALWARE MOBILE APPS! SKIMMING 6

AUCTION FRAUDS 7! Seller account takeover! Posting products for sale! Luring the victim with to good to be true deals! Setting up a money cashing network! Money laundering

PHISHING 8 MAIN USES:! obtaining payment card information! obtaining online bank accounts! obtaining usernames and password for different types of accounts (Yahoo, Gmail, Paypal, Facebook, etc )

PHISHING 9 BASIC STEPS:! Identifying a target and preparing for the attack! Launch the attack! Data gathering! Checking phished informations! Using phished informations and obtaining money

PHISHING identifying a target 10! The phisher usually targets banks or other financial institutions! The phisher will decide on the method of attack, which will often be some combination of email phishing, pharming, deceptive downloads, and other available techniques! The beginners collaborate with other phishers, in order to learn how to operate and to carry out the attack! The most experienced ones, recruit accomplices for some parts of the attack

PHISHING - launch the attack 11! The attacker has to send out the bait for a phishing attack or find some other way to attack the consumer.! The best-known phishing attack is an email that asks the user for personal information.! Other attacks could be deceptive downloads onto user computers, pharming attacks, and recruiting insiders who can help in harvesting personal information.

PHISHING - launch the attack! The phishing attack conducted through email: 12 " Obtaining lists of email accounts (millions of accounts) " Using email mass sender software and hacked email servers, the attacker will send messages to potential victims; " Create or customizing a fake websites " Create an email account, used as a dropbox for receiving information; " Upload fake websites on compromised servers or on hosting servers which the attacker has bought using previous stolen credit card information. " Preparing backup servers, in case the first servers will be blocked by ISPs or law enforcement

PHISHING - launch the attack! Deceptive downloads: 13! Could turn user system into a zombie where the attacker is able to remotely control system resources, so user computer become part of a BotNet.! Spam perpetuates phishing attacks. BotNets can send spam and launch Distributed Denial of Service attacks (DDOS).! The attacker also try to get search engines to promote their spoofed links by paying for sponsored links or using the BotNets to cheat the rank algorithm.! The most insidious form of deceptive software is a rootkit which installs at or below the level of the operating system to avoid detection! Pharming:! compromises DNS servers which redirect a user to the attacker site even when the user enters or clicks on a trusted link. Rogue software can edit a local hosts file to effect the same action.

PHARMING 14 A pharming attack occurs when users are redirected from an authentic to a fraudulent website that replicates the original in appearance http://www.igcseict.info/theory/6/internet/

PHISHING - data gathering Major ways to harvest the data : 15! user entry of data, such as on a spoofed Web site or in an email;! software capture of data, such as by logging the consumer keystrokes or sniffing traffic in the network.

PHISHING checking phished informations! Once the criminals have gathered personal data, they have to decide how to use it. 16! For attacks against a financial institution or online merchant, they have to learn the modus operandi what information is needed for authorization, what sum limits activates alarms.! The criminals also need to select the best users to attack who has the large assets, the good credit score, or other characteristics that make them a profitable target.

PHISHING using phished informations! Attackers seek to take advantage of the data they have gathered. 17! Most often the crime is financial fraud, such as:! unauthorized purchase,! hijacking a bank account and transfer funds from it! withdraw cash from ATMs! In other cases the attackers are selling the information they gathered.

Phishing attacks Examples 19

SPEARPHISHING 20 Spearphishing is an e-mail spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data. http://www.astraid.com/spear-phishing/

VISHING / SMISHING 21! VISHING is the illegal access of data via voice over Internet Protocol (VoIP). Vishing is IP telephony s version of phishing and in some cases uses voice messages to steal identities and financial resources.

VISHING / SMISHING 22! SMISHING is an identity theft scheme that involves sending consumers text messages containing a link to a fraudulent website or a phone number in an attempt to collect personal information

SOCIAL NETWORK IDENTITY THEFT! Social networking sites have the greatest potential for abuse, because of the sensitive information that can be used against you in a variety of malicious ways. The following profile elements can be used to steal or misappropriate your identity: 23 Full name (particularly your middle name) Date of birth (often required) Home town Relationship status School locations and graduation dates Affiliations, interests and hobbies! All the sensitive and apparently unimportant information (pet names, mother's maiden name) provided on social networks sites can be used by an attacker to impersonate the victim of an identity theft in offline situations (e.g. at a bank)

MALWARE MOBILE APPS 24! when the app is launched, a fake login form window (e.g. Facebook) is displayed to the user. If victims fell for the scam, their credentials would be sent to the attackers server.! certain apps can transmit the IMEI, IMSI, storage info, and installed app info to a remote server. Then, the server can send a command to uninstall certain apps (such as anti-virus applications), launch other apps, or download and install apps from URLs given by the server. These actions can be used to launch further attacks.

MALWARE MOBILE APPS 25 https://www.fireeye.com/blog/threat-research/2015/10/kemoge_another_mobi.html

SKIMMING 26! A method used by criminals to capture data from the magnetic stripe on the back of any card, using a card reader which can be disguised to look like a part of the ATM, or installed inside of a POS! Even if this is an offline modus operandi of identity theft, it is one of the most frequent ways to steal credit/debit card information

HOW TO AVOID ONLINE IDENTITY THEFT! Be suspicious of any email or communication (including text messages, social media post, ads) with urgent requests for personal financial information.! Avoid clicking on links. Instead, go to the website by typing the Web address directly into your browser or by searching for it in a search engine. Calling the company to verify its legitimacy is also an option, too.! Don t send personal financial information via email, and avoid filling out forms in email that ask for your information.! Use a secure website (https:// and a security lock icon) when submitting credit card or other sensitive information online. 27

HOW TO AVOID ONLINE IDENTITY THEFT! Keep A Clean Machine.! Keep security software current.! Automate software updates.! Protect all devices that connect to the Internet.! Plug & scan: Protect Your Personal Information.! Secure your accounts.! Make passwords long and strong: Unique account, unique password.! Write it down and keep it safe.! Own your online presence.! Connect With Care.! When in doubt, throw it out.! Get savvy about Wi-Fi hotspots.! Protect your $$: Be Web Wise.! Stay current. Keep pace with new ways to stay safe online.! Think before you act.! Back it up..! Be an online Law Abiding Citizen.! Safer for me more secure for all.! Help the authorities fight cyber crime 28

MAIN CHALLENGES 29 Tracing and Identifying Criminals Undercover Online Investigations Constant Development and Evolution of Technology Digital Forensic Analysis International Co-operation in Cybercrime Investigation

TRACING AND IDENTIFYING CRIMINALS 30! Fragmented nature of identity theft! Different suspects may be responsible for various aspects of identity theft crimes, such as providing how-to instructions, helping to set up spoofed sites and sending emails, and money laundering! many of the perpetrators targeting consumers in one country operate from foreign countries! Better organization of the criminal groups through structuring and specialization of their members! Use of youngsters with skills in using computer and new technologies, which are organized and coordinated by the leaders of criminal groups

TRACING AND IDENTIFYING CRIMINALS 31! Following the money! It s obviously better to disrupt criminal acts as early as possible, before the harm to individuals takes place. However, sometimes the only chance to identify the attacker is in the later stages of an attack. At the stage where the suspect tries to convert the stolen personal information into money, investigators can follow up on these fraudulent transactions and trace the criminals involved in identity theft operations.! Tracing communications! While it is actually occurring! Using data stored by communications providers

UNDERCOVER ONLINE INVESTIGATIONS 32! Investigators can enter in chatrooms and other places where potential phishers communicate with each other! Undercover agents can infiltrate the criminal groups! Undercover operations can create the evidence needed for successful prosecutions! Use disinformation when the criminal gathers personal data:! Investigators can cause trouble for phishers by feeding false personal data to the spoof sites. This approach may reduce the economic value of phishing! Investigators can deliberately seed a false name, bank account, etc. to a spoof site. If that false name or number is then used, that is strong evidence that the person using the data is linked to criminal phishing activity.! Disinformation, therefore, can reduce the value of personal information on the black market and create evidence that links the criminal to illegal phishing activity

CONSTANT DEVELOPMENT AND EVOLUTION OF TECHNOLOGY 33! Easy acces to new technologies and the possibility to travel abroad faster will make the tracking more difficult.! Permanent concern in finding new modes of operation, the identification of products that can be defrauded and systems that can be compromised;! The suspects started to change the field of action from small phishing /skimming attacks against persons to major frauds (major damagehundreds of thousands/millions) against companies;

CONSTANT DEVELOPMENT AND EVOLUTION OF TECHNOLOGY 34! Resources problems - Investigators in law enforcement agencies often lag behind cyber criminals in terms of their understanding of technology and the equipment at their disposal.! As identity theft methods evolve, it is crucial for investigators to keep up-to-date. Yet, sufficient funding is often lacking in the public sector for the ongoing training, hardware and software, and other tools necessary to keep up with the perpetrators! Law Enforcement Needs:! Experts dedicated to high-tech crime! Experts available 24 hours a day! Continuous training! Continuously updated equipment

DIGITAL FORENSIC ANALYSIS! New tools and processes capable of locating and recovering sufficient evidence from larger data storage devices quickly, efficiently and in detail! Forensic tools are often commercial products rather than science -based, and do not fulfill all forensic needs! Increasing size of data storage on some personal computing devices, as well as cloud and network storage represents a real challenge to law enforcement! Cloud computing services (which replaces much of the traditional IT hardware) can be hosted and managed by an organization, or by a third-party provider, making it harder for law enforcement to acquire evidence 35

INTERNATIONAL CO-OPERATION IN CYBERCRIME INVESTIGATIONS 36! The transborder nature of the cybercrimes will make the investigation more difficult as we need information from authorities from abroad (by means of rogatory letters), an expensive and slow procedure.! Cooperation with the private sector can help! Differences in language, laws, and legal procedures make it very difficult to prosecute the suspects

CONCLUSIONS 37! The threats are continuously evolving and blended together by the suspects to form new attacks.! Self awareness is the first step in protecting online identity. It is better to be aware of all of the ways someone could possibly steal your personal information, than to have it happen and wonder how or why.! International and inter-institutional cooperation is a key factor in preventing, controlling and fighting against online identity theft

THANK YOU QUESTIONS? Silviu CIOBOTICI