Cybersecurity Threats – “What Every Employer Needs to Know”
Total Page:16
File Type:pdf, Size:1020Kb
1/18/2018 Cybersecurity Threats – “What Every Employer Needs To Know” Connecticut Department of Labor Bryan Cassidy, VP / Information Security Officer (CISA, CISSP, CFE) Disclaimers The opinions expressed in this presentation and on the following slides are solely those of the presenter and not necessarily those of Farmington Bank. Farmington Bank does not guarantee the accuracy or reliability of the information provided herein. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by Farmington Bank. 1/18/2018 | page 2 1 1/18/2018 Bad Actor Profiles Organized Nation Hacktivists Fraudsters Crime States Motivation Skill 1/18/2018 | page 3 Hacktivists WikiLeaks Anonymous Lulzsec 1/18/2018 | page 4 2 1/18/2018 Fraudsters Brett Johnson Alexandre Cazes Ross Ulbricht Sanford Wallace (“ GollumFun”) (“ DeSnake”) (“ Dread Pirate Roberts” ) (“ Spam King” ) ShadowCrew AlphaBay Silk Road 1.0 Cyber Promotions Albert Gonzalez Roman Vega Ercan Findikoglu Yarden Bidani (“ CumbaJohnny”) (“ Boa” ) (“ Segate”) (“ applej4ck” ) ShadowCrew CarderPlanet ATM Cash Out vDOS 1/18/2018 | page 5 Blurring of Organized Crime / Nation States Equation Group Deep Panda Cozy Bear Longhorn Black Vine Sofacy DragonOK Fancy Bear Hidden Lynx Shadow Brokers Mofang Syrian Electronic Army OilRig 1/18/2018 | page 6 3 1/18/2018 Why Are They Not Arrested!? PARIS MOSCOW HARTFORD MIAMI DUBAI LAGOS DAR ES SALAAM Geopolitical Challenges Protections Masking Techniques Laws/Regulations Attribution Challenges 1/18/2018 | page 7 Shedding Light On The Dark Web 1/18/2018 | page 8 4 1/18/2018 Surface Web Only 4% of Web content (~8 billion pages) is available via search engines 1 zettabyte Deep Web Approximately - 250 billion 96% of the digital 7.9 universe is DVDs unsearchable or Zettabytes - 36 million password protected years of HD video Dark Web A portion of the “deep web” used by criminals to perform illegal activities 1/18/2018 | page 9 Source: The Deep Web: Semantic Search Takes Innovation to New Depths The Onion Router (TOR) “…free software for enabling anonymous communication…directs traffic through a free overlay network to conceal a user’s location and usage . TOR’s intended use is to help protect personal privacy of users, as well as their freedom and ability to conduct confidential communications…” Wikipedia 1/18/2018 | page 10 5 1/18/2018 The Onion Router (TOR) India Nepal Canada Colorado Vietnam Ohio Brazil Texas Vermont Malaysia Hartford Poland Peru Canada Russia Austria Estonia You Website Spain Utah Russia Yemen Sweden Maine Canada France China Ukraine Entry Guards Exit Nodes The TOR Network Encrypted Unencrypted 1/18/2018 | page 11 Structure of a Dark Web Marketplace Website Payment Methods Parties Sellers Buyers Centralized Vendors Buyers De-Centralized 1/18/2018 | page 12 6 1/18/2018 Products & Services On the Dark Web Products Services Account Credentials Spam Rental Services Drugs & Prescriptions Translation Services Debit/Credit Cards Money Mules Crimeware Kits Re-shippers Human Trafficking Crimeware-as-a-Service DIY Guides “…daily sales were Identification Docs found to fluctuate Exploits between $300,000 and Bank Statements $500,000 per day.” Carnegie Mellon University: “Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem (August 2015). 1/18/2018 | page 13 Cybercrime Pricelist Attack Tools Data • $400 Remote Access Trojan • $3 SSN and DOB Verification • $100 Remote Desktop Control • $150 Credit Report 750+ Score • $400 1 Million Spam Emails • $5 Credit/Debit Card (Online) Services • $10 Credit/Debit Card (Cloned) • $100 Email Account • $5 Bank Account Login • $150 Bulletproof Hosting ( China, • $1 Existing PayPal Account Eastern Europe, etc .) • $100 Email Account • $20 Virtual Private Network • $1 Proxy • $25 Malicious File Encryption • $25 Fake Driver’s License • $25 Digital Copy of Fake Utility Bill or Social Security Card Source: Recorded Future 1/18/2018 | page 14 7 1/18/2018 Carding Shops 1/18/2018 | page 15 Dark Web Distrust – Scammers & Law Enforcement A dark web marketplace owner can perform an ‘ exit scam ’ and take all the digital currency with him/her. A vendor can steal a buyer’s digital currency by never providing a service or shipping a product but risks negative feedback. A vendor can sell fake services/products to a buyer but risks negative feedback. Law enforcement can be impersonating a vendor/buyer in an attempt to identify dark web marketplace owners, vendors, and/or buyers. Law enforcement may have taken full control over a dark web marketplace by possessing the servers, in an attempt to identify vendors and/or buyers. 1/18/2018 | page 16 8 1/18/2018 Law Enforcement Takedown 1/18/2018 | page 17 Law Enforcement Monitoring 1/18/2018 | page 18 9 1/18/2018 Spoofing, Compromise, and Account Takeover 1/18/2018 | page 19 FBI Public Service Announcements January 22, 2015 I-012215-PSA There have been 2,126 victims with an exposed loss amount of $0.2 billion from October 2013 to December 2014. August 27, 2015 I-082715a-PSA There have been 8,179 victims with an exposed loss amount of $0.8 billion from October 2013 to August 2015. June 14, 2016 I-061416-PSA There have been 22,143 victims with an exposed loss amount of $3.1 billion from October 2013 to May 2016. May 4, 2017 I-050417-PSA There have been 40,203 victims with an exposed loss amount of $5.3 billion from October 2013 to December 2016. 1/18/2018 | page 20 10 1/18/2018 Headlines (March 2016 – August 2017) 1/18/2018 | page 21 Wire Fraud Example From : [email protected] Sent : April 2, 2017 10:02am To : [email protected] Hi Sasha, We have to make a payment to Def Company for $123,000 today. Do you have time to process a wire? Thank you, Bryan AB Company 1/18/2018 | page 22 11 1/18/2018 Wire Fraud Example From : [email protected] Sent : April 2, 2017 10:40am To : [email protected] Bryan, I’ll process the wire after lunch and send you the confirmation tomorrow as I’m out of the office. Regards, Sasha AB Company 1/18/2018 | page 23 Wire Fraud Example From : [email protected] Sent : April 2, 2017 10:51am To : [email protected] Great! Please pay them as soon as possible as it is urgent. This is the bank account information for them; BANK NAME: Global Bank BANK ADDRESS: 1 Farm Glen Blvd., Farmington, CT 06032 ACCT NO: 123456789 ROUTING NO: 9515710 BENEFICIARY: ABC Company BENEFICIARY ADDRESS: 32 Main Street, Farmington, CT 06032 Thank you, Bryan AB Company 1/18/2018 | page 24 12 1/18/2018 Wire Fraud Example From : [email protected] Sent : April 3, 2017 8:01am To : [email protected] Hi Bryan, I’ve paid the vendor as requested. Regards, Sasha AB Company 1/18/2018 | page 25 Wire Fraud Example From : [email protected] Sent : April 5, 2017 9:15am To : [email protected] Hi Bryan, We still haven’t received payment yet for the $123,000. Please pay as soon as possible to avoid any late charges. Thanks, Lauren Def Company 1/18/2018 | page 26 13 1/18/2018 Common Phishing/Email Spoofing Fraud Red Flags Poor spelling and/or grammar . Requests for instructions on processing wire/ACH payments. Last minute changes in wire/ACH instructions. Elements of urgency . -“This needs to be completed by today !” Elements of secrecy . -“Don’t tell anyone !” -“This needs to remain confidential !” Avoiding communication - “I can’t talk right now .” - “I’m in a meeting !” 1/18/2018 | page 27 Steps To Help Prevent Becoming a Victim Append a disclaimer for all external emails coming into your network (e.g., “ The below email is from an external source. Please be careful with open attachments or clicking on links .”) Use out of band methods for confirming out of the ordinary requests instead of solely relying on email. Create a culture of cybersecurity awareness to help employees understand threats and red flags. Block foreign IP addresses (if possible ) to prevent attempts from low skilled fraudsters/criminals. Know who to immediately contact at your financial institution to begin the process to recover funds. 1/18/2018 | page 28 14 1/18/2018 Cybersecurity Awareness Training Vendors 1/18/2018 | page 29 Ransomware 1/18/2018 | page 30 15 1/18/2018 What is “Ransomware”? A malware variant that encrypts important file types (.docx, .xlsx, etc.) and demands a “ ransom ” via digital currency to obtain the private key that unlocks your data. of respondents say negligent employees put 58% their company at risk for a ransomware attack. Source: Ponemon Institution: Rise of Ransomware 2017 Common Digital Currencies 1/18/2018 | page 31 FBI - Public Service Announcement “…the FBI does not support paying a ransom to the adversary. Paying a ransom does not guarantee the victim will regain access to their data ; in fact, some individuals or organizations are never provided with decryption keys after paying a ransom. Paying a ransom emboldens the adversary to September 15, target other victims for profit, and could 2016 provide incentive for other criminals to I-091516-PSA engage in similar illicit activities for financial gain. While the FBI does not support paying a ransom, it recognizes executives, when faced with inoperability issues, will evaluate all options to protect their shareholders, employees, and customers .” 1/18/2018 | page 32 16 1/18/2018 Recent High Profile Victims Target Industry Demand Negotiated Payment San Francisco Light Trail Transportation Did Not Pay Transit $73,000 Hollywood Presbyterian Healthcare $17,000 Medical Center $3,600,000 University of Calgary Education $16,000 $16,000 City of Detroit Government $800,000 Did Not Pay Moses Afonso Ryan Ltd.