emerging threats in theemerging threats in the battle against...

57
Emerging Threats in the Emerging Threats in the Emerging Threats in the Emerging Threats in the Battle Against Cybercrime Battle Against Cybercrime Battle Against Cybercrime Battle Against Cybercrime Erez Liebermann, Assistant United States Attorney Erez Liebermann, Assistant United States Attorney Deputy Chief, Economic Crimes Unit Deputy Chief, Economic Crimes Unit Chief, Computer Hacking and IP Section Chief, Computer Hacking and IP Section District of New Jersey District of New Jersey District of New Jersey District of New Jersey

Upload: others

Post on 27-Jun-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Emerging Threats in theEmerging Threats in theEmerging Threats in the Emerging Threats in the Battle Against CybercrimeBattle Against CybercrimeBattle Against CybercrimeBattle Against Cybercrime

Erez Liebermann, Assistant United States AttorneyErez Liebermann, Assistant United States AttorneyDeputy Chief, Economic Crimes UnitDeputy Chief, Economic Crimes Unit

Chief, Computer Hacking and IP SectionChief, Computer Hacking and IP SectionDistrict of New JerseyDistrict of New JerseyDistrict of New JerseyDistrict of New Jersey

Page 2: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Laws and Penalties• Computer Fraud and Abuse Act

• Identity Theft

• Access Device Fraud• Access Device Fraud

• Intellectual Property Laws

Page 3: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Where Are We Now?Where Are We Now?

Case Studies

Page 4: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

U.S. v. Albert Gonzalez

• Where we meet Albert G l ?Gonzalez?• Arrested for ATM Fraud• 2003

• ShadowcrewS ado c e• Landmark Carding Case• Indictment October 2004Indictment October 2004• 21 Arrested in U.S.; Others Overseas

Page 5: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the
Page 6: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

GonzalezGonzalez

Page 7: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

TJX Hacking Investigation

• 2003 to 2008: • TJX• BJ’s Wholesale Club• OfficeMax• Boston Market• Barnes & Noble

Sports Authority• Sports Authority• Forever 21• DSW DSW

• USSS & D. Massachusetts

Page 8: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Heartland and Others

• Continuing investigation… • More Victims:• More Victims:

H tl d P t S t• Heartland Payment Systems• 7-Eleven / Citi• Hannaford / Food Lion• JCPenney• Wetseal

Page 9: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the
Page 10: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

IndictmentsG l I di t d• Gonzalez Indicted• 3 Districs

• Longest Sentence for a Hacker:• 20 years.20 years.

Page 11: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

PBX HackingPBX Hacking

Page 12: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Role of PBX

Public Network

e.g., AT&T, Sprint, Etc.

Caller

Ext. 1124

p ,

Ext 1125Ext. 1125

Ext. 4057

Ext. 2563

PBX SystemExtensions

Page 13: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

The Hacking Method• Vulnerability = lack of security on

The Hacking Method

phone systemsx2241 pwd unknown

Public Network

unknownx2242 pwd unknown2243 d

PBX System

x2243 pwd defaultHacker

Page 14: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

The Loopback MethodThe Loopback MethodHacker

Public NetworkHacker Line 1

PBX SystemPublic Network

PBX SystemHacker Line 2

Call Recipient

Page 15: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

The Pass-code MethodThe Pass code Method

Public Network

Call

PBX Hacker

Call Recipient

System

Page 16: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Why Hack?• Two reasons:

• Income• Anonymity

Victim PBX System

Page 17: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Hacker Phone #

Page 18: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

FINAANCIIERS

Page 19: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Operation March 9-10th, 2007

Page 20: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Suspect Michael Kwan

Page 21: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Nancy M Gomez - Malolos Avenue Metro Manila

Page 22: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Philippine National Police CSI Squad

Page 23: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Maria Lopez Residence -Burgus St. Cubao

Page 24: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Suspect - Maria Isabel Lopez

Page 25: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Evidence

Lair of the hacker Maria Isabel Lopezp

Page 26: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Juffer Virgo residence Benitez , Quezon City

Page 27: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Suspect Juffer Virgo from Benitez Street Location

Page 28: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the
Page 29: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Examples of documents seized from hacker’s home

NameNumber dialed Time of call

Cost

Duration of call

10-10 Dialing

Page 30: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

MR Luna Street, Paranaque

Page 31: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Mastermind Mahmoud Nusier

Page 32: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Suspects at Police Headquarters

Page 33: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

PBX Phase II: ItalyPBX Phase II: Italy

Page 34: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Italy Search and Arrests – June 12, 2009

Page 35: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

In tal modo il sistema violato ed il numero delle intrusioni ai PBX si amplia con proporzioni geometriche.

Il manager fornisce le informazioni sul

li centralino compromesso ai Phone Center.

Page 36: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Polizia di Stato F.B.I.

Mohammad ZamirMohammad Zamirnato in Pakistan il 30.01.1969

Kanwal Shabinanata in Pakistan il 11.12.1971

SHAH Zahirnato in Pakistan il 01.01.1970

WASEEM Ahmednato in Pakistan il 01.03.1969

IQBAL Khurram

nato in Pakistan il 04.04.1980

Page 37: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Outsider Attack

• Voice Over Internet Protocol (VOIP)(VOIP)• Edwin Pena and co-conspirators hack

into VOIP companies and unsuspecting intermediaries.B t F Att k• Brute Force Attacks.

• Millions made.

Page 38: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the
Page 39: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the
Page 40: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Insider Attack

• Medco Health Solutions, Inc.Andy Lin Feared he would be fired when • Andy Lin Feared he would be fired when rumors of layoffs spread.

• Planted logic bomb in Medco’s systemPlanted logic bomb in Medco s system.• Had it been triggered:

•Financial DamageFinancial Damage•Health implications

Page 41: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Updating script Pre-existing system file

The Operation of Lin’s Logic Bomb

Updating-script g yruns every day on every Unix server.

Legit 1 and Legit 2 are innocuous scripts.

Legit_1 Legit_2

Legit_1 and Legit_2 are innocuous scripts. Lin wrote Legit_1. He did not write Legit_2, but he did add a line in it which calls perfnck.

perfnck perfdatPerfnsck compares the current date with the date in perfdat. If they match, perfnck sets the following scripts in motion

Check date

following scripts in motion.

omb

dirsncksysmsgck

setvarsHolds information e l

ogic

bo

Sets up environment

WIPES OUT SYSTEM

on which part of the server to wipe outThe

Page 42: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

• Medco Health Solutions, Inc. –edco ea t So ut o s, cCont’d

• Pleaded Guilty

• Employee

Page 43: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Cyber ExtortionCyber Extortion

• Actual breach into computer systemsy

Th t d b h i t • Threatened breach into computer system

Page 44: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Military Hacky

• United States v. Gary McKinnony• Weapons Station Earle• NASANASA• Pentagon

• Searching for info on UFO’s?• Searching for info on UFO s?

Page 45: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

“US foreign policy is akin to US foreign policy is akin to government sponsored terrorism th d It t i t k these days... It was not a mistake that there was a huge security stand-down on September 11 last year... I am SOLO. I will continue yto disrupt at the highest levels.”

Page 46: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the
Page 47: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Data Breaches: To Report N t t R t?or Not to Report?

• Data breach notification laws

• Cooperate with authorities

• Avoid aggravating factors in a Avoid aggravating factors in a lawsuit

Page 48: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

What if it Happens?

• Call Law Enforcement.

• But• But…

Page 49: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Myth:y“If I call law enforcement, they won’t enforcement, they won t care.”

Page 50: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Myth:y“Law enforcement won’t be able to catch won t be able to catch the bad guys.”

Page 51: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

M thMyth:“I can handle the situation myself.”y

Page 52: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

M thMyth:“If I just patch the security hole, restore y ,my data, and fire the dirty insider, then I dirty insider, then I don’t need to tell anyone ”anyone.

Page 53: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

M thMyth:“If I call law enforcement, they’ll enforcement, they ll come and take my servers away ”servers away.

Page 54: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Myth:“If I report to law enforcement I’ll lose enforcement, I ll lose control of my proprietary data ”proprietary data.

Page 55: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Best Practices

• Protect the rights of the victim.• Consult with senior management• Consult with senior management.• Consult with IT staff.• Minimize disruption to the company• Minimize disruption to the company.• Coordinate media releases.• Keep the company informed• Keep the company informed.• Build relationships before an

intrusion.intrusion.

Page 56: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Steps to ProtectSteps to Protect

•Logs, Logs and more Logs.•Separation of Powers•Separation of Powers.•Click-Through Banners.•Extra vigilance.•Immediate cut-off•Immediate cut-off.

Page 57: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the

Questions?Questions?

My contact info:My contact info:[email protected]