Tracking Cyber-threat Actors

Slides:



Advertisements
Similar presentations
Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security.
Advertisements

Chapter Nine Maintaining a Computer Part III: Malware.
Confidential On-line Banking Risks & Countermeasures By Vishal Salvi – CISO HDFC Bank IBA Banking Security Summit 2009.
E-commerce. Introduction  Electronic commerce (e-commerce) is going to have profound effect on the Government, the industry and the community on the.
Free Trade in the Cyber Underground Malware Outsourcing Marita Fowler Farrah Patterson CAP 6135 – Term Project Proposal.
E-BANKING E-banking is defined as the automated delivery of new and traditional banking products and services directly to customers through electronic,
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Information Warfare Playgrounds to Battlegrounds.
Malware Targets Bank Accounts GAMEOVER!!. GameOver Cyber criminals have found yet another way to steal your hard-earned money: a recent phishing scheme.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
The evolution of eCrime and the remote banking channels Presentation to the RHUL MSc Information Security Summer School 9 September 2013 Dom Lucas.
Electronic Money. What is Electronic Money? Scrip or money that is exchanged only through electronically is referred to as electronic money. Electronic.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Consistency in Reporting Data Breaches
Topic 5: Basic Security.
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
Advertising and Sales Promotion ©2013 Cengage Learning. All Rights Reserved. Chapter 5.
Information Warfare Playgrounds to Battlegrounds.
Stop cybercrime, protect privacy, save world. Chris Monteiro Cybercrime, dark web and internet security researcher Systems administrator Pirate / Digital.
ONLINE SHOPPING. Refers to buying and selling of goods and services using websites accessed through the internet physical goods such as clothes and books.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Matt Jennings.  Introduction  Value Chains  Major value chains in the illegal market  Means of Communication  Conclusion.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Paypal PayPal is an e-commerce business allowing payments and money transfers to be made through the Internet. With a PayPal account, you can send and.
Protecting Your Assets By Preventing Identity Theft
INTERNET SAFETY FOR EVERYONE
Advanced Persistent Threat
GP Double JEOPARDY! Click Once to Begin
The Underground Ecosystem Of Credit Card Frauds
Small Business Management, 18e
E-Commerce Fundamentals
ACQUISITION CRITERIA Established platforms with robust organic growth
إدارة الأعمال الإلكترونية عمادة التعلم الإلكتروني والتعليم عن بعد
[Internal Use] for Check Point employees​
Analyzing Malware Behavior
Analyzing Malware Behavior
<Partner Name> MMM DD, 2017
IT Security  .
Advanced Persistent Threat
The Hidden face of the Darknet
Backdoor Attacks.
Cyber Security & IT: What’s Next?
Risks.
Threat Monitoring Center
Trends in Ransomware Distribution
Agenda Equifax data hack Best Buy stops selling Kaspersky
Analyzing Malware Behavior
FedEx Billing Online (FBO) Non-Revenue Quick Guide
Federal Reserve Bank of Atlanta-Retail Payments Risk Forum
Information Security Session October 24, 2005
Internet Safety for Everyone
Customer Contract Management Scenario Overview
Order-to-Cash (Project-Based Services) Scenario Overview
HOW DO I KEEP MY COMPUTER SAFE?
Internet Safety for Everyone
E-Commerce and Economic Forces
Customer Contract Management Scenario Overview
Order-to-Cash (Project-Based Services) Scenario Overview
Internet Safety for Everyone
Internet Safety for Everyone
Tom Murphy Chief Information Security Officer
Chapter 12-Financial Management
Internet Safety for Everyone
Internet Safety for Everyone
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Financial Service Providers
Presentation transcript:

Tracking Cyber-threat Actors Effective Methods for Link Analysis and Attribution

Defining Threat Groups Smallest atomic unit: the individual Largest cloud unit: the scam Fraud, IP-theft, access reseller A.B.C  narrowing cloudspace to individual Developers Less than number of malware (with malware defined before MD5 created aka pre-packing) Users Larger than number of developers

Hacking Groups From China Like Cyber Café The country has more than 81,000 Internet cafes with 4.7 million computers.

The Fraud Marketplace The largest and most successful established market Sets the model for all other marketplaces

Payment system developer $500+ Implant Vendor $1,000+ Exploit Pack Vendor $10,000+ for 0-day Exploit Developer $10,000+ for 0-day Rootkit Developer Rogueware Developer Back Office Developer $1000+ Wizard Bot Vendor eGold ~4% of bank customers Payment system developer Country that doesn’t co-op w/ LE Secondary atm Keep 10% Victims Small Transfers A single operator here may recruit 100’s of mules per week $5,000 incrm. Drop Man Account Buyer Affiliate Botmaster ID Thief Endpoint Exploiters Keep 50% $100.00 per 1000 infections PPI Forger Cashier / Mule Bank Broker Sells accounts in bulk Country where account is physically located $5.00 per $50 Keep 10%

IP-Theft This marketplace is largely unmapped Buyers/Sellers have quite a bit of risk so information brokers have emerged A general auction/market has not been established due to the general exposure risk Many actors are directed at targets by a controller-individual State-sponsored attacks

Access Theft Because the IP-Theft market is difficult to emerge, the next-best thing is reselling access Industry-specific, nature of access described Sold on the basis of potential data-access Sometimes data will be enumerated (not actually stolen, just characterized) This is highly lucrative and well established, with prices in double and triple digits USD/Euro

Fingerprinting Malware Developers Use of forensic toolmarks See HBGary’s presentation on Malware Attribution for technical details on this subject

Malware Consumers (users) Requires information exposure that leaks PPI about the users Penetration of social cyberspaces / marketplaces Forums Back-end systems for license control Back-end systems for PPI accounting Download logs / user-id’s on systems

Exploitation Affiliates These are like foot soldiers Typically a numerical ID can be extracted from the exploit payload, as this is used to register a successful infection in a PPI program This is how they get paid $$$$

Example finding consumers via forum Toolmark leads to developer, which leads to forum for technical support, which leads to consumers

Example: Link Analysis with Palantir™ Implant Forensic Toolmark specific to Implant Searching the ‘Net reveals source code that leads to Actor Actor is supplying a backdoor Group of people asking for technical support on their copies of the backdoor

Example finding consumers via leaky license key Developer’s identity leads to postbin site, which leads to unprotected dynamic files, which leads to a cleartext listing of licensed user-keys

Keylogger (link analysis)

Penetrating Cyberspaces Maintaining and building digital cover Non-attrib pop on ‘net Multiple identities Contribution for bonafides

Building and Maintaining Digital Cover

Solutions for non-attribution Require access to the ‘net that cannot be attributed May require point-of-presence in specific country This is more difficult than it sounds Don’t think you can just buy a local dialup account

Time of day

Challenges of Forum-Scraping

Analysis Identifying an actual threat group pre-existing / established capability and motive Identifying newly emerging threats New attack / new motive Predicting new threats Getting into their head, what are they going to think of next?

Working back the timeline Who sells it, when did that capability first emerge? Requires ongoing monitoring of all open-source intelligence, presence within underground marketplaces Requires budget for acquisition of emerging malware products

Clustering a malware collection Large number of samples Need to group self-similar items into “clusters” Like a “strange attractor” From the cluster, perform link analysis into social cyberspaces to find “participants” Some participants may “resolve” into a developer, user, or other archetype

Following the Money

WebMoney

PayPal

PerfectMoney

Liberty Reserve

Moneybookers

AlertPay

BankWire

Neteller

cashU

eGold

Exchanges Exchanges convert one currency to another They also convert “virtual currencies” such as poker cash http://www.exchangemoneyplace.com/