Direct Deposit Phishing Attack

Slides:



Advertisements
Similar presentations
So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen Network Security Analyst,
Advertisements

Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Topics in Security IS&T All Staff Meeting Tuesday, April 7, 2011 Brian Allen, CISSP Network Security Analyst, Washington University.
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
Johnson Logistics Solutions Office of Systems and Information Technology.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Wireless and Switch Security NETS David Mitchell.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Technology Update TSAG Meeting 11/14/02. Announcements: Spam Open Forum  Monday November 18, 2pm-3pm  OV Presentation Room Campus Operations Center:
IP Blacklisting Causes & Solution Marcus Low, R&D Director InternetNow International Sdn Bhd.
Phishing and Intrusion Prevention Tod Beardsley, TippingPoint (a division of 3Com), 02/15/06 – IMP-201.
Topics in Internet Security A&D Lunch & Learn Brown Bag Friday, August 19, 2011 Brian Allen, CISSP Network Security Analyst, Washington.
1 ECE 156 Computer Network Architecture Professor Krish Chakrabarty Department of Electrical and Computer Engineering Fall 2006.
Introduction1-1 Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 1 Omar Meqdadi Department of Computer Science and Software Engineering.
Note1 (Admi1) Overview of administering security.
Lecture Number One History of the internet and a bit about how it works.
Terri Lahey Control System Cyber-Security Workshop October 14, SLAC Controls Security Overview Introduction SLAC has multiple.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
7.7 DDoS Attack Timeline 1 st Attack Date : ’ :00 ~ ’ :00, ’ :00 ~ ’ :00 Target : (US) White House + 4 web sites (US)
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Secure & Asymmetric Approach for Designing FUTURE INTERNET Presented by Md. Obaidur Rahman Networking Lab, Department of Computer Engineering, Kyung Hee.
1 CDA 4527 Computer Networking Prof. Cliff Zou School of Computer Science University of Central Florida Fall 2005.
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
Networks. Local area network (LAN( Wide-area network (WAN( Networks Topology.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
ECE 374: Computer Networks & Internet Introduction Spring 2012 Prof. Michael Zink.
Staff addresses Availability tradeoffs December 13, 2012.
CERN - IT Department CH-1211 Genève 23 Switzerland t OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall.
Networking Revision. Advantages:  Communication (remotely)  Sharing hardware (saves on cost, eg. Printers)  Sharing of data and info (eg. Databases.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Munix Bus WiFi Authentication, Log Management, Internet Security, Content Filter & VPN Service Internet Gateway & Business Intelligence
«My future profession»
Sean Moriarty, Oswego State CTS 2016 Cyber Security Update
3.1 Types of Servers.
CIS 333 Course Experience Tradition/ snaptutorial.com
Munix for Education Content Filter, Bandwidth Control, Location Mapping, Movement Analysis, User Self Management Portal, Time Analysis, and much more ….
CNT 4704 Computer Communication Networking (not “analysis”)
Backdoor Attacks.
3.1 Types of Servers.
Internet and Intranet.
CNT 4704 Computer Communication Networking (not “analysis”)
3.1 Types of Servers.
CNT 4704 Computer Communication Networking (not “analysis”)
ADVANCED PERSISTENT THREATS (APTs) - Simulation
Hiding Network Computers Gateways
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
SCSU Technology Update FY05
Network Services.
Internet and Intranet.
WELCOME Start of Semester Meeting Fall 2016
CSCD 330 Network Programming Spring
IPv6 Hanford Local Area Network (HLAN) Upgrade Project
CSCD 330 Network Programming Spring
CNT 4704 Analysis of Computer Communication Networks
CNT 4704 Analysis of Computer Communication Networks
Internet and Intranet.
Unit 36: Internet Server Management
A worldwide system of interconnected computer networks.
CSCD 330 Network Programming Spring
was not invented by Al Gore…
Read this to find out how the internet works!
COMPUTER NETWORKS AND THE INTERNET Chapter 6
Computer Networks Protocols
Wireless Spoofing Attacks on Mobile Devices
Internet and Intranet.
Communicating in the IT Industry
Eduroam and Ipv6 Deployment Progress in Uva Wellassa University
Division of Engineering Computing Services
Presentation transcript:

Direct Deposit Phishing Attack Brian Allen brianallen@wustl.edu Network Security Analyst Washington University in Saint Louis May 2014 ----- Meeting Notes (5/7/14 10:17) -----

Topics for Today Brief overview of the Washington University network Brief look at first incident in Sept/Oct 2013 Brief look at second incident in Jan/Feb 2014 Potential phishing defenses Some examples of real phishing emails Who attacked us? Final thoughts

Washington University in St. Louis Business School NSS Internet Law School NSO Arts & Sciences Medical School Decentralized Campus Network NSS = Network Services and Support NSO = Network Security Office Library We have a decentralized campus network. The Internet comes into the department called NSS which acts as the ISP for the University. NSS handles, among other things, the core routers, many of the switches, the main DNS servers, the main mail gateway, and all of the campus wireless. The Network Security Office sits inside NSS and my team of one, namely me, works closely with NSS. Every department on campus runs their own IT show. Each one has their own staff, and each runs their own mail servers, web servers, computer labs, etc. This means I don’t have access to any of their devices. Social Work Art & Architecture Engineering School Washington University in St. Louis

Numbers from Sept/Oct 2013 Attack: 13 total victims 11 Medical School faculty 2 Business School faculty 11 had direct deposit info changed 1 account caught by the new HRMS blacklist and immediately blocked

Round 1a Phishing Attack

Round 1b Phishing Email

Numbers From Jan/Feb 2014 Attack 17 Users were victims 15 Medical Faculty or Staff 1 Engineering School Faculty 1 Law Student 4 Victims had their Direct Deposit info changed 7 Users were protected by the Blacklist 10 Victims were logged into from new IP addresses which were quickly added to the Blacklist

Round 2 Phish Three Months Later

Criminals seemingly have a huge advantage They send hundreds of phishing emails and only need ONE user to fall for it to succeed

We can turn the tables on them Force the criminal to run through a gauntlet of defenses to succeed

Reconnaissance Phase

Phishing Email Phase

Criminal Login Phase

HR/SSO Application Suggestions

Payroll Alerting Suggestions

Communication Suggestions

Phishing Examples

WUSTL Site or Phish Site?

WUSTL Site or Phish Site?

WUSTL Site or Phish Site?

Real Email or Phish Email?

Spammers log in and use account to send spam

Sept/Oct Attack 1

Jan/Feb Attack

Numbers from September/October: 13 total victims 11 Medical School faculty 2 Business School faculty 11 had direct deposit info changed 1 account caught by the new HRMS blacklist and immediately blocked

How Much $ Did the Criminals Get in October? $97,210.28 Total was Transferred Out $91,470.53 Was Recovered by Payroll $5,739.75 Was Lost

Numbers From Jan/Feb Attack 17 Users were victims 15 Medical Faculty or Staff 1 Engineering School Faculty 1 Law Student 4 Victims had their Direct Deposit info changed 7 Users were protected by the Blacklist 10 Victims were logged into from new IP addresses which were quickly added to the Blacklist

How Much $ Did the Criminals Get in January? $0 Total was Transferred Out $0 Was Recovered by Payroll $0 Was Lost Thanks! Questions? brianallen@wustl.edu