Www.cuispa.org Fraudulent Site Take Down Guidance Author: John Brozycki, CISSP Hudson Valley FCU CUISPA Member Advisor LEGAL DISCLAIMER: This document.

Slides:



Advertisements
Similar presentations
The Internet.
Advertisements

NetScanTools ® LE Law Enforcement Version of NetScanTools ® from Northwest Performance Software, Inc. netscantools.com.
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Handling Internet Network Abuse Reports at APNIC 21 October 2010 LAP-CNSA Workshop, Melbourne George Kuo.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Presentation for the Department of Commerce's Internet Policy Task Force Second Public Meeting Recording Industry Association of America, May 8, 2014.
Chapter 2 Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
The Internet Useful Definitions and Concepts About the Internet.
FTP – File Transfer Protocol. 5 דברים שלא ידעתם על FTP FTP is commonly run on two ports, 20 and 21.ports FTP run exclusively over TCP.TCP FTP is separated.
CSC586 Network Forensics IP Tracing/Domain Name Tracing.
Lesson 1: Configuring Network Load Balancing
Department of Information Engineering 1 What is port number? OK, you know that in order to connect to Internet, each computer must have a unique address.
How to Establish a Blog. What is a Blog A blog is a collection of informational articles/ideas intended to update a viewer on new information associated.
Internet Basics.
Norman SecureSurf Protect your users when surfing the Internet.
Mandatory Annual ACE Training Fiscal Year 2011 – 2012.
Forensic and Investigative Accounting
GCSE Computing#BristolMet Session Objectives# 19 MUST understand what is meant by intellectual property and the legislation to protect ownership. SHOULD.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E Database SIG APNIC Database Privacy Issues 1 March 2001 APRICOT, Malaysia Fabrina.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
 Internet vs WWW  Pages vs Sites  How the Internet Works  Getting a Web Presence.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
FTP (File Transfer Protocol) & Telnet
Simple Web Services. Internet Basics The Internet is based on a communication protocol named TCP (Transmission Control Protocol) TCP allows programs running.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
How Web Servers and the Internet Work by by: Marshall Brainby: Marshall Brain
Chapter 8 The Internet: A Resource for All of Us.
ACSP Report – Review of Open Suggestions Nate Davis.
HOW WEB SERVER WORKS? By- PUSHPENDU MONDAL RAJAT CHAUHAN RAHUL YADAV RANJIT MEENA RAHUL TYAGI.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Forensic and Investigative Accounting Chapter 14 Digital Forensics Analysis © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
CIS 450 – Network Security Chapter 3 – Information Gathering.
1 INFO 321 Server Technologies II FTP Material adapted from Dr. Randy Kaplan.
Department of Computer Science Southern Illinois University Edwardsville Spring, 2008 Dr. Hiroshi Fujinoki FTP Protocol Programming.
Day 14 Introduction to Networking. Unix Networking Unix is very frequently used as a server. –Server is a machine which “serves” some function Web Server.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Phishing Lab. Lab 9: Phishing ● Step 1: Acquire Some Data ● Open the Phishing_Evidence document. This is the original in its initial format as.
Assessing a Target System Source: Chapter 3 Computer Security Fundamentals Chuck Easttom Prentice Hall, 2006.
What is WHOIS?. 2  Internet Protocol you can use to search registry and registrar databases and discover who registered a domain name or IP address 
Cosc 5/4730 Networking Overview and protocols. Basic networking Networking coding is based on a client and server model. – Even if the code you are writing.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
ECEN “Internet Protocols and Modeling”, Spring 2012 Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Class.
Chapter 11 Working with Credit Card Methods of Processing Credit Cards Preparing for Cyber Cash Authoring a Credit card Transaction.
Evaluating & Maintaining a Site Domain 6. Conduct Technical Tests Dreamweaver provides many tools to assist in finalizing and testing your website for.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
The Internet. Important Terms Network Network Internet Internet WWW (World Wide Web) WWW (World Wide Web) Web page Web page Web site Web site Browser.
COMPUTER NETWORKS Hwajung Lee. Image Source:
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Whois & Data Accuracy Across the RIRs. Terms ISP – An Internet Service Provider is allocated address space by an RIR for the purpose of providing connectivity.
Ip addressing: dhcp & dns
The Acceptable Use of Technology
3.02H Publishing a Website 3.02 Develop webpages..
Footprinting and Scanning
I S P S loss Prevention.
Module 23 (ftp and wireshark)
Unit 27: Network Operating Systems
ETS Submission Process for New Project Applications
Intro to Ethical Hacking
File Transfer Protocol
Protecting Yourself from Fraud including Identity Theft
Implementing Client Security on Windows 2000 and Windows XP Level 150
4.02 Develop web pages using various layouts and technologies.
2008 Workshop AHEPA District 3 Website Presentation
Ip addressing: dhcp & dns
Designing IIS Security (IIS – Internet Information Service)
File Transfer Protocol
Presentation transcript:

Fraudulent Site Take Down Guidance Author: John Brozycki, CISSP Hudson Valley FCU CUISPA Member Advisor LEGAL DISCLAIMER: This document is provided for informational purposes only. CUISPA and the author make no warranties or representations as to the accuracy or completeness of such information and CUISPA and the author assume no liability or responsibility for errors or omissions in the content of this information. Your use of this information is AT YOUR OWN RISK and applies to all CUISPA legal notices and terms of use.

Overview Responding to phishing attacks has become a routine task for many credit union IT departments. Rapidly taking down these fraudulent websites is a prudent and often necessary measure for preventing losses. This presentation outlines some of the processes, challenges, and techniques involved in getting a fraudulent website, impersonating your institution, taken down.

Take-down Steps: 1)PREPARATION 2)DETERMINE THE SOURCE 3)RESEARCH THE DOMAIN 4)RECON / INTELLEGENCE 5)CONTACTING 3rd PARTIES 6)WORKING WITH LAW ENFORCEMENT

Prepare Environment Prepare your environment in advance. Remember that the site may host malicious code. Do not use a production machine that can’t afford to be compromised. Always use a test PC that can be “sacrificed.” If possible, do not use your production network. A separate broadband connection is preferable. Full Internet access (no proxy server or restricted ports) is advantageous. Useful common Internet tools: ping, traceroute, nslookup etc.

Helpful Tools VMware Workstation or Player Allows you to create a test environment without sacrificing a production PC. Disks can be “undoable” so you can get back to the original state without rebuilding from scratch.

Helpful Tools SandboxIE A freeware utility that allows you to launch an app, such as IE, in a controlled area, prohibiting writes to the hard drive and registry.

2) Determine the SOURCE The phishing site may be accessible via FQDN (Fully Qualified Domain Name) and/or IP address. Try to determine the FQDN if applicable, IP address, and path information

2) Determine the SOURCE If you have the phish , view the underlying source to determine the true link URL Example (FQDN): / Example (IP address):

3) Researching the DOMAIN The Domain often be contained in the FQDN Example: (domain is hackedsite.com) Use a WHOIS utility to determine information on the domain. WHOIS gives us: 1) Domain owner and contact information ( and hopefully a phone number) 2) Determine who is authoritative for DNS. May be owner, ISP, or DNS hosting service.

For US-based.com and common domains, start with: click on “whois” link. For a more expansive search, try one of the following: (free service from MarkMonitor) 3) Researching the DOMAIN

3) Research the DOMAIN ARIN: Start with ARIN (American Registry for Internet Numbers, WHOIS tool. Enter the IP address. If IP is not domestic, ARIN will tell you where to look next, ie: RIPE, APNIC, etc. If IP only leads back to site owner, use a traceroute to determine how packets get to the site. The IPs right before the site will be the ISPs and you can look them up.

3) Researching the DOMAIN If given an IP address only: 1.Any website that may be viewable from the IP only should be viewed on a safe test machine (ex: 1.PING –a

SAMPLE RESULTS FOR BOB’S INTERNET, BOBI-IPNET (NET ) My Credit Union BOBI-MYCU-1 (NET ) # ARIN WHOIS database, last updated :10 # Enter ? for additional hints on searching ARIN's WHOIS database. The above results tell us that “Bob’s Internet” owns the range of addresses from through A class “C” range (255 addresses from through ) are assigned to “My Credit Union”. In this case, you would try to contact My Credit Union as they are responsible for the IP address. You can always contact the ISP if you can’t reach the party immediately responsible for the IP address. 3) Research the DOMAIN

We now know: Who owns the domain Contact info for domain The ISP (may not be hosting but is at least providing connectivity) DNS provider RESEARCH COMPLETE!

4) RECON AND INTELLIGENCE Procede with caution Gathering intelligence is optional. You may not need any additional information. Further investigation calls upon some technical skills. Be cautious of the legal aspects of further investigation. Finger-printing tools can be deployed to determine OS, app, etc. Port scanners can determine if other services are running.

4) RECON AND INTELLIGENCE Example: Information from FTP service telnet FTP Server ready. 214-The following commands are recognized (* =>'s unimplemented). USER PASS ACCT* CWD XCWD CDUP XCUP SMNT* QUIT REIN* PORT PASV TYPE STRU MODE RETR STOR STOU* APPE ALLO* REST RNFR RNTO ABOR DELE MDTM RMD XRMD MKD XMKD PWD XPWD SIZE LIST NLST SITE SYST STAT HELP NOOP 214 Direct comments to

5) CONTACT PARTIES Try contacting Website owner first Try contacting ISP next If no luck and the site uses an external DNS service then try contacting them next. Have documentation available and provide it with your request. Request the fake site code for further reference.

5) CONTACT PARTIES To whom it may concern, URGENT REQUEST - Please read the following: Today a number of our credit union members received a phishing soliciting their personal account information. The link referenced in the e- mail returns to a site which is presenting itself as our Hudson Valley Federal Credit Union Web site. As such it is violating copyright laws and misrepresenting itself for the purposes of illegally collecting account information for financial gain. The compromised server is housing the spoof content at: IP = Please take this site down or remove the fraudulent content and respond when these changes have been implemented. If any financial loss is incurred we will be required to actively seek redress through local and national law enforcement bodies. I have attached a PDF capture of the spoofed site (rogue1.pdf). We would greatly appreciate it if you would us an archive of the fake site directory. Thank you for your prompt attention to this matter. Sample to ISP

5) CONTACT PARTIES Common difficulties: Time differences with overseas ISPs. Language barriers. ISP policies on take-downs

6) WORKING WITH LAW ENFORCEMENT Law enforcement can make request on your behalf or call on contacts abroad (ie: Interpol) Provide law enforcement with intelligence information: 1) They track it 2) You may provide a missing piece of a larger puzzle 3) Losses across organizations can be aggregated

CUISPA Educational Programs (512) Oakmont Blvd. Su.204 Austin, TX For comments on this presentation please send to: