Cyber Crime Tanmay S Dikshit.

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Advertisements

By Hiranmayi Pai Neeraj Jain
Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
7 Effective Habits when using the Internet Philip O’Kane 1.
Security for Today’s Threat Landscape Kat Pelak 1.
The Elderwood Project Brian Bowlby CompNet. Review of material on Symantec website (
1© Copyright 2011 EMC Corporation. All rights reserved. Advanced Persistent Threat Sachin Deshmanya & Srinivas Matta.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.
Information Networking Security and Assurance Lab National Chung Cheng University 1 A Real World Attack: wu-ftp.
! Importance: High BancorpSouth Inview IMPORTANT SECURITY NOTICE All Users - Must Accept New Digital Security Certificate 2007 (Security ISO Certification.
MIRAGE CPSC 620 Project By Neeraj Jain Hiranmayi Pai.
Advanced Persistent Threats CS461/ECE422 Spring 2012.
eScan Total Security Suite with Cloud Security
Introduction to InfoSec – Recitation 15 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Introduction to Computer Ethics
 a crime committed on a computer network, esp. the Internet.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Security at NCAR David Mitchell February 20th, 2007.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Advanced Persistent Threats (APT) Sasha Browning.
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
Malicious Software.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Computer Security By Duncan Hall.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 3 Network Security Threats Chapter 4.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Cyber Security – Anatomy of a Hack
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Cyber Threat Dr. John P. Abraham Professor University of Texas Pan American.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
 Terms:  “Security”: is a system’s ability to provide services while maintaining the five IA pillars  “Attack”: an action that violates one of the.
Koustav Sadhukhan, Rao Arvind Mallari and Tarun Yadav DRDO, Ministry of Defense, INDIA Cyber Attack Thread: A Control-flow Based Approach to Deconstruct.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Understanding and breaking the cyber kill chain
Proactive Incident Response
Understanding Cyber Attacks: Technical Aspects of Cyber Kill Chain
WannaCry/WannaCrypt Ransomware
WannaCry/WannaCrypt Ransomware
Ilija Jovičić Sophos Consultant.
A lustrum of malware network communication: Evolution & insights
Employee clicks on fake
Secure Software Confidentiality Integrity Data Security Authentication
Intelligence Driven Defense, The Next Generation SOC
TOPIC 8 ADVANCED PERSISTENT THREAT (APT) 進階持續性滲透攻擊
Report Phishing Forward phishing s to
Jon Peppler, Menlo Security Channels
Spear Phishing Ways to Minimize its Risks
Internet Worm propagation
A Distributed DoS in Action
David J. Carter, CISO Commonwealth Office of Technology
Report Phishing Forward phishing s to
Introduction to Systems Security
Information Security Awareness
Chapter 4: Protecting the Organization
Information Security – Sep 18
Presentation transcript:

Cyber Crime Tanmay S Dikshit

Stage 1 Reconnaissance Finding out about the target Scan a well known site and find the hosts around it (Port Scan) Use of Botnets Stage 1 Reconnaissance

Stage 2 Weaponization Target a specific or a group of targets Exploit a vulnerability Target a specific site Stage 2 Weaponization

Stage 3 Delivery Infect a document to send via Email Infect a website with a malware Use stolen or default credentials Identify flaws in exposed software Stage 3 Delivery

Stage 4 Exploitation Exploit Software Remote stream of packets to exposed host Stage 4 Exploitation

Stage 5 Installation Payload executes and continues to execute. Registry key that starts the software. Stage 5 Installation

Stage 6 Command and Control Attack may carry out action for long time Payload may provide long term source of intelligence Stage 6 Command and Control

Stage 7 Actions Depends on motives of attacker Defacement Information theft Money Theft Stage 7 Actions

Case Study Lockheed Martin- Computer Incident Response Team (LM-CIRT) March 2009 3 intrusions Common Advanced Persistent Threat tactic Use of Targeted malicious email

Case Study LM-CIRT March 2009 APT tactic: A suspicious email attachment About: American Institute of Aeronautics and Astronautics (AIAA) conference. Sender: Authorized employee Receiver: Only 5 users

Intrusion 1 Email Header Received: (qmail 71864 invoked by uid 60001); Tue, 03 Mar 2009 15:01:19 +0000 Received: from [60.abc.xyz.215] by web53402.mail.re2.yahoo.com via HTTP; Tue, 03 Mar 2009 07:01:18 -0800 (PST) Date: Tue, 03 Mar 2009 07:01:18 -0800 (PST) From: Anne E... <dn...etto@yahoo.com> Subject: AIAA Technical Committees To: [REDACTED] Reply-to: dn...etto@yahoo.com Message-id: <107017.64068.qm@web53402.mail.re2.yahoo.com> MIME-version: 1.0 X-Mailer: YahooMailWebService/0.7.289.1 Content-type: multipart/mixed; boundary= "Boundary_(ID_Hq9CkDZSoSvBMukCRm7rsg)” X-YMail-OSG: Please submit one copy (photocopies are acceptable) of this form, and one copy of nominee's resume to: AIAA Technical Committee Nominations, 1801 Alexander Bell Drive, Reston, VA 20191. Fax number is 703/264- 7551. Form can also be submitted via our web site at www.aiaa.org, Inside AIAA, Technical Committees Email Header Intrusion 1

Intrusion 1 The email contained a pdf file which was actually: a benign PDF and a Portable Executable (PE) backdoor installation file. encrypted using a trivial algorithm with an 8-bit key stored in the exploit shellcode. On Installation: C:\Documents and Settings\[username]\Local Settings\fssm32.exe Opens the benign pdf The pdf is same as what was available on AIAA website at http://www.aiaa.org/pdf/inside/tcnom.pdf The attack Intrusion 1

Intrusion 1

Intrusion 2 Email Header Received: (qmail 97721 invoked by uid 60001); 4 Mar 2009 14:35:22 -0000 Message-ID: <552620.97248.qm@web53411.mail.re2.yahoo.com> Received: from [216.abc.xyz.76] by web53411.mail.re2.yahoo.com via HTTP; Wed,04 Mar 2009 06:35:20 PST X-Mailer: YahooMailWebService/0.7.289.1 Date: Wed, 4 Mar 2009 06:35:20 -0800 (PST) From: Anne E... <dn...etto@yahoo.com> Reply-To: dn...etto@yahoo.com Subject: 7th Annual U.S. Missile Defense Conference To: [REDACTED] MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="0-760892832-1236177320=:97248" Welcome to the 7th Annual U.S. Missile Defense Conference Email Header Intrusion 2

Intrusion 2 The email contained a pdf file which was actually: a benign PDF MDA_Prelim_2.pdf and a Portable Executable (PE) backdoor installation file. encrypted using a trivial algorithm with an 8-bit key stored in the exploit shellcode. On Installation: C:\Documents and Settings\[username]\Local Settings\fssm32.exe Opens the benign pdf The pdf is same as what was available on AIAA website at http://www.aiaa.org/events/missiledefense/MDA_Prelim_09.pdf The attack Intrusion 2

Intrusion 2

Intrusion 3 Email Header Received: (qmail 62698 invoked by uid 1000); Mon, 23 Mar 2009 17:14:22 +0000 Received: (qmail 82085 invoked by uid 60001); Mon, 23 Mar 2009 17:14:21 +0000 Received: from [216.abc.xyz.76] by web43406.mail.sp1.yahoo.com via HTTP; Mon, 23 Mar 2009 10:14:21 -0700 (PDT) Date: Mon, 23 Mar 2009 10:14:21 -0700 (PDT) From: Ginette C... <ginette.c...@yahoo.com> Subject: Celebrities Without Makeup To: [REDACTED] Message-id: <297350.78665.qm@web43406.mail.sp1.yahoo.com> MIME-version: 1.0 X-Mailer: YahooMailClassic/5.1.20 YahooMailWebService/0.7.289.1 Content-type: multipart/mixed; boundary="Boundary_(ID_DpBDtBoPTQ1DnYXw29L2Ng)" <email body blank> Email Header Intrusion 3

Intrusion 3 The email contained a powerpoint file which was actually: a malicious power-point file exploiting a Microsoft zero-day exploit Exploit was publicly acknowledged after 10 days Microsoft released a patch after a month The attack Intrusion 3

Intrusion 3

Cyber Security Intelligence-Driven Computer Network Defense Adversary Campaigns Analysis Intrusion Kill Chains