Pacific Northwest Digital Government Summit Security – How Much is Enough? June 20, 2006 SA Kenneth A. Schmutz
National Priorities Counterterrorism Counterintelligence Cyber Crime
Cyber Crime Components Computer Intrusions BOTNETS DDOS Attacks Intellectual Property Theft Theft of Trade Secrets Virus/Worm Activity Child Pornography Internet Fraud
How Severe is the Threat? THREATTHREAT Professional Cyber Criminals Organized Crime ( Foreign and Domestic) Money Information
Growing Trend BOTNETS Distributed Denial Of Service Attacks (DDoS) Extortion Malicious Attacks Pay for Click (Adware installations) Network Traffic Identity Theft (keylogging, phishing) SPAM
Components of BOTNET Internet Relay Chat (IRC) Server Usually a compromised Linux box Zombies- Compromised computers Home, Military, Government, Education, and Business infected by a worm, trojan, or virus Botherder – Person controlling BOTNET
Attack Network Attack Control Computer
Recent BOTNET Case ZOTOB Released ~8/2005 Spreads through and MS05-039(PnP) Sets up Backdoor via trojan Controlled by Internet Relay Chat (IRC) Zotob A, B, C derived from MyTob Zotob D, E, F derived from Rxbot
ZOTOB- victims IRC SERVER Diabl0.turkcoders.net
ZOTOB - Subjects Code Analysis e b 78 5d f 74 7a 6f 72 B-O-T-Z-O-R.SCAN....[x] Botzor c 4f By DiablO
ZOTOB - Subjects Diabl0 FBI Headquarters Cyber FBI Seattle Cyber Squad Identify hotmail account for Diabl0 through DNS Whois for blackcarder.net Worm analysis “greetz to my good friend coder”
ZOTOB - Subjects FBI flies to Morocco/Turkey
ZOTOB Conclusion Two subjects located and arrested in less than two weeks from infection
Cyber Prevention Current, patched Operating System Enable automatic updates Current virus protection Update as often as service allows Software and Hardware based firewall Anti-Spyware Protection Now a necessity Identify points of vulnerability Remote access Laptops
Resources ( )
Contact Special Agent Kenneth A. Schmutz (206)