Presentation is loading. Please wait.

Presentation is loading. Please wait.

Direct Deposit Phishing Attack

Similar presentations


Presentation on theme: "Direct Deposit Phishing Attack"— Presentation transcript:

1 Direct Deposit Phishing Attack
Brian Allen Network Security Analyst Washington University in Saint Louis May 2014 ----- Meeting Notes (5/7/14 10:17) -----

2 Topics for Today Brief overview of the Washington University network
Brief look at first incident in Sept/Oct 2013 Brief look at second incident in Jan/Feb 2014 Potential phishing defenses Some examples of real phishing s Who attacked us? Final thoughts

3 Washington University in St. Louis
Business School NSS Internet Law School NSO Arts & Sciences Medical School Decentralized Campus Network NSS = Network Services and Support NSO = Network Security Office Library We have a decentralized campus network. The Internet comes into the department called NSS which acts as the ISP for the University. NSS handles, among other things, the core routers, many of the switches, the main DNS servers, the main mail gateway, and all of the campus wireless. The Network Security Office sits inside NSS and my team of one, namely me, works closely with NSS. Every department on campus runs their own IT show. Each one has their own staff, and each runs their own mail servers, web servers, computer labs, etc. This means I don’t have access to any of their devices. Social Work Art & Architecture Engineering School Washington University in St. Louis

4 Numbers from Sept/Oct 2013 Attack:
13 total victims 11 Medical School faculty 2 Business School faculty 11 had direct deposit info changed 1 account caught by the new HRMS blacklist and immediately blocked

5 Round 1a Phishing Attack

6 Round 1b Phishing

7

8 Numbers From Jan/Feb 2014 Attack
17 Users were victims 15 Medical Faculty or Staff 1 Engineering School Faculty 1 Law Student 4 Victims had their Direct Deposit info changed 7 Users were protected by the Blacklist 10 Victims were logged into from new IP addresses which were quickly added to the Blacklist

9 Round 2 Phish Three Months Later

10

11

12 Criminals seemingly have a huge advantage
They send hundreds of phishing s and only need ONE user to fall for it to succeed

13 We can turn the tables on them
Force the criminal to run through a gauntlet of defenses to succeed

14 Reconnaissance Phase

15 Phishing Phase

16 Criminal Login Phase

17 HR/SSO Application Suggestions

18 Payroll Alerting Suggestions

19 Communication Suggestions

20 Phishing Examples

21 WUSTL Site or Phish Site?

22

23 WUSTL Site or Phish Site?

24

25 WUSTL Site or Phish Site?

26 Real Email or Phish Email?

27

28 Spammers log in and use account to send spam

29 Sept/Oct Attack 1

30 Jan/Feb Attack

31 Numbers from September/October:
13 total victims 11 Medical School faculty 2 Business School faculty 11 had direct deposit info changed 1 account caught by the new HRMS blacklist and immediately blocked

32 How Much $ Did the Criminals Get in October?
$97, Total was Transferred Out $91, Was Recovered by Payroll $5, Was Lost

33 Numbers From Jan/Feb Attack
17 Users were victims 15 Medical Faculty or Staff 1 Engineering School Faculty 1 Law Student 4 Victims had their Direct Deposit info changed 7 Users were protected by the Blacklist 10 Victims were logged into from new IP addresses which were quickly added to the Blacklist

34 How Much $ Did the Criminals Get in January?
$0 Total was Transferred Out $0 Was Recovered by Payroll $0 Was Lost Thanks! Questions?


Download ppt "Direct Deposit Phishing Attack"

Similar presentations


Ads by Google