Leveraging Technology to Combat Fraud
Transcription
Leveraging Technology to Combat Fraud
Information Security Association (ISA) November 14, 2007 Leveraging Technology to Combat Fraud Dan VanBelleghem, Technical Director Security and Systems Engineering Solutions, SRA DISCLAIMER Points of view or opinions expressed in this presentation do not necessarily represent the official position or policies of SRA or any past, future or present bosses. About Me • SRA • Leading provider of technology and strategic consulting services and solutions - including systems design, development and integration; and outsourcing and managed services. • Comprehensive information assurance practice integrating security architecture, risk assessments, and certification & accreditation. SRA’s IA practice currently rated at NSA-CMM Level 3. • Dan VanBelleghem • Technical Director of SRA Security Systems and Engineering Solutions Team. Conducts security-related research and consulting activities including providing strategic guidance to customers, analyzing network traffic for security-related incidents, and designing security solutions to maintain integrity and prevent loss of intellectual capital • Member of the faculty at the George Washington University’s Computer Security and Information Assurance program. Agenda • Introduction • Attack Description • Threats • Recent Threat Examples • Organized Crime • Additional resources • Q&A Network Attack Methodology Information Gathering Create Backdoor Cover Tracks Service Identification Trophy Hunting Exploit and Gain Access Attacks range from focused attempts for a specific target to random scans looking for a vulnerable victim. Vulnerability Analysis Denial of Service 2007 SRA International, Inc. - Proprietary Aim Versus Effect Common Attacks •Operational •Architecture Architecture •Mission Operations •Technical •Architecture Focus on vulnerability of a component (e.g., poor authentication) Potential to affect the host system or platform Network becomes affected Which could impact a mission process •Systems •Networks •Components Customer Case Studies • Common Security Assessment Findings • Storage area networks default administrative accounts • Printers, switches and routers discovered with no authentication enabled • Security officer’s files found on open network share with vulnerability reports • Databases discovered with default system accounts and passwords Attack Sophistication • Attack sophistication continues to increase while the amount of knowledge an attacker needs is decreasing • Tools are getting better • Script Kiddies • Target the Internet for a known vulnerability; however, only 1 percent of the systems may be vulnerable. If you can scan 1 million host, you will find 10,000 vulnerable victims. • Black Hats • Will focus their attack to a specific victim or target. 2007 SRA International, Inc. - Proprietary Yesterday’s Attacks • Common attacks in 2000 & 2001 were web defacements and Denial of Service attacks against your IRC foe. • Hacker underground bragging rights • Elevate IRC user control • Fun and curiosity • Old school tools include NetBus, Sub7, Back Orifice • Open CD tray • Remote administration • Key logging 2007 SRA International, Inc. - Proprietary Today’s Attacks • More focused on financial and identity theft • Underground economy that exists to buy and sell financial and identity data 2007 SRA International, Inc. - Proprietary Common Attack Scenario Sell Data in Underground Market Scan for Vulnerable web servers Exploit & Escalate Privileges (admin) Discover Backend Customer Database Infect Web Server with Bot code Capture Credit Compromise Card Data Customer Database Users Download Bot & join Bot heard Attacker builds army of zombies Key Stroke Logger 2007 SRA International, Inc. - Proprietary Threat Environment is Changing • Gartner, via the March 2007 issue of CIO Decisions: • "By the end of 2007, 75% of enterprises will be infected with undetected, financially motivated, targeted malware. These attacks will evade traditional perimeter and host defenses. The threat environment is changing: Targeted attacks for financial gain are increasing, and automated malware generation kits allow simple creation of thousands of variants quickly. But our security processes and technologies haven't kept up." 2007 SRA International, Inc. - Proprietary Recent Security Breaches • TJX • 45.7 Million User Credit Cards and debit cards were stolen over 18 month period • USDA • Up to 63,000 Social Security Numbers for farmers receiving aid were disclosed • University of Missouri • Over 22,000 Students’ PII compromised 2007 SRA International, Inc. - Proprietary Topic: Transnational Cyber-Crime • Traditional Organized Crime: smuggling, trafficking, drugs, gambling, etc. • Anonymity and financial lure has made cyber-crime more attractive • Separation between the physical and virtual world. The virtual world is another universe where groups form and engage in illegal activities • Organized cyber-crime groups can conduct operations without ever making physical contact with each other. All can be independent, anonymous cells. • Organization can be networked or hierarchical Motivation… Who Are They ? • A highly organized criminal network based primarily in Eastern Europe • Consist of Specialized Cells for Specific Functions– “a network of networks” • Utilize Web Forums such as Carderportal, IAACA, Mazafaka, Shadowcrew, Carderplanet • Inflict a significant amount of damage to the U.S. and international financial industry Where are they? • Global: All continents • Concentrations in: Middle East, Eastern Europe, Russia, Brazil, SE Asia, USA. What do they do? • Conduct network intrusion on merchant processors • Write Viruses, Malware, and trojans • Use of Spam/Phishing to exploit eBay/PayPal users, banks, credit card users, online account holders, etc • Software piracy, illegal pharmaceuticals • Escrow and Auction Fraud • Use of compromised credit cards and compromised online accounts to conduct reshipping operations Other Characteristics • Geopolitical/Cultural Perspectives: • Lax Cyber-Laws in some countries, but getting better • Poorly funded, untrained, and inadequately equipped police forces w/ little expertise in cyber crime or computers • Highly literate, educated, and skilled work force + no jobs leads young adults to find creative ways to make “easy money”--little incentive to find legit job. • Part of the Culture: young adults spending much of their day online. Carding networks: past, present, future Key Facts: ICA Formed: 2001 during meeting in Odessa, Ukraine Founders: Dmitriy Golubov and Roman Vega 150 Original members Status: The group’s members are still somewhat active with many actors involved in other forums and groups • Dozens have been arrested • • • • Inactive Sites Active Sites •CarderPlanet •CarderPortal •Darkprofits •Dumpsmarket •IAACA •Mazafaka •ShadowCrew •Carders Market •Carders Army •Cardingworld •Darkmarket •The Grifters •TheftServices (IAACA) •Mazafaka •Tanec Hackerov • Vendorsname •TalkCash •Carder.info Dmitriy Golubov “Script” Arrested: July 2005 Roman Vega “BOA” Arrested: May 2003 Carding Lingo • • • • • • • • • • • • • • • • • • • • • Carder - Slang used to describe individuals who use stolen credit card account information to conduct fraudulent transactions. Carding - Trafficking in and fraudulent use of stolen credit card account information. Cashing - The act of obtaining money by committing fraud. This act can be committed in a variety of ways: The term can stand for cashing out Western Union wires, Postal money orders and WebMoney; using track data with PINs to obtain cash at ATMs, from PayPal accounts, or setting up a bank account with a fake ID to withdraw cash on a credit card account. CC - Slang for credit card. Change of Billing (COB or COBs) - Term used to describe the act of changing the billing address on a credit account to match that of a mail drop. This act allows the carder full takeover capability of the compromised credit card account and increases the probability that the account will not be rejected when being used for Internet transactions. CVV2 - CVV2 stands for credit card security code. Visa, MasterCard, and Discover require this feature. It is a 3 digit number on the back of the card. DDoS - Acronym for Distributed Denial of Service Attack. The intent when conducting a DDOS attack is to shut down a targeted website, at least for a period of time, by flooding the network with an overflow of traffic. DLs - A slang term that stands for counterfeit or novelty driver's licenses. Drop - An intermediary used to disguise the source of a transaction (addresses, phones etc.) Dumps - Copied payment card information, at least Track 1 data, but usually Track 1 and Track 2 data. Dump checking - Using specific software or alternatively encoding track data on plastic and using a point of sale terminal to test whether the dump is approved or declined. This provides carders a higher sense of security for obtaining quality dumps from those who offer them and also a sense of security when doing in store carding. Full info(s) - Term used to describe obtaining addresses, phone numbers, social security numbers, PIN numbers, credit history reports and so on. Full Info(s) are synonymous with carders who wish to take over the identity of a person or to sell the identity of a person. Holos - Slang for the word Holograms. Holograms are important for those who make counterfeit plastic credit cards to emulate an existing security feature. ICQ - An abbreviation for "I Seek You". ICQ is the most widely used instant messaging system for carders. Popular among Eastern Europeans in their Internet culture, it continues to be used for carding activity. IRC - An abbreviation for "Internet Relay Chat". IRC is a global system of servers through which users can conduct real-time text-based chat, exchange files, and interact in other ways. IDs - Slang for identification documents. Carders market a variety of IDs, including bills, diplomas, driver's licenses, passports, or anything that can be used as an identity document. MSR (Magnetic Strip Reader) - Device that can be used for skimming payment card information and/or encoding track information on plastic. Phishing - The extraction of information from a target using a hook (usually an e-mail purporting to be from a legitimate company). Phishers spam the Internet with e-mails in hopes of obtaining information that can be used for fraudulent purposes. POS (Point of Sale) - Acronym for a terminal through which credit cards are swiped in order to communicate with processors who approve or decline transactions. Proxies - Term used for proxy servers. The use of proxy servers to mask ones identity on the Internet is widely practiced amongst carders. Many vendors sell access to proxy servers, socks, http, https, and VPN (Virtual Private Networks), which aide in hiding the user's actual IP address when committing fraud or other illegal activity on the Internet. Track 1/Track 2 data - Track 1 and Track 2 data is the information stored on the magnetic stripe of a payment card that contains the account information. How They Market Themselves Stages of Carding • Collection: • Technical Means • Social Engineering means • Desired Data: • Account Holder’s Information • Expiration Date • Primary Acct No. (PAN) • PIN No. • CVV No. • Processing • Production • Distribution Collection: Acquisition of Data Processing: Sell “Dump” to Databroker Distribution: ATM Cashing/ Reshipping Production: Documents and Merchandise Collection of Data • Technical Methods: • Skimming • Hacking • Malicious Programs • Social Engineering: • Phishing (via web or phone) Collection via Phishing As reported by the Anti-Phishing Working Group Targeted Industry Sectors A subset of Digital Phishnet * Gary Warner Copyright CastleCops® 2 Nov 2006 Metrics • 485 ‘harvest’ (‘drop’) e-mail accounts identified associated with phish • 400 deactivated & evidence preserved • Each ‘harvest’ account contains dozens to thousands of cards • Average ‘value’ to each card is $5,000 according to several US Court Districts • Realistic loss = $300 to $2,000 per card • 400 accounts * 100 cards/account * $600/card = $24,000,000 USD Processing and Production • Processing includes filtering the credible data and selling to a data broker. • Production can include: • Fake Documents: Passports, License, Birth Certificates, etc. • Fake Credit Cards: • Dump Data: Track 1 and 2 • An example of a “dump” (Track 1 and Track 2): B412345123456789^John/Doe^06101011123400567000000;;41234 5123456789=061010111234005679991 • Data is recorded onto a blank “white card” via a Magnetic Strip Reader (MSR) Distribution: Cashier/Reshipping • ATM Cashing: Cashiers will receive “white plastic” cards and withdraw funds from an ATM machine. • Reshipping Fraud: A scheme where a scammer overseas has purchased merchandise with illegal credit cards and has it shipped to a co-conspirator (aka reshipper), often in the USA. The reshipper repackages the item and sends it to a destination usually overseas. The reshipper is paid for his/her services. Vladuz Bluetooth 1. Hacker/Programmer 2. Spammer 3. Data Broker 4. Documents & Mechandise 5. Reshipper/Cashier DMS 6. Money Launderer BOA KLAD SINJII Financial: Money Laundering • Money Orders • Western Union • Speedy • Highly anonymous • Ability to pickup money wordwide • Many outlets are owned by carders themselves • Paypal • Avaliable currencies: Canadian Dollar, Euro, Pound Sterling, USD, Yen, Australian Dollar • Easy Setup • All transactions logged Financial: Money Laundering • E-Gold • Uses “virtual gold” for payment • Cashout services available • Webmoney.ru • Z-Wallet accounts • Easy transactions via the internet, cellphone, or Webmoney outlet (170 countries) • Fee based cashout service Mazafaka Screenshot CardingWorld Screenshot Where are they going? Use of malicious code in the carding world Phishing based trojans and keyloggers As reported by the Anti-Phishing Working Group International Challenges • Cyber Crime has no geographical boundaries • Some countries just starting to recognize the need for adequate cyber laws. • Law Enforcement cooperation often based upon personal relationships. • Hard for U.S. law enforcement to gain venue within the U.S. as many key targets are located overseas. Questions Slide - 45 Who We Are – SRA SRA is a leading provider of technology and strategic consulting services and solutions to clients in national security, civil government, and health care and public health We offer cutting-edge business solutions in a wide range of different areas, including: • • • • • • • • Business Intelligence Text & Data Mining Contingency & Disaster Response Planning Environmental Strategies Enterprise Architecture Wireless Integration AND Information Assurance & Privacy! Who We Are – SRA Factoids Founded by Dr. Ernst Volgenau in 1978 • IPO in May 2002 (SRX) • Began operations out of Dr. Volgenau’s Reston basement Stock Price = $29.51 (as of 11/13/07) 6,300+ employees (more than doubled in size in the last four years) 300+ government clients; 900+ active engagements Headquartered in Fairfax, VA; offices in 17 states, DC, France, Germany, & the United Kingdom $1.269 billion in revenue in FY07 (doubled in size in just three years) Goal $5 billion in revenue by FY12 Chosen by Fortune magazine as one of the “100 Best Companies to Work For” for eight consecutive years Strong community service orientation (SRA “CARES” Committee) & environmental focus (SRA’s “Green Team”) Rolling out new college recruiting, internship, and co-op programs Major training and development initiatives underway (career paths and training opportunities) More than 200 immediately-billable open positions currently available Who We Are – IA & Privacy Began operations with fewer than a half dozen practitioners c. 2000 200+ IA & Privacy professionals work within the practice today We have helped more than 300 federal information systems achieve certification and accreditation (C&A) and are currently performing physical- and cyber-security services Government-wide SRA’s IA analysts and engineers have obtained the highest professional certifications in the industry, including: • • • • • • • NSA’s Information Assurance Methodology (IAM) NSA’s Information Engineering Methodology (IEM) Certified Information System Security Professional certification (CISSP) Certified Business Continuity Planner (CBCP) Project Management Professional (PMP) Certified Information System Auditor (CISA) Certified Information Security Management (CISM) What We Do Forensics Penetration Testing Vulnerability Assessment Compliance Risk Assessment System Testing and Evaluation Incident Response Operations Staff Augmentation Security Awareness & Training Privacy FOIA