Cybercrime Inc. v2.2

61
Delivering the best in z services, software, hardware and training. Delivering the best in z services, software, hardware and training. World Class z Specialists Cybercrime, Inc. Rui Miguel Feio – Technical Lead

Transcript of Cybercrime Inc. v2.2

Page 1: Cybercrime Inc. v2.2

Deliveringthebestinzservices,software,hardwareandtraining.Deliveringthebestinzservices,software,hardwareandtraining.

WorldClasszSpecialists

Cybercrime,Inc.

RuiMiguelFeio – TechnicalLead

Page 2: Cybercrime Inc. v2.2

Agenda• Evolution• Thenext-generationcriminalorganisation• TheCybercrimeInc.organisation• Adapttothenew• Examples• Technologicaltargets• Hackers– Thebreadandbutter• Takingsecurityseriously(ornot)• Whatcanwedo?• Conclusion• Questions

Page 3: Cybercrime Inc. v2.2

Introduction– TechnicalleadatRSMPartners

– Beenworkingwithmainframesforthepast17years

– StartedasanMVSSystemsProgrammerwithIBM

– Specialisesinmainframesecurity

– Experienceinnon-mainframeplatformsaswell

– Beengivenpresentationsallovertheworld

Page 4: Cybercrime Inc. v2.2

Evolution

Page 5: Cybercrime Inc. v2.2

Intheearlyyears…notsolongago…

Picturefromtheshortmovie“KUNGFURY”

Page 6: Cybercrime Inc. v2.2

Intheearlyyears…notsolongago…

Technology• Phones• PC• BulletinBoardSystems• Internet

The‘curiousbunch’– Phreakers– Crackers– Hackers

Page 7: Cybercrime Inc. v2.2

Today…

Page 8: Cybercrime Inc. v2.2

Innowadays…Technology• Phones• PC• Internet• Smartphones• Tablets• DarkWeb• InternetofThings(IoT)• AdventofRobotics

‘Curiousbunch’turnedPro– Phreakers– Crackers– Hackers– Carders– Nation-states– IntelligenceServices– Hacktivists– Insiders– OrganisedCrimeGroups

Page 9: Cybercrime Inc. v2.2

Internet,thenewfrontier• Techevolution+Internet=NewBusinessOpportunities

– Individualsstartedonlinebusinesses

– Newmajorcompanieshavebeenfounded:• Google,Facebook,Yahoo,etc.

– Existingbusinesssectorsturnedonlinetoincreasetheirearnings:• Retail,financial,insurance,etc.

Page 10: Cybercrime Inc. v2.2

Societyhasalsoevolved…• Theinternetallowedthecreationofneweconomicmarketsand

opportunities

• Thisneweconomicmarkethasnoborders

• Amarketwithhundredsofmillionsofusers

• Aneconomicmarketworth…TrillionsofDollars,Euros,Pounds…!!

• Manycountriesandcompaniesarenowdependentonthisneweconomicmarket

Page 11: Cybercrime Inc. v2.2

Wherethereismoney,thereiscrime!

• Criminalgangsandorganisationsmovedintotheneweconomicmarket:

– StartedrecruitingHackers

– Starteddevisingnew“businessideas”

– Developeda“businessplan”

• Organisedcrimebecameprofessionalinthenewinternetworld.

Page 12: Cybercrime Inc. v2.2

Oldboysinanewage• Traditionalcriminalorganisationshave‘started’cybercrime

divisions:

– CosaNostra(ItalianMafia)– JapaneseYakuza– ChineseTriads– RussianMafia– Nigerianmobs– Mexicancartels– …

Page 13: Cybercrime Inc. v2.2

Thenext-generationofcriminalorganisation:CYBERCRIMEINC.

Page 14: Cybercrime Inc. v2.2

CybercrimeInc.• Highlyprofitable(it’salwaysaboutthemoney)

• Lowrisk(anonymityandgeographicallocation)

• Moreefficientduetotechnology

• Globallydispersed,withspecialconcentrationin:• Ukraine • China • Brazil• Russia • Indonesia • USA• Romania • Taiwan • Turkey• Bulgaria • India • Nigeria

Page 15: Cybercrime Inc. v2.2

CybercrimeInc.• 80%ofHackersworkwithorarepartofanorganisedcrimegroup*

• Highlyorganised

• Deeplysophisticated:– Businessapproach– Towardsthe‘client’

*2014study bytheRandCorporation

Page 16: Cybercrime Inc. v2.2

CybercrimeInc.Usetypicalcorporatestrategies:

– Creativefinancing– Globallogistics– Supplychainmanagement– ‘Workforce’management– ‘Client’needs– Businessandmarketanalysis

Page 17: Cybercrime Inc. v2.2

CybercrimeInc.- Businessmodel• Takeadvantageof‘anonymous’servicestoadvertiseandselltheir

‘normal’productsandservicesonline

• Someofthenew‘business’opportunities:• Identitytheft• Intellectualpropertytheft• Tradesecrets• Industrialespionage• Sensitivedatatheft• Onlineextortion• Financialcrime• Datamanipulation

Page 18: Cybercrime Inc. v2.2

CybercrimeInc.- Tacticsused• SomeofthetacticsandmethodsusedbyCybercrimeInc:

– Phishingandspearphishing– Man-in-the-middle– Vulnerabilities– Trojanhorsesoftware– Spam– Botnets– Scareware– Ransomware– Malware– DoS andDDoS

Page 19: Cybercrime Inc. v2.2

TheCybercrimeInc.organisation

Page 20: Cybercrime Inc. v2.2

Atypicalbusinessorganisation

CEO

CFO

Management

SalesPeople

CIO

Management

Researchers Developers Engineers QATesters TechSupport

HRDirector CMO

Management

Distributors Affiliates

Page 21: Cybercrime Inc. v2.2

TheCybercrimeInc.organisation

CEO(Boss)

CFO(Underboss)

Management(Lieutenant)

MoneyMules(Soldiers&Associates)

CIO(Underboss)

Management(Lieutenant)

Researchers(Soldiers)

Developers(Soldiers)

Engineers(Soldiers)

QATesters(Soldiers)

TechSupport(Soldiers)

HRDirector(Underboss)

CMO(Underboss)

Management(Lieutenant)

Distributors(Soldiers)

Affiliates(Associates)

Page 22: Cybercrime Inc. v2.2

CybercrimeInc.– ‘Business’roles(1)

• ChiefExecutiveOfficer(CEO)– Boss– Responsiblefordecisionmakingandoverseeingoperations

• ChiefFinancialOfficer(CFO)– Underboss– Dealswitheveryfinancialaspectofthecybercrimeorg.

• ChiefInformationOfficer(CIO)- Underboss– ResponsiblefortheITinfrastructureoftheorganization

• ChiefMarketingOfficer(CMO)- Underboss– Designseffectiveadvertisingmethodsforproductsandservices

Page 23: Cybercrime Inc. v2.2

CybercrimeInc.– ‘Business’roles(2)

• HumanResources(HR)Director- Underboss– Recruitsthecriminalworkforcefortheorganization

• Management- Lieutenant– Responsibleformanagingthe‘criminal’workforce

• Researchers- Soldiers– Lookfornewexploitsand‘business’opportunities

• Developers&Engineers- Soldiers– Thetechies,akathebrains!

Page 24: Cybercrime Inc. v2.2

CybercrimeInc.– ‘Business’roles(3)

• QualityAssurance(QA)Testers- Soldiers– Testallcrimeware toensureitbypassesanysecuritymeasures

ofpotentialtargets

• TechnicalSupport- Soldiers– Techsupporttoclients,affiliatesandmembersofthe

organization

• Affiliates- Associates– DrivepotentialclientstoCybercrimeInc.

Page 25: Cybercrime Inc. v2.2

CybercrimeInc.– ‘Business’roles(4)

• Distributors– Soldiers– Helpdistributemalware

• Money‘Mule’– Soldiers&Associates– Helpswiththemoneylaundering

Page 26: Cybercrime Inc. v2.2

Adapttothenew

Page 27: Cybercrime Inc. v2.2

CybercrimeInc.– AdaptstotheNew

• Constantlylookingtoinnovate

• Overcomeobstacles

• Meetmarketdemands

• Explorenew‘business’opportunities

• Usetoolstohelpmeasurelevelsofsuccess(e.g.Webanalytics)

Page 28: Cybercrime Inc. v2.2

Hackingasaservice

Page 29: Cybercrime Inc. v2.2

Someexamples

Page 30: Cybercrime Inc. v2.2

CybercrimeInc.– InnovativeInc.• InnovativeMarketingInc.(akaIMI)

– FoundedbySamJainandDanielSundin (HQinUkraine)– Developedscarewareroguesecurityprograms:

• WinFixer• WinAntiVirus

– Officesin4continentswithhundredsofemployees– SupportcentresinOhio,ArgentinaandIndia– Marketedproductsundermorethan1,000differentbrandsandin9

languages– From2002to2008IMIgeneratedhundredsofmillionsofdollarsin

profit.

Page 31: Cybercrime Inc. v2.2

CybercrimeInc.– InnovativeInc.

Photograph taken in 2003

BJORN DANIEL SUNDINWire Fraud; Conspiracy to Commit Computer Fraud; Computer Fraud

DESCRIPTIONAlias: David Sundin

Date(s) of Birth Used: August 7, 1978 Place of Birth: Sweden

Hair: Red Eyes: Hazel

Height: 5'10" Weight: 136 pounds

Sex: Male Race: White

Occupation: Internet Entrepreneur Nationality: Swedish

Languages: English, Swedish NCIC: W10511664

REWARDThe FBI is o6ering a reward of up to $20,000 for information leading to the arrest and conviction of Bjorn Daniel Sundin.

REMARKSSundin has ties to Sweden and the Ukraine.

CAUTIONBjorn Daniel Sundin, along with his co-conspirator, Shaileshkumar P. Jain, is wanted for his alleged involvement in an international cybercrimescheme that caused internet users in more than 60 countries to purchase more than one million bogus software products, resulting inconsumer loss of more than $100 million. It is alleged that from December 2006 to October 2008, through fake advertisements placed onlegitimate companies’ websites, Sundin and his accomplices deceived internet users into believing that their computers were infected with“malware” or had other critical errors in order to encourage them to purchase “scareware” software products that had limited or no ability toremedy the purported defects.

Sundin and his co-conspirators allegedly deceived victims, through browser hijacking, multiple fraudulent scans and false error messages,into purchasing full paid versions of software products o>ered by their company, Innovative Marketing, Inc. The proceeds of these credit cardsales were allegedly deposited into bank accounts controlled by the defendant and others around the world, and were then transferred tobank accounts located in Europe. When customers complained that their purchases were actually fraudulent software, call centerrepresentatives were allegedly instructed to lie or provide refunds in order to prevent fraud reports to law enforcement or credit companies.

On May 26, 2010, Sundin was indicted in Chicago, Illinois, by a federal grand jury for the United States District Court, Northern District ofIllinois. He was indicted for wire fraud, conspiracy to commit computer fraud and computer fraud. That same day, a federal warrant wasissued for Sundin’s arrest.If you have any information concerning this person, please contact your local FBI o7ce or the nearest American Embassy orConsulate.

Page 32: Cybercrime Inc. v2.2

CybercrimeInc.– RBN• RussianBusinessNetwork(akaRBN)

– Registeredasaninternetsitein2006– BasedinSt.Petersburg,Russia– Allegedlyfoundedbythenewphew ofapowerfulRussianpolitician– Specialisesin:

• Personalidentitytheftforresale• Provideswebhostingandinternetaccesstoillegitimateactivities• DoS attacks• Deliveryofexploitsviafakeanti-spywareandanti-malware• Botnet

Page 33: Cybercrime Inc. v2.2

CybercrimeInc.– Carbanak Group• TheCarbanak Group

– Discoveredinearly2015byKasperskyLab– UsedanAPT-stylecampaigntargetingfinancialinstitutions– Aimtostealmoneyfrombanks– Estimated$1Billiondollarshavebeenstoleninanattackagainst100

banksandprivatecustomers– TargetedprimarilyRussia,UnitedStates,Germany,ChinaandUkraine

Page 34: Cybercrime Inc. v2.2

CybercrimeInc.– MexicanCartels• Mexicancartels:

– TargetedforeigncompaniesinvestinginorwithpresenceinMexico– Usedinternettoidentifyhigh-valuedemployees– CheckedtravelarrangementstoMexico– Replacedpersonatairportwaitingfor’high-valuedtarget’– Kidnapped’high-valuedtarget’– Demandedransom

Page 35: Cybercrime Inc. v2.2

CybercrimeInc.– MexicanCartels

Page 36: Cybercrime Inc. v2.2

TechnologicalTargets

Page 37: Cybercrime Inc. v2.2

Targeting- Mobility• CybercrimeInc.isfocusingonmobiledevices:

– Usedbyindividualsonaday-to-daybasis:• Onlinebanking• Onlineshopping• Socialising• Emails• Storepersonaldata• GPS

– Canbeeasytocompromiseandhack(e.g.install“rootkit”togaincontroltoallfeaturesofthemobiledevice)

Page 38: Cybercrime Inc. v2.2

Targeting– TheCloud• CybercrimeInc.isfocusingonTheCloud:

– Networkofcomputingresourcesavailableonline

– TheCloudcanbeusedtostore,manageandprocessinformation

– CompaniesareoutsourcingprimarybusinessfunctionsusingCloudservices

– CriticalandconfidentialdataisnowcentralisedintheCloud

– Insteadoftargetingseveralindividualserverslet’sfocusontheonesinthecloudshallwe?

Page 39: Cybercrime Inc. v2.2

Targeting- Data• CybercrimeInc.isfocusingonData:

– Personaldata– Businessdata– Governmentdata– Militarydata– Datamanipulationanddisinformation:

• Financialmarkets• Whatisdisplayedinourscreens

Page 40: Cybercrime Inc. v2.2

Targeting- Internetofthings(IoT)• CybercrimeInc.isfocusingonIoT

devices:

– 2013therewere13billiononlinedevices– CiscoSystemsestimates50billiononline

devicesby2020– IoT isestimatedtodriveanadditional

$6.2trilliontotheglobaleconomyby2025accordingtoMcKinseyGlobalInstitute

– IoT devicesaredevelopedwithouthavingsecurityinmind

Page 41: Cybercrime Inc. v2.2

ButCybercrimeInc.canalsotarget…

• SCADAdevices– SupervisoryControlAndDataAcquisition(SCADA)– Specialised andoftenoldcomputersystems– Beingconnectedtothebroaderinternet– Thesesystemswerenotdesignedwithsecurityinmind– 2014studyrevealedthat70%hadsufferedatleastonesecurity

breach• GPSSystems• TrackingSystems• Implantedmedicaldevices(IMDs)• Andsomanymore!!...

Page 42: Cybercrime Inc. v2.2

Hackers– Thebreadandbutter

Page 43: Cybercrime Inc. v2.2

LookingforaHacker• Hackersarenotbornhackers,theyaretrained

• Enormousamountoffreeeducationalmaterialintheinternetandintheunderworld(darkweb)

• PCgames:– Uplink– HackerExperience– TornCity– Hacknet– Hackers(foriOSandAndroid)

Page 44: Cybercrime Inc. v2.2

WhowantstobeaHacker?• Anyonewhofeelsattractedorenjoys:

– Technology– Challenge– Thethrill– Adventure– Danger– Money– Respect– Fame

Page 45: Cybercrime Inc. v2.2

Takingsecurityseriously(ornot)

Page 46: Cybercrime Inc. v2.2

OnaniceSundaymorning…

Page 47: Cybercrime Inc. v2.2

OnitsTVscreenfacingthestreet

Page 48: Cybercrime Inc. v2.2

Onabusinesstraintrip…

Page 49: Cybercrime Inc. v2.2

Onabusinesstraintrip…

Page 50: Cybercrime Inc. v2.2

Onasite,somewhereinEurope…

Page 51: Cybercrime Inc. v2.2

Onasite,somewhereinEurope…

Page 52: Cybercrime Inc. v2.2

Whatcanwedo?

Page 53: Cybercrime Inc. v2.2

Whatcanwedo?• Securitymustbetakenseriouslybyeveryone!

– Governments,companies,andindividualsneedtobesecurityconsciousandsecurityoriented

• Usualsecurityrecommendationsapply:– Keepsecuritysystemsupdatedandup-to-date– Questiontheoriginofeverything– Bemindfulof:

• Theinformationyoushareandmake’publicly’available• FreeWifi hotspots(freecanbebecomeveryexpensive)

Page 54: Cybercrime Inc. v2.2

Whatcanwedo?• Consider(asindoing!)regular:

– Securityaudits– Penetrationtests– Vulnerabilityanalysis

• Seekhelpforexpertsinthefieldtohelptoimprovesecurity

• Keepinformed(training,conferences,articles,books,…)

• Don’tfacilitate(weakpasswords,useofsamepassword,…)

Page 55: Cybercrime Inc. v2.2

Whatcanwedo?• Theremustbenoathomeandattheofficeattitude.Security

awarenessmustalwaysbepresent.

• Readbeforeyou‘click’.

• Search,ask.

• Ultimately,ifthisistoomuch.Justswitchoffeveryelectronicaldeviceandgobacktopenandpaper.Butwillthisbeenough?

Page 56: Cybercrime Inc. v2.2

Conclusion

Page 57: Cybercrime Inc. v2.2

Conclusion• Asalwaysthebadguysareaheadofthegame:

– Theyhavethemoney– Theyhavetheresources– Theyarewellorganised– Andaboveall,theyhavetime!

• Themostimportantthingisforeveryoneofus(the‘good’guys)tobesecurityawareandsecurityfocused

Page 58: Cybercrime Inc. v2.2

Conclusion• Ultimatelyweneedtotrust:

– Thecompanieswhosellusdevices,andsoftware– Theserviceproviders– Oursocialnetwork– Thegovernment

Page 59: Cybercrime Inc. v2.2

Conclusion– MostImportant!• Bemindful • Beaware

Page 60: Cybercrime Inc. v2.2

Questions

Page 61: Cybercrime Inc. v2.2

RuiMiguelFeio,[email protected]:+44(0)7570911459linkedin: www.linkedin.com/in/rfeiowww.rsmpartners.com

Contact