Current Trends in Cybercrimefiles.acams.org/pdfs/2019/Current-Trends-in-Cybercrime.pdf · 2019. 10....

25
Current Trends in Cybercrime SPECIAL AGENT PAUL BINGHAM FBI—SALT LAKE CITY

Transcript of Current Trends in Cybercrimefiles.acams.org/pdfs/2019/Current-Trends-in-Cybercrime.pdf · 2019. 10....

Page 1: Current Trends in Cybercrimefiles.acams.org/pdfs/2019/Current-Trends-in-Cybercrime.pdf · 2019. 10. 4. · Phishing - $$$ Professional Hackers Hacktivism – Political/Social Change

Current Trends in CybercrimeSPECIAL AGENT PAUL BINGHAMFBI—SALT LAKE CITY

Page 2: Current Trends in Cybercrimefiles.acams.org/pdfs/2019/Current-Trends-in-Cybercrime.pdf · 2019. 10. 4. · Phishing - $$$ Professional Hackers Hacktivism – Political/Social Change

Current Trends in Cybercrime

Who are the actors? What are they doing? Why are they doing it? Where are they? How are they doing it?

Page 3: Current Trends in Cybercrimefiles.acams.org/pdfs/2019/Current-Trends-in-Cybercrime.pdf · 2019. 10. 4. · Phishing - $$$ Professional Hackers Hacktivism – Political/Social Change

Who are the actors?

Low Tech Attackers/Script Kiddies

Professional Hackers

Organized Crime

State-sponsored Groups/Terrorists

Page 4: Current Trends in Cybercrimefiles.acams.org/pdfs/2019/Current-Trends-in-Cybercrime.pdf · 2019. 10. 4. · Phishing - $$$ Professional Hackers Hacktivism – Political/Social Change

What are they doing?

Low Tech Attackers/Script Kiddies Phishing

Professional Hackers Hacktivism

Data Breaches

Organized Crime Ransomware

BEC Scams

State-sponsored Groups/Terrorists Secrets

Page 5: Current Trends in Cybercrimefiles.acams.org/pdfs/2019/Current-Trends-in-Cybercrime.pdf · 2019. 10. 4. · Phishing - $$$ Professional Hackers Hacktivism – Political/Social Change

Why are they doing it?

Low Tech Attackers/Script Kiddies Phishing - $$$

Professional Hackers Hacktivism – Political/Social Change

Data Breaches – Notoriety and $$$

Organized Crime Ransomware – $$$

BEC Scams – $$$

State-sponsored Groups/Terrorism Secrets – Intelligence, Political Advantage,

$$$, World Domination

Page 6: Current Trends in Cybercrimefiles.acams.org/pdfs/2019/Current-Trends-in-Cybercrime.pdf · 2019. 10. 4. · Phishing - $$$ Professional Hackers Hacktivism – Political/Social Change

Where are they?

Low Tech Attackers/Script Kiddies

Professional Hackers

Organized Crime

State-sponsored Groups/Terrorists

Page 7: Current Trends in Cybercrimefiles.acams.org/pdfs/2019/Current-Trends-in-Cybercrime.pdf · 2019. 10. 4. · Phishing - $$$ Professional Hackers Hacktivism – Political/Social Change

Where are they?

Low Tech Attackers/Script Kiddies

Professional Hackers

Organized Crime

State-sponsored Groups/Terrorists

Page 8: Current Trends in Cybercrimefiles.acams.org/pdfs/2019/Current-Trends-in-Cybercrime.pdf · 2019. 10. 4. · Phishing - $$$ Professional Hackers Hacktivism – Political/Social Change

Where are they?

Low Tech Attackers/Script Kiddies

Professional Hackers

Organized Crime

State-sponsored Groups/Terrorists

Page 9: Current Trends in Cybercrimefiles.acams.org/pdfs/2019/Current-Trends-in-Cybercrime.pdf · 2019. 10. 4. · Phishing - $$$ Professional Hackers Hacktivism – Political/Social Change

Where are they?

Low Tech Attackers/Script Kiddies

Professional Hackers

Organized Crime

State-sponsored Groups/Terrorists

Page 10: Current Trends in Cybercrimefiles.acams.org/pdfs/2019/Current-Trends-in-Cybercrime.pdf · 2019. 10. 4. · Phishing - $$$ Professional Hackers Hacktivism – Political/Social Change

Where are they?

Low Tech Attackers/Script Kiddies

Professional Hackers

Organized Crime

State-sponsored Groups/Terrorists

Page 11: Current Trends in Cybercrimefiles.acams.org/pdfs/2019/Current-Trends-in-Cybercrime.pdf · 2019. 10. 4. · Phishing - $$$ Professional Hackers Hacktivism – Political/Social Change

How are they doing it?

Phishing Phishing kits on compromised

servers

Phishing emails

Social Engineering

Office 365, banks, PayPal,

Use harvested credentials to buy goods or transfer money

Credentials often go to personal email address

Page 12: Current Trends in Cybercrimefiles.acams.org/pdfs/2019/Current-Trends-in-Cybercrime.pdf · 2019. 10. 4. · Phishing - $$$ Professional Hackers Hacktivism – Political/Social Change

How can you stop it?

Phishing Relies on human error

EDUCATE YOUR EMPLOYEES

Keep browsers updated

www.ic3.gov

Page 13: Current Trends in Cybercrimefiles.acams.org/pdfs/2019/Current-Trends-in-Cybercrime.pdf · 2019. 10. 4. · Phishing - $$$ Professional Hackers Hacktivism – Political/Social Change

How are they doing it?

Hacktivism/Data Breaches Generally more sophisticated than

phishing

BUT, still uses EMAIL as Attack Vector

May employ social engineering techniques

Exploit vulnerabilities in hardware and software Web Server

Mail Server

Page 14: Current Trends in Cybercrimefiles.acams.org/pdfs/2019/Current-Trends-in-Cybercrime.pdf · 2019. 10. 4. · Phishing - $$$ Professional Hackers Hacktivism – Political/Social Change

How can you stop it?

Hacktivism/Data Breaches Patch, Patch, Patch

Enforce Aggressive Password Policies

Enhance Early Detection

Threat Hunting

Auditing

Outbound Traffic Analysis

Host-to-Host Connections

Intrusion Prevention/Detection Systems

Report to law enforcement

www.ic3.gov

FBI

Page 15: Current Trends in Cybercrimefiles.acams.org/pdfs/2019/Current-Trends-in-Cybercrime.pdf · 2019. 10. 4. · Phishing - $$$ Professional Hackers Hacktivism – Political/Social Change

How can you stop it?

Hacktivism/Data Breaches Ensure/Harden Physical Access

Jackpotting Malware: Ploutus-D

Vulnerability: Kalignite Platform

XP, Vista, 2000, NT

Page 16: Current Trends in Cybercrimefiles.acams.org/pdfs/2019/Current-Trends-in-Cybercrime.pdf · 2019. 10. 4. · Phishing - $$$ Professional Hackers Hacktivism – Political/Social Change

How are they doing it?

Ransomware Primarily malicious email

links/attachments

Automated replication

Encrypt files/drives

Demand payment through cryptocurrency

If payment is received Request more money

Decrypt data

Sometimes it works

Page 17: Current Trends in Cybercrimefiles.acams.org/pdfs/2019/Current-Trends-in-Cybercrime.pdf · 2019. 10. 4. · Phishing - $$$ Professional Hackers Hacktivism – Political/Social Change

How can you stop it?

Ransomware One word: BACKUP

Separate, physical device

Location which requires distinct login

Report to law enforcement www.ic3.gov

FBI

Page 18: Current Trends in Cybercrimefiles.acams.org/pdfs/2019/Current-Trends-in-Cybercrime.pdf · 2019. 10. 4. · Phishing - $$$ Professional Hackers Hacktivism – Political/Social Change

How are they doing it? BEC Scams

Stolen credentials/phishing/ malware/spoofed or similar email domain

Scan of compromised systems for invoicing/financial practices

Social media snooping or surveillance

Executive impersonation through email (phone or fax possible)

Instructions for payment Sense of urgency

From upper management

Reason for deviation from normal procedures

Page 19: Current Trends in Cybercrimefiles.acams.org/pdfs/2019/Current-Trends-in-Cybercrime.pdf · 2019. 10. 4. · Phishing - $$$ Professional Hackers Hacktivism – Political/Social Change

How are they doing it? (cont'd) BEC Scams

Real Estate (any B2B commerce)

Use of money mules to obfuscate trail and move money forward

Wire trends Hong Kong

HSBC

Losses Global: >$12 Billion

US – 2017: $675 Million

Utah – 2017: ~$2 Million

Utah – 2018: >$20 Million

Page 20: Current Trends in Cybercrimefiles.acams.org/pdfs/2019/Current-Trends-in-Cybercrime.pdf · 2019. 10. 4. · Phishing - $$$ Professional Hackers Hacktivism – Political/Social Change

How can you stop it?

BEC Scams Before: Consider Two-Factor Authentication for Email Check email forwarding rules Educate Accounts Payable personnel Examine payment policies During: VERIFY!! Call whomever instructed payment Call vendor* Verify changes to invoices, payment instructions,

or contact information Consider two-level approval for rush payments

Page 21: Current Trends in Cybercrimefiles.acams.org/pdfs/2019/Current-Trends-in-Cybercrime.pdf · 2019. 10. 4. · Phishing - $$$ Professional Hackers Hacktivism – Political/Social Change

How can you stop it? (cont'd)

BEC Scams After:

IMMEDIATELY CALL BANK and INITIATE SWIFT RECALL

Retain logs and data

Contact law enforcement FBI

www.ic3.gov

Conduct cybersecurity assessment

Page 22: Current Trends in Cybercrimefiles.acams.org/pdfs/2019/Current-Trends-in-Cybercrime.pdf · 2019. 10. 4. · Phishing - $$$ Professional Hackers Hacktivism – Political/Social Change

HACKING 101: A Review

USERS INFO TECH/ INFO SEC

Presenter
Presentation Notes
Recon: Technique- Social media, Internet registries, passive detect (dns, mail, time), scanning Tools- havij, Vega, Nessus, Accunetix, Nmap, amap Defend- WAF, IDS, Pen Testing, Distributed Services Exploit: Technique- Phishing, Spear phishing, 0-day, vuln, drop tools Tools- Scripts, Metasploit, Other Crimeware Defend – WAF, IPS, IDS, Pen Testing, Intel Escalate/Move: First move is to escalate, if you can’t then move lateral or wait�Technique- Internal recon, AD Domain commands, PASSWD dumps/cracks, Admin services/accounts Tools- RDP, Mimikatz, Shellshock, Meterpreter, NMAP, ping Defend – No local admin access, HIDS, strong domain passwords, net command alerts, service account monitoring Persist: Establish backup comms channel (Foothold), Valid credentials Technique- Reverse TCP connections, Process injection, Web shells Tools- RDP, Malware, reverse shell (keep alive) Defend- Log heuristics, HIDS, Binary comparison, baslining Staging: Technique- Compress files, Password protect exfil Tools- RAR, ZIP, custom compression Defend- Log heuristics, IDS, segmentation, limit lcoal admin access Theft: Changed from Exfil because quite simply it’s Theft, Exfil is too nice Technique- Tools- FTP, SFTP, SSH (plink, scp), Web Drop Boxes Defend- Firewalls, protocol blocking The only difference is motivation and skill Govt come in at a variety of times
Page 23: Current Trends in Cybercrimefiles.acams.org/pdfs/2019/Current-Trends-in-Cybercrime.pdf · 2019. 10. 4. · Phishing - $$$ Professional Hackers Hacktivism – Political/Social Change

InfraGardPartnership for Protection

Partnership between the FBI and private sector to protect our nation's critical infrastructure

Expedites timely exchange of information & promotes mutual learning opportunities

Representation from all sectors of infrastructure

Page 24: Current Trends in Cybercrimefiles.acams.org/pdfs/2019/Current-Trends-in-Cybercrime.pdf · 2019. 10. 4. · Phishing - $$$ Professional Hackers Hacktivism – Political/Social Change

InfraGardPartnership for Protection

www.infragard.org

Page 25: Current Trends in Cybercrimefiles.acams.org/pdfs/2019/Current-Trends-in-Cybercrime.pdf · 2019. 10. 4. · Phishing - $$$ Professional Hackers Hacktivism – Political/Social Change

Special Agent Paul BinghamFBI Salt Lake City

801-579-1400

[email protected]