2017 IPA Tasmania Congress ONLINE INVESTIGATIONS & CURRENT - - PDF document

2017 ipa tasmania congress
SMART_READER_LITE
LIVE PREVIEW

2017 IPA Tasmania Congress ONLINE INVESTIGATIONS & CURRENT - - PDF document

12/05/2017 //_18.5.2017 2017 IPA Tasmania Congress ONLINE INVESTIGATIONS & CURRENT THEATS TO BUSINESS 1 12/05/2017 Internet Investigations Theft of Intellectual Property Spear Phishing Ransomware Payroll Compromise


slide-1
SLIDE 1

12/05/2017 1

2017 IPA Tasmania Congress

ONLINE INVESTIGATIONS & CURRENT THEATS TO BUSINESS

//_18.5.2017

slide-2
SLIDE 2

12/05/2017 2

  • Internet Investigations
  • Theft of Intellectual Property
  • Spear Phishing
  • Ransomware
  • Payroll Compromise

Internet based investigations – IP Addresses

An IP address is a unique numeric value assigned to any computer on the internet. 203.122.145.110

slide-3
SLIDE 3

12/05/2017 3

slide-4
SLIDE 4

12/05/2017 4

The Identity of the Internet Service Provider (ISP) who was used. From the ISP we can find out the name, address and billing information of the owner of the Internet Access Account.

What Does the IP address Tell us?

On 3 August 2011 in the mid-afternoon Peters walked through the front door

  • f the home wearing a rainbow balaclava and carrying a baseball bat and a

backpack. He confronted Ms Pulver and then told her: “I’m not going to hurt you.” He then removed a black box from the backpack and tied it around his victim’s throat with a USB stick and two-paged Letter.

Read more: http://www.smh.com.au/nsw/ maddie-pulver-bomb-hoax-pictures-released-20121019-27von. html#ixzz3BTTTKc5a

Madeline Pulver – Mosman Collar Bomb Hoax

slide-5
SLIDE 5

12/05/2017 5

  • "Powerful new technology plastic explosives are located inside…... The

case is booby trapped. …………………………..I am a former special forces Green Beret Munitions specialist, and have constructed such devices over 20 years…….you will inadvertently trigger a tragically avoidable explosion ... You will be provided with detailed remittance instructions to transfer a Defined Sum……………... If remittance instructions are executed CORRECTLY … I will immediately provide you with: 1) The combination that can open the case without triggering a Brian Douglas Wells event and 2) An internal key to completely disable the explosive mechanism embedded inside ... "

Read more: http://www.smh.com.au/nsw/count-to-200--ill-be-back--if-you-move-i-can-see-you-details-of-maddie- collar-bomb-revealed-20120308-1ulir.html#ixzz3BTWJRJ6M http://en.wikipedia.org/wiki/Brian_Douglas_Wells

Sources of Evidence & Info

Two primary Sources of Evidence

  • USB Placed around Madeline’s neck containing a ransom demand
  • Gmail account – dirkstruan1840@gmail.com referenced in the ransom

demand

slide-6
SLIDE 6

12/05/2017 6

  • Contained a ransom demand in a Word document
  • Metadata
  • Deleted: Two previous versions of demand
  • Deleted: Draft letter of demand addressed to the “Trustee of the

James M.Cox Estate Trust.”

USB Device

Information from Google:

  • Created on 30 May 2011
  • IP address – Chicago airport
  • Airline passenger list

On the day of the assault on Madeline Pulver the account was accessed three times. Tracing the IP addresses identified:

  • 1 - public internet terminal at Kincumber Library
  • 2 & 3 – Avoca Beach Video

The Gmail Account – dirkstruan1840@gmail.com

slide-7
SLIDE 7

12/05/2017 7

Credit card records:

  • Purchase of a USB device and a purple lanyard from

Officeworks in West Gosford on July 4

  • Purchase of a black aluminium softball bat from Rebel Sport

at Erina Fair on July 16 CCTV footage:

  • Erina Fair shopping centre – Baseball bat
  • Kincumber Library – Gmail account access
  • Avoca Beach video shop - Gmail account access
  • Sydney airport – flight to USA
  • Purchase of items to assemble the homemade “explosive”

device

Credit Cards & CCTV

  • “Data retention” describes the retention of metadata by

telecommunication services providers (BigPond/Optus etc) for all customers for a legislated period of time.

  • That data is then available for law enforcement agencies to use in their

investigations.

IP Address Logs & Data Retention Laws

slide-8
SLIDE 8

12/05/2017 8

Metadata is widely understood by government officials to include the following:

  • Telephone numbers
  • The IP addresses of computers from which messages are received or sent
  • Location of parties making phone calls/communications
  • To and from email addresses on emails
  • Logs of visitors to chat rooms online
  • Chat aliases or identifiers (the name a person uses in a chat room online)
  • Start and finish times of internet sessions

What is Metadata?

  • Content of a phone call or an email
  • Subject line of an email
  • What is said in a chat room online
  • Content of a SMS
  • Attachments to emails
  • Web camera transmissions
  • Websites a person visits (i.e. browsing histories)
  • Names of websites

Metadata is not:

slide-9
SLIDE 9

12/05/2017 9

  • Agencies accessed metadata 330,640 times in 2012-13 - an 11 per cent

increase in a year and a jump of 31 per cent over two years.

  • ASIO is not included in the figures as it is exempt from having to report

the number of requests it makes

  • Something similar proposed about 2 years ago….which wasn’t popular

with most.

  • Even ‘anonymous’ weren’t happy with the Australian Government’s

idea!

Is this a new thing?

slide-10
SLIDE 10

12/05/2017 10

Over the past week Anonymous' Australian Twitter account has been boasting it will attack the ASIO website and that of Defence Signals Directorate. "The anonymous Operation Australia hackers have today again been busy with further attacks on the ASIO and DSD website," Anonymous Australia wrote on Wednesday.

Hackers cripple ASIO site to protest web spy plan

ASIO's website was down for at least half an hour this morning and now either works, loads slowly or doesn't work at all.

  • PayPal pulled support for Wikileaks, which had dumped 250,000

classified US State Department cables.

  • PayPal said the move was in response to "a violation of the PayPal

Acceptable Use Policy" because Wikileaks "was encouraging sources to release classified material.”

  • Anonymous DDoS attacks PayPal, Amazon, Visa, and MasterCard

websites

  • DoJ arrest 16 people for Anonymous-related DDoS attacks
  • Claiming to support transparency and counter-censorship.

2010 PayPal DDoS Attack

slide-11
SLIDE 11

12/05/2017 11

Back in early March, hackers affiliated with Anonymous tried to reboot their Operation Trump campaign by calling for everyone to take down Trump's websites in a coordinated effort on April 1. Almost immediately, the initiative was criticized by people within Anonymous as irresponsible and "cringeworthy," but a dedicated group apparently moved on with the plan.

Anonymous Targets Trump Census DDoS Attack

slide-12
SLIDE 12

12/05/2017 12

  • Client lists
  • Research data
  • Financial info
  • Project info
  • Templates

Theft of IP

The Most Common Scenario is the departing employee that has taken material with him such as ….

  • Wilson v Secure
  • Utilities company – external hard drive
  • Property Development company – Keylogging
  • Don’t let IT staff do their own investigation!

Case examples

slide-13
SLIDE 13

12/05/2017 13

Employee’s desktop/laptop/iPad/phone:

  • Link files
  • Deletion
  • Webmail
  • External storage (USB) devices
  • Discussions with other employees
  • Social Media: Facebook/Twitter/LinkedIn
  • Registration of business names
  • Lease of Premises

What do we examine?

Analyse the time leading up to departure

  • CV update
  • Access to network folders/files
  • Clean up of computer
  • Sending and deleting email
  • USB devices
  • Documents accessed immediately before or after the USB
  • Documents sent as attachments to personal webmail accounts

Chronology

slide-14
SLIDE 14

12/05/2017 14

slide-15
SLIDE 15

12/05/2017 15

  • Monitor the business environment – supported by policy!
  • Have a departure process;
  • Understand who the ‘key’ employees are;
  • Real time alerts based on risk profile:
  • Accessing restricted folders;
  • Attaching business documents to email;
  • Copying documents to a USB;
  • Keyword based alerts.

Prevention is the Best Cure

  • Oxford v Moss (1979): Student stole an exam result paper and was

charged with theft.

  • The court ruled that information was not property within the

definition of the Crimes Act and therefore was incapable of being stolen.

  • Definition of property: “property includes money and all other

property real or personal including things in action and other intangible property.”

  • Crown appealed – dismissed.
  • R v George

Criminal Law

slide-16
SLIDE 16

12/05/2017 16

  • Secure financial transaction model
  • 9 minutes
  • 3 employees
  • $2.2 million

Network Compromise Case Example

  • On the same day that the CEO takes annual leave, the

CFO receives an email request to transfer $367,000.

  • To and fro of email over the course of that day and the

next.

  • Funds transferred.
  • Attacker gathered names, roles and email addresses

from the companies website.

  • CEOs email was made to look legitimate e.g. David

Caldwell <david.caldwell@forensiicit.com.au>

  • New domain name registered days before the attack in

Bermuda

  • CEO comes back from leave and the CFO asks him

about the transfer

Spear Phishing $367,00 Case Example

slide-17
SLIDE 17

12/05/2017 17

  • Financial Controller receives an email from the MD
  • Requests transfer of funds $35,000
  • Grammar slightly different
  • Checks with MD by phone
  • Investigation shows that email address used was

compromised in LinkedIn hack in 2012 (https://haveibeenpwned.com)

Spear Phishing $35,000 Ransomware

Engaged in a matter where the network has been encrypted and there is a ‘dispute’ taking place between the business and the IT

  • utsourcers. Ware the scanner!!!!
slide-18
SLIDE 18

12/05/2017 18

  • Educate employees
  • Use Phishing education software
  • Reward recognition & reporting
  • Ongoing testing of employees and environment

How to Defend against Phishing?

  • One in five Australian small and medium-sized businesses have

been hit;

  • The latest Norton SMB Cybersecurity Survey indicates that 19

per cent — or about 400,000 — of the 2.1 million Australian small and medium-sized businesses have been attacked;

  • Phishing scams are the main form of attack;
  • Ransomware has hit 11 per cent of small businesses. 34 per cent

paid the ransom at an average cost of $4677.

Cyber attacks hitting Aussie businesses hard

Herald Sun March 7, 2017

slide-19
SLIDE 19

12/05/2017 19

  • Privacy Amendment (Notifiable Data Breaches) Act 2017
  • Will apply to all businesses, government agencies and
  • ther organisations covered by the Australian Privacy Act

1988

  • Turnover $3million plus
  • Health care service providers
  • 22 February 2018
  • Requires agencies, organisations and certain other

entities to provide notice to the Australian Information Commissioner and affected individuals of an eligible data breach.

Notifiable Data Breach Reporting

  • A ‘NDB’ is a breach that is likely to result in serious harm to any
  • f the individuals to whom the information relates;
  • Requirement to notify individuals concerned;
  • Where there are “reasonable grounds” to believe a “serious

data breach” has occurred;

  • Examples:
  • Device is lost or stolen;
  • Database is hacked; or
  • Personal information mistakenly provided.
  • Once a belief is formed that a breach has occurred - up to 30

days to conduct investigations ;

  • Relates to Agencies & Organizations (Annual turnover

$3million+) and Health Service Providers

When Must a Report be Made?

slide-20
SLIDE 20

12/05/2017 20

A data breach is serious and notifiable when affected individuals face a ‘real risk of serious harm’ Harm is: a) physical; b) psychological; c) emotional; d) reputational; e) economic; or f) financial.

What is a ‘Serious Data Breach’ Responding to a data breach.

4 key steps to consider when responding to a breach:

  • Contain the breach and assess;
  • Cause
  • What PI involved;
  • Evaluate risk;
  • Notification; and
  • Prevention of future breaches
  • “Other matters”: Be careful not to destroy evidence”
slide-21
SLIDE 21

12/05/2017 21

  • There is an obligation to have reasonable security safeguards and

take reasonable steps to protect PI;

  • “Reasonable steps” may include having a policy and response

plan;

  • If there is a real risk of serious harm the affected individuals and

OAIC should be notified;

  • Notification of a breach is not required by the Privacy Act – but is

highly recommended by he OAIC;

  • Mandatory obligation to report has been recommended by ALRC.

Key Messages

  • When was the last time your incident response plan was reviewed,

updated and tested?

  • If you have data outside your organisation (hosted) what are your

rights if there is a breach?

  • Does your service provider have an obligation to notify you if they

learn of a breach?

  • Are your systems capable of identifying if there is a breach?
  • Would you be able to identify and investigate a data breach in 30

days?

  • How comfortable would you be with your ability to report

accurately?

  • Would you be covered by insurance?

Questions and concerns

slide-22
SLIDE 22

12/05/2017 22

The ACORN is an online system where people can securely report cybercrime, and find advice on how to recognise and avoid it. 1 April – 30 June 2016: 10,810 reports 1 July – 30 September 2016: 11,556 reports Top 3 crimes: Scams, fraud purchase/sale, bullying Top target: Email

ACORN – Australian Cybercrime Online Reporting Network

slide-23
SLIDE 23

12/05/2017 23

Key Logging - Hardware Key Logging

slide-24
SLIDE 24

12/05/2017 24

Key Logging Key Logging

Smartphone Spy App Wonder where your kids went last night? Can’t reach them by the phone? Learn where your kids are (and were) with Hoverwatch Cell Phone Spy! Hoverwatch is meant to help you protect and supervise your kids, giving you the ability to track their location, discover their daily routes, listen to their calls and read their text messages. Protect and Supervise Your Kids Cell Spy is made to help you supervise your kids, turning their Android phone into a spying

  • device. With this program, you’ll always stand

behind their back and know when they need your help or protection. Cell Spy will constantly track their location recording their every step, and watch closely who they speak with and what they talk about.

slide-25
SLIDE 25

12/05/2017 25

Android Phones Stupid is as stupid does. No 1

slide-26
SLIDE 26

12/05/2017 26

Stupid is as stupid does. No 2 Stupid is as stupid does. No 3

slide-27
SLIDE 27

12/05/2017 27

Takeaway: Assess, Manage & Test:

  • Backups
  • Segregation of data based on role etc.
  • Monitor what's happening on the systems

(insider threat monitoring)

  • Retention of deleted email
  • Staff departure process
  • Regular security audit
  • Educate employees