SLIDE 1
12/05/2017 1
2017 IPA Tasmania Congress
ONLINE INVESTIGATIONS & CURRENT THEATS TO BUSINESS
//_18.5.2017
SLIDE 2 12/05/2017 2
- Internet Investigations
- Theft of Intellectual Property
- Spear Phishing
- Ransomware
- Payroll Compromise
Internet based investigations – IP Addresses
An IP address is a unique numeric value assigned to any computer on the internet. 203.122.145.110
SLIDE 3
12/05/2017 3
SLIDE 4 12/05/2017 4
The Identity of the Internet Service Provider (ISP) who was used. From the ISP we can find out the name, address and billing information of the owner of the Internet Access Account.
What Does the IP address Tell us?
On 3 August 2011 in the mid-afternoon Peters walked through the front door
- f the home wearing a rainbow balaclava and carrying a baseball bat and a
backpack. He confronted Ms Pulver and then told her: “I’m not going to hurt you.” He then removed a black box from the backpack and tied it around his victim’s throat with a USB stick and two-paged Letter.
Read more: http://www.smh.com.au/nsw/ maddie-pulver-bomb-hoax-pictures-released-20121019-27von. html#ixzz3BTTTKc5a
Madeline Pulver – Mosman Collar Bomb Hoax
SLIDE 5 12/05/2017 5
- "Powerful new technology plastic explosives are located inside…... The
case is booby trapped. …………………………..I am a former special forces Green Beret Munitions specialist, and have constructed such devices over 20 years…….you will inadvertently trigger a tragically avoidable explosion ... You will be provided with detailed remittance instructions to transfer a Defined Sum……………... If remittance instructions are executed CORRECTLY … I will immediately provide you with: 1) The combination that can open the case without triggering a Brian Douglas Wells event and 2) An internal key to completely disable the explosive mechanism embedded inside ... "
Read more: http://www.smh.com.au/nsw/count-to-200--ill-be-back--if-you-move-i-can-see-you-details-of-maddie- collar-bomb-revealed-20120308-1ulir.html#ixzz3BTWJRJ6M http://en.wikipedia.org/wiki/Brian_Douglas_Wells
Sources of Evidence & Info
Two primary Sources of Evidence
- USB Placed around Madeline’s neck containing a ransom demand
- Gmail account – dirkstruan1840@gmail.com referenced in the ransom
demand
SLIDE 6 12/05/2017 6
- Contained a ransom demand in a Word document
- Metadata
- Deleted: Two previous versions of demand
- Deleted: Draft letter of demand addressed to the “Trustee of the
James M.Cox Estate Trust.”
USB Device
Information from Google:
- Created on 30 May 2011
- IP address – Chicago airport
- Airline passenger list
On the day of the assault on Madeline Pulver the account was accessed three times. Tracing the IP addresses identified:
- 1 - public internet terminal at Kincumber Library
- 2 & 3 – Avoca Beach Video
The Gmail Account – dirkstruan1840@gmail.com
SLIDE 7 12/05/2017 7
Credit card records:
- Purchase of a USB device and a purple lanyard from
Officeworks in West Gosford on July 4
- Purchase of a black aluminium softball bat from Rebel Sport
at Erina Fair on July 16 CCTV footage:
- Erina Fair shopping centre – Baseball bat
- Kincumber Library – Gmail account access
- Avoca Beach video shop - Gmail account access
- Sydney airport – flight to USA
- Purchase of items to assemble the homemade “explosive”
device
Credit Cards & CCTV
- “Data retention” describes the retention of metadata by
telecommunication services providers (BigPond/Optus etc) for all customers for a legislated period of time.
- That data is then available for law enforcement agencies to use in their
investigations.
IP Address Logs & Data Retention Laws
SLIDE 8 12/05/2017 8
Metadata is widely understood by government officials to include the following:
- Telephone numbers
- The IP addresses of computers from which messages are received or sent
- Location of parties making phone calls/communications
- To and from email addresses on emails
- Logs of visitors to chat rooms online
- Chat aliases or identifiers (the name a person uses in a chat room online)
- Start and finish times of internet sessions
What is Metadata?
- Content of a phone call or an email
- Subject line of an email
- What is said in a chat room online
- Content of a SMS
- Attachments to emails
- Web camera transmissions
- Websites a person visits (i.e. browsing histories)
- Names of websites
Metadata is not:
SLIDE 9 12/05/2017 9
- Agencies accessed metadata 330,640 times in 2012-13 - an 11 per cent
increase in a year and a jump of 31 per cent over two years.
- ASIO is not included in the figures as it is exempt from having to report
the number of requests it makes
- Something similar proposed about 2 years ago….which wasn’t popular
with most.
- Even ‘anonymous’ weren’t happy with the Australian Government’s
idea!
Is this a new thing?
SLIDE 10 12/05/2017 10
Over the past week Anonymous' Australian Twitter account has been boasting it will attack the ASIO website and that of Defence Signals Directorate. "The anonymous Operation Australia hackers have today again been busy with further attacks on the ASIO and DSD website," Anonymous Australia wrote on Wednesday.
Hackers cripple ASIO site to protest web spy plan
ASIO's website was down for at least half an hour this morning and now either works, loads slowly or doesn't work at all.
- PayPal pulled support for Wikileaks, which had dumped 250,000
classified US State Department cables.
- PayPal said the move was in response to "a violation of the PayPal
Acceptable Use Policy" because Wikileaks "was encouraging sources to release classified material.”
- Anonymous DDoS attacks PayPal, Amazon, Visa, and MasterCard
websites
- DoJ arrest 16 people for Anonymous-related DDoS attacks
- Claiming to support transparency and counter-censorship.
2010 PayPal DDoS Attack
SLIDE 11
12/05/2017 11
Back in early March, hackers affiliated with Anonymous tried to reboot their Operation Trump campaign by calling for everyone to take down Trump's websites in a coordinated effort on April 1. Almost immediately, the initiative was criticized by people within Anonymous as irresponsible and "cringeworthy," but a dedicated group apparently moved on with the plan.
Anonymous Targets Trump Census DDoS Attack
SLIDE 12 12/05/2017 12
- Client lists
- Research data
- Financial info
- Project info
- Templates
Theft of IP
The Most Common Scenario is the departing employee that has taken material with him such as ….
- Wilson v Secure
- Utilities company – external hard drive
- Property Development company – Keylogging
- Don’t let IT staff do their own investigation!
Case examples
SLIDE 13 12/05/2017 13
Employee’s desktop/laptop/iPad/phone:
- Link files
- Deletion
- Webmail
- External storage (USB) devices
- Discussions with other employees
- Social Media: Facebook/Twitter/LinkedIn
- Registration of business names
- Lease of Premises
What do we examine?
Analyse the time leading up to departure
- CV update
- Access to network folders/files
- Clean up of computer
- Sending and deleting email
- USB devices
- Documents accessed immediately before or after the USB
- Documents sent as attachments to personal webmail accounts
Chronology
SLIDE 14
12/05/2017 14
SLIDE 15 12/05/2017 15
- Monitor the business environment – supported by policy!
- Have a departure process;
- Understand who the ‘key’ employees are;
- Real time alerts based on risk profile:
- Accessing restricted folders;
- Attaching business documents to email;
- Copying documents to a USB;
- Keyword based alerts.
Prevention is the Best Cure
- Oxford v Moss (1979): Student stole an exam result paper and was
charged with theft.
- The court ruled that information was not property within the
definition of the Crimes Act and therefore was incapable of being stolen.
- Definition of property: “property includes money and all other
property real or personal including things in action and other intangible property.”
- Crown appealed – dismissed.
- R v George
Criminal Law
SLIDE 16 12/05/2017 16
- Secure financial transaction model
- 9 minutes
- 3 employees
- $2.2 million
Network Compromise Case Example
- On the same day that the CEO takes annual leave, the
CFO receives an email request to transfer $367,000.
- To and fro of email over the course of that day and the
next.
- Funds transferred.
- Attacker gathered names, roles and email addresses
from the companies website.
- CEOs email was made to look legitimate e.g. David
Caldwell <david.caldwell@forensiicit.com.au>
- New domain name registered days before the attack in
Bermuda
- CEO comes back from leave and the CFO asks him
about the transfer
Spear Phishing $367,00 Case Example
SLIDE 17 12/05/2017 17
- Financial Controller receives an email from the MD
- Requests transfer of funds $35,000
- Grammar slightly different
- Checks with MD by phone
- Investigation shows that email address used was
compromised in LinkedIn hack in 2012 (https://haveibeenpwned.com)
Spear Phishing $35,000 Ransomware
Engaged in a matter where the network has been encrypted and there is a ‘dispute’ taking place between the business and the IT
- utsourcers. Ware the scanner!!!!
SLIDE 18 12/05/2017 18
- Educate employees
- Use Phishing education software
- Reward recognition & reporting
- Ongoing testing of employees and environment
How to Defend against Phishing?
- One in five Australian small and medium-sized businesses have
been hit;
- The latest Norton SMB Cybersecurity Survey indicates that 19
per cent — or about 400,000 — of the 2.1 million Australian small and medium-sized businesses have been attacked;
- Phishing scams are the main form of attack;
- Ransomware has hit 11 per cent of small businesses. 34 per cent
paid the ransom at an average cost of $4677.
Cyber attacks hitting Aussie businesses hard
Herald Sun March 7, 2017
SLIDE 19 12/05/2017 19
- Privacy Amendment (Notifiable Data Breaches) Act 2017
- Will apply to all businesses, government agencies and
- ther organisations covered by the Australian Privacy Act
1988
- Turnover $3million plus
- Health care service providers
- 22 February 2018
- Requires agencies, organisations and certain other
entities to provide notice to the Australian Information Commissioner and affected individuals of an eligible data breach.
Notifiable Data Breach Reporting
- A ‘NDB’ is a breach that is likely to result in serious harm to any
- f the individuals to whom the information relates;
- Requirement to notify individuals concerned;
- Where there are “reasonable grounds” to believe a “serious
data breach” has occurred;
- Examples:
- Device is lost or stolen;
- Database is hacked; or
- Personal information mistakenly provided.
- Once a belief is formed that a breach has occurred - up to 30
days to conduct investigations ;
- Relates to Agencies & Organizations (Annual turnover
$3million+) and Health Service Providers
When Must a Report be Made?
SLIDE 20 12/05/2017 20
A data breach is serious and notifiable when affected individuals face a ‘real risk of serious harm’ Harm is: a) physical; b) psychological; c) emotional; d) reputational; e) economic; or f) financial.
What is a ‘Serious Data Breach’ Responding to a data breach.
4 key steps to consider when responding to a breach:
- Contain the breach and assess;
- Cause
- What PI involved;
- Evaluate risk;
- Notification; and
- Prevention of future breaches
- “Other matters”: Be careful not to destroy evidence”
SLIDE 21 12/05/2017 21
- There is an obligation to have reasonable security safeguards and
take reasonable steps to protect PI;
- “Reasonable steps” may include having a policy and response
plan;
- If there is a real risk of serious harm the affected individuals and
OAIC should be notified;
- Notification of a breach is not required by the Privacy Act – but is
highly recommended by he OAIC;
- Mandatory obligation to report has been recommended by ALRC.
Key Messages
- When was the last time your incident response plan was reviewed,
updated and tested?
- If you have data outside your organisation (hosted) what are your
rights if there is a breach?
- Does your service provider have an obligation to notify you if they
learn of a breach?
- Are your systems capable of identifying if there is a breach?
- Would you be able to identify and investigate a data breach in 30
days?
- How comfortable would you be with your ability to report
accurately?
- Would you be covered by insurance?
Questions and concerns
SLIDE 22
12/05/2017 22
The ACORN is an online system where people can securely report cybercrime, and find advice on how to recognise and avoid it. 1 April – 30 June 2016: 10,810 reports 1 July – 30 September 2016: 11,556 reports Top 3 crimes: Scams, fraud purchase/sale, bullying Top target: Email
ACORN – Australian Cybercrime Online Reporting Network
SLIDE 23
12/05/2017 23
Key Logging - Hardware Key Logging
SLIDE 24 12/05/2017 24
Key Logging Key Logging
Smartphone Spy App Wonder where your kids went last night? Can’t reach them by the phone? Learn where your kids are (and were) with Hoverwatch Cell Phone Spy! Hoverwatch is meant to help you protect and supervise your kids, giving you the ability to track their location, discover their daily routes, listen to their calls and read their text messages. Protect and Supervise Your Kids Cell Spy is made to help you supervise your kids, turning their Android phone into a spying
- device. With this program, you’ll always stand
behind their back and know when they need your help or protection. Cell Spy will constantly track their location recording their every step, and watch closely who they speak with and what they talk about.
SLIDE 25
12/05/2017 25
Android Phones Stupid is as stupid does. No 1
SLIDE 26
12/05/2017 26
Stupid is as stupid does. No 2 Stupid is as stupid does. No 3
SLIDE 27 12/05/2017 27
Takeaway: Assess, Manage & Test:
- Backups
- Segregation of data based on role etc.
- Monitor what's happening on the systems
(insider threat monitoring)
- Retention of deleted email
- Staff departure process
- Regular security audit
- Educate employees