a year s evolution in attacks against online banking
play

A Year's Evolution in Attacks Against Online Banking Customers - PowerPoint PPT Presentation

A Year's Evolution in Attacks Against Online Banking Customers Matthew W A Pemble Information Security Crystal Ball 29 th June 2006 Group Security & Fraud Phishing, Trojans & other scams Despite appearances banks are actually (ish)


  1. A Year's Evolution in Attacks Against Online Banking Customers Matthew W A Pemble

  2. Information Security Crystal Ball 29 th June 2006 Group Security & Fraud

  3. Phishing, Trojans & other scams • Despite appearances banks are actually (ish) secure • Home-user security is terrible • Serious, professional , organised crime • Go where the money is: • Compromise bank staff • Place bank employees • Attack the communications chain outside of the Bank’s control • Attack the customers (and their computers) 29 th June 2006 Group Security & Fraud

  4. The situation at Singapore • Significant increases in basic numbers • Majority of attacks still non-financials • Attacking biggest English-speaking orgs • US / Aus / NZ / UK + ? • Rapid rise in use and utility of trojans • Losses (corporate) still low • Absolutely • Compared to other fraud (card, 419 etc) • Compared to cost of solution 29 th June 2006 Group Security & Fraud

  5. Where are we now? • Concentration on money making • More sophistication in strategy • More sophistication in technology • Mule recruitment • More effort • Fewer mugs ? • Use of non-internet channels for initial theft • First 4 / 5 / 6 (BIN) “email personalisation” • More languages (German, French, Spanish & …) • spulling dreadful still • and grimer 29 th June 2006 Group Security & Fraud

  6. “Nothing is worse than active ignorance” Goethe 29 th June 2006 Group Security & Fraud

  7. Phishing – main trends • Flat simple numerics • Inexorable rise in finance attacks • Significant (lesser) rise in reported losses • Change of tack • Non-English (at last � ) • Failure of non-strong auth (Tan etc) • Focus on smaller institutions (UK & US) • Demand for (and use of) telephony credentials • Technical sophistication of supporting infrastructure • Balkanisation • Nigerianization 29 th June 2006 Group Security & Fraud

  8. Normalised to Jun 05 10 9 8 7 6 5 4 3 2 1 0 Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May UK (norm) APWG (norm) 29 th June 2006 Group Security & Fraud

  9. “Weak” hosting • Single email • Extremely poor English • No geographical customisation (i.e. $ not £) • Single host (hacked virtual hosting box) • DNS • Often on the same box (old) • Or by legitimate server owner (ISP) • No resilience in site • New kit wave within 3 hrs of site takedown. 29 th June 2006 Group Security & Fraud

  10. “Strong” Hosting • This is not the “Rock” group MO. • 1 email wave – standard wording • Up to 4 “confusingly similar” domain names • “Fraudster friendly” registrar • + don’t work weekends � • Separate DNS • “Sensible”, fraudster owned, DNS service domain • 5 live A records at a time • Slow rotation ( ≈ 30 mins) • Botnet hosting • 30 + IP addresses seen in 32 hr lifetime 29 th June 2006 Group Security & Fraud

  11. What does this mean? • 2-factor approaching economic • Attributable cost of IR on order of financial loss • Education appears to be reducing customer response • But when you get an attack after 14 months … • Inter-bank recovery rates are consistent to improving • Wider scale spam filtering seems to be helping • Grip slowly tightening on phishing gangs • Law Enforcement effort needing • Low value crime, international & difficult 29 th June 2006 Group Security & Fraud

  12. “Spear-Phishing” • Pick your definition • Well targeted attack (only genuine customers) • Attacking only one email domain • Personalising attack emails • Scripted emails with unique identifiers • Active email / mug verification • Avoid dilution & decoys • Future proofing 29 th June 2006 Group Security & Fraud

  13. Perseverance is a great element of success: if you only knock loud and long enough at the gate, you are sure to wake up somebody. Henry Wadsworth Longfellow

  14. Pharming • I would exclude “etc/hosts” changes • Rare, but difficult to spot • Why? • Spam is easy, fools are plentiful? • Spectacularly successful when implemented • Potential for “transparent proxy” • DNS surveys suggest wide-scale susceptibility 29 th June 2006 Group Security & Fraud

  15. Trojans • Remain the “iceberg issue” • Many customer machines multiply compromised • Vast range of applicable threats • Key-logging • Keyword tailored key-loggers • Screen scraper • Disk search utilities (inc grep) • MITM Proxies (Browser Help Objects) • Etc/hosts file alterations 29 th June 2006 Group Security & Fraud

  16. Trojan Impact • Very few customers per identified variant • Spread between many banks (over 200 in some etc/ hosts) • Auto-updates • Well-established malware author shops / kits • Botnet hosting • Nasty suspicion? • What happens to real 1 st -party fraud? 29 th June 2006 Group Security & Fraud

  17. (small) Etc/hosts sample 24.14.38.190 www.halifax-online.co.uk 24.14.38.190 ibank.barclays.co.uk 24.14.38.190 online.lloydstsb.co.uk 24.14.38.190 online-business.lloydstsb.co.uk 24.14.38.190 www.ukpersonal.hsbc.co.uk 24.14.38.190 www.nwolb.com 24.14.38.190 banesnet.banesto.es 24.14.38.190 extranet.banesto.es 24.14.38.190 ebanking.bccbrescia.it 24.14.38.190 www.bankofscotlandhalifax-online.co.uk 24.14.38.190 www.rbsdigital.com 24.14.38.190 oi.cajamadrid.es 24.14.38.190 bancae.caixapenedes.com 24.14.38.190 banking.postbank.de 24.14.38.190 meine.deutsche-bank.de 24.14.38.190 myonlineaccounts2.abbeynational.co.uk 24.14.38.190 ibank.cahoot.com 29 th June 2006 Group Security & Fraud

  18. Non-IT Attacks • Telephony • Auto-diallers (espec VOIP) • SMS • Paper • Interference with the Mails • Statement stuffers • Marketing departments don’t help 29 th June 2006 Group Security & Fraud

  19. A good End cannot sanctify evil Means; nor must we ever do Evil, that Good may come of it. William Penn

  20. Summary: The state at Baltimore • Attacks steadily ramping up • Spam volumes erratic • No real learning on “hook” • Minor variations in favourite targets • $millions per month • International • Multiple languages • Transnational targeting • West Africans now playing • Technology improving • Almost time to do something about it � 29 th June 2006 Group Security & Fraud

  21. So what for next year? • Cleverer targeting • Cleaner spam lists • More / better personalisation • Theft of customer (marketing) databases • Money movement? • Away from Western Union • Suborned registrars? • Strong 2-factor transaction data signing • 2FA is not enough (though necessary) 29 th June 2006 Group Security & Fraud

  22. Just remember it’s not the only problem … The “Enron 3” Donald MacKenzie 29 th June 2006 Group Security & Fraud

  23. Some perspective Phishing & trojans Donald MacKenzie • Organised crime • Business Relationship Mgr • Hundreds of attacks • 5 year rolling scheme(r) • £23.2m UK admitted loss • Prosecuted for ≈ £21m loss • Thousands of hours ISIRT • Loan & dormant account fraud • Mostly getting away with it • 5 man-days • Apparently below LE “radar” • Computer & phone forensics • Statement writing • Sent down for 10 yrs on Tuesday 27 th June � 29 th June 2006 Group Security & Fraud

  24. Questions ?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend