cyber fraud trends authentication
play

Cyber Fraud Trends - Authentication Ralph Thomas - iDefense Malcode - PowerPoint PPT Presentation

20 th Annual FIRST Conference Cyber Fraud Trends - Authentication Ralph Thomas - iDefense Malcode Intelligence rthomas@idefense.com, +1.571.723.1978 June, 2008 Cyber Fraud Disruptors Anti-virus Windows Vista Firewall Stopped


  1. 20 th Annual FIRST Conference Cyber Fraud Trends - Authentication Ralph Thomas - iDefense Malcode Intelligence rthomas@idefense.com, +1.571.723.1978 June, 2008

  2. Cyber Fraud Disruptors  Anti-virus  Windows Vista Firewall − − Stopped static malware Outbound filtering enabled by default (incl. phishing filters) − Packers and scrambling is now − common practice Limit drive-by installations  Windows XP SP2 Firewall − Limit malware from phoning home − Essential for attackers to maintain − Enabled by default untainted/volatile hosting − Stopped malware from coming to --> Bulletproof Hosting the computer  2FA Deployment − Start of drive-by installs via − browser exploitation (get the victim Underground economy changes to go to the malware) --> Adjusted Behaviour

  3. Cyber Fraud Disruptors  Essential for attackers to maintain untainted/volatile hosting --> Bulletproof Hosting  Underground economy changes --> Adjusted Behaviour

  4. Bulletproof Hosting  The Truth About RBN − All public customers on one network − Not secretive at all, heavily spammed ads on many forums

  5. Bulletproof Hosting  The Post-RBN Era − Most popular providers existed well before the fall of RBN − Competitors to RBN, no proven connections to leadership − Common customers is NOT evidence of common leadership  McColo  AbdAllah  RentaBL

  6. Bulletproof Hosting - AbdAllah  Reseller of a coalition of bulletproof hosts  Controls one network, resells the rest

  7. Bulletproof Hosting

  8. "Bulletproof Hosting" - Fastflux

  9. Bulletproof Hosting 4% 9% US 9% 4% 4% 9% US RU RU 3% 10% 4% 3% MY UA HK 3% 2% HK TR 3% 33% MY 2% 2% NL DE DE 12% 7% 7% 1% SG JP 2% ES LU GB 1% 1% UA EE CZ 1% 1% BY TH CN 16% 1% CA 26% CA 36% LU

  10. Cyber Fraud Disruptors  Essential for attackers to maintain untainted/volatile hosting --> Bulletproof Hosting  Underground economy changes --> Adjusted Behaviour

  11. Adjusted Behavior  Fraud is more difficult/complex − give up! (not going to happen anytime soon) − keep current tactics and change targets  go for the smaller fish, drastic increase of phishing attacks against smaller institutions, which are now faced with a 'new' problem − stay with current targets and adjust tactics  due to 2FA, stolen credentials are stale  move from phishing/pharming to malware  All internet users are affected − financial (e-banking, e-brokerage) − e-commerce, e-recruitment, communication (e-mail, IM, blogs/forums/groups, ...) − persistent environments, social networks, and gaming

  12. Ambush: e-Consumers Under Attack 1) WLAN: Invite for eavesdropping 1) Trojans: Bogus Software 2) Fake User: I am not me 2) With counterfeit passport into the vault 3) Detour into the bandit's camp: DNS spoof 3) Enter PIN: The crooks read along 4) Deceptive Guidepost: The hosts file

  13. Ambush: e-Consumers Under Attack  Phishing & Pharming − Lure victims via social engineering and tempering with DNS to fraudulent webpage designed to steal personal identifiable information (PII)  Man-in-the-middle (MITM) − Fraudulent webpage designed to instantly defraud victims in order to circumvent temporary 2FA means  Malware − Hostile software installed on the victim's computer designed to steal PII or to perform MITM. This compromises the consumer's communication endpoint.

  14. Strong Authentication  Many choices for client-side  Mutual (2-way) authentication authentication  Account vs. Transaction − Smart card − USB Token Authentication − Virtual Token  Implementation is key − OTP Token − e.g. cell phone as OTP Token vs. − Scratch Pad mTAN − Certificate − e.g. OTP token timeout at BR bank − Biometrics − e.g. weakness in business process: change phone number − Phone/Cell/SMS − etc.

  15. Strong Authentication

  16. Q + A Ralph Thomas - iDefense Malcode Intelligence rthomas@idefense.com, +1.571.723.1978 May 28, 2008

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend