Mitigating Information Security Risks Financial CyberSecurity Threats by Craig Schiller, CISSP-ISSMP, ISSAP EVP-IT Services & CIO Security Compliance Associates Agenda Today's presentation Brought to you by ©2021, Craig Schiller & Security Compliance Associates 2 About SCA Security Compliance Associates • • • • • Since 2005, SCA has been a credit Union industry leading provider of information security Assessment and compliance services Focuses on a hands-on partnership approach, using continuous improvement in the assessment and reporting processes. Specializes in thorough, comprehensive assessments using industry best tools and methodologies including SANS Top 20, NIST, ISO, and PCI-DSS Service over 13% of the Top 200 Credit Unions In addition to Standard Internal/External Assessments, tracking regulator focus on Online Banking, Mobile banking, and Risk Analysis ©2021, Craig Schiller & Security Compliance Associates 3 Business Banking Threat Pitfalls of Business Banking ©2021, Craig Schiller & Security Compliance Associates 4 The threat Two of the most successful criminal operations (and the respective malware) are known as Clampi and Zeus. The operations have been in place for over a year, and have proven to be successful, difficult to stop, and damaging. A public school district in Pennsylvania lost $700,000 in a two-day attack. A county government in Kentucky lost $415,000. Last Christmas a New York school district lost $3M of which .5M remained unrecovered as of 6-Jan. ©2021, Craig Schiller & Security Compliance Associates 5 The threat ©2021, Craig Schiller & Security Compliance Associates 6 Rules have changed Persons who conduct institutional/commercial online banking operations are being specifically targeted by the criminals. Standard desktop computer antivirus is not an effective defense because the attackers constantly morph the attacks to evade antivirus signatures. Network defenses, such as firewalls and IDS/IPS, that rely on signatures are similarly ineffective. Some attacks have successfully defeated two-factor authentication, a real-time trojan successfully bypassed a SecureID system to steal $447,000 using 27 different transactions to siphon off the funds. Two-factor remains to be an effective defense against many other attacks. ©2021, Craig Schiller & Security Compliance Associates 7 SpyEye/Zeus or Z-Bot The Zeus Trojan uses key-logging techniques to steal sensitive data such as user names, passwords, account numbers and credit card numbers. It injects fake HTML forms into online banking login pages to steal user data. SpyEye now modifies online bank statements so the victim doesn’t know that money is being siphoned from their accounts. SpyEye/Zeus added investment firms and retail stores that offer credit cards to its list of targets. A new Zeus derivative has added a Man-in-the-Mobile attack. ©2021, Craig Schiller & Security Compliance Associates 8 Operation Aching Mules ©2021, Craig Schiller & Security Compliance Associates 9 Operation Aching Mules Mules were recruited from Russian and Eastern European citizens They were given fake passport credentials The passport credentials were used to establish bank accounts for the ACH transfers ©2021, Craig Schiller & Security Compliance Associates 10 Operation Aching Mules NYPD detectives entered a Bronx bank in February to investigate a suspicious $44,000 withdrawal. International investigation began in Omaha, in May 2010 when fraudulent ACH payments were made to 46 bank accounts Cyber-attacks began in Eastern Europe, sending apparently-benign email to computers at small businesses and municipalities in the US Clicking on a link downloaded Zeus The malware recorded their keystrokes as they logged into their bank accounts online Hackers made unauthorized transfers of thousands of dollars at a time to receiving accounts controlled by the co-conspirators. Once the victim/employee begins executing an online banking transaction on behalf of his or her employer, ZeuS invisibly also executes a fraudulent wire transfer, usually for $10,000 or less. ©2021, Craig Schiller & Security Compliance Associates 11 Operation Aching Mules Money Mules Receiving accounts were set up by a "money mule organization" responsible for retrieving the proceeds of the malware attacks and transporting or transferring the stolen money overseas. The money mule organization recruited individuals who had entered the United States on student visas, provided them with fake foreign passports, and instructed them to open false-name accounts at U.S. banks. Once these false-name accounts were successfully opened and received the stolen funds from the accounts compromised by the malware attacks, the "mules" were instructed to transfer the proceeds to other accounts, most of which were overseas, or to withdraw the proceeds and transport them overseas as smuggled bulk cash. ©2021, Craig Schiller & Security Compliance Associates 12 Operation Aching Mules U.S. authorities charged 92 Russians and Eastern Europeans who allegedly opened U.S. bank accounts expressly to receive cash transferred from hacked online banking accounts. The defendants charged in Manhattan federal court include managers of and recruiters for the money mule organization, an individual who obtained the false foreign passports. 19 Eastern Europeans were arrested in the UK. The Ukrainian SBU arrested 5 key subjects of the investigation. $70M over the last four years. ©2021, Craig Schiller & Security Compliance Associates 13 DDoS used to prevent recall In one case, the subjects used a Distributed Denial of Service (DDoS) attack against a compromised ACH third-party provider to prevent the provider and the bank from recalling the fraudulent ACH transfers before money mules could cash them out. These ACH transfers ranged from thousands to millions of dollars. ©2021, Craig Schiller & Security Compliance Associates 14 Exploitation of online banking credentials The FBI has seen a significant increase in fraud involving the exploitation of valid online banking credentials belonging to small and medium sized businesses. In a typical scenario, the attack vector is a "spear phishing" e-mail which contains either an infected file or a link to an infectious Web site. The e-mail recipient is generally a person within a company who can initiate funds transfers on behalf of the business, or a credential account holder (treasury management platforms typically support both wires and Automated Clearing House (ACH) transfers). Once the user opens the attachment, or navigates to the Web site, malware is installed on the user's computer. The malware contains a key logger, which harvests the user’s corporate online banking credentials. Shortly thereafter, the subject either creates another user account from the stolen credentials or directly initiates a funds transfer masquerading as a legitimate user. These transfers have occurred through both the wire system and the ACH Network. ©2021, Craig Schiller & Security Compliance Associates 15 Trojan attachment ©2021, Craig Schiller & Security Compliance Associates 16 Spearphishing with Download Spearphishing email ©2021, Craig Schiller & Security Compliance Associates 17 Keystroke logger video Banking Trojan Captures User's Screen in Video Clip ©2021, Craig Schiller & Security Compliance Associates 18 Man in the Browser Attack - Torpig Torpig/Mebroot/Sinowal or Anserin Financial bot, Boot sector virus –reimaged machines are re-infected as soon as the machine is re-booted. Uses Man-in-the-Browser attack. ©2021, Craig Schiller & Security Compliance Associates 19 Ramnit Morphed into a financial malware in 2011. Ramnit can infect Windows executable files, HTML files, office files and possibly other file types. The malware includes a Man-in-the-Browser (MitB) web injection module, which enables Ramnit to modify web pages (client-side), modify transaction content, insert additional transactions – all in a completely covert manner invisible to both the user and host application. Suspected to have incorporated code from Zeus. Many new malware families are based on Public domain Zeus code (e.g. Citadel, Ice IX, Neloweg). ©2021, Craig Schiller & Security Compliance Associates 20 Clampi/Ligats/Ilomo,Rscan A trojan designed to steal credentials from infected systems. • This malware was used in the Slack Auto Parts $75,000 loss. • Uses psexec (from SysInternals) to spread across intranets. • Steals credentials for online banking sites as well as credentials stored locally. • To bypass firewalls, Clampi injects itself into IE for Command & Control traffic. • Like Zeus/SpyEye, Tunnels back through member’s computer to log into the victim’s account • "They are targeting {4600} institutions where users may enter data that might be useful in stealing money, such as utilities, retail, online casinos, banking, insurance, accounting services, credit bureaus," Joe©2021, Stewart Craig Schiller & 21 Security Compliance Associates Classes of sites targeted by Clampi Advertising networks Utilities Email marketing Stock brokerages Market research databases Online casinos Retail Career sites Insurance Banking Credit card companies Accounting Services Wire transfer services Mortgage lenders Consumer databases Webmail Foreign Postal Services (Non-US) Software Military/Gov information portals Recommendation engines ISPs Various News blogs File upload sites ©2021, Craig Schiller & Security Compliance Associates 22 Feodo Security researchers from FireEye identified this banking trojan, which is capable of launching man-in-the-browser (MITB) attacks and targets an unusually high number of financial institutions. In addition Feodo targets PayPal, Amazon, Myspace or Gmail The malware is similar in concept and features to other banking trojans like ZeuS, SpyEye, Bugat or Carberp. It steals online banking credentials and other sensitive information by intercepting data inputted into Web forms, as well as injecting rogue HTML elements into pages. ©2021, Craig Schiller & Security Compliance Associates 23 Cridex, Carperb/Dapato Cridex has a database of 137 banks. The Banking plug-in control panel contains the structure of the banks' web pages, so the Trojan can identify which valuable fields to send back to the command and control server. The cyber criminals can create and change forms that are normally completed by the victim. The attacks started with several large spam campaigns by cyber criminals who had previously compromised hundreds of WordPress-based websites. The spam emails included embedded URL links or HTML attachments that trick the victim to browse those compromised websites. All these links eventually lead to web pages infected with the Phoenix exploit kit. This Trojan’s capability is basically similar to Zeus and SpyEye. It collects information from the user’s machine and sends it to the C&C server. The Cridex Trojan takes control of the victim’s machines and allows it to collect information and potentially make fraudulent transactions by manipulating the bank Web pages. M86 Security Labs ©2021, Craig Schiller & Security Compliance Associates 24 Shylock malware platform Feb 2012 the Shylock malware platform intorduced a fake financial institution chat. By combining MitB techniques of HTML and JavaScript, criminals are now able to bring live chat right to your browser. The system couldn't identify your PC You will be contacted by a representative of bank to confirm your personality. Please pass the process of additional verification otherwise your account will be locked. Sorry for any inconvenience, we are carrying about security of our clients. ©2021, Craig Schiller & Security Compliance Associates 25 Ice IX Malware developed using Zeus source code. Captures sensitive information on telephone accounts belonging to the victims who happen to be customers of BT, TalkTalk and Sky. US banking customers have also been targeted by the scam. The criminal organization can redirect the calls your financial institution makes to verify suspicious transactions – straight into the waiting handsets of professional criminal caller services. ©2021, Craig Schiller & Security Compliance Associates 26 Financial Malware Attack Vectors OWASP Financial Malware List ©2021, Craig Schiller & Security Compliance Associates 27 Advanced Persistent Threat APT is not malware, it is an attack paradigm. APT events are usually named for the campaign (e.g. Aurora, Titan Rain, RSA), not for the malware family they belong to. APT attacks have been around since before 2000. They most closely resemble a black ops scenario. They can use old and new technology as needed to accomplish the desired objective. Stuxnet Flame ©2021, Craig Schiller & Security Compliance Associates 28 Stuxnet overview “the dangerously misleading expectation of complacent asset owners that something like Stuxnet can’t happen to them if they are not high-value military targets.” Stuxnet partial flow diagram Ralph Langner ©2021, Craig Schiller & Security Compliance Associates 29 Stuxnet detail 1 ©2021, Craig Schiller & Security Compliance Associates 30 Stuxnet detail 2 ©2021, Craig Schiller & Security Compliance Associates 31 Stuxnet detail 3 ©2021, Craig Schiller & Security Compliance Associates 32 Stuxnet detail 4 ©2021, Craig Schiller & Security Compliance Associates 33 Stuxnet detail 5 ©2021, Craig Schiller & Security Compliance Associates 34 Characteristics of the worm ©2021, Craig Schiller & Security Compliance Associates 35 Worm Propagation ©2021, Craig Schiller & Security Compliance Associates 36 Exploitation techniques ©2021, Craig Schiller & Security Compliance Associates 37 Control System Exploitation On any system with Siemens Step 7 software, Stuxnet modifies dlls so that users on Programming stations can’t see what Stuxnet has modified on Programmable Logic Controllers (PLCs). Stuxnet confirms it can connect to an appropriately configured PLC, the starts one of three sequences to inject code to payloads into the PLC. Two of the sequences sabotage the speed of the PLC (centrifuges) The third sequence prevents the PLC safety logic from alarming or overriding the changes made by Stuxnet. ©2021, Craig Schiller & Security Compliance Associates 38 Command and Control In case something goes wrong or if the instructions need to be changed: Normal communications would use HTTP to communicate with one of two Command and Control servers. The firewalls in the recommended architecture would block any direct communications from the Process Control and Control Systems Networks. All infected systems communicate using a P2P protocol using Windows Remote Procedure Calls. RPC is used by Windows file sharing, Windows printing spooling, OPC, and some Siemens proprietary data exchange protocols. ©2021, Craig Schiller & Security Compliance Associates 39 Flame Likely that Flame was created by the same organization that created Stuxnet. ©2021, Craig Schiller & Security Compliance Associates 40 Summary of Kaspersky’s Analysis of Flame’s C&C Largest and most complex attack toolkit to date, used primarily for cyber-espionage The Flame C&C infrastructure, which had been operating for years, went offline immediately after Kaspersky Lab disclosed the discovery of the malware’s existence last week. Currently there are more than 80 known domains used by Flame for C&C servers and its related domains, which have been registered between 2008 and 2012. During the past 4 years, servers hosting the Flame C&C infrastructure moved between multiple locations, including Hong Kong, Turkey, Germany, Poland, Malaysia, Latvia, the United Kingdom and Switzerland. The Flame C&C domains were registered with an impressive list of fake identities and with a variety of registrars, going back as far as 2008. According to Kaspersky Lab’s sinkhole, infected users were registered in multiple regions including the Middle East, Europe, North America and Asia-Pacific. The Flame attackers seem to have a high interest in PDF, Office and AutoCad drawings. The data uploaded to the Flame C&C is encrypted using relatively simple algorithms. Stolen documents are compressed using open source Zlib and modified PPDM compression. Windows 7 64 bit, which we previously recommended as a good solution against infections with other malware, seems to be effective against Flame. ©2021, Craig Schiller & Security Compliance Associates 41 Information gathered by Flame Data gathered according to Symantec ©2021, Craig Schiller & Security Compliance Associates 42 Information gathered by Flame Data gathered according to Symantec ©2021, Craig Schiller & Security Compliance Associates 43 Recommendations 1. Make certain that systems used in performing financial transactions are protected by strict technical controls and receive periodic validation. 2. Make certain that personnel involved in performing online financial transactions have the necessary security awareness and training. Those persons should receive targeted training on phishing and this threat. 3. Have written policies defining the controlled environment in which online banking transactions can be conducted, e.g. what systems can be used, how they must be secured and maintained, required personnel training, etc. 4. Routinely audit compliance with established technical controls and policies. 5. All online banking operations should be conducted on special-use computers that are used SOLELY for financial transactions. No other use of the machine should be permitted - no e-mail, no web browsing, no general-purpose business use - nothing but institutional online financial institution transactions. Educause.edu ©2021, Craig Schiller & Security Compliance Associates 44 Technical Recommendations -- Systems used for online banking: • Should have the least amount of software installed as necessary to facilitate their business functions. • Should have Javascript and ActiveX disabled or specifically limited to trusted sites. • Should be subject to a change management process for any work that's to be done on the machine. Multiple-party approvals should be required. • Should be examined monthly and routinely patched by professional institutional IT security staff. If the system is not examined or patched by a specific date of a month, business office folks should not use it until the IT security staff bring it up to date. • Physical access to the machine should be tightly controlled. • The system should have a permanent and obvious distinguishing mark, e.g. spray paint it orange, to insure there can be no mistaking that this is a special purpose machine. • Any other intentional use of the machine should be a cause for disciplinary action. ©2021, Craig Schiller & Security Compliance Associates 45 How Do We Detect Botnets? Computer is Exploited Becomes a Bot Other Bot Clients Security & FW logs C&C User Browsing Malicious Sites New Bot Rallys to let Botherder know it’s joined the team A/V Detection Retrieve the Anti A/V module Download server Secure the New Bot Client C&C Known Malware Distribution sites Listen to the C&C Server/Peer for commands Known C&C sites User Complaint C&C Report Result to the C&C Channel Botlike Traffic Retrieve the Payload module Download server Bad Behavior Abuse@ notices Execute the commands Talking to Darknet Possible traffic to victim On Command, Erase all evidence and abandon the client Anomalous Protocol Detection ©2021, Craig Schiller & Security Compliance Associates 46 Technical & Policy Controls • • • • • • • Two-factor authentication should be used for financial institution access were available. While two-factor authentication will not protect against all attacks it does provide protection against many. Application white-listing, e.g. on Windows (e.g. AppLocker) can offer significant protection. Don't make the machine part of a Windows domain. Administer the machine using a local administrator account. Place the machine on a separate VLAN, on a secure dedicated hardwired network connection. Shut the machine down when not in use. Implement very aggressive firewall and possibly proxy protections for the system. All non-banking traffic should be denied. Aggressively monitor traffic to and from the system From the The Irretrievable Losses of Malware-Enabled ACH and Wire Fraud: ©2021, Craig Schiller & Security Compliance Associates 47 User Notification • • • • • Traditional Help Desk response to malware must be changed for financial malware. When financial malware is involved, infected users need to be asked if they used the infected computer for e-commerce, electronic banking, or investment activities. If yes, then they should be advised to contact their credit union, credit card company, or investment firm. They should change their account passwords, change their credit cards, and review their accounts for transactions that they did not make. Credit unions should provide financial malware awareness for members and employees. ©2021, Craig Schiller & Security Compliance Associates 48 DNS Changer event UNITED STATES v. VLADIMIR TSASTSIN, ET AL. FBI Operation Ghost Click – arrested 6 Estonian nationals that were operating the Rove criminal enterprise. The botnet infected 4 million computers including 500,000 in the US. The botnet included a dnschanger mechanism the replaced the default DNS server with one under the control of the criminal enterprise. After the arrest the FBI worked with outside organizations to continue to operate the bogus DNS servers so that victims computers would not be affected. The Court ordered ISC to maintain these servers for 120 days. According to the FBI website, “The clean DNS servers will be turned off on July 9, 2012, and computers still impacted by DNSChanger may lose Internet connectivity at that time. “ ©2021, Craig Schiller & Security Compliance Associates 49 DNS Changer event Chances are that some of your customers may be among those that are infected. How to tell that you are infected. Use ipconfig /all on the windows command line to determine the IP address of your DNS server Use the IP address of the DNS server on the following website. http://www.dns-ok.us/ ©2021, Craig Schiller & Security Compliance Associates 50 DNS Changer event If the dns-ok-us website background is red, then you should have your computer re-imaged or have your computer reformatted and have the operating system installed. This check and the mitigations steps should be completed before July 9, 2012. ©2021, Craig Schiller & Security Compliance Associates 51 Q&A Questions? Craig Schiller, CISSP-ISSMP, ISSAP Craig.Schiller@SCASecurity.com EVP-IT Services & CIO Security Compliance Associates 727.571.1141 www.scasecurity.com ©2021, Craig Schiller & Security Compliance Associates 52