ARF WORKSHOP PROXY ACTOR CYBERCRIME USING PROXY ACTOR Dr. TRAN VAN HOA Deputy Director VIETNAM HIGHTECH CRIME POLICE DEPARTMENT HOIAN March 2012 Vietnam Internet Security Report 2011 • Most common Cybercrime: illegal access, virus, Credit card fraud, Online phishing; DDOS attacks • 2,245 websites were attacked; Only in June 2011: over 200 sites are attacked - 51 websites with domain names “.gov.vn” • 38,961 new virus - 64,2 million computers infected • Stealing of users’ accounts and passwords: such as Nickname and email (Yahoo chat, Facebook) Number of attacked websites (2011) 450 450 402 400 345 350 300 250 156 137 150 100 71 97 88 81 41 50 0 195 182 200 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Source: Bkav Dec Crime using Proxy Vietnamnet Online Newspaper Case Website www.vietnamnet.vn is defaced and DDOS. About 100,000 botnets participated in this DDOS attack. BKAV Case Feb 2012, website of BKAV was hacked. Hackers using Tor (Proxy Tool) change their real IP to US, UK, Korean IP address… 5 Articles on cybercrime in Penal Code Article 224. Spreading computer viruses and programs with a feature of harming the operation of computer networks, telecommunications networks, Internet and digital devices 1. Those who intentionally spread computer viruses and programs with a feature of harming the operation of computer networks, telecommunications networks, Internet and digital devices shall be imposed a fine of between twenty million and two hundred million dong or a prison term of between one and five years. 5 Articles on cybercrime in Penal Code Article 225. Obstructing or disordering the operation of computer networks, telecommunications networks, Internet and digital devices 1. Those who commit any of the following acts, causing serious consequences but not falling into cases specified in Articles 224 and 226a of this Code, shall be imposed a fine of between twenty million and two hundred million dong or a prison term of between one and five years: a/ Deleting, damaging or altering without permission software and data of digital devices: b/ Illegally blocking the transmission of data of computer networks, telecommunications networks. Internet and digital devices: c/ Other acts of obstructing or disordering the operation of computer networks, telecommunications networks, Internet and digital devices. 5 Articles on cybercrime in Penal Code "Article 226a. Illegally accessing computer networks, telecommunications networks, Internet or digital devices of other persons 1. Those who intentionally pass warnings, access codes or firewalls, use other's administration right or other means to illegally access computer networks, telecommunications networks. Internet or digital devices of other persons and appropriate their control right; intervene in the operation functions of digital equipment; hack, modify, destroy or tamper with data or illegally use services, shall be imposed a fine of between twenty million and two hundred million dong or subject to a prison term of between one and five years. PROXY ACTOR What is a proxy server? - As an intermediary for requests from clients seeking resources from other servers. - Request of Client for service connecting to proxy. - Filtering the request: traffic by IP or protocol. - Request of Proxy on behalf of the client. - Sometimes: Providing respond from 'caches' without contacting the specified server. Four main functions of Proxy Server • Filtering requests and access monitoring • Internet sharing • Improving performance • Anonymous function and firewall bypass Filtering requests and monitoring access Proxies protecting internal network from virus, spyware, unwanted intrusion from outside Internet sharing It helps multiple computers access the Internet through a computer (Proxy Server) with access to certain accounts Improving performance Web proxies are commonly used to cache web pages from a web server to speed up access to resources (using caching) Anonymous function and firewall bypass The webserver receives requests from the proxy server. The webserver only know the Proxy Servers’ IP address and does not recognize the real end-user’s IP address. Therefore, the client can hide their information, leaving no trace on the server's log Proxy can help user to access resources that are restricted by a firewall Types of proxy By supported protocol: • HTTP Proxy Server • FTP Proxy • SOCKS Proxy Server • CGI Proxy Server By anonymous ability • Transparent Proxy • Anonymous Proxy • High Anonymous Proxy Common Proxy Servers and Tools CGI Proxy Thousands of free-proxy-server sites available on the Internet HTTP & SOCKS Proxy http://aliveproxy.com/ http://www.proxyblind.org/ http://www.atomintersoft.com/ http://www.proxy-list.net/ http://www.cybersyndrome.net A free SOCKS Proxy site This free proxy site providing hundreds of SOCKS proxies. Proxy Tools • The Onion Routing (Tor) • Internet Invisible Project (I2P) • Others: Sockscap, Hotspot Shield, Hide the Ip, GhostSurf Proxy Platinum, Anonymous Surfing, Proxy Finder Pro The Onion Router (Tor) • Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the U.S. Naval Research Laboratory • Tor was financially supported by the Electronic Frontier Foundation from 2004 • Until 2011, Tor had 26 million users Functions of Tor • To improve privacy and security on the Internet • To hide the IP, when access internet, upload and download sensitive data, cybercrime activities • To protects client against “traffic analysis” and other forms of Internet surveillance How Tor works? How Tor works? How Tor works? Advantages of Tor • Completely anonymous • Secure your data (including data payload and header) • Easy to use • Constantly change the IP (after a specific time) • Multi-layer encryption • Impossible to trace back Internet Invisible Project (I2P) • Formed in 2003 to support the more free society, by offering them an anonymous and secure communication system • Work with mail, peer-peer, IRC chat, and others How I2P works? How I2P works? Other Proxy Tools Vietnam Initiatives in International Cooperation on fighting against cybercrime using Proxy • The need of international cooperation for building guideline and national Law, for Collaboration in implementing the secure free internet, especially the use of Proxy Actor. • Organizing workshop with attending of specialist from ARF countries to create the policy for proxy actor. • Avoid the spontaneous Development of Proxy Actor in the Internet and the misuse by hacker, criminal, terrorist, may harm other countries and internet environment Vietnam Initiatives in International Cooperation on fighting against cybercrime using Proxy • Every countries should have strict control of the Proxy Server list, maintain log file in the time of – at least 3 month for the review and not allow it’s citizen and Proxy server in their countries, to be used for the attacking other countries and to commit crime. • Enhancement of the information exchange, assistance the cybercrime investigation, tracing the IP… • Build a secure internet system, to protect the privacy without criminal Proxy Actor. THANK YOU 36