Powerpoint Available

advertisement
Recognizing Email Scams
SIRT IT Security Roundtable
Harvard Townsend
Chief Information Security Officer
harv@ksu.edu
December 4, 2009
Agenda









The problem – why should we care?
Types of email scams
Recent examples at K-State and why they
tricked so many people
Characteristics of scam emails – things to look
for and tools to help
How to determine if a web link is safe
How to evaluate email attachments
Reporting scams or other malicious emails
Useful information sources
Q&A
2
Many vectors for attack














Vulnerable operating system (i.e., Windows)
Vulnerable applications
Hackers scanning our network from outside or inside the campus
network
Passwords stolen by a key logger
USB flash drives
Malicious web links, even sponsored ads at the top of a Google
search
Malicious Facebook ads
Extra goodies in P2P downloads
Instant messaging
Redirected DNS queries
Hijacked duplicate web site
Phishing email
Malicious web links in an email
Email attachments
3
Many vectors for attack














Vulnerable operating system (i.e., Windows)
Vulnerable applications
Hackers scanning our network from outside or inside the campus
network
Passwords stolen by a key logger
USB flash drives
Malicious web links, even sponsored ads at the top of a Google
search
Malicious Facebook ads
Extra goodies in P2P downloads
Instant messaging
Redirected DNS queries
Hijacked duplicate web site
Phishing email
Malicious web links in an email
Email attachments
4
What’s the big deal?






130+ K-State computers infected in November when
people opened malicious email attachments – the same
emails that hit campus in July and infected 100+
computers
289 spear phishing scams at K-State thus far in 2009
resulting in 421 compromised email accounts used to
send spam
These forms of “social engineering” currently one of the
most effective ways to compromise a computer and
steal financial or personal identity information
Information loss/theft (personal, institutional, passwords,
acct info)
Identity theft
Financial fraud
5
It doesn’t just affect you





When stolen K-State email accounts are used to send spam,
K-State is seen as a spam source and sometimes ends up on
spam block lists such that ALL email from K-State to those
email providers is blocked (examples include Hotmail, Gmail,
Comcast, AT&T, Road Runner…) – a huge headache for
faculty-student communication
Compromised computers become part of a “botnet” used for
illegal purposes
A recent compromised K-State computer became a “botnet
controller” that controlled 12,000 other compromised
computers around the world
Compromised computers are used to send spam, host scam
web sites, spread malware, steal data, launch denial of
service attack, etc.
One careless mouse click can affect thousands of other
people, not just yourself
6
What’s the big deal?



Tactics constantly changing so can’t
let down your guard
Malware constantly changing so antivirus software can’t always prevent
infection
Technology can’t stop them all – you,
the user, is critically important in
our security defenses
7
Definitions

Malware – malicious software






Virus, Worm, Trojan, etc. - types of malware, specific definitions
not that important now; “virus” sometimes used as a catch-all for
malware
Keylogger – watches your keystrokes and intercepts data of
interest; often sends it to the perpetrator. Typically looks for
things like username/password, bank account info, credit card
info
Rootkit – malware that tries to hide the fact that it compromised
the computer. Think of it as stealth malware.
Spyware – watches your online activity and sends information
about you or your habits to others w/o your informed consent
Adware – automatically displays ads on your computer,
usually in annoying pop-ups
Scareware – tries to trick you into buying something of little or
no value using shock, anxiety or threats (like Anti-virus
2008/2009). Common tactic is to claim your computer is
infected and you have to buy their software to clean it up.
8
Scareware
examples
9
Definitions




Phishing – attempt to acquire sensitive
information by posing as a legitimate
entity in an electronic communication
Spear phishing – phishing that targets a
specific group
Social engineering – manipulating or
tricking people into divulging private
information
Spam – unsolicited or undesired
bulk email/messages
10
Spear phishing example that targets K-State
11
Let’s look at some examples


Check IT Security Threats blog for
examples of spear phishing scams:
threats.itsecurity.k-state.edu
Analysis of actual scams received by
people at K-State
12
Most
Effective
Spear
Phishing
Scam
13
Most
Effective
Spear
Phishing
Scam
14
Most
Effective
Spear
Phishing
Scam
15
Most effective spear
phishing scam



At least 62 replied with password, 53 of which were
used to send spam from K-State’s Webmail
Arrived at a time when newly admitted freshmen
were getting familiar with their K-State email – 37 of
the 62 victims were newly-admitted freshmen
Note characteristics:



“From:” header realistic:
"Help Desk" <helpdesk@k-state.edu>”
Subject uses familiar terms:
“KSU.EDU WEBMAIL ACCOUNT UPDATE”
Message body also references realistic terms:



“IT Help Desk”, “Webmail”, “KSU.EDU”, “K-State”
Asks for “K-State eID” and password
Plausible story (accounts compromised by spammers!!)
16
Another effective spear
phishing scam
This one
also tricked
62 KStaters into
giving away
their eID
password
17
How to identify a scam

General principles:





Neither IT support staff nor any legitimate
business will EVER ask for your
password in an email!!!
Use common sense and logic – if it’s too
good to be true, it probably is.
Think before you click – many have fallen
victim due to a hasty reply
Be paranoid
Don’t be timid about asking for help from
your IT support person or the IT Help Desk
18
How to identify a scam

Characteristics of scam email







Poor grammar and spelling
Uses unfamiliar or inappropriate terms (like “send your
account information to the MAIL CONTROL UNIT”)
It asks for private information like a password or
account number
The message contains a link where the displayed
address differs from the actual web address
It is unexpected (you weren’t expecting Joe to send
you an attachment)
The “Reply-to:” or “From:” address is unfamiliar, or is
not a ksu.edu or k-state.edu address
Does not provide explicit contact information (name,
address, phone #) for you to verify the communication.
Good example is spear phishing scam that tries to
steal your eID password is signed “Webmail
administrator”
19
How to identify a scam







Beware of scams following major news events or natural
disasters (e.g., after Hurricane Katrina asking for donations
and mimicking a Red Cross web site)
Seasonal scams like special Christmas offers, or IRS
scams in the spring during tax season
They take advantage of epidemics or health scares, like
H1N1 scam currently making the rounds
Often pose as legitimate entity – PayPal, banks, FBI, IRS,
Wal*Mart, Microsoft, etc.
If unsure, call the company to see if they sent it (we did this
with recent email from Manhattan Mercury)
Many make sensational claims; remember to apply the
common sense filter – if it sounds too good to be true, it
probably is
Hackers very good at imitating legitimate email – will use
official logos, some links in the email will work properly, but
one link is malicious
20
Real K-State Federal Credit Union
web site
Fake K-State Federal Credit Union
web site used in spear phishing scam
21
Can I click on this?

Watch for displayed URL (web address) that does
not match the actual
displayed: http://update.microsoft.com/microsoftupdate
actual:
http://64.208.28.197/ldr.exe


Beware of link that executes a program (like ldr.exe
above)
Avoid numeric IP addresses in the URL
http://168.234.153.90/include/index.html

Some even use hexadecimal notation for the IP:
http://0xca.0x27.0x30.0xdd/www.irs.gov/

Watch for legitimate domain names embedded in
an illegitimate one
http://leogarciamusic.com/servicing.capitalone.com/c1/login.aspx/
22
Can I click on this?

Beware of email supposedly from US
companies with URLs that point to a non-US
domain (Kyrgyzstan in example below)
From: Capital One bank <cservice@capitalone.com>
URL in msg body: http://towernet.capitalonebank.com.mj.org.kg/onlineform/

IE8 highlights the actual domain name to help
you identify the true source. Here’s one from
an IRS scam email that’s actually hosted in
Pakistan:
23
Can I click on this?

Beware of domains from unexpected foreign
countries
Kyrgyzstan: http://towernet.capitalonebank.com.mj.org.kg/onlineform/
Pakistan: http://static-host202-61-52-42.link.net.pk/IRS.gov/refunds.php
Lithuania: http://kateka.lt/~galaxy/card.exe
Hungary: http://mail.grosz.hu/walmart/survey/
Romania: http://www.hostinglinux.ro/
Russia: http://mpo3do.chat.ru/thanks.html

MANY scams originate in China (country code =
.cn)

Country code definitions available at:
www.iana.org/domains/root/db/index.html
24
Can I click on this?

Analyze web links w/o clicking on them by
copying the URL and testing them at these
sites:

Trend Micro’s Web reputation query –
reclassify.wrs.trendmicro.com/wrsonlinequery.aspx

McAfee SiteAdvisor (enter URL on this web
page – you don’t have to install their software):
www.siteadvisor.com/
25
Can I click on this?

Watch for malicious URLs cloaked by URL
shortening services like:



TinyURL.com
Bit.ly
CloakedLink.com
26
Can I click on this?


TinyURL has a nice “preview” feature that
allows you to see the real URL before going to
the site. See http://tinyurl.com/preview.php to
enable it in your browser (it sets a cookie)
Bit.ly has a Firefox add-on to preview shortened
links; it also warns you if the site appears to be
malicious:
addons.mozilla.org/en-US/firefox/addon/10297
27
Can I click on this?
28
Trend Micro Web Reputation
Services is your friend
29
So are anti-phishing/malware
features in Firefox and IE
30
Evaluating attachments

Saving it to your desktop without opening it or
executing it is usually safe




If Trend Micro OfficeScan recognizes it as malicious, it will
prevent you from saving it to the desktop (a function of the
“real time scan”)
If not detected, is either OK or a new variant of malware
Manually update Trend Micro OfficeScan (point to the
OfficeScan icon in the system tray, right click, select
“Update Now”), then scan the file (point to the file,
right click, select “Scan with OfficeScan client”)
If OfficeScan still says “No security risk was found”,
submit the file to www.virustotal.com to be evaluated
by 39 anti-virus products, including Trend Micro;
here’s an example:
virustotal.com/analisis/b299e2ac8871cd3e511db312d3f3e55d
31
Evaluating attachments





If it is still undetected and obviously malicious because
of the email it was attached to, submit it K-State’s IT
security team at
www.k-state.edu/its/security/report/ so we can send it
to Trend Micro for analysis
Contact the sender to verify they sent it
Ignore or delete it if it’s not expected or important
Beware of executable files embedded in .zip
attachments – is a common way for hackers to send
.exe files that would normally be deleted by email
systems
Potentially dangerous file types include .exe, .zip
(depending on file types in the .zip archive), .msi, .pif,
.scr, .js, and even.pdf and (rarely) .doc
32
Example of malicious
email attachments





Monday, July 13, 12:59pm – received first report
(from Penn State) that a K-State computer was
sending spam with a malicious attachment
Many more reports soon followed from around the
world implicating many K-State IP addresses
Many K-Staters started reporting receipt of the
malicious emails too
At least113 K-State computers were
infected/compromised when people open the
malicious attachment
Was a new variant of malware so Trend Micro
OfficeScan did not detect it initially
33
What happened?

Four different emails with the following subjects:





Three (somewhat) different attachments:




Shipping update for your Amazon.com order 254-78546325-658742
You have received A Hallmark E-Card!
Jessica would like to be your friend on hi5!
Your friend invited you to twitter!
Shipping documents.zip
Postcard.zip
Invitation card.zip
At least three different malicious executables in the zip files (note the
numerous spaces in the file name before the “.exe” extension):



“attachment.pdf
“attachment.htm
“attachment.chm
.exe”
.exe”
.exe”
34
What happened?



Harvested email addresses in address
books and sent the same malicious emails
to everyone – aka “mass mailing worm”;
that’s why so many people at K-State
received so many copies
July 29 and August 7 - similar attacks with
new variants of the malware that escaped
anti-virus detection
AGAIN (!!) on Nov. 5 – same four emails,
new variant of malware, infected 130+ KState computers
35
Why was it so effective?

Used familiar services











Amazon.com
Hallmark eCard greeting
Twitter
Sensual enticement (“Jessica would like to be your friend on hi5!”)
Somewhat believable replicas of legitimate emails
Sent it to lots of people (bound to hit someone who just ordered
something from amazon.com or is having a birthday)
Effectively masked the name of the .exe file in the .zip attachment
by padding the name with lots of spaces
New variant that spread quickly so initial infections missed by
antivirus protection
I was too slow submitting samples to Trend (better the second and
third time around)
Malware/attachment filtering in Zimbra did not stop it
Been a long time since attack came by email attachment so people
caught off-guard
36
Malicious
Hallmark
E-Card
37
Legitimate
Hallmark
E-Card
38
Malicious
Amazon
Shipping
Notice
39
Legitimate
Amazon
Shipping
Notice
40
Malicious
Twitter
Invitation
41
Legitimate
Twitter
Invitation
42
What can we do?





Remember - Hallmark, amazon.com,
Twitter, etc. do not send info in
attachments
Don’t open attachment unless you are
expecting it and have verified with sender
Analyze attachments before opening them
Think before you click
Be paranoid!
43
Reporting scams

Send spear phishing scams that target KState specifically to abuse@ksu.edu



Send them with “full headers” (in webmail:
highlight message, right click, select “Show
Original”, copy everything in resulting
window and paste into email to
abuse@ksu.edu)
To get full headers in other email clients:
www.haltabuse.org/help/headers/index.shtml
Don’t send generic run-of-the-mill scams
to abuse@ksu.edu unless it’s something
particularly threatening to K-Staters
44
Reporting scams


Submit suspicious files/attachments to
www.k-state.edu/its/security/report/
(don’t try to send them in email since they
may get filtered)
Can report scams/fraud/crimes to federal
government:



FBI’s Internet Crime Complaint Center
www.ic3.gov/
FTC’s OnGuardOnline www.onguardonline.gov/file-complaint.aspx
ALWAYS report suspected child pornography
to the police (K-State or Riley County)
45
Useful sources of information






Google – search for unique phrase in the suspected scam
to see what others are reporting about it
Web sites of organization targeted by scams often have
information, like the IRS
www.irs.gov/privacy/article/0,,id=179820,00.html?portlet=1
Snopes to debunk/confirm hoaxes, rumors, and other
“urban legends” – snopes.com
Teach yourself with Sonicwall’s “Phishing and Spam IQ
Quiz” – www.sonicwall.com/phishing/
K-State’s IT security web site updated regularly
SecureIT.k-state.edu
Current threats and spear phishing scams posted on KState’s IT threats blog threats.itsecurity.k-state.edu/
46
What’s on your mind?
47
Download