Special Agent Chris Buechner (cbuechner@fbi.gov) Denver FBI Computer Analysis Response Team CART Computer Crime Before and After the Attack Cyber Investigations • Computer Crimes • Before you’re a Victim • When You’re a Victim Are you a victim? • • • • • • What type of victim are you? How do you know you’re a victim? How to protect the information Getting your system back up Who should you contact Who are the hackers/crackers What type of Victim • System hacked – Gain information – Gain band width – Revenge (insider) • Silent host – Capture additional sites – Cover tracks How do you know you’re a victim? • Logs show unauthorized access – Telnet – Ftp • Creation of new accounts • Loss of computer resources – DOS (denial of service) • New files and directories appear • Information on system, made public – Grades, salaries, personnel information, credit card information Protect the information • Take computer off line • Determine the location of the attack – What if any information was taken – The identity of the attackers – Methods of intrusion used Getting system back online • Replace the computer if possible • Make a copy of system files • Restore the backups from trusted source – Backups may have back doors installed • Install all upgrades and patches Who should you contact • Local law enforcement vs. the feds – Local law enforcement • • • • Can better handle juveniles Lower thresholds for prosecution Minimal resources Limited by boundaries – The feds • • • • Unlimited resources Nationally and International coverage No juvenile system Minimum threshold for prosecution When you make contact • Do not make contact from compromised system • Have procedures in place to control the situation • Select one individual to control and maintain evidence • Maintain log of costs and steps taken in the process THREATS THREATS Hacker/Cracker Criminal Profiles • • • • Majority are white males THIS is changing... 16-40! Most likely 16-26 Interview: most will go as far as they THINK you know. Often ask for counsel. • Very loyal to friends - to a point Hacker/Cracker Criminal Profiles • Ego maniacs • Socially withdrawn • Generally still don’t understand Law Enforcement Are WE catching the really GOOD ones? METHODS OF ATTACKS Dumpster diving Brute force hacking Social engineering Data scope programs Sniffer programs IP spoofing DDOS “To Watch” Sites/Lists • Sites: – antionline.com, wired.com, 2600.com, rootshell.com, csu.purdue.edu/coast/, etc. • Newsgroups/Lists: – Bugtraq, NTbugtraq, Best of Security (BoS) – CERT.org – alt.security, comp.security.misc, etc. • Tools (www.network-tools.com) Before you’re a Victim DEVELOP A PLAN! Preparation • Post warning banners: – Every system should display banner • Display at every login – at every port accessed – FTP, Telnet • System is property of your organization • System is subject to monitoring • No expectation of privacy while using system – Management and legal counsel should approve – DO NOT reveal system purpose/OS/etc Preparation • Be Proactive to Prevent Incidents – – – – Establish Security Policy Monitor and Analyze Network Traffic Assess Vulnerabilities (System Scans) Configure Systems Wisely • Limit Services (FTP/telnet) • Patches – Establish Training for Employees Preparation • Establish Policy on Employee Privacy – Email: Owned by Corp. or Employee – Data Files – Encryption okay? • Keys • Disgruntled Employees Preparation • Establish Organizational Approach to Intrusions (2 ways) – Contain, Clean and Deny • STOP Intruder. Remove system from Net • Repair System and block access • IP Filtering, Firewalls, etc. Preparation • Establish Organizational Approach to Intrusions – Monitor and Gather Information • Fishbowl • Proceed with Caution Preparation • Policy for Peer Notification – DDOS • Remote Computing – Telecommuters • Laptop Privacy (temps, contractors too) – Acceptable Use Policy (Sign Yearly) – Revoke Access when no longer required – Log Remote Access (Radius/Caller ID/Remote Callback) Preparation • Develop Management Support • Develop a Incident Response Team – Assign Specific Duties • Call - duty and phone list • Legal Counsel • PR/Law Enforcement Liaison • Assign a Person to be Responsible for Incident System Preparation • System Backups – – – – Original O/S Log Files Admin Files/Applications Data • When restoring systems, be careful not to re-introduce problem System Preparation • Acquire and install some level of intrusion detection and audit capability. – Advanced Logging programs – TCP Wrappers, Tripwire, etc. • Install and configure a firewall • Monitor industry information regarding intrusions/hacker techniques The Security Investment • Recruit and hire security capable staff • Keep current on system vulnerabilities • Ensure networked systems are maintained and patched • Train administrators and users in security and protection measures • Adequate password security When you’re a Victim What the FBI can do • • • • • Combine technical skills and investigative experience National and global coverage Apply more traditional investigative techniques Long-term commitment of resources Integration of law enforcement and national security concerns • Pattern analysis • Can provide deterrent effect . . . even if hacker not prosecuted The FBI won’t: • Take over your systems • Repair your systems • Share proprietary information with competitors • Provide investigation-related information to the media or your shareholders When You’re a Victim • Stop and Think -- REMAIN CALM – Take Notes (who, what, why, where, when, how and why) – Notify appropriate persons • Supervisor • Security Coordinator • Legal Counsel • Etc – Enforce a Need to Know Policy When You’re a Victim • Communicate Wisely – Email/chat -- intruder may be listening – Use telephone/voicemail/fax/etc. – If email, use encryption or secure system • Remove system from Net When You’re a Victim • Make a Bit by Bit copy of system – Use NEW media & VERIFY the backup!! – Initial and date backup…time too – Secure in a locked limited access location • Chain of Custody • Collect other evidence in the same manner – Always preserve originals! When You’re a Victim • Best Evidence Rule – Original Drives – Bit by Bit Copy • Linux dd • Safeback – Copy of relevant files When You’re a Victim • Begin analysis to determine what happened – – – – – Work from copy Review system, firewall, router logs Look for trojan system files Look for new, suspicious users Contact ISP for additional logs and possible filtering When You’re a Victim • Start to determine cost of attack – – – – – Recovery costs Lost business Legal expenses Salaries Technical and Security Contractors • Maintain incident log and chronology When You’re a Victim • Know When to Contact Law Enforcement – Intrusions, theft, espionage, child pornography, hate crimes, and threats – Dollar losses due to intrusions exceed $5K • Law Enforcement Difficulties – keystroke monitoring and wire taps – legal restrictions (subpoena’s/orders/warrants) Final Thoughts • 2001 CSI/FBI security survey revealed: – 91% of respondents had detected security breach within last year – 64% reported significant loss due to intrusion • Any computer system is vulnerable – Through Internet or by local user Contact Us Federal Bureau of Investigation Computer Crime Squad Denver Division (303) 629-7171 (24 Hours) (303) 628-3267 (Direct) Cbuechner@FBI.gov