Top Banner
CYBER FRAUD THE NEW FRONTIERS Albert Hui GREM, GCFA, GCFE, GNFA, GCIA, GCIH, GXPN, GPEN, GAWN, GSNA, CISA, CISM, CRISC Principal Consultant 2014 Asia- Pacific Fraud Conference November 17 th 2014 @ Hong Kong
28
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber Fraud - The New Frontiers

CYBER FRAUDTHE NEW FRONTIERS

Albert Hui GREM, GCFA, GCFE, GNFA, GCIA, GCIH, GXPN, GPEN, GAWN, GSNA, CISA, CISM, CRISCPrincipal Consultant

2014 Asia-Pacific Fraud ConferenceNovember 17th 2014 @ Hong Kong

Page 2: Cyber Fraud - The New Frontiers

WHO AM I?

• Spoken at Black Hat, High Tech Crime Investigation Association (Asia Pacific Conference), and Economist Corporate Network.

• Risk Consultant for Banks, Government and Critical Infrastructures.

• SANS GIAC Advisory Board Member.

• Co-designed the first Computer Forensics curriculum forHong Kong Police Force.

• Former HKUST Computer Science lecturer.

Albert Hui GREM, GCFA, GCFE, GNFA, GCIA, GCIH, GXPN, GPEN, GAWN, GSNA, CISA, CISM, CRISCPrincipal Consultant

[email protected]

Page 3: Cyber Fraud - The New Frontiers

FOCUS

• Cyber Fraud• External Fraud• Mechanisms and Facilitators

Page 4: Cyber Fraud - The New Frontiers

AGENDA

Overview of 2 Prominent Fraud Scenarios• Phishing / Whaling• Man-in-the-Browser

Monetization• Hacker Supply Chain• Underground Economy• Money Laundering

Cyber Security Countermeasures

Copyright © 2014 Albert Hui

Page 5: Cyber Fraud - The New Frontiers

PHISHINGFROM AN END-USER PROBLEMTO A CORPORATE PROBLEM

Page 6: Cyber Fraud - The New Frontiers

CLASSIC PHISHING SCAM:NIGERIAN LETTER

Copyright © 2014 Albert Hui

Page 7: Cyber Fraud - The New Frontiers

ADVANCED FEES SCAMIS 200+ YEARS OLD

“Spanish Prisoner” scam letter from 1905

Copyright © 2014 Albert Hui

Page 8: Cyber Fraud - The New Frontiers

PHISHING EVOLUTION

more targetedmore transparent

spear phishing

phishing

whalingpharming

Copyright © 2014 Albert Hui

Page 9: Cyber Fraud - The New Frontiers

WHALING EXAMPLE

trojanCopyright © 2014 Albert Hui

Page 10: Cyber Fraud - The New Frontiers

CLASSIC PHISHING AND WHALING COMPARED

Classic Phishing• Ridiculous contents

• Opportunistic

• Straight-forward financial scam

Whaling• Make-Believe contents

• Targeted

• Lateral compromises possible,often leads to corporate espionage

Copyright © 2014 Albert Hui

Page 11: Cyber Fraud - The New Frontiers

CYBER KILL CHAIN

Recon Weaponize Deliver Exploit Install C2 Action

Copyright © 2014 Albert Hui

Page 12: Cyber Fraud - The New Frontiers

MONETIZATIONTURNING EXPLOITS INTO CASH

Page 13: Cyber Fraud - The New Frontiers

SOME MONETIZATION POSSIBILITIES

bank accounts

computer

file server

customer data stored values(e.g. Q-coins, Taobao credit)

credit cardsCopyright © 2014 Albert Hui

Page 14: Cyber Fraud - The New Frontiers

MAN-IN-THE-BROWSER ATTACK:SPOOFED SCREENS

trojan (e.g. Zeus)Copyright © 2014 Albert Hui

Page 15: Cyber Fraud - The New Frontiers

MAN-IN-THE-BROWSER ATTACK:REAL-TIME REDIRECT

trojan (e.g. Zeus)Copyright © 2014 Albert Hui

Page 16: Cyber Fraud - The New Frontiers

FOOD CHAIN

Fraud Rings(can launder money

“safely”)

Hackers(cannot)

Copyright © 2014 Albert Hui

Page 17: Cyber Fraud - The New Frontiers

MONEY LAUNDERING

Page 18: Cyber Fraud - The New Frontiers

MONEY MULES

Copyright © 2014 Albert Hui

Page 19: Cyber Fraud - The New Frontiers

STORED VALUES

Copyright © 2014 Albert Hui

Page 20: Cyber Fraud - The New Frontiers

HACKER SUPPLY CHAIN

Anon Payment

Hacker Tools /

Bulletproof Hosting

MonetizationImplications• Sophisticated attacks now available to

non-experts

• Lower breakeven point for attacks

• More “worthwhile” targets

Copyright © 2014 Albert Hui

Page 21: Cyber Fraud - The New Frontiers

UNDERGROUND ECONOMY

Page 22: Cyber Fraud - The New Frontiers

BITCOIN FOR MONEY LAUNDERING

Dark Wallet

CoinJoin

Copyright © 2014 Albert Hui

Page 23: Cyber Fraud - The New Frontiers

HIDDEN INTERNET

Dark Net / Deep Web Silk Road

The OnionRouter

Copyright © 2014 Albert Hui

Page 24: Cyber Fraud - The New Frontiers

CYBER SECURITY COUNTERMEASURES

Page 25: Cyber Fraud - The New Frontiers

PHILOSOPHY

Defender’s Dilemma• Must secure all possible vulnerabilities

Intruder’s Dilemma• Must evade all detections

Reason’s Swiss Cheese ModelPicture from NICPLD

Copyright © 2014 Albert Hui

Page 26: Cyber Fraud - The New Frontiers

ESSENTIALS FOR DETECTING CYBER ATTACKS

• Layered defense-in-depth• Redundant security (e.g. two different brands of FWs)• Security event correlation (e.g. SIEM)• Trustworthy logging• Up-to-date threat intelligence• Security awareness and reporting channel• Incident response capability (e.g. CSIRT)

Copyright © 2014 Albert Hui

processpeople

technology

Page 27: Cyber Fraud - The New Frontiers

ANY QUESTIONS?

???

Page 28: Cyber Fraud - The New Frontiers

THANK YOU

[email protected]