Top Banner
Phishing, Bot Herding, and Other Emerging Cyber Terms
29
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Phishing, Bot Herding, and Other Emerging Cyber Terms.

Phishing, Bot Herding, and Other Emerging Cyber Terms

Page 2: Phishing, Bot Herding, and Other Emerging Cyber Terms.

2

Sophos: “Sharp increase in web-based

malware this year”

The number of websites Sophos was blocking

jumped from about 5,000 per day a year ago to

29,700 by this Spring

SC Magazine, July 26, 2007

Page 3: Phishing, Bot Herding, and Other Emerging Cyber Terms.

3

The annual loss due to computer crime was

estimated to be $67.2 Billion for U.S. organizations,

with the majority of that ($49.3 billion) being related

to Identity Theft, and $1 billion associated

specifically with phishing.

U.S. GAO Report to Congressional Requesters (GAO-07-705), titled “CYBERCRIME: Public and Private Entities Face Challenges in Addressing Cyber Threats”

- June 2007

Page 4: Phishing, Bot Herding, and Other Emerging Cyber Terms.

4

Agenda

Phishing

Spear Phishing

Whaling

Pharming

Botnets

Bot Herding

Page 5: Phishing, Bot Herding, and Other Emerging Cyber Terms.

5

What is “Phishing”?

Phishing is nothing more than social engineering.

Definitions:

– Social Engineering: the practice of obtaining confidential information by manipulating users.

– Phishing: spoofed email messages and websites designed to fool recipients into divulging personal financial information

Phishing is set apart by the broad scale and low cost afforded by the Internet and its on-line anonymity.

Page 6: Phishing, Bot Herding, and Other Emerging Cyber Terms.

6

How to Spot a Phish

Language that is informal or uncharacteristically unprofessional for the size of the apparent institution

– Look for misspellings and typos– Look for missing words and unpolished grammar

Urgent instructions to take specified action

– “Click on the link or your account will be closed”– “Supply requested details to remove this charge from your

credit card …”– “You will not be able to access your <your bank name>

account without <your bank name> Online Banking Tool after …”

Page 7: Phishing, Bot Herding, and Other Emerging Cyber Terms.

7

How to Spot a Phish (cont’d)

Generic greeting

– Messages beginning with “Dear Member” or “Valued Customer” are likely phish attempts.

– Legitimate business emails are far more likely to address you by name.

Request leaves you feeling something is not right

– Most financial institutions and service providers will NEVER contact you by telephone or email to ask you for your sensitive account details

– You don’t even have an account with the company the email appears to have come from

Page 8: Phishing, Bot Herding, and Other Emerging Cyber Terms.

8

How to Spot a Phish (cont’d)

Overt offer to download software

– Banks will virtually never ask you to download and install software.

– NEVER respond to a solicitation to download and install software without first independently validating the source.

“Mouse over” any hyperlink in your email

– While not foolproof, a mismatch between the hyperlink text and the address shown in the status bar is a give-away.

Page 9: Phishing, Bot Herding, and Other Emerging Cyber Terms.

9

How to Spot a Phish (cont’d)

Phishing attacks ultimately want to draw you to a web page

– Web page may install malicious software on your PC, without your knowledge or any action on your part.

– Web page may request you provide sensitive information on web forms.

What signs suggest a web page may not be what it seems?

– Browser padlock icon is not “locked” and/or web page address begins “http” instead of https”

– Web site suggests that a displayed, 3rd party icon proves security. TRUSTe, for example, is just a service to certify privacy practices … nothing more.

Page 10: Phishing, Bot Herding, and Other Emerging Cyber Terms.

10

Spear Phishing

Works much like phishing, but source is well-known, trusted, and intent is to gather information about corporate systems accounts.

– Example: Email received from the CIO, saying IT is conducting an account audit, and you must cooperate per instructions or face disciplinary action.

– “Spear phishing is a pinpoint attack against some subset of people (users of a website or product, employees of a company, members of an organization) to attempt to undermine that company or organization.” [1]

1 Spear Phishing, May 9th, 2007, By Stephen Northcutt (http://www.sans.edu/resources/securitylab/spear_phish.php)

Page 11: Phishing, Bot Herding, and Other Emerging Cyber Terms.

11

Whaling

If spear phishing is a specifically targeted phishing attack, then “whaling” is a very narrowly focused spear phishing attack.

– Focuses upon a very small group of senior personnel within an organization and tries to steal their credentials.

– Example: A CD, delivered via normal postal mail systems, supposedly containing evaluation software from a known supplier to the CIO, but containing a hidden malware installer.

Description and example from “Spear Phishing and Whaling,” June 28, 2007, Posted by Gunter Ollmann (http://blogs.iss.net/archive/SpearPhishing.html)

Page 12: Phishing, Bot Herding, and Other Emerging Cyber Terms.

12

Pharming

Pharming is an attack intended to trick a web user into landing on a false copy of a desirable web site.

– Internet routing instructions are altered either at the user’s PC or at their Internet Service Provider.

– Even by manually typing a web address you know to be accurate, you might be misrouted to a close or exact copy of what you expected to see.

Newer web browsers have features to help identify suspicious web sites.

Beware of any changes to the logon screen. If you are asked for anything out of the ordinary, do not enter ANY information.

Page 13: Phishing, Bot Herding, and Other Emerging Cyber Terms.

13

Pharming (cont’d)

The ‘hosts’ file -- C:\WINDOWS\system32\drivers\etc

Page 14: Phishing, Bot Herding, and Other Emerging Cyber Terms.

14

Test Yourself . . .

Page 15: Phishing, Bot Herding, and Other Emerging Cyber Terms.

15

Test Yourself . . .

Page 16: Phishing, Bot Herding, and Other Emerging Cyber Terms.

16

Page 17: Phishing, Bot Herding, and Other Emerging Cyber Terms.

17

Page 18: Phishing, Bot Herding, and Other Emerging Cyber Terms.

18

Page 19: Phishing, Bot Herding, and Other Emerging Cyber Terms.

19

Page 20: Phishing, Bot Herding, and Other Emerging Cyber Terms.

20

Page 21: Phishing, Bot Herding, and Other Emerging Cyber Terms.

21

Page 22: Phishing, Bot Herding, and Other Emerging Cyber Terms.

22

What Can We Do?

Do not provide personal information or information about your organization to unknown persons.

Do not reveal personal or financial information in E-mail.

Don't send sensitive information over the Internet before checking a Website's security.

If you are unsure whether an E-mail request is legitimate, try to verify it by contacting the company directly, calling the number on your financial statements or on the back of your credit card.

Page 23: Phishing, Bot Herding, and Other Emerging Cyber Terms.

23

Other Resources

U.S. Federal Trade Commission's "How Not to Get Hooked by a ‘Phishing’ Scam": http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/alt127.shtm

U.S. Computer Emergency Readiness Team's Cyber Security Tip, "Avoiding Social Engineering and Phishing Attacks": http://www.us-cert.gov/cas/tips/ST04-014.html

Page 24: Phishing, Bot Herding, and Other Emerging Cyber Terms.

24

Botnets

“Generally used to refer to a collection of compromised computers (called zombie computers) running programs, usually referred to as worms, Trojan horses, or backdoors, under a common command and control infrastructure.” [1]

Common Botnet uses:

– Distributed Denial of Service (DDoS)– Email spam– Adware/spyware– Click fraud

1 Botnet definition, Wikipedia.org (http://en.wikipedia.org/wiki/Botnet)

Page 25: Phishing, Bot Herding, and Other Emerging Cyber Terms.

25

Anatomy of a Botnet

Introducing the cast members:

Bot-herder or Bot-master: amasses thousands, or hundreds of thousands of bots/zombies for hire

Trojan software: used to compromise and control victim PCs

Victim: owner/user of a computer that is compromised with Trojan code and turned into a zombie

Cyber-criminal: pays bot-herders large sums of $$ for the nefarious use of their botnets

Page 26: Phishing, Bot Herding, and Other Emerging Cyber Terms.

26

Page 27: Phishing, Bot Herding, and Other Emerging Cyber Terms.

27

What Can We Do?

Protect your PC

– Apply operating system and other software patches.– Install antivirus and antispyware software (and maintain

subscriptions to updated definition files).– Install (or enable) personal PC firewall software.– Be cautious when opening email attachments (open only

expected attachments).– Be cautious when clicking on hyperlinks in emails and web

pages.– Use a “phish aware” web browser.

Page 28: Phishing, Bot Herding, and Other Emerging Cyber Terms.

28

FBI’s “Operation Bot Roast”

“More than 1 million computers - possibly yours, too - are used by hackers as remote-controlled robots …”

“What was viewed seven years ago as a kind of prank to boot people off-line has evolved into schemes to defraud people by stealing credit card and Social Security data, by crashing retail Web sites and through "pump-and-dump" online stock deals.”

Recent busts of botnet hackers, as part of the FBI's "Operation Bot Roast" sting:

– James C. Brewer, of Arlington, Texas … indicted … on charges of infecting more than 10,000 computers globally.

– Robert Alan Soloway of Seattle … for allegedly using botnets to send out millions upon millions of junk e-mails since 2003.

– Jason Michael Downey, of Covington, Ky … accused … of flooding his botnet-linked computers with spam for an 11-week period in 2004.

Page 29: Phishing, Bot Herding, and Other Emerging Cyber Terms.

29

Questions?