Top Banner
Recognizing Fraud | Staying Safe 2018 Information/Cyber Security Training Presented by: John H Rogers, CISSP Director of Advisory Services [email protected] Copyright Sage Data Security 2017-2018© All Rights Reserved
36

Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

Jul 10, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

Recognizing Fraud | Staying Safe2018 Information/Cyber Security Training

Presented by:John H Rogers, CISSP

Director of Advisory [email protected]

Copyright Sage Data Security 2017-2018© All Rights Reserved

Page 2: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

Agenda

The Internet Environment : Foundations of Knowledge

Threat Update

Recognizing Fraud

Pentucket Bank Customer Fraud Protections

Social Engineering : The Human Factor

Defense in Depth

Questions & Answers

Page 3: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

The Internet Environment

Page 4: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

• The Internet is a shared resource and securing it is ~ Our Shared Responsibility ~

• No individual, business or government entity is solely responsible for securing the Internet. Everyone has a role in securing their part of cyberspace, including the devices and

networks they use.• Individual actions have a collective impact and when we

use the Internet safely we make it more secure for everyone.

Foundational Principle

Page 5: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

Background: The Real Internet

Every two days now we create as much information as we did from the dawn of civilization up until 2003, according to Eric Schmidt of Google.

Page 6: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

Internet Analogies

• Email: lane (port) 110 receiving, port 25 for sending

• Web: lane (port) 80 for browsing, port 443 for secure browsing

US Highway SystemThink of the Internet as a 65,000+ lane highway. Each lane (actually called a “port”), of the first 1000, is assigned to a specific service:

Page 7: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

Internet Analogies

US Postal ServiceData moves through the Internet like regular mail:• Sender address• Recipient address• Datagrams

• Packets of information travel across thousands of routes to arrive at their destination and/or connection point.

Page 8: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

Internet Analogies

The Phone BookDomain Name Service (DNS, Port 53)

• First, your browser asks DNS to find the website you want to visit.

• You type a name, e.g., www.amazon.com,

• DNS knows the website's IP Address, and tells your browser, e.g., 44.248.2.125 (IP Address)

• “That website is at this address…”

Page 9: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

Threat Update

Page 10: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

Adversaries

Insider• Financial

Gain• Grievance• Targeted

Hacker• Bragging

rights• Opportunist

ic

CyberCriminal• Financial

Gain• Opportunist

ic

CyberHacktivist• Grievance• Targeted

CyberTerrorist• Political

warfare• Targeted

Page 11: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

Threats

Unauthorized Access

Disruption of Service

or Productivity

Data Leakage Data Loss Misuse of

Privilege

Page 12: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

12

Today’s Hacker – Media Fantasy

Page 13: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

13

Today’s Hacker - Reality

Page 14: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

DDoS Attack

Threat Landscape

Zero Day Vulnerability Exploit

Ransomware

Remote Access Exploits

Page 15: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

Recognizing Fraud

Page 16: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

E-mail Compromise Fraud: Schemes in which criminals compromise the e-mail accounts of victims to send fraudulent wire transfer instructions to financial institutions in order to misappropriate funds. The main types of e-mail compromise fraud include:

• Business Email Compromise• Targets a financial institution’s commercial customers

• E-mail Account Compromise• Targets personal accounts

Email Fraud

*FinCEN Advisory FIN-2016-A003 Financial Crimes Enforcement Network

Page 17: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

Email FraudStage 1 – Compromising Victim Information and E-mail Accounts: Criminals first unlawfully

access a victim’s e-mail account through social engineering3 or computer intrusion techniques. Criminals subsequently exploit the victim’s e-mail account to obtain information on the victim’s financial institutions, account details, contacts, and related information.

Stage 2 – Transmitting Fraudulent Transaction Instructions: Criminals then use the victim’s stolen information to e-mail fraudulent wire transfer instructions to the financial institution in a manner appearing to be from the victim. To this end, criminals will use either the victim’s actual e-mail account they now control or create a fake e-mail account resembling the victim’s e-mail.

Stage 3 – Executing Unauthorized Transactions: Criminals trick the victim’s employee or financial institution into conducting wire transfers that appear legitimate but are, in fact, unauthorized. The fraudulent transaction instructions direct the wire transfers to the criminals’ domestic or foreign bank accounts. Banks in Asia—particularly in China and Hong Kong—are common destinations for these fraudulent transactions.

*FinCEN Advisory FIN-2016-A003 Financial Crimes Enforcement Network

Page 18: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

*FinCEN Advisory FIN-2016-A003 Financial Crimes Enforcement Network

Email Fraud - Email Account Compromise

Scenario 1 – Lending/Brokerage Services: A criminal hacks into and uses the e-mail account of a financial services professional (such as a broker or accountant) to e-mail fraudulent instructions, allegedly on behalf of a client, to the client’s bank or brokerage to wire-transfer client’s funds to an account controlled by the criminal.

Scenario 2 – Real Estate Services: A criminal compromises the e-mail account of a realtor or of an individual purchasing or selling real estate, for the purposes of altering payment instructions and diverting funds of a real estate transaction (such as sale proceeds, loan disbursements, or fees). Alternately, a criminal hacks into and uses a realtor’s e-mail address to contact an escrow company, instructing it to redirect commission proceeds to an account controlled by the criminal.

Scenario 3 – Legal Services: A criminal compromises an attorney’s e-mail account to access client information and related transactions. The criminal then e-mails fraudulent transaction payment instructions to the attorney’s financial institution. Alternatively, the criminal may compromise

a client’s e-mail account to request wire transfers from trust and escrow accounts the client’s attorney manages.

Page 19: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

Email Fraud – Other Examples of Email Fraud

*FinCEN Advisory FIN-2016-A003 Financial Crimes Enforcement Network

Page 20: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

Website Fraud – Other Examples of Fraud

*FinCEN Advisory FIN-2016-A003 Financial Crimes Enforcement Network

Page 21: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

Website Fraud – Other Examples of Fraud

*FinCEN Advisory FIN-2016-A003 Financial Crimes Enforcement Network

Page 22: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

• Malicious Code: When you use personal webmail from a corporate network, you are circumventing internal controls that protect you against malicious code/viruses. Webmail services have an exponentially higher amount of fraud and infected content than corporate email systems.

• External Administration: Personal webmail sites are not “hardened” by internal IT staff, and therefore, the controls are not up to internal security standards, and are “user-configurable”.

• Accidental Exposure of sensitive or personal information - It is a common error to accidentally copy/paste sensitive information into a personal webmail message, and send it unsecured to an unintended recipient.

Personal Webmail Sites

Page 23: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

Pentucket Bank: Customer Fraud Protections

Page 24: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

Pentucket Bank Customer Fraud Protections

• Calls backs to verify wire transfer requests and ACH batch totals• Call backs using alternative communication method to answer

questions about transactions or provide confirmations• Secure messaging within the online banking portal• One-time passcodes sent to a phone for authentication• Shorter password expiration times for changes• Session timeouts • Periodic account activity assessments for Merchant Capture• Registered license keys for Merchant Capture Software

Page 25: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

Social Engineering : The Human Factor

Page 26: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

The Human Factor

Goal of Social Engineering is the acquisition of sensitive information or inappropriate access privileges by an outsider based upon the building of trusted or intimidating relationship with insiders.

Social Engineering preys on qualities of human nature:• the desire to be helpful.• the tendency to trust people.• the fear of getting into trouble.

The sign of a truly successful social engineer is that they receive information without raising any suspicion as to what they were doing.

Why We’re All Vulnerable

Page 27: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

The Human Factor• Common Attacks | Delivery Channels

o Email Phishing: Posing as a legitimate business/serviceo Vendor Spoofing: Posing as a vendor on a service callo IT/IS Spoofing: Posing as internal IT or IS department staffo Website Spoofing: Creating phony websites that appear to be

legitimateo Phone Spoofing: Caller ID

Page 28: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

Defense = Situational Awareness

“Can I call you back?”

Forward Slash,

two dots back

Am I expecting this?

Did I initiate this?

Page 29: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

Defense in Depth

Page 30: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

Foundation: Institutional Memory

• Opposite of practical knowledge, aka “Tribal knowledge.”

• Information about operations people keep in their heads.• The “real information” behind a static written procedure or

process• can walk out the door at anytime

• Cost is hard to quantify, but it is significant• Real dollars to train• Real dollars in lost productivity• Time spent updating severely outdated documents• Can cause significant disruption up to and including replacing

whole systems

Page 31: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

Foundation: Institutional Memory

• Definition: Active organizational documentation (hard copy and/or digital), including:

• Policy• Procedure• Guideline• Asset inventories• Change documentation• Network infrastructure diagrams• Data flow diagrams• Continuity of Operations Plans

• BCP/DR• IRP• Vendor Management• Pandemic

Page 32: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

Protecting Your Business (and everyone else)

Layered approach to Cybersecurity : Defense In Depth

• Perimeter preventative controls• Firewall

• Each rule documented with business purpose• Configuration backups• HA synchronization• Critical services segmentation• Daily log review• Patching and updates

• IDS/IPS• Strategic sensor locations external and internal• Network based• Regular updating

Page 33: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

Layered approach to Cybersecurity : Defense In Depth

• Perimeter preventative controls• “Zero-day” protection

• Appliance or agent based software• Daily activity review

• Multi-factor authentication for remote-access• At minimum for all administrator activity• Not to be confused with multi-layer

• Certificates• IP Restriction

Protecting Your Business (and everyone else)

Page 34: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

Layered approach to Cybersecurity : Defense In Depth

• Internal network preventative controls• IDS/IPS

• Host-based / application layer for critical services, web applications• Web/Internet filtering

• Documented approved sites• Exception list

• Data Leakage Prevention (DLP)• Removable media control• Email security• NPPI Inventory control

• Antivirus software• Central management• Updated as often as tool allows• Not configurable by users

Protecting Your Business (and everyone else)

Page 35: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

Questions and Answers

Page 36: Recognizing Fraud | Staying Safe - Pentucket Bank · 2018-05-29 · Layered approach to Cybersecurity : Defense In Depth • Internal network preventative controls • IDS/IPS •

Thank you!

Presented by:John H Rogers, CISSP

Director of Advisory [email protected]