Presentation is loading. Please wait.

Presentation is loading. Please wait.

Michael McDonnell GIAC Certified Intrusion Analyst Creative Commons License: You are free to share and remix but you must provide.

Similar presentations

Presentation on theme: "Michael McDonnell GIAC Certified Intrusion Analyst Creative Commons License: You are free to share and remix but you must provide."— Presentation transcript:

1 Michael McDonnell GIAC Certified Intrusion Analyst Creative Commons License: You are free to share and remix but you must provide attribution and you must share alike. Hackers in the Library

2 Website Shutdown Library Website Shutdown by Hacker

3 ILS Server ILS Server Hacked This isn't exactly true: Unix isn't any more or less hacker friendly than any other OS (not at this level of discussion). Beware, this opinion is expressed in the L.I.S. literature (but contradicted in I.T. Literature). Don't play the blame game... come up with a defense-in-depth strategy instead.

4 Phonelines Library Phonelines Hacked

5 Library of Congress Even Library of Congress was Hacked

6 More And More...

7 Many Many Library Hacks: Old & New

8 This talk covers 3 Kinds of Library Cybersecurity Case Study Libraries as unique targets Libraries as attractive targets Trends in cybercrime 1 2 3

9 Shezaf (2008) Libraries 2 nd Most Libraries fit into the 2 nd Most Hacked Organization Type Libraries

10 Unique Libraries can be Unique Targets Public Access Computers + Lots of Users + Private Records for Large Populations + Lots of Bandwidth + Access to Valuable Licensed Information

11 Defacement PAC Desktop Wallpaper Defacement defacementPAC station A politically motivated defacement of PAC station desktop wallpaper. The regular wallpaper was used to provide instructions for use of the PAC and was locked down.

12 HOWTO Helpful HOWTO on Library Hacking

13 Ezproxy Password Fans

14 Academics and Doctors Proxy Academics and Doctors Dedicated to Hacking Libray Proxy Servers

15 why Forums show why libraries are being targeted

16 Typosquatting Virtual Reference popular mispellings Typosquatters have websites with popular mispellings for names content from In 2006 several cybersquatters displayed content from and links back to Is that GOOD thing or a BAD thing?

17 Overdue Notice Student Sent a Prank Overdue Notice First overdue notice: According to our records, the following library material is overdue. Please renew or return as fines may be accruing. Currently you owe $ If you do not pay by 10/10/2008, your University degree will be immediately revoked. If you wish to renew, you may do so using this link to My Account at Contact the circulation desk at the above library if you have any questions. Thank you. 1 call number:Z 699 A1 A61 v ID: $30.00 Annual review of information science and technology. [Washington, etc.] American Society for Information Science [etc.] due:8/31/2008,23:59 2 call number:Z 699 A1 A61 v ID: $21.00 Annual review of information science and technology. [Washington, etc.] American Society for Information Science [etc.] due:8/31/2008,23:59....

18 Patron Records Library Patron Records Exposed

19 Attractive Libraries are Attractive Targets Lots of Bandwidth + Lots of Users + Open Networks + Weak I.T. Practices

20 Defacers Museum Turkish Defacers Attack Museum Greeting Cards

21 Spam Link Injection Wordpress Spam Link Injection

22 Library GIS Station Hacked

23 excessive bandwidth An unpatched server was compromised and used to distributed 20 GB of videos with French language titles. The problem was discovered when the server was blocked for excessive bandwidth usage. ? Hacked to Serve Illicit French Movies

24 French Puppet Videos! French Puppet Videos The server was distributing 20 GB of French Puppet Videos. The cleanup time was 7 hours. If they had just asked we would have probably found someone to host the videos for them!

25 Cybercrime Trends in Cybercrime Will Affect Libraries Every factor already mentioned + Hacker's desire to make money

26 Money Hackers are motivated by Money Defacement –Propaganda –Bragging Rights –Reputation Hijacking –Ad Revenue Stealing Sensitive Info –Ransom –Direct Financial Gain –Information Leaks –Enable other Attacks Types of Cyberattacks by Volume Shezaf (2008)

27 Phonelines Library Phonelines Hacked

28 Phishingphishing Phishing & Spear-phishing From: To: Subject: (TRANSFER CONTACT) My Dear, It`s me Mrs. Anita Johnson Ross, please I have been waiting for you to contact me regarding your willed fund of ($3,500,000.00) (Three million five hundred thousand dollars) but i did not hear from you since the last time. Well I finally went and deposited the fund in a bank, as I will be going in for an operation any moment from now. I hope you are aware that I have been diagnosed for cancer about 2 years ago, that was immediately after the death of my husband before I was touched by God to donate from what I have inherited from my late husband to you for the good work of God than allow my relatives to use my husband hard earned funds ungodly. What you have to do now is to contact the Bank as soon as possible to know when they will Transfer the money to you to start the good work of the lord as initially arranged, and to help the motherless less privilege also for the assistance of the widows according to (JAMES 1:27). For your information, I have paid all the Charges, Insurance premium and Clearance Certificate showing that it is not a Drug Money or meant to sponsor Terrorism in your Country. The only money you have to send to the Bank is the account opening fee due to my method of deposit. Again, don't be deceived by anybody to pay any other money except account opening charges. Please kindly contact the bank on Tel: /Fax: OR via with your full names contact telephone/fax number and your full address and tell them that I have deposited the sum of ($3,500,000.00) in the Unit account of the bank and you are the present beneficiary to the sum. I will inform the bank immediately that I have WILL-IN that amount to you for a specific work. Let me repeat again, try to contact the Bank as soon as you receive this mail to avoid any further delay and remember to pay them their account set up fee for their immediate action. I will also appreciate your utmost confidentiality in this matter until the task is accomplished as I don't want anything that will jeopardize my last wish. Also I will be contacting you by as I don't want my relation or anybody to know because they are always around me. Yours Faithfully, Mrs. Anita Johnson Ross

29 gets paid $$$ The cyberbrowse owner gets paid $$$ when people view or click on ads. DNS servers poisoned misdirect browsers We found that Big Public Library's DNS servers were being poisoned to misdirect browsers to the cyberbrowse website DNS Poisoning

30 How DNS Works Your PC Your DNS Server Hotmail's DNS Server What is the IP for What is the IP for Get the webpage from The IP is The IP for is DNS Cache 4 Remember Is

31 How DNS Poisoning Works Your PC Your DNS Server HostileDNSServer What is the IP for The IP for Is !!! Get the webpage from The IP for is DNS Cache 2 Remember Is Hotmail's DNS Server

32 Cyberbrowse attack was widespread others suffered In 2003, others suffered from the cyberbrowse DNS Poisoning mistook the attack Many mistook the attack for a problem with their own computers under attack for months I spoke with Shaw Bigpipe and confirmed that they were under attack for months but didn't know it was an attack.

33 The Crimeware Supply Chain How SPAM Makes Money How SPAM Makes Money Viruses create botnets (networks of thousands of slave computers) Botnet owners pay to have viruses distributed Spammers pay botnet owners to send spam But spamming requires accounts, which are protected by CAPTCHAs Botnet owners pay CAPTCH breakers How Credit Card Theives WorkHow Credit Card Theives Work Viruses steal credit card and identity info Card information is sold to others Carders use stolen cards to purchase items R ers ensure shipped items can be obtain Stealing from your Bank AccountItems may be sold Stealing from your Bank Account Banks accounts are broken into Money Mules accept payments to their own accounts and then pay the theives

34 CAPTCHAs Breaking CAPTCHAs Pays From Dancho Danchev's Blog: $2/1000 This pays about $2/1000 CAPTCHAs broken occording to a presentation at OWASP 3.0

35 Affiliate Marketing Affiliate Marketing Pays for Viruses

36 Cybercrime has grown to include complete supply chain management

37 Questions? me: Slides:

38 virusNOT No virus news is NOT good news ProblemsProblems Old anti-virus programs cannot detect the latest types of viruses Viruses released today cannot be detected until tomorrow Viruses come in clusters: you might only detect on when you are infected with 5 No anti-virus program can detect all viruses SolutionsSolutions Update your anti-virus software, not just the definitions Peform a full-antivirus scan every few days Completely reformat any computer on which a virus is detected Scan with several different online scanners (f-secure, trend at home, stinger).

39 Questions Asked Questions: What are the top 3 things we can do today to secure our networks Answers: 1) Keep your anti-virus up-to-date (both definitions & software) and do nightly or weekly scans (see next slide) Use separation of concerns in your network: separate (physically or virtually) those things that do not need to access each other. Use different passwords for every web application instead of a shared one. Make sure that servers that don't need to connect cannot connect. Automated Monitoring (I failed to give this as an example, but it my biggest ally). This means a lot of things from testing if servers and services are up to monitoring and charting bandwidth, CPU, and RAM usage. Anomolies are a very strong way to determine if you have a security issue

Download ppt "Michael McDonnell GIAC Certified Intrusion Analyst Creative Commons License: You are free to share and remix but you must provide."

Similar presentations

Ads by Google