Anti-Phishing Working Group www.antiphishing.org Internet Policy Committee Update, and Latest Phishing Trends Public Interest Registry Advisory Council.

Slides:



Advertisements
Similar presentations
ICANN SSAC, Cairo Nov 2008 Page 1 Summary of Fast Flux Dave Piscitello ICANN SSAC.
Advertisements

Supplied on \web site. on January 10 th, 2008 Customer Security Management Reducing Internet fraud June 1 st, 2008 eSAC Walk Thru © Copyright Prevx Limited.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
7 Effective Habits when using the Internet Philip O’Kane 1.
1 Identity Theft and Phishing: What You Need to Know.
Breaking Trust On The Internet
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
SGNIC’s Measures Against Domain Name Abuses 26 August 2011 Lim Choon Sai General Manager (SGNIC)
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
NewTLDs: Implications for Trademark Owners Mike Rodenbaugh Online Brand Management in the World of New gTLDs MelbourneIT Strategy Seminar November 21,
The problems associated with operating an effective anti-spam blocklist system in an increasingly hostile environment. Robert Gallagher September 2004.
Registrars and Security Greg Rattray Chief Internet Security Advisor.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Phishing – Read Behind The Lines Veljko Pejović
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
Network security policy: best practices
SiteLock Internet Security: Big Threats for Small Business.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Security Guidelines and Management
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
SEC835 Database and Web application security Information Security Architecture.
Confidential On-line Banking Risks & Countermeasures By Vishal Salvi – CISO HDFC Bank IBA Banking Security Summit 2009.
Internet Security Aspects Dr. Gulshan Rai Director Indian Computer Emergency Response Team (CERT-In) Department of Information Technology.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crimes.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
Staying Safe Online Keep your Information Secure.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Update from ICANN staff on SSR Activities Greg Rattray Tuesday 21 st 2010.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
1 Commonwealth Security Information Resource Center Michael Watson Security Incident Management Director 10/17/2008
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
What is WHOIS?. 2  Internet Protocol you can use to search registry and registrar databases and discover who registered a domain name or IP address 
Consistency in Reporting Data Breaches
1 1 The GNSO Role in Internet Governance Presented by: Chuck Gomes Date: 13 May 2010.
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Governmental Advisory Committee Public Safety Working Group 1.
.ORG, The Public Interest Registry. 2 Proprietary & Confidential What is Domain Security? Domain security is: 1) Responsibility. Any TLD should have a.
Computer Security By Duncan Hall.
U.S. Businesses Targeted Randy Wolverton Brian J. Koechner.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
THE LARGEST NAME SERVICE ACTING AS A PHONE BOOK FOR THE INTERNET The Domain Name System click here to next page 1.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
Margie Milam, Senior Director 27 March 2014 Privacy/Proxy Accreditation Survey Results.
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
Fast Flux Hosting and DNS ICANN SSAC What is Fast Flux Hosting? An evasion technique Goal of all fast flux variants –Avoid detection and take down of.
Computer Security Keeping you and your computer safe in the digital world.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Important Information Provided by Information Technology Center
Public Safety Working Group (PSWG)
Common Methods Used to Commit Computer Crimes
ISYM 540 Current Topics in Information System Management
NCUC Africa Members First Regional Webinar Ines Hfaiedh
I S P S loss Prevention.
How to Protect Yourself from ID Theft and Social Engineering
Red Flags Rule An Introduction County College of Morris
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Presentation transcript:

Anti-Phishing Working Group Internet Policy Committee Update, and Latest Phishing Trends Public Interest Registry Advisory Council March 7, 2008 Presented by Mike Rodenbaugh

Agenda Developments in Phishing/Malware Threats –Multi-level attacks –Fast-flux tactics –Phone phishing (aka vishing, to some) Ongoing concerns –Registrar accreditation and responsiveness Update on continuing APWG Policy initiatives –Registry Domain Suspension Plan –ICANN Topical items Discussion

APWG Internet Policy Committee (IPC) Approximately 50 members Participants include registries, registrars, CERTs, solution providers, ISPs, researchers, financial institutions, ICANN wonks, etc. Goal: Ensure that anti-phishing concerns are represented during the creation or modification of Internet policies

APWG Collaboration with ICANN Community APWG Presenting Phishing Issues at ICANN Meetings –APWG presented at ICANN meetings since 2005 –Collaborating with SSAC on security/stability issues Fast Flux DNS Phishing attacks against registrars –Work at constituency level on best practices and policy issues Registrar, Registry, ccNSO Whois working group.Asia suspension initiative ICANN staff and constituencies working with APWG –Presenting at APWG meetings since 2006 –Several registrars and registries have joined as members

Phishing sites continue to proliferate Methodologies of phishers changing - affecting reported site data - driven by: The success of browser blocking in IE and Firefox RockPhish and fast-flux attacks Reports handling catching up with these changes

Phishers Casting a Wider Net Many smaller banking institutions, and non-financial institutions, being targeted -- usually with a serious lack of resources to fight the problem More sophisticated attacks being employed against first time targets

Phishing is a Global Problem Top countries for hosting phish sites in November 2007 China and US in dead heat – China slightly more phish India rose significantly

Latest Phishing Trends Domain Name Phishing –Fast-Flux - not just for the big boys –IDNs (Internationalized Domain Names) Phone Phishing Large-Scale Spear Phishing –Ties to malware attacks –Targeting of companies for customer intel Registrars facilitating the problem

Fast-Flux for Phishing Increasing More Players? –Commercial systems from bot herders? –More kits seen on flux and fraud DNS networks –High volume of lures for fast-flux incidents – personalized & tracking More Targets –Attacks against traditional targets continue relentlessly –“Little Guys” hit hard with fast-flux on first ever phish Overwhelming infrastructure and personnel Losses occurring quickly – major cash-outs in short amount of time More Sophistication! –Routine blocking of monitoring efforts –Better DNS set-ups (self-defined, and use of ccTLD nameservers) –Finding and using the worst registrars to handle mitigation –Exploiting cash-outs via “holes” in overseas ATM verification systems CrimeDNS = High availability “fraud” DNS systems for hire SSAC Report (SAC 025); GNSO Issues Report forthcoming

Detecting, Killing, Preventing DNS is the key! Advice for hunters/registrars/registries Scrutinize nameservers; limit changes? –New nameservers on unusual domains/TLDs –DNS servers located on consumer netblocks –Multiple changes to nameserver IPs (double FastFlux) Examine new domain A Records in DNS –Rapid changes –Located on consumer netblocks Move daily from one to another - around the globe Multiple static entries - worldwide Can compare to known bad actors –Wildcard - all hosts resolve The 3 P’s - Policies, procedures, people - in place for quick kills

SSAC Report: possible mitigation steps Authenticate contacts before permitting changes to name server configurations. Implement measures to prevent automated (scripted) changes to name server configurations. Set a minimum allowed TTL (e.g., 30 minutes) that is long enough to thwart the double flux element of fast flux hosting. Implement or expand abuse monitoring systems to report excessive DNS configuration changes. Publish and enforce a Universal Terms of Service agreement that prohibits the use of a registered domain and hosting services (DNS, web, mail) to abet illegal or objectionable activities (as enumerated in the agreement) and include provisions for suspension of domain names that are demonstrated to be involved in fast flux hosting.

Large-scale use of IDNs in Phish ROCK leading the way in past few months –Several IDN domains mixed in with regular ROCK domains daily –Primarily on.HK with mixed scripts (Chinese, Roman) xn--randomlookingstuff-realstuff.tld –xn--askl44-2n0jx24jgq2b.hk = 我們的 askl44.hk –Three Chinese characters which translate to the pronoun "our" are placed before the "askl44” Lots of implications - especially in the ccTLD space –Can we all follow the non-mixed script recommendation? –Automate systems to flag suspicious registrations? Is that easily done technically? Policy development? Most aren’t even doing it for ASCII based system!

Phone Phishing Has Arrived Last 3 months have seen a rapid rise in phone phishing (often mis-named vishing by press etc.) –VOIP usually not being used Multiple techniques –  phone number –Phone call  website Often targeting “little” guys –Small credit unions and local banks –Local phone numbers used, local people targeted Getting good intel and target lists somewhere

Malware proliferation Change in emphasis - now Crimeware Organized crime with specialists creating sophisticated attacks Open up computers to become zombies Install keyloggers and scan for user/pass Capturing and using address books –Direct targets for sophisticated social engineering –Going after “whales” - people with high-value assets

Phishing Social Networks MySpace example –2006- Zero phish –More than 2,000 since then –Currently over 5 per day Capturing login credentials and associations to other people/affinities/companies –Use for spamming/spear phishing –Logins can be re-used by many for other services People are generally poor with password practices

Targeting of Businesses for Data Major phishing and malware groups are now targeting companies with vast stores of sensitive information –Attacks are looking for database access credentials –NOT targeting financial institutions –Particularly looking for executive staff data and HR access Growing phishing activity over past 9 months –Business data: Lexis/Nexis, Salesforce.com –Employment data (HR acct): Monster.com, CareerBuilder.com –Credit Bureaus (business access): Equifax Wide swath of major financials also targeted directly –Malware and/or phish targeted to executives –Disguised as important agencies (IRS, FTC, BBB, EEOC) –Leading directly to data breaches Attacks often use fast-flux and/or sophisticated DNS

Stolen Login Credentials Used Criminals run reports and get info on customers – addresses for spam targeting –Net-worth/value of the customer –Latest transactions/communications Implications (for registrars/registries) –Assume employees are compromised –Institute better access controls (multi-factor, IP tracing/blocking, etc) –Monitor report generation and domain changes for unusual activity

Mass-Market Spear Phishing Large-scale phishing with stolen customer data –Known good addresses –Established relationship with breached company –Social engineering mechanisms easy to create –Return address will be white-listed by many victims Personalization = high success rate –Depending on data stolen, highly personalized lures –Name, correct account #, latest transaction –Expected communications can be timed and spoofed

Phishing We’re entering a new phase with these targeted attacks More, not less in losses What do we need? –Better/faster intervention –Better access controls in place for a wider variety of data –Education beyond “don’t click on this” – and web authentication and reputation actually USED –Better control over the DNS infrastructure –Fewer security holes in software! –Basically everything we’ve been talking about for over four years now. #1 - Change in mindset – assume users are compromised - build and run systems accordingly

Registrar Risks There are several risky registrars with access to the TLD registry zones –Hiding identities/locations –No or SLOW response to abuse issues –Registrar in-a-box – no one is actually there Handing out access to criminals posing as “resellers” –No rules or requirements from ICANN on reseller accreditation –Shields financial transaction from registration process No accountability

Example: Blog.com Nice website with a great domain name No one is home! –Registrar in-a-box –US “presence” is a corporate filing in Delaware –Actual site and “owners” in Portugal Never answer abuse requests (phone, etc.) Fully-automated set-up, no humans needed –Actual service provided by Directi (India) Will suspend abuse domains eventually The latest favorite registrar for ROCK

Who’s in charge of Risky Registrars? ICANN compliance almost powerless –Often don’t even have accurate contact data –What is review process? Insurance checked? Spot checks on required support? –Mixed messages on their mission Registries cannot suspend bad actors –Must provide access to ICANN accredited registrars –Still reluctant to take action/responsibility (some changes) If no one takes responsibility –Some regulator will –Things will break - badly

Initiatives of the APWG Internet Policy Committee Accelerated Domain Suspension by Registries Influence ICANN WHOIS issues Registrar Best Practices “What to do if your site has been hacked” Phish Site “Landing page” to educate victims Collaborate with ICANN constituencies & SSAC Large-scale data study for 2007 phishing

Process Flow: Registry Suspension of Phish Domains

Accelerated Domain Suspension Plan for Registries: Update Near final for.ASIA (Afilias back-end) –Most logistics worked out after long consultation Several other ccTLD registries interested Still TBD –Accreditation agency –Accredited Intervenor list –Timeframe of registry suspension of DNS to eligible domain –Fast arbitration process for disputes –Penalties for erroneous requests

WHOIS Issues: APWG view Access needed to WHOIS by –Law enforcement –Brand owners –Third party shutdown providers The use of WHOIS in phish site remediation: Future studies – IPC will participate in ICANN framing of studies Privacy “services” and “proxies” a major concern – they make criminal site suspension much more difficult and time-consuming, especially for hacked sites using otherwise legitimate domain names.

Registrar Best Practices Goal: Provide recommendations to registrars to help them assist the anti-phishing community and make the Internet safer for all of us Focus: –Limit NS and IP changes to mitigate ‘fast flux’ crime –Evidence preservation (help LE catch the criminals) What is useful? How to preserve? Who to provide to? –Registrant screening tips to identify fraud proactively –Phishing domain takedown assistance –Provide resources to help identify malicious activities Final draft in review by registrars

“What to do if your website has been hacked by phishers” Intended to be a quick reference guide Supported by resources on the APWG website Includes feedback from the wider APWG group Nearly complete! Final feedback process underway. If you only do two things… –Ensure your software, hosting and DNS applications are all up to date with the most recent patches –Use hard-to-guess passwords

Phishing Site Landing Page Website to redirect from removed phishing sites EDUCATE people who fell for phishing lures Logistics in process –Hosted by APWG or ISP that hosted phishing site –Could we do this via Registry/Registrar? –Translated to multiple languages Concerns –Attacks (DDOS, Defacement, Drop Malware) –Potential use for evidence gathering - how?

Prototype

2007 Phishing Data Study Goal: Create an in-depth paper on phishing through 2007 that provides useful trends and commonalities to help investigation and provoke action by stakeholders Special focus on domain name system Data sets being collected from many sources Volunteers needed! –Data, data, data! –Analysis and collaborators for the study

Next APWG Meeting Tokyo, Japan May 26-27, 2008 We invite you to participate!

APWG Contacts Website: Phish Site Reporting: Membership: IPC Chair’s Discussion

Anti-Phishing Working Group IPC Initiative Update and Latest Phishing Trends Presented by Mike Rodenbaugh