FBI Malware Overview - EDUs

Slides:



Advertisements
Similar presentations
Its a new digital world with new digital dangers….
Advertisements

LEADS Law Enforcement Agencies Data System
Introduction and Overview of Digital Crime and Digital Terrorism
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Sixteen Police Technology Hi-Tech Crime.
C YBER T HREATS AND R ESPONSE Unclassified Continuity Insights Conference Chicago June 18-19, 2013.
2 Language of Computer Crime Investigation
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Cyber Crime The current threat to the UK Security Marking.
Mohd Taufik Abdullah Department of Computer Science
Computer and Internet Crimes By: Tracey Ross & Tommy Brown.
1. 2 A High Tech Crime Investigation Lessons learned by the National High Tech Crime Center Hans Oude Alink, project leader NHTCC November 2005.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
CRIMINAL JUSTICE A Brief Introduction, 5/E by Frank Schmalleger ©2004 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Police.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Norman SecureSurf Protect your users when surfing the Internet.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
BotNet Detection Techniques By Shreyas Sali
Federal Bureau of Investigation
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
FBI’s InfraGard.
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
 a crime committed on a computer network, esp. the Internet.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CYBER CRIME.
The “3 P’s” of Senate Bill 75 Prosecution Prevention Protection.
FBI Cyber Presentation
Viruses Articles Article 1 - Computer virus hits second energy firm Article 2 - Online bank robbers face.
BOTNETS Presented By : Ramesh kumar Ramesh kumar 08EBKIT049 08EBKIT049 A BIGGEST THREAT TO INERNET.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
FBI and Cyber Crime FBI’s cyber mission: Stop those behind most serious computer intrusions and the spread of malicious code To identify and thwart online.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
Johannes Hassmund (2009), Project Report for Information Security Course, Linkoping University, Sweden. Speaker : Hung-Jen Chiang Studying IDS signatures.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 Fighting cybercrime in 2009 Magnus Kalkuhl, Senior Virus Analyst Kaspersky Lab ITU-T.
Topic 5: Basic Security.
Objectives SWBAT Identify the various procedures in the enactment, implementation, and enforcement of law SWBAT compare responsibilities, jurisdictions,
Investigating Sophisticated Security Breaches Digital Forensics has proven tough in the age of sophisticated Intruders.
Computer Skills and Applications Computer Security.
Pacific Northwest Digital Government Summit Security – How Much is Enough? June 20, 2006 SA Kenneth A. Schmutz.
Ned Einsig III.  Domestic Intelligence & Security Service of the United States  Prime Federal Law Enforcement Organization  Jurisdiction on over 200.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
FBI Phoenix Computer Crime Squad SA Tom Liffiton 10/23/2003 Maricopa Association of Governments Telecommunications Advisory Group.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
 Computer Network Attack  “… actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers.
Crown capital management international relations International Affairs.
crimes-report
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Federal Bureau of Investigation
Melissa McBee Anderson Ethan Via Federal Bureau of Investigations
Data Compromises: A Tax Practitioners “Nightmare”
Malware CJ
Security.
Crime Lab Agencies.
Confronting Cyber Threats: Cybersecurity from the FBI’s Perspective
Electronic Surveillance, Post 9/11
Chapter # 3 COMPUTER AND INTERNET CRIME
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
Presentation transcript:

FBI Malware Overview - EDUs Vincent J. Rowe, Intelligence Analyst Andy Czyzewski, Intelligence Analyst FBI Cyber Division Washington, DC UNCLASSIFIED

Overview FBI’s mission Intelligence initiatives Analysis objectives Cycle of malicious code Case Studies: FooNet, Mytob Implications for universities (“EDUs”) Questions UNCLASSIFIED

FBI’s Priorities 1. Protect the US from terrorist attack. 2. Protect the US against foreign intelligence operations and espionage. 3. Protect the US against cyber-based attacks and high-technology crimes. 4. Combat public corruption at all levels. 5. Protect civil rights. 6. Combat transnational and national criminal organizations and enterprises. 7. Combat major white-collar crime. 8. Combat significant violent crime. 9. Support federal, state, county, municipal, and international partners. 10. Upgrade technology to successfully perform the FBI's mission. UNCLASSIFIED

FBI Cyber Division Mission Stop those behind the most serious computer intrusions and the spread of malicious code Identify and thwart online sexual predators who use the Internet to meet and exploit children and to produce, share, or possess child pornography Counteract operations that target U.S. intellectual property Dismantle national and transnational organized criminal enterprises engaging in Internet fraud. UNCLASSIFIED

Analysis Objectives What is the author’s skill level? What does the code do? What OSs are affected? When was it written? Who wrote the code? What is the purpose? What contacts does the subject have? What type of connection did he make? UNCLASSIFIED

Cycle of Malicious Code UNCLASSIFIED

Harvesting Phase From January to April over 75 pieces of malcode were released into the wild MyDoom (15), Netsky (30), and Beagle (30) Mass mailing worm arrives as attachment Establish listen threads on TCP ports Creates a notification thread that will contact to a remote site Enables the intruder to download and execute arbitrary files Forensic analysis revealed an online war of words between the authors Economic damage was estimated at over 100 billion worldwide Vendors estimated that MyDoom was the most successful (450k compromised) Targeting SCO with a DDoS masked the author’s true intention UNCLASSIFIED

Harnessing Phase The next phase is to herd the victimized systems into a botnet by gaining unauthorized access left behind by the worm infections Backdoor command and control software is then executed on the victimized system from the holes left behind by the worms Allows the intruder to remotely control a compromised system and perform: Download/execute files Deliver system/network info to the author Harvest email address Act as a proxy Host phishing pages UNCLASSIFIED

Execution Phase The victimized boxes are herded into a botnet to launch DDoS attacks DDoS attacks are used extort money out of victim companies to have access to the Internet Botnets can be used as a platform to launch next-generation malware Botnets can be sold to spammers Info resides on the compromised system is stolen and sold to different organized groups Credit card info Social security numbers Banking login ID and passwords Corporate secrets UNCLASSIFIED

Case Study: FooNet In January 2003, an FBI investigation centered around a group of individuals launching DDoS attacks Forensic analysis of victims’ logs lead the FBI to UK subject using an IRC channel hosted by FooNet Individuals from this group launched numerous DDoS attacks, driving victims to FooNet for protection UNCLASSIFIED

Case Study: FooNet (cont) UNCLASSIFIED

Case Study: FooNet (cont) UNCLASSIFIED

Case Study: FooNet (cont) FBIHQ coordinated with New Scotland Yard on the arrest and interview of the UK subject Implicated the owner of a webhosting provider in Columbus, OH UK subject commanded an army of 20,000-50,000 bots SDbot and Agobot UNCLASSIFIED

Case Study: FooNet (cont) Columbus subject owned and operated a web hosting provider in his home, with some legitimate clients On February 14, 2004, “Cyber St. Valentine’s Day Massacre,” the FBI executed a search warrant on FooNet Over 299 systems were seized, the largest takedown in FBI cyber history UNCLASSIFIED

Case Study: FooNet (cont) UNCLASSIFIED

Case Study: FooNet (cont) Through forensic analysis and interviews with the subject, the FBI determined that FooNet administrators hired DDoS henchmen to knock entities off the Internet The group had about 20 members that design, develop, and test code UNCLASSIFIED

Case Study: Mytob Computers affected: CNN, ABC News, The New York Times, the U.S. Senate, the Centers For Disease Control and Prevention, Daimler Chrysler and U.S. Immigration and Customs Enforcement and others Writer was paid to create malware Likely profit motive for deployment UNCLASSIFIED

Case Study: Mytob (cont) Cooperation: FBI, law enforcement in Morocco and Turkey, and Microsoft Farid Essebar, 18, a Moroccan national born in Russia who went by the screen moniker "Diabl0" Atilla Ekici, aka "Coder," a 21-year old resident of Turkey Local prosecutions UNCLASSIFIED

Why Universities (EDUs)? EDU networks are targeted in order to carry out further attacks (botnets, host phishing, test malware, etc) Large volume of networked computers Significant Internet presence (“wired”) High bandwidth EDU networks hold large amounts of valuable data (SSNs) that can be trafficked UNCLASSIFIED

EDUs/Law Enforcement Success A university experienced a DDoS attack Administrators and tech professionals gathered information They forwarded the information to their local FBI field office UNCLASSIFIED

EDUs/LE Success (cont) FBI opened an investigation University provided information critical in locating the perpetrator Further investigation revealed that others were involved in the attack Other schools were also victimized Investigation continues UNCLASSIFIED

What Can EDUs Do? Report intrusion incidents to your local FBI field office Participate in your local Infragard chapter Once established, maintain contact with your local FBI cyber personnel Proactive UNCLASSIFIED

Questions? IA Vince Rowe Vincent.Rowe@ic.fbi.gov IA Andy Czyzewski Andrew.CzyzewskiJr@ic.fbi.gov UNCLASSIFIED