CyberheistNews #5



CyberheistNews Vol 1, #5







Editor's Corner



KnowBe4




Are Users the Weak Link in IT Security?





[caption id="attachment_1367" align="alignleft" width="150" caption="Stu"]cybercrime[/caption]



I met Windows IT Pro Magazine Security Editor Jeff James at the TechEd

show in Atlanta. We discussed IT security and the fact that end-users

are now the biggest vulnerability. Then we continued the talk a few

weeks later and this is the result of the two discussions.







Jeff wrote a great article in his security blog and started out with:

"Firewalls and antivirus can only go so far. For most of 2011, the

news headlines have been filled with tales of cyberheists and security

failures... And in all likelihood there were hundreds (if not thousands)

of less well-known cyberattacks that occurred in the same timeframe but

went unnoticed or unreported. IT security seems to be a mess these days,

with even the largest and most well-financed corporations and government

organizations proven to have security defenses the consistency of

half-eaten Swiss cheese... What Sjouwerman advocates is a much more

aggressive training and education regimen for users at every company,

starting with informing users about the threat posed by phishing attempts

and how to identify and combat them." The whole article is here and

warmly recommended:


http://www.windowsitpro.com/article/security/users-weak-link-security-139572











Five Generations Of Cybercrime







It helps to understand more about the history of hacking, when you need

to defend yourself against cyber criminals. So here is your Executive

Summary.







Early hacking started when guys like Kevin Mitnick became 'digital

delinquents' and broke into the phone company networks. That was to a

large degree to see how far they could get with social engineering,

and it got them way further than expected. Actual financial damage to

hundreds of thousands of businesses started only in the nineties, but

has moved at rocket speed these last 20 years.







Generation ONE







Those were the teenagers in dark, damp cellars writing viruses to gain

notoriety, and to show the world they were able to do it. Relatively

harmless, no more than a pain in the neck to a large extent. We call

them sneaker-net viruses as it usually took some one to walk over

from one PC to another with a floppy disk to transfer the virus.







Generation TWO







These early day 'sneaker-net' viruses were followed by a much more

malicious type of rapidly spreading worms like Blaster, Sasser and

NetSky that started to cause multi-million dollar losses. These were

still more or less created to get notoriety, and showing off their

"elite skills".







Generation THREE







Here the motive moved from recognition to remuneration. These guys

were in it for easy money. This is where botnets came in, thousands

of infected PCs owned and controlled by the cybercriminal that used

the botnet to send spam, attack websites, identity theft and other

nefarious activities. The malware used was more advanced than the

code of the 'pioneers' but did not do much to cover its tracks.







Generation FOUR







Here is where cybercrime goes professional. The malware starts to

hide itself, and they get better organized. They are mostly in

eastern European countries, and use more mature coders which

results in much higher quality malware which is reflected by

the first rootkit flavors showing up. They are going for larger

targets where more money can be stolen. This is also the time where

traditional mafias muscle into the game, and rackets like extortion

of online bookmakers starts to show its ugly face.







Generation FIVE







The main event that created the fifth and current generation is

that an active underground economy has formed, where stolen goods

and illegal services are exchanged in a professional manner.

Cyber crime now specializes in different markets, that taken all

together form the full criminal enterprise. Note that because of

this, cybercrime develops at a much faster rate. All the tools are

for sale now, and relatively inexperienced criminals can get to

work quickly. Some examples of this specialization are:

1) Cybercrime has their own social networks with escrow services

2) Malware can now be licensed and gets tech support

3) You can now rent botnets by the hour, for your own crime spree

4) Pay-for-play malware infection services quickly create botnets

5) A lively market for zero-day exploits (unknown vulnerabilities).







The problem with this is that it both increases the malware quality,

speeds up the criminal 'supply chain' and at the same time spreads

the risk among these thieves, meaning it gets harder to catch the

culprits. We are in this for the long haul, and we need to step

up our game, just like the miscreants have done the last 10 years!

















Quotes of the Week









"A specialist is a man who knows more and more about less and less." - William Mayo







"A person without a sense of humor is like a wagon without springs.

It's jolted by every pebble on the road."
- Henry Ward Beecher







"You can't put a limit on anything. The more you dream, the farther

you get."
- Micheal Phelps







Please tell your friends about CyberheistNews! They can subscribe here:


http://www.knowbe4.com/about-us/cyberheist-news/









Selected Dataloss Incidents This Week







Not many people are aware of the excellent work that the people at the

www.datalossdb.org do. They gather all cyber security events and put

these in a database, free for everyone to query. Here are some selected

incidents of last week. There are a lot more, varying from records dumped

instead of shredded to stolen laptops with confidential information.







Do yourself a favor, and take a minute to review this 'Defense-In-Depth'

page. It clearly shows and explains the six areas you need to defend,

and how it all -starts- with Policies, Procedures & Awareness:
http://www.knowbe4.com/resources/defense-in-depth/





Selected Incidents:







Reported Date: 2011-06-24


Summary: Personal information of 58,000


customers and some job applicants


acquired by hackers.


Organization: T&T; Supermarket, Inc.


http://datalossdb.org/incidents/3940







Reported Date: 2011-06-23


Summary: Internal memos as well as


personal information such as names,


phone numbers, addresses and passwords


belonging to Arizona law enforcement


accessed by hackers.


Organization: Arizona Department of Public Safety


http://datalossdb.org/incidents/3926





Reported Date: 22011-06-23


Usernames, passwords, addresses and


email addresses may have been


acquired by hacker.


Organizations: NATO e-Bookshop, Unknown Organization


http://datalossdb.org/incidents/3942







Reported Date: 2011-06-22


Summary: Failure to adequately wipe


devices being re-sold left sensitive


information including Social Insurance


Numbers, provincial health card or passport


numbers, Employment history, academic transcripts,


and personal investment info exposed.


Organizations: Staples Business Depot


http://datalossdb.org/incidents/3931







Reported Date: 2011-06-19


Summary: 177,172 e-mail addresses acquired by hackers.


Organization: Sony Pictures France


http://datalossdb.org/incidents/3890







You can find all of them at:


http://datalossdb.org/












KnowBe4






FFIEC Updates Internet Banking Environment Guidelines







Federal banking regulators today released a long-awaited supplement

to the 2005 guidelines that describe what banks should be doing to

protect e-banking customers from cybercrime, hackers and cyberheists.

Experts called the updated guidance a step forward, but were divided

over whether it would be adequate to protect small to mid-sized

businesses against today’s sophisticated online attackers.





“Fraudsters have continued to develop and deploy more sophisticated,

effective, and malicious methods to compromise authentication

mechanisms and gain unauthorized access to customers’ online accounts,”

the FFIEC wrote. “Rapidly growing organized criminal groups have

become more specialized in financial fraud and have been successful

in compromising an increasing array of controls.”





For the complete document click the link below: Authentication in

an Internet Banking Environment

http://www.fdic.gov/news/news/press/2011/pr11111a.pdf







This document illustrates that no matters how well an organization

tries to protects itself from external cybercriminals, that because

of the human factor (like internal employees) network access can

sometimes be gained by the bad guys. You should definitely check the

effectiveness of your security. Take a free phishing security test

of your company.

http://www.knowbe4.com/phishing-security-test/







KnowBe4






Cyberheist 'FAVE' LINKS:


* This Week's Links We Like. Tips, Hints And Fun Stuff.


The data breach quiz. Find out how RSA, Sony, Citigroup, Anonymous and the

U.S. Senate fit into this watershed year for data hacks:


http://www.networkworld.com/slideshows/2011/062211-data-breach.html?


Cool Photos of Levitating Girl:


http://www.toxel.com/inspiration/2011/06/24/cool-photos-of-levitating-girl/"



How people in other countries improvise with various methods of transportation.


http://www.flixxy.com/cars-in-poor-countries.htm



A 2 min. short film about two people in two different cities. Shot entirely on a Nokia N8 mobile phone.


http://www.flixxy.com/splitscreen-a-love-story.htm


Topics: Cybercrime



Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews