SlideShare a Scribd company logo
1 of 26
Cybercrime—A Primer
9/8/2020
Frederick Scholl
MS Cybersecurity Program Director
• Lies, damn lies and statistics
• Sometimes cyber crime statistics can
be overwhelming
• Cyber crime research through stories
• Research done by using court
transcripts
• Breaches caused by people lapse +
technology lapse
How do we prevent cybercrime?
• Loss of privacy
• Trade secret theft
• Business Email Compromise
• PII breaches (Personally Identifiable
Information)
• Ransomware
Five Perspectives of Cybercrime
 Cell phone subscriptions = 7.5 B
 Internet access = 3.9 B people
 GDP per capita per year
 Quatar = $138,910
 Central African Republic = $700
 Population of sub-Saharan Africa = 2 X China by 2099
Cybercrime is Here to Stay
• US v. AK 2016-17: Maryland district
• JK gets romantically involved with AK; they break up 5/2016
• AK took over following accounts: Facebook, Yahoo, Instagram, Nelnet, Apple,
TurboTax
• Sent spoofed threatening messages from JK to himself
• Had JK’s clients discontinue their insurance
• Had JK arrested and jailed 6 times; filed protective order against her
Protecting Your Privacy
• Monitor privacy of all social media platforms
• Use password manager (LassPass, DashLane, etc.)
• Use Multi Factor Authentication
• Protect even accounts without financial impact
• Jumbo Privacy (www.jumboprivacy.com)
Protecting Your Privacy
• One Time Password
• Send time token protected by
• Secret Key (QR code)
Google Authenticator for MFA
• Internal and External
• US and China agree to not “conduct or knowingly support cyber-enabled theft of
intellectual property” for commercial gain! (2015)
• Nationwide Children’s Hospital, Columbus Ohio
• YZ and LC worked at NCH from 2007-2017 doing exosome research and…
• Started Chinese company offering exosome research and services in 2015
• Started US company offering exosome research and services in 2016
• Worked for the Chinese State Administration of Foreign Expert Affairs Agency
• Sent NCH trade secrets to Chinese and personal email accounts
Trade Secret Theft: Robbing Children
• Attack went on for years
• Technology: Data Loss Prevention (DLP)
• Middle management requirements
• More training on how to manage risk
• Supervision of employees
• Privileged Access Management Systems
• DLP
Solutions: Trade Secret (Insider) Theft
• Use of email to steal funds from corporate accounting
• The $15m “emergency” that needed to be addressed
BEC (Business Email Compromise)
Hackers
Chuck Elsea
Controller: Kevin
McMurtry
Outside attorney
Hackers’
Bank
• Sender: hacker
• From address: ft-809@outlook.com
• Spoofed sender: Chuck Elsea, CEO
• To address: kmcmurtry@scuolar.com
• Body: “I have assigned you to manage file FT 809. This is a
strictly confidential operation to which takes priority over other
tasks”. Regards, Chuck Elsea
#1: Email to Controller
Non-standard address
Bad English
• Sender: hacker
• From address: ft-809@outlook.com
• Spoofed sender: Chuck Elsea, CEO
• To address: kmcmurtry@scuolar.com
• Body: “For the last months, we have been working on acquiring a
Chinese company. Please reach out to attorney Rodney Lawrence
for information on where the funds need to be deposited
Rodney.Lawrence@kpmg-office.com”
#2: Second Email to Controller
Non-standard address
Bad English
Non-standard address
• Sender: hacker
• From address: Rodney.Lawrence@kpmg-office.com
• Spoofed sender: Chuck Elsea, CEO
• To address: kmcmurtry@scuolar.com
• Body: “Please see here the below wire details. Shanghai Pudong
Development Bank, Amount USD $780,000. Regards, Rodney
Lawrence, KPMG”
#3: Third Email to Controller
Non-standard address
Started small
• Sender: hacker
• From address: ft-809@outlook.com
• Spoofed sender: Chuck Elsea, CEO
• To address: kmcmurtry@scuolar.com
• Body: “SEC require us to close the deal by Monday. In order to
avoid any penalties, we will execute the wire immediately. Balance
to pay: $7,020,000. Please proceed asap with the wire. Chuck”
#4: Fourth Email to Controller
Non-standard address
Bad English
• Check email addresses and content!
• Don’t publicize your back office staff
• Management authorizations and signature level
• Office 365 has “Advanced Threat Protection” but it
doesn’t stop account takeovers
Lessons Learned
• Started in Woolford, MD as credit reporting service
• Equifax—145 million records breached 2017
• US charges PLA members with the crime (2/2020)
PII* Breaches: Fixing Technical Vulnerabilities
Dispute Resolution System: ACIS
Running on “Apache” software
* PII = Personally
Identifiable Information
• On March 8, US DHS publishes a bulletin about critical vulnerability (fix within 48
hours) in Apache software
• Process of fixing software vulnerabilities is “patching”
• March 9 Equifax security team notifies CIO (GP) that ACIS system needs
“patching”; CIO missed the email
• July 29 suspicious activity noted on ACIS from China
• Breach made public on September 19, 2017
What Happened?
• First American Title— 850 million documents exposed 2017-2019
• Started in Orange County, CA 1889
• Anyone user could see any other user’s information (SSN, finances, etc.)
PII Breaches: Fixing Technical Vulnerabilities
FAST: online title
document repository
• Vulnerability was created in 2014
• Discovered in December 2018 by FA’s Cyber Defense Team
• Report sent to application team management
• No action taken
• Misclassified security risk as low
• Didn’t fix within the required 90 days
• Journalist published this information in May 2019
What Happened: First American
• Fix your remediation process first, not your vulnerability
• Educate boards and senior management
• Keeping track of risks, not just vulnerabilities
Lessons Learned Fixing Vulnerabilities
Controlled Unclassified Information
If you want to do business
with the Federal
government
• A type of extortion
• SamSam Ransomware
• Atlanta spent $2.6 million to recover
• Mansouri and Sanvandi indicted Nov 2018 (Iran)
Ransomware Breach: Atlanta
Back Office
Data
Phishing
Web Portal
Remote Access
Managed
Service
Providers
Attack
Paths
• MAZE
• REvil
• Nemty
• DoppelPaymer
Ransomware Trends
Affiliates Target
GandCrab founder
arrested August in
Belarus
Bitcoin
Payment
• Not a special animal; attacks same as other threat
• Use same prevention methods
• Recovery: Use tried and true 3-2-1 backup method
• Three copies of data
• Two media types
• One copy offsite (not connected)
Ransomware: Lessons Learned
• People are partly responsible for security breaches, but also need to be the best
defense
• Executives: Culture, Strategy, Policy
• Middle Management: Execution, Tactics, Supervision, Controls
• Line workers: Follow Process, Procedures, Standards
• Technology matters, but is not “all important”
Information Security: A Team Sport
• More COVID related attacks; don’t rely exclusively on technology to protect
• Election related scams will exponentially increase
• Biggest risk is disinformation
Trends: The Near Future
Thank You

More Related Content

What's hot

How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...IJCSIS Research Publications
 
computer crime
computer crimecomputer crime
computer crime00jitesh00
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftIJCNCJournal
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in IraqAyub Nuri
 
Cyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To MeCyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To MeSimon Salter
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thKartik Chhabra
 
Viruses, Biometrics, Encryption
Viruses,  Biometrics,  EncryptionViruses,  Biometrics,  Encryption
Viruses, Biometrics, EncryptionBrain Young
 
Louisiana Cybersecurity State of Emergency Update
Louisiana Cybersecurity State of Emergency UpdateLouisiana Cybersecurity State of Emergency Update
Louisiana Cybersecurity State of Emergency UpdateIvanti
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussainaisha747
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
Evolution of phishing Bsides Delft 2018
Evolution of phishing   Bsides Delft 2018Evolution of phishing   Bsides Delft 2018
Evolution of phishing Bsides Delft 2018Johanna Curiel
 

What's hot (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
 
computer crime
computer crimecomputer crime
computer crime
 
cyber crime
 cyber crime  cyber crime
cyber crime
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
Cyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To MeCyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To Me
 
Electronic defamation
Electronic defamationElectronic defamation
Electronic defamation
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
 
Viruses, Biometrics, Encryption
Viruses,  Biometrics,  EncryptionViruses,  Biometrics,  Encryption
Viruses, Biometrics, Encryption
 
Louisiana Cybersecurity State of Emergency Update
Louisiana Cybersecurity State of Emergency UpdateLouisiana Cybersecurity State of Emergency Update
Louisiana Cybersecurity State of Emergency Update
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
Information security
Information securityInformation security
Information security
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Evolution of phishing Bsides Delft 2018
Evolution of phishing   Bsides Delft 2018Evolution of phishing   Bsides Delft 2018
Evolution of phishing Bsides Delft 2018
 

Similar to Cybercrime Prevention Tips from a Cybersecurity Expert

How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsGabor Szathmari
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterJose L. Quiñones-Borrero
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxStephen Jesukanth Martin
 
GROUP 4-final presentation.pptx. in TLE
GROUP  4-final presentation.pptx. in TLEGROUP  4-final presentation.pptx. in TLE
GROUP 4-final presentation.pptx. in TLEmenezachristal
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxAbdullaFatiya3
 
Cybersecurity-Awareness-Presentation-17-May-22.pptx
Cybersecurity-Awareness-Presentation-17-May-22.pptxCybersecurity-Awareness-Presentation-17-May-22.pptx
Cybersecurity-Awareness-Presentation-17-May-22.pptxRahulDasari12
 
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptx
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptxCybersecurity-Awareness-Presentation-17-May-22 (1).pptx
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptxSanjaiJinSanjaiJin
 
Iron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firmIron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firmGabor Szathmari
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationNick Chandi
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerZitaAdlTrk
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSScott Suhy
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal PrivacyDoubleXDS
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYDoubleXDS
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 

Similar to Cybercrime Prevention Tips from a Cybersecurity Expert (20)

How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scams
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to doNEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
GROUP 4-final presentation.pptx. in TLE
GROUP  4-final presentation.pptx. in TLEGROUP  4-final presentation.pptx. in TLE
GROUP 4-final presentation.pptx. in TLE
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
 
Cybersecurity-Awareness-Presentation-17-May-22.pptx
Cybersecurity-Awareness-Presentation-17-May-22.pptxCybersecurity-Awareness-Presentation-17-May-22.pptx
Cybersecurity-Awareness-Presentation-17-May-22.pptx
 
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptx
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptxCybersecurity-Awareness-Presentation-17-May-22 (1).pptx
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptx
 
Iron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firmIron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firm
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigation
 
Phishing
PhishingPhishing
Phishing
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 

Recently uploaded

'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 

Recently uploaded (20)

'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 

Cybercrime Prevention Tips from a Cybersecurity Expert

  • 1. Cybercrime—A Primer 9/8/2020 Frederick Scholl MS Cybersecurity Program Director
  • 2. • Lies, damn lies and statistics • Sometimes cyber crime statistics can be overwhelming • Cyber crime research through stories • Research done by using court transcripts • Breaches caused by people lapse + technology lapse How do we prevent cybercrime?
  • 3. • Loss of privacy • Trade secret theft • Business Email Compromise • PII breaches (Personally Identifiable Information) • Ransomware Five Perspectives of Cybercrime
  • 4.  Cell phone subscriptions = 7.5 B  Internet access = 3.9 B people  GDP per capita per year  Quatar = $138,910  Central African Republic = $700  Population of sub-Saharan Africa = 2 X China by 2099 Cybercrime is Here to Stay
  • 5. • US v. AK 2016-17: Maryland district • JK gets romantically involved with AK; they break up 5/2016 • AK took over following accounts: Facebook, Yahoo, Instagram, Nelnet, Apple, TurboTax • Sent spoofed threatening messages from JK to himself • Had JK’s clients discontinue their insurance • Had JK arrested and jailed 6 times; filed protective order against her Protecting Your Privacy
  • 6. • Monitor privacy of all social media platforms • Use password manager (LassPass, DashLane, etc.) • Use Multi Factor Authentication • Protect even accounts without financial impact • Jumbo Privacy (www.jumboprivacy.com) Protecting Your Privacy
  • 7. • One Time Password • Send time token protected by • Secret Key (QR code) Google Authenticator for MFA
  • 8. • Internal and External • US and China agree to not “conduct or knowingly support cyber-enabled theft of intellectual property” for commercial gain! (2015) • Nationwide Children’s Hospital, Columbus Ohio • YZ and LC worked at NCH from 2007-2017 doing exosome research and… • Started Chinese company offering exosome research and services in 2015 • Started US company offering exosome research and services in 2016 • Worked for the Chinese State Administration of Foreign Expert Affairs Agency • Sent NCH trade secrets to Chinese and personal email accounts Trade Secret Theft: Robbing Children
  • 9. • Attack went on for years • Technology: Data Loss Prevention (DLP) • Middle management requirements • More training on how to manage risk • Supervision of employees • Privileged Access Management Systems • DLP Solutions: Trade Secret (Insider) Theft
  • 10. • Use of email to steal funds from corporate accounting • The $15m “emergency” that needed to be addressed BEC (Business Email Compromise) Hackers Chuck Elsea Controller: Kevin McMurtry Outside attorney Hackers’ Bank
  • 11. • Sender: hacker • From address: ft-809@outlook.com • Spoofed sender: Chuck Elsea, CEO • To address: kmcmurtry@scuolar.com • Body: “I have assigned you to manage file FT 809. This is a strictly confidential operation to which takes priority over other tasks”. Regards, Chuck Elsea #1: Email to Controller Non-standard address Bad English
  • 12. • Sender: hacker • From address: ft-809@outlook.com • Spoofed sender: Chuck Elsea, CEO • To address: kmcmurtry@scuolar.com • Body: “For the last months, we have been working on acquiring a Chinese company. Please reach out to attorney Rodney Lawrence for information on where the funds need to be deposited Rodney.Lawrence@kpmg-office.com” #2: Second Email to Controller Non-standard address Bad English Non-standard address
  • 13. • Sender: hacker • From address: Rodney.Lawrence@kpmg-office.com • Spoofed sender: Chuck Elsea, CEO • To address: kmcmurtry@scuolar.com • Body: “Please see here the below wire details. Shanghai Pudong Development Bank, Amount USD $780,000. Regards, Rodney Lawrence, KPMG” #3: Third Email to Controller Non-standard address Started small
  • 14. • Sender: hacker • From address: ft-809@outlook.com • Spoofed sender: Chuck Elsea, CEO • To address: kmcmurtry@scuolar.com • Body: “SEC require us to close the deal by Monday. In order to avoid any penalties, we will execute the wire immediately. Balance to pay: $7,020,000. Please proceed asap with the wire. Chuck” #4: Fourth Email to Controller Non-standard address Bad English
  • 15. • Check email addresses and content! • Don’t publicize your back office staff • Management authorizations and signature level • Office 365 has “Advanced Threat Protection” but it doesn’t stop account takeovers Lessons Learned
  • 16. • Started in Woolford, MD as credit reporting service • Equifax—145 million records breached 2017 • US charges PLA members with the crime (2/2020) PII* Breaches: Fixing Technical Vulnerabilities Dispute Resolution System: ACIS Running on “Apache” software * PII = Personally Identifiable Information
  • 17. • On March 8, US DHS publishes a bulletin about critical vulnerability (fix within 48 hours) in Apache software • Process of fixing software vulnerabilities is “patching” • March 9 Equifax security team notifies CIO (GP) that ACIS system needs “patching”; CIO missed the email • July 29 suspicious activity noted on ACIS from China • Breach made public on September 19, 2017 What Happened?
  • 18. • First American Title— 850 million documents exposed 2017-2019 • Started in Orange County, CA 1889 • Anyone user could see any other user’s information (SSN, finances, etc.) PII Breaches: Fixing Technical Vulnerabilities FAST: online title document repository
  • 19. • Vulnerability was created in 2014 • Discovered in December 2018 by FA’s Cyber Defense Team • Report sent to application team management • No action taken • Misclassified security risk as low • Didn’t fix within the required 90 days • Journalist published this information in May 2019 What Happened: First American
  • 20. • Fix your remediation process first, not your vulnerability • Educate boards and senior management • Keeping track of risks, not just vulnerabilities Lessons Learned Fixing Vulnerabilities Controlled Unclassified Information If you want to do business with the Federal government
  • 21. • A type of extortion • SamSam Ransomware • Atlanta spent $2.6 million to recover • Mansouri and Sanvandi indicted Nov 2018 (Iran) Ransomware Breach: Atlanta Back Office Data Phishing Web Portal Remote Access Managed Service Providers Attack Paths
  • 22. • MAZE • REvil • Nemty • DoppelPaymer Ransomware Trends Affiliates Target GandCrab founder arrested August in Belarus Bitcoin Payment
  • 23. • Not a special animal; attacks same as other threat • Use same prevention methods • Recovery: Use tried and true 3-2-1 backup method • Three copies of data • Two media types • One copy offsite (not connected) Ransomware: Lessons Learned
  • 24. • People are partly responsible for security breaches, but also need to be the best defense • Executives: Culture, Strategy, Policy • Middle Management: Execution, Tactics, Supervision, Controls • Line workers: Follow Process, Procedures, Standards • Technology matters, but is not “all important” Information Security: A Team Sport
  • 25. • More COVID related attacks; don’t rely exclusively on technology to protect • Election related scams will exponentially increase • Biggest risk is disinformation Trends: The Near Future