SlideShare a Scribd company logo
Cybercrime—A Primer
9/8/2020
Frederick Scholl
MS Cybersecurity Program Director
• Lies, damn lies and statistics
• Sometimes cyber crime statistics can
be overwhelming
• Cyber crime research through stories
• Research done by using court
transcripts
• Breaches caused by people lapse +
technology lapse
How do we prevent cybercrime?
• Loss of privacy
• Trade secret theft
• Business Email Compromise
• PII breaches (Personally Identifiable
Information)
• Ransomware
Five Perspectives of Cybercrime
 Cell phone subscriptions = 7.5 B
 Internet access = 3.9 B people
 GDP per capita per year
 Quatar = $138,910
 Central African Republic = $700
 Population of sub-Saharan Africa = 2 X China by 2099
Cybercrime is Here to Stay
• US v. AK 2016-17: Maryland district
• JK gets romantically involved with AK; they break up 5/2016
• AK took over following accounts: Facebook, Yahoo, Instagram, Nelnet, Apple,
TurboTax
• Sent spoofed threatening messages from JK to himself
• Had JK’s clients discontinue their insurance
• Had JK arrested and jailed 6 times; filed protective order against her
Protecting Your Privacy
• Monitor privacy of all social media platforms
• Use password manager (LassPass, DashLane, etc.)
• Use Multi Factor Authentication
• Protect even accounts without financial impact
• Jumbo Privacy (www.jumboprivacy.com)
Protecting Your Privacy
• One Time Password
• Send time token protected by
• Secret Key (QR code)
Google Authenticator for MFA
• Internal and External
• US and China agree to not “conduct or knowingly support cyber-enabled theft of
intellectual property” for commercial gain! (2015)
• Nationwide Children’s Hospital, Columbus Ohio
• YZ and LC worked at NCH from 2007-2017 doing exosome research and…
• Started Chinese company offering exosome research and services in 2015
• Started US company offering exosome research and services in 2016
• Worked for the Chinese State Administration of Foreign Expert Affairs Agency
• Sent NCH trade secrets to Chinese and personal email accounts
Trade Secret Theft: Robbing Children
• Attack went on for years
• Technology: Data Loss Prevention (DLP)
• Middle management requirements
• More training on how to manage risk
• Supervision of employees
• Privileged Access Management Systems
• DLP
Solutions: Trade Secret (Insider) Theft
• Use of email to steal funds from corporate accounting
• The $15m “emergency” that needed to be addressed
BEC (Business Email Compromise)
Hackers
Chuck Elsea
Controller: Kevin
McMurtry
Outside attorney
Hackers’
Bank
• Sender: hacker
• From address: ft-809@outlook.com
• Spoofed sender: Chuck Elsea, CEO
• To address: kmcmurtry@scuolar.com
• Body: “I have assigned you to manage file FT 809. This is a
strictly confidential operation to which takes priority over other
tasks”. Regards, Chuck Elsea
#1: Email to Controller
Non-standard address
Bad English
• Sender: hacker
• From address: ft-809@outlook.com
• Spoofed sender: Chuck Elsea, CEO
• To address: kmcmurtry@scuolar.com
• Body: “For the last months, we have been working on acquiring a
Chinese company. Please reach out to attorney Rodney Lawrence
for information on where the funds need to be deposited
Rodney.Lawrence@kpmg-office.com”
#2: Second Email to Controller
Non-standard address
Bad English
Non-standard address
• Sender: hacker
• From address: Rodney.Lawrence@kpmg-office.com
• Spoofed sender: Chuck Elsea, CEO
• To address: kmcmurtry@scuolar.com
• Body: “Please see here the below wire details. Shanghai Pudong
Development Bank, Amount USD $780,000. Regards, Rodney
Lawrence, KPMG”
#3: Third Email to Controller
Non-standard address
Started small
• Sender: hacker
• From address: ft-809@outlook.com
• Spoofed sender: Chuck Elsea, CEO
• To address: kmcmurtry@scuolar.com
• Body: “SEC require us to close the deal by Monday. In order to
avoid any penalties, we will execute the wire immediately. Balance
to pay: $7,020,000. Please proceed asap with the wire. Chuck”
#4: Fourth Email to Controller
Non-standard address
Bad English
• Check email addresses and content!
• Don’t publicize your back office staff
• Management authorizations and signature level
• Office 365 has “Advanced Threat Protection” but it
doesn’t stop account takeovers
Lessons Learned
• Started in Woolford, MD as credit reporting service
• Equifax—145 million records breached 2017
• US charges PLA members with the crime (2/2020)
PII* Breaches: Fixing Technical Vulnerabilities
Dispute Resolution System: ACIS
Running on “Apache” software
* PII = Personally
Identifiable Information
• On March 8, US DHS publishes a bulletin about critical vulnerability (fix within 48
hours) in Apache software
• Process of fixing software vulnerabilities is “patching”
• March 9 Equifax security team notifies CIO (GP) that ACIS system needs
“patching”; CIO missed the email
• July 29 suspicious activity noted on ACIS from China
• Breach made public on September 19, 2017
What Happened?
• First American Title— 850 million documents exposed 2017-2019
• Started in Orange County, CA 1889
• Anyone user could see any other user’s information (SSN, finances, etc.)
PII Breaches: Fixing Technical Vulnerabilities
FAST: online title
document repository
• Vulnerability was created in 2014
• Discovered in December 2018 by FA’s Cyber Defense Team
• Report sent to application team management
• No action taken
• Misclassified security risk as low
• Didn’t fix within the required 90 days
• Journalist published this information in May 2019
What Happened: First American
• Fix your remediation process first, not your vulnerability
• Educate boards and senior management
• Keeping track of risks, not just vulnerabilities
Lessons Learned Fixing Vulnerabilities
Controlled Unclassified Information
If you want to do business
with the Federal
government
• A type of extortion
• SamSam Ransomware
• Atlanta spent $2.6 million to recover
• Mansouri and Sanvandi indicted Nov 2018 (Iran)
Ransomware Breach: Atlanta
Back Office
Data
Phishing
Web Portal
Remote Access
Managed
Service
Providers
Attack
Paths
• MAZE
• REvil
• Nemty
• DoppelPaymer
Ransomware Trends
Affiliates Target
GandCrab founder
arrested August in
Belarus
Bitcoin
Payment
• Not a special animal; attacks same as other threat
• Use same prevention methods
• Recovery: Use tried and true 3-2-1 backup method
• Three copies of data
• Two media types
• One copy offsite (not connected)
Ransomware: Lessons Learned
• People are partly responsible for security breaches, but also need to be the best
defense
• Executives: Culture, Strategy, Policy
• Middle Management: Execution, Tactics, Supervision, Controls
• Line workers: Follow Process, Procedures, Standards
• Technology matters, but is not “all important”
Information Security: A Team Sport
• More COVID related attacks; don’t rely exclusively on technology to protect
• Election related scams will exponentially increase
• Biggest risk is disinformation
Trends: The Near Future
Thank You

More Related Content

What's hot

Cybercrime
CybercrimeCybercrime
Cybercrime
MobeenaJavid
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
essay-writing-help.us
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
Rajesh Satpathy, Regional College of Management (RCM), Bhubaneswar
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
jpeters_securitysnapshot
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
IJCSIS Research Publications
 
computer crime
computer crimecomputer crime
computer crime
00jitesh00
 
cyber crime
 cyber crime  cyber crime
cyber crime
shobhapalpari123
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
IJCNCJournal
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
Ayub Nuri
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
Murray Security Services
 
Cyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To MeCyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To Me
Simon Salter
 
Electronic defamation
Electronic defamationElectronic defamation
Electronic defamation
Apostolos Syropoulos
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
Kartik Chhabra
 
Viruses, Biometrics, Encryption
Viruses,  Biometrics,  EncryptionViruses,  Biometrics,  Encryption
Viruses, Biometrics, Encryption
Brain Young
 
Louisiana Cybersecurity State of Emergency Update
Louisiana Cybersecurity State of Emergency UpdateLouisiana Cybersecurity State of Emergency Update
Louisiana Cybersecurity State of Emergency Update
Ivanti
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussainaisha747
 
Information security
Information securityInformation security
Information security
Laxmiprasad Bansod
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
ArrayShield Technologies Private Limited
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
Nikhil D
 
Evolution of phishing Bsides Delft 2018
Evolution of phishing   Bsides Delft 2018Evolution of phishing   Bsides Delft 2018
Evolution of phishing Bsides Delft 2018
Johanna Curiel
 

What's hot (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
 
computer crime
computer crimecomputer crime
computer crime
 
cyber crime
 cyber crime  cyber crime
cyber crime
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
Cyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To MeCyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To Me
 
Electronic defamation
Electronic defamationElectronic defamation
Electronic defamation
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
 
Viruses, Biometrics, Encryption
Viruses,  Biometrics,  EncryptionViruses,  Biometrics,  Encryption
Viruses, Biometrics, Encryption
 
Louisiana Cybersecurity State of Emergency Update
Louisiana Cybersecurity State of Emergency UpdateLouisiana Cybersecurity State of Emergency Update
Louisiana Cybersecurity State of Emergency Update
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
Information security
Information securityInformation security
Information security
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Evolution of phishing Bsides Delft 2018
Evolution of phishing   Bsides Delft 2018Evolution of phishing   Bsides Delft 2018
Evolution of phishing Bsides Delft 2018
 

Similar to Cybercrime: A Primer

How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scams
Gabor Szathmari
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
Jose L. Quiñones-Borrero
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
CCIAOR
 
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to doNEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
New England Direct Marketing Association, Inc.
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
Stephen Jesukanth Martin
 
GROUP 4-final presentation.pptx. in TLE
GROUP  4-final presentation.pptx. in TLEGROUP  4-final presentation.pptx. in TLE
GROUP 4-final presentation.pptx. in TLE
menezachristal
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
AbdullaFatiya3
 
Cybersecurity-Awareness-Presentation-17-May-22.pptx
Cybersecurity-Awareness-Presentation-17-May-22.pptxCybersecurity-Awareness-Presentation-17-May-22.pptx
Cybersecurity-Awareness-Presentation-17-May-22.pptx
RahulDasari12
 
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptx
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptxCybersecurity-Awareness-Presentation-17-May-22 (1).pptx
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptx
SanjaiJinSanjaiJin
 
Iron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firmIron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firm
Gabor Szathmari
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigation
Nick Chandi
 
Phishing
PhishingPhishing
Phishing
Ajit Yadav
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
ZitaAdlTrk
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
pdewitte
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
Scott Suhy
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
DoubleXDS
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
vineetkathan
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Vansh Verma
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
DoubleXDS
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
Abzetdin Adamov
 

Similar to Cybercrime: A Primer (20)

How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scams
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to doNEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
GROUP 4-final presentation.pptx. in TLE
GROUP  4-final presentation.pptx. in TLEGROUP  4-final presentation.pptx. in TLE
GROUP 4-final presentation.pptx. in TLE
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
 
Cybersecurity-Awareness-Presentation-17-May-22.pptx
Cybersecurity-Awareness-Presentation-17-May-22.pptxCybersecurity-Awareness-Presentation-17-May-22.pptx
Cybersecurity-Awareness-Presentation-17-May-22.pptx
 
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptx
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptxCybersecurity-Awareness-Presentation-17-May-22 (1).pptx
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptx
 
Iron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firmIron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firm
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigation
 
Phishing
PhishingPhishing
Phishing
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 

Recently uploaded

Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 

Recently uploaded (20)

Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 

Cybercrime: A Primer

  • 1. Cybercrime—A Primer 9/8/2020 Frederick Scholl MS Cybersecurity Program Director
  • 2. • Lies, damn lies and statistics • Sometimes cyber crime statistics can be overwhelming • Cyber crime research through stories • Research done by using court transcripts • Breaches caused by people lapse + technology lapse How do we prevent cybercrime?
  • 3. • Loss of privacy • Trade secret theft • Business Email Compromise • PII breaches (Personally Identifiable Information) • Ransomware Five Perspectives of Cybercrime
  • 4.  Cell phone subscriptions = 7.5 B  Internet access = 3.9 B people  GDP per capita per year  Quatar = $138,910  Central African Republic = $700  Population of sub-Saharan Africa = 2 X China by 2099 Cybercrime is Here to Stay
  • 5. • US v. AK 2016-17: Maryland district • JK gets romantically involved with AK; they break up 5/2016 • AK took over following accounts: Facebook, Yahoo, Instagram, Nelnet, Apple, TurboTax • Sent spoofed threatening messages from JK to himself • Had JK’s clients discontinue their insurance • Had JK arrested and jailed 6 times; filed protective order against her Protecting Your Privacy
  • 6. • Monitor privacy of all social media platforms • Use password manager (LassPass, DashLane, etc.) • Use Multi Factor Authentication • Protect even accounts without financial impact • Jumbo Privacy (www.jumboprivacy.com) Protecting Your Privacy
  • 7. • One Time Password • Send time token protected by • Secret Key (QR code) Google Authenticator for MFA
  • 8. • Internal and External • US and China agree to not “conduct or knowingly support cyber-enabled theft of intellectual property” for commercial gain! (2015) • Nationwide Children’s Hospital, Columbus Ohio • YZ and LC worked at NCH from 2007-2017 doing exosome research and… • Started Chinese company offering exosome research and services in 2015 • Started US company offering exosome research and services in 2016 • Worked for the Chinese State Administration of Foreign Expert Affairs Agency • Sent NCH trade secrets to Chinese and personal email accounts Trade Secret Theft: Robbing Children
  • 9. • Attack went on for years • Technology: Data Loss Prevention (DLP) • Middle management requirements • More training on how to manage risk • Supervision of employees • Privileged Access Management Systems • DLP Solutions: Trade Secret (Insider) Theft
  • 10. • Use of email to steal funds from corporate accounting • The $15m “emergency” that needed to be addressed BEC (Business Email Compromise) Hackers Chuck Elsea Controller: Kevin McMurtry Outside attorney Hackers’ Bank
  • 11. • Sender: hacker • From address: ft-809@outlook.com • Spoofed sender: Chuck Elsea, CEO • To address: kmcmurtry@scuolar.com • Body: “I have assigned you to manage file FT 809. This is a strictly confidential operation to which takes priority over other tasks”. Regards, Chuck Elsea #1: Email to Controller Non-standard address Bad English
  • 12. • Sender: hacker • From address: ft-809@outlook.com • Spoofed sender: Chuck Elsea, CEO • To address: kmcmurtry@scuolar.com • Body: “For the last months, we have been working on acquiring a Chinese company. Please reach out to attorney Rodney Lawrence for information on where the funds need to be deposited Rodney.Lawrence@kpmg-office.com” #2: Second Email to Controller Non-standard address Bad English Non-standard address
  • 13. • Sender: hacker • From address: Rodney.Lawrence@kpmg-office.com • Spoofed sender: Chuck Elsea, CEO • To address: kmcmurtry@scuolar.com • Body: “Please see here the below wire details. Shanghai Pudong Development Bank, Amount USD $780,000. Regards, Rodney Lawrence, KPMG” #3: Third Email to Controller Non-standard address Started small
  • 14. • Sender: hacker • From address: ft-809@outlook.com • Spoofed sender: Chuck Elsea, CEO • To address: kmcmurtry@scuolar.com • Body: “SEC require us to close the deal by Monday. In order to avoid any penalties, we will execute the wire immediately. Balance to pay: $7,020,000. Please proceed asap with the wire. Chuck” #4: Fourth Email to Controller Non-standard address Bad English
  • 15. • Check email addresses and content! • Don’t publicize your back office staff • Management authorizations and signature level • Office 365 has “Advanced Threat Protection” but it doesn’t stop account takeovers Lessons Learned
  • 16. • Started in Woolford, MD as credit reporting service • Equifax—145 million records breached 2017 • US charges PLA members with the crime (2/2020) PII* Breaches: Fixing Technical Vulnerabilities Dispute Resolution System: ACIS Running on “Apache” software * PII = Personally Identifiable Information
  • 17. • On March 8, US DHS publishes a bulletin about critical vulnerability (fix within 48 hours) in Apache software • Process of fixing software vulnerabilities is “patching” • March 9 Equifax security team notifies CIO (GP) that ACIS system needs “patching”; CIO missed the email • July 29 suspicious activity noted on ACIS from China • Breach made public on September 19, 2017 What Happened?
  • 18. • First American Title— 850 million documents exposed 2017-2019 • Started in Orange County, CA 1889 • Anyone user could see any other user’s information (SSN, finances, etc.) PII Breaches: Fixing Technical Vulnerabilities FAST: online title document repository
  • 19. • Vulnerability was created in 2014 • Discovered in December 2018 by FA’s Cyber Defense Team • Report sent to application team management • No action taken • Misclassified security risk as low • Didn’t fix within the required 90 days • Journalist published this information in May 2019 What Happened: First American
  • 20. • Fix your remediation process first, not your vulnerability • Educate boards and senior management • Keeping track of risks, not just vulnerabilities Lessons Learned Fixing Vulnerabilities Controlled Unclassified Information If you want to do business with the Federal government
  • 21. • A type of extortion • SamSam Ransomware • Atlanta spent $2.6 million to recover • Mansouri and Sanvandi indicted Nov 2018 (Iran) Ransomware Breach: Atlanta Back Office Data Phishing Web Portal Remote Access Managed Service Providers Attack Paths
  • 22. • MAZE • REvil • Nemty • DoppelPaymer Ransomware Trends Affiliates Target GandCrab founder arrested August in Belarus Bitcoin Payment
  • 23. • Not a special animal; attacks same as other threat • Use same prevention methods • Recovery: Use tried and true 3-2-1 backup method • Three copies of data • Two media types • One copy offsite (not connected) Ransomware: Lessons Learned
  • 24. • People are partly responsible for security breaches, but also need to be the best defense • Executives: Culture, Strategy, Policy • Middle Management: Execution, Tactics, Supervision, Controls • Line workers: Follow Process, Procedures, Standards • Technology matters, but is not “all important” Information Security: A Team Sport
  • 25. • More COVID related attacks; don’t rely exclusively on technology to protect • Election related scams will exponentially increase • Biggest risk is disinformation Trends: The Near Future