SlideShare a Scribd company logo
September 9, 2013
DCI Annual Conference
DDoS Attacks:
The Impact to Community
Financial Institutions
Jay McLaughlin, CISSP
Senior Vice President, Chief Security Officer
September 9, 2013
Agenda
• Overview of Distributed Denial-of-Service Attacks
• Types of DoS attacks and why they are successful
• Understanding the motives behind recent attacks
• Detecting & Defending against an attack
• Preparation for response to an attack
• Steps to mitigate the attacks targeted to commit fraud
September 9, 2013
Types of Denial-of-Service Attacks
• SYN Floods/IP Floods
• connection attacks; half open connections do not complete the handshake
• HTTP GET/POST
• Application level flood attacks
• ICMP Attacks / ICMP Echo
• ping of death; Smurf attacks
• UDP Floods
• DNS amplification attacks
- send 64-byte query and return 3,363-byte return (50X amplification factor)
• Teardrop Attacks
• TCP packet fragmentation that attacks reassembly process
September 9, 2013
New Waves of State-Sponsored Attacks
• April 2007 began a three-week wave of massive cyber-
attacks on the small Baltic country of Estonia
• First known incidence of such an assault on a state
• Targeted the government, banks, news agencies, and
businesses
• Recent DDoS attacks have indicated sponsorship or
involvement of foreign nation states
September 9, 2013
“Hacktivism” on the Rise
•Definition: “Hacktivisim”
– Non-violent use of legal and/or illegal computers and computer
networks as a means in pursuit of political ends
– Term first coined in 1998 by Cult of the Dead Cow
•Most forms of political activism require the strength of masses;
hacktivism can often the result from the power of one, or small group
•Attacks often include defacement, sit-ins, e-mail bombs, & doxing
•Most often carried out anonymously, and can take place over trans-
national borders
September 9, 2013
H-Activists Attacks Organized by “Anonymous”
• Group formed in 2008 originally after an internal Church of
Scientology video was redacted from YouTube
• Gained public prominence in 2010 during its defense and
support of WikiLeaks and its leader Julian Assange
• Anonymous mobilized, unleashing its Low Orbit Ion Cannon
(LOIC) tool, with which anyone could participate in DDoS attacks
• Attacks waged against Mastercard, Visa, PayPal
• Since attacked various causes, from cartels in Mexico, child
pornography, protests against U.S. actions
• Government entities, CIA & FBI, Sony, Westboro Baptist Church
September 9, 2013
Operation Payback: Against Anti-Piracy
September 9, 2013
Tools: No Skills Required (Example: LOIC)
September 9, 2013
Waves of DDoS Attacks Against US Banks
• Bank of America, Chase, Citigroup, HSBC, Wells Fargo, US Bank,
Capital One, PNC Financial Services, Ally Bank, SunTrust Bank,
Regions Bank, BB&T, Fifth-Third Bank, etc.
• U.S. intelligence officials said they believe the attacks against the
banks have been carried out or condoned by the Iranian govt
• “Suspicions point towards a special unit of Iran’s Revolutionary Guard”
– Sen. Joe Lieberman (CSPAN interview, Sept. 2012)
• Experts cautioned it is difficult to accurately identify
September 9, 2013
Responsibility for the latest attacks against banks?
• Izz ad-Din Al-Qassam
• Syrian prophet who fought against the French, British and
Zionist elements in eastern Mediterranean regions in the
20’s and 30’s
• “Brigades” is military wing of the Islamic resistance movement
Hamas
• “Cyber Fighters” is the hacker collective
• Retaliation for the portrayal of Muslims in a series of movie
trailers posted to YouTube for the film “Innocence of Muslims.”
September 9, 2013
Warning of Attacks Against US Banks
http://www.youtube.com/watch?v=xYVfBNKbfRQ
September 9, 2013
DDoS Attacks Hit US Banks: Operation Ababil
September 9, 2013
Pay-to-Play “Booter” Services
September 9, 2013
Why are DDoS Attacks Successful?
• Attackers are acquiring more bandwidth
September 9, 2013
September 9, 2013
Why are DDoS Attacks Successful?
• Attackers are acquiring more bandwidth
• No longer compromise and recruit thousands or tens of thousands of end-user
PCs to carry out the distributed denial-of-service attacks
• Instead, targeting a handful of web servers that have more bandwidth and processing
power
• Yapping Chihuahuas morphed into fire-breathing Godzillas
• The extra horse power of servers can create peak floods exceeding 100Gbps, a
volume big enough to knock even large sites offline
September 9, 2013
Compromised Endpoints: Botnet Armies
• Researchers from the security firm Incapsula
researchers noticed a website located in the UK
that was exhibiting suspicious behavior
• Discovered a backdoor that had been planted
on it that was programmed to receive
instructions from remote attackers
• Website traffic was being directed to send a
flood of HTTP and UDP packets to major banks
including PNC HSBC, and Fifth Third Bank Source: Ars Technica; Jan. 2013
http://arstechnica.com/security/2013/01/secret-footsoldier-targeting-banks-
reveals-meaner-leaner-face-of-ddos/
September 9, 2013
Attacking The Stack
• DDoS security firm Prolexic reported they have found several
compromised servers were outfitted with “itsoknoproblembro”
• (pronounced "it's OK, no problem, bro”)
• DDoS tools that allowed the attackers to unleash network packets
based on the UDP, TCP, HTTP, and HTTPS protocols.
• These flooded the banks' routers, servers, and server applications
• Attacked layers 3, 4, and 7 of the networking stack
Source: Threatpost October 2012
http://threatpost.com/en_us/blogs/automated-toolkits-named-massive-ddos-attacks-against-us-banks-100212
September 9, 2013
Preparing for DoS Attacks
September 9, 2013
What Can Be Done in Advance?
• DoS attacks cannot be prevented!
• Adversaries will launch attacks and no technology, provider, plans,
etc. can stop those actions from occuring
• Element of your Risk Assessment
• Risk 101:
• Risks can NEVER be eliminated…but they CAN be mitigated
September 9, 2013
Incident Response Planning
• Critical to establish your plans
• Don’t assume you won’t be a target
• Most banks cannot fight these attacks alone
• Relying on infrastructure will eventually help attacks achieve objectives
• Ensure that providers and ISPs are prepared
• Blocking source addresses and blacklisting traffic
from geographic regions must be done “upstream”
• Test plans to ensure preparedness (ex. tabletop testing)
September 9, 2013
Understanding Your Network
• Baseline network activity
• Without established baselines, it is difficult to be identify
when an onslaught or attack is starting
• Real-time monitoring of inbound TCP/UDP traffic
• Understand “normal” connection counts for web applications (e.g. OLB)
• Track bandwidth utilization – what is typical? Good? Bad?
September 9, 2013
Securing the Perimeter
• Load Balance Traffic
• Explicit access-control lists should permit only authorized traffic
• Immediately drop all malformed protocol requests
• Pre-built access-lists to block non-domestic inbound traffic or shun bad sources
• Set rate limits and embryonic connection thresholds
• DNS cat-mouse techniques
• Enhance monitoring of traffic (early detection, baselines)
• Work with your critical providers and ISPs in advance
September 9, 2013
Combatting These Attacks
September 9, 2013
Critical Distinction
• Politically-motivated attacks are a reality for prominent US institutions
• they are now at risk of being targeted for activities unrelated to their own business
• Different threat scenario for community banks
• Community banks will more likely be targeted in combination with an account
takeover event
• DDoS attacks are significantly mitigated with the absence of account
takeover fraud
• DDoS attacks represent ONLY the 2nd half of the equation
September 9, 2013
Anatomy of an Attack
September 9, 2013
Account Takeover Fraud
• Account takeover is one of the more prevalent forms of fraud.  It is the
result of an attacker taking over another person's account, first by
gathering information about the intended victim
• Estimates from the FBI project that financial fraud resulting from account
takeover attacks will exceed $1 billion this year 
• Motivated by financial gain, this has become an extremely lucrative,
criminal business
September 9, 2013
•Defense-in-depth (“deep” or “elastic”)
•Derived from traditional military strategy
• requires that a defender deploy resources
at and well behind the front line
•Reliance on any single control or mitigating factor is not
sufficient
•Prevents shortfalls in any single defense control
Building a Layered Security Model
September 9, 2013
• Strong multi-factor authentication
• one-time passwords (OTPs), temporary access codes (TACs)
• Out-of-band transaction authorization
• Cannot only focus around authentication events
• Anomaly detection for suspicious transactions based on characteristics/patterns
• Dual Approval controls / Segregation of duties
• Enhanced controls over account activities
• Transactions limits, payment recipients, thresholds
Fighting Account Takeover Fraud
September 9, 2013
Out-of-Band Transaction Authorization
• FFIEC’s June 2011 Guidance states:
• “Out-of-band authentication means that a transaction that is
initiated via one delivery channel [e.g.. online] must be re-
authenticated or verified via an independent delivery channel [e.g..
telephone] in order for the transaction to be completed”
 out-of-band authentication directed to through the same device
that initiates the transaction may not be effective since that
device may have been compromised
• Out-of-band authorization is can be extremely effective in
protecting customers against financial malware attacks and Trojans
September 9, 2013
Leverage Alerts
• Users must play a part and participate in fighting fraud
• Real-time alerts delivered to a victim are timely and provide the opportunity to
alert the financial institution of activity
• Transactional Alerting
 Ex: creation, authorization
• Changes to profile settings
• Security Event Alerts
 Ex: changes to delivery targets, failed logon attempts
September 9, 2013
Communicating with Customers
• FFIEC has been critical of the lack of communication provided by
banks and institutions that have been attacked
• This represents a fine line, as any public communication may
disclose response plans, details, or other information to attackers
• Establish general communication templates that will be used in the
event of an attack
• Know how and at what point to communicate
September 9, 2013
Summary & Wrap Up
• Hacktivists attacks have illustrated severity of DoS
• Better understanding of denial-of-service attacks
• DoS attacks are being used in multifaceted fraud
• Critical distinction between publicized attacks
• Establish and test your plans
• Reduce account takeover fraud with layered controls
September 9, 2013
“The future ain’t
what it used to be.”
-Lawrence “Yogi” Berra
New York Yankees, 1946-1964
Be Prepared
September 9, 2013
Declare var $response
if [?] >= ‘1’
then
$response = ‘answer’
else
$response = ‘thankyou’
end if;
Questions
September 9, 2013
linkedin.com/in/mclaughlinjay
Email: jmclaughlin@q2ebanking.com
Thank you

More Related Content

What's hot

Aligning Threat Intelligence to Defender Needs - Identifying Activity Groups
Aligning Threat Intelligence to Defender Needs - Identifying Activity GroupsAligning Threat Intelligence to Defender Needs - Identifying Activity Groups
Aligning Threat Intelligence to Defender Needs - Identifying Activity Groups
Joe Slowik
 
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. ReefBGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
Boston Global Forum
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Chris Hails
 
hashdays 2011: Sniping Slowloris - Taking out DDoS attackers with minimal har...
hashdays 2011: Sniping Slowloris - Taking out DDoS attackers with minimal har...hashdays 2011: Sniping Slowloris - Taking out DDoS attackers with minimal har...
hashdays 2011: Sniping Slowloris - Taking out DDoS attackers with minimal har...
Area41
 
The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]
Radware
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
Jamie Moore
 
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Chris Hails
 
What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?
lorzinian
 
In the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber AttacksIn the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber Attacks
Radware
 
Cyberwarfare
CyberwarfareCyberwarfare
Brooks18
Brooks18Brooks18
Brooks18
Chuck Brooks
 
HITB2013AMS Defenting the enterprise, a russian way!
HITB2013AMS Defenting the enterprise, a russian way!HITB2013AMS Defenting the enterprise, a russian way!
HITB2013AMS Defenting the enterprise, a russian way!
F _
 
In the Line of Fire - The Morphology of Cyber-Attacks
In the Line of Fire - The Morphology of Cyber-AttacksIn the Line of Fire - The Morphology of Cyber-Attacks
In the Line of Fire - The Morphology of Cyber-Attacks
Radware
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
David Sweigert
 
PLNOG16: DNS – przyjaciel e-szpiegów i e-złodziei. Analityka w służbie jej DN...
PLNOG16: DNS – przyjaciel e-szpiegów i e-złodziei.Analityka w służbie jej DN...PLNOG16: DNS – przyjaciel e-szpiegów i e-złodziei.Analityka w służbie jej DN...
PLNOG16: DNS – przyjaciel e-szpiegów i e-złodziei. Analityka w służbie jej DN...
PROIDEA
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank
shreemala1
 
Cybersecurity and data privacy
Cybersecurity and data privacyCybersecurity and data privacy
Cybersecurity and data privacy
Katherine Cancelado
 
The Anatomy of an Anonymous Attack
The Anatomy of an Anonymous AttackThe Anatomy of an Anonymous Attack
The Anatomy of an Anonymous Attack
Imperva
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
frcarlson
 
Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say? Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say?
Phil Agcaoili
 

What's hot (20)

Aligning Threat Intelligence to Defender Needs - Identifying Activity Groups
Aligning Threat Intelligence to Defender Needs - Identifying Activity GroupsAligning Threat Intelligence to Defender Needs - Identifying Activity Groups
Aligning Threat Intelligence to Defender Needs - Identifying Activity Groups
 
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. ReefBGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
hashdays 2011: Sniping Slowloris - Taking out DDoS attackers with minimal har...
hashdays 2011: Sniping Slowloris - Taking out DDoS attackers with minimal har...hashdays 2011: Sniping Slowloris - Taking out DDoS attackers with minimal har...
hashdays 2011: Sniping Slowloris - Taking out DDoS attackers with minimal har...
 
The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
 
What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?
 
In the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber AttacksIn the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber Attacks
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Brooks18
Brooks18Brooks18
Brooks18
 
HITB2013AMS Defenting the enterprise, a russian way!
HITB2013AMS Defenting the enterprise, a russian way!HITB2013AMS Defenting the enterprise, a russian way!
HITB2013AMS Defenting the enterprise, a russian way!
 
In the Line of Fire - The Morphology of Cyber-Attacks
In the Line of Fire - The Morphology of Cyber-AttacksIn the Line of Fire - The Morphology of Cyber-Attacks
In the Line of Fire - The Morphology of Cyber-Attacks
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
PLNOG16: DNS – przyjaciel e-szpiegów i e-złodziei. Analityka w służbie jej DN...
PLNOG16: DNS – przyjaciel e-szpiegów i e-złodziei.Analityka w służbie jej DN...PLNOG16: DNS – przyjaciel e-szpiegów i e-złodziei.Analityka w służbie jej DN...
PLNOG16: DNS – przyjaciel e-szpiegów i e-złodziei. Analityka w służbie jej DN...
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank
 
Cybersecurity and data privacy
Cybersecurity and data privacyCybersecurity and data privacy
Cybersecurity and data privacy
 
The Anatomy of an Anonymous Attack
The Anatomy of an Anonymous AttackThe Anatomy of an Anonymous Attack
The Anatomy of an Anonymous Attack
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say? Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say?
 

Similar to Exploring DDoS Attacks: Impact to Community Financial Institutions

30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
Kaukau9
 
security in IOT.pptx
security in IOT.pptxsecurity in IOT.pptx
security in IOT.pptx
Tulasi72
 
CNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring RationaleCNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring Rationale
Sam Bowne
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
John Donahue
 
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_230 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
Gaurav Srivastav
 
AtlSecCon 2016
AtlSecCon 2016AtlSecCon 2016
AtlSecCon 2016
Earl Carter
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
GDSCCVR
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
Chuck Brooks
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
APNIC
 
THE CYBER-DOME
THE CYBER-DOMETHE CYBER-DOME
THE CYBER-DOME
Dina Beer
 
Quant & Crypto Gold
Quant & Crypto GoldQuant & Crypto Gold
Quant & Crypto Gold
Andrew Hammond
 
Bangladesh bank heist case study!
Bangladesh bank heist case study!Bangladesh bank heist case study!
Bangladesh bank heist case study!
Mohammed Jaseem Tp
 
Akamai___WebSecurity_eBook_Final
Akamai___WebSecurity_eBook_FinalAkamai___WebSecurity_eBook_Final
Akamai___WebSecurity_eBook_Final
Cheryl Goldberg
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
Ian-Edward Stafrace
 
Cloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareCloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-ware
Tzar Umang
 
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkAdvantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
Jack Shaffer
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
David J Rosenthal
 
The 2019 Security Strategy
The 2019 Security StrategyThe 2019 Security Strategy
The 2019 Security Strategy
Cloudflare
 
Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?
Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?
Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?
Codero
 
DDOS Attack - Gurzu Nepal
DDOS Attack - Gurzu NepalDDOS Attack - Gurzu Nepal
DDOS Attack - Gurzu Nepal
GurzuInc
 

Similar to Exploring DDoS Attacks: Impact to Community Financial Institutions (20)

30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
 
security in IOT.pptx
security in IOT.pptxsecurity in IOT.pptx
security in IOT.pptx
 
CNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring RationaleCNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring Rationale
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_230 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
 
AtlSecCon 2016
AtlSecCon 2016AtlSecCon 2016
AtlSecCon 2016
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
THE CYBER-DOME
THE CYBER-DOMETHE CYBER-DOME
THE CYBER-DOME
 
Quant & Crypto Gold
Quant & Crypto GoldQuant & Crypto Gold
Quant & Crypto Gold
 
Bangladesh bank heist case study!
Bangladesh bank heist case study!Bangladesh bank heist case study!
Bangladesh bank heist case study!
 
Akamai___WebSecurity_eBook_Final
Akamai___WebSecurity_eBook_FinalAkamai___WebSecurity_eBook_Final
Akamai___WebSecurity_eBook_Final
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Cloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareCloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-ware
 
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkAdvantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
The 2019 Security Strategy
The 2019 Security StrategyThe 2019 Security Strategy
The 2019 Security Strategy
 
Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?
Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?
Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?
 
DDOS Attack - Gurzu Nepal
DDOS Attack - Gurzu NepalDDOS Attack - Gurzu Nepal
DDOS Attack - Gurzu Nepal
 

More from Jay McLaughlin

Evaluating your Cybersecurity Preparedness - FFIEC Assessment
Evaluating your Cybersecurity Preparedness - FFIEC AssessmentEvaluating your Cybersecurity Preparedness - FFIEC Assessment
Evaluating your Cybersecurity Preparedness - FFIEC Assessment
Jay McLaughlin
 
Securing the Virtual Branch
Securing the Virtual BranchSecuring the Virtual Branch
Securing the Virtual Branch
Jay McLaughlin
 
Securing 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingSecuring 3-Mode Mobile Banking
Securing 3-Mode Mobile Banking
Jay McLaughlin
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
Jay McLaughlin
 
Protecting the Information Infrastructure
Protecting the Information InfrastructureProtecting the Information Infrastructure
Protecting the Information Infrastructure
Jay McLaughlin
 
Social Media: Infiltrating The Enterprise
Social Media: Infiltrating The EnterpriseSocial Media: Infiltrating The Enterprise
Social Media: Infiltrating The Enterprise
Jay McLaughlin
 

More from Jay McLaughlin (6)

Evaluating your Cybersecurity Preparedness - FFIEC Assessment
Evaluating your Cybersecurity Preparedness - FFIEC AssessmentEvaluating your Cybersecurity Preparedness - FFIEC Assessment
Evaluating your Cybersecurity Preparedness - FFIEC Assessment
 
Securing the Virtual Branch
Securing the Virtual BranchSecuring the Virtual Branch
Securing the Virtual Branch
 
Securing 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingSecuring 3-Mode Mobile Banking
Securing 3-Mode Mobile Banking
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Protecting the Information Infrastructure
Protecting the Information InfrastructureProtecting the Information Infrastructure
Protecting the Information Infrastructure
 
Social Media: Infiltrating The Enterprise
Social Media: Infiltrating The EnterpriseSocial Media: Infiltrating The Enterprise
Social Media: Infiltrating The Enterprise
 

Recently uploaded

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 

Recently uploaded (20)

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 

Exploring DDoS Attacks: Impact to Community Financial Institutions

  • 1. September 9, 2013 DCI Annual Conference DDoS Attacks: The Impact to Community Financial Institutions Jay McLaughlin, CISSP Senior Vice President, Chief Security Officer
  • 2. September 9, 2013 Agenda • Overview of Distributed Denial-of-Service Attacks • Types of DoS attacks and why they are successful • Understanding the motives behind recent attacks • Detecting & Defending against an attack • Preparation for response to an attack • Steps to mitigate the attacks targeted to commit fraud
  • 3. September 9, 2013 Types of Denial-of-Service Attacks • SYN Floods/IP Floods • connection attacks; half open connections do not complete the handshake • HTTP GET/POST • Application level flood attacks • ICMP Attacks / ICMP Echo • ping of death; Smurf attacks • UDP Floods • DNS amplification attacks - send 64-byte query and return 3,363-byte return (50X amplification factor) • Teardrop Attacks • TCP packet fragmentation that attacks reassembly process
  • 4. September 9, 2013 New Waves of State-Sponsored Attacks • April 2007 began a three-week wave of massive cyber- attacks on the small Baltic country of Estonia • First known incidence of such an assault on a state • Targeted the government, banks, news agencies, and businesses • Recent DDoS attacks have indicated sponsorship or involvement of foreign nation states
  • 5. September 9, 2013 “Hacktivism” on the Rise •Definition: “Hacktivisim” – Non-violent use of legal and/or illegal computers and computer networks as a means in pursuit of political ends – Term first coined in 1998 by Cult of the Dead Cow •Most forms of political activism require the strength of masses; hacktivism can often the result from the power of one, or small group •Attacks often include defacement, sit-ins, e-mail bombs, & doxing •Most often carried out anonymously, and can take place over trans- national borders
  • 6. September 9, 2013 H-Activists Attacks Organized by “Anonymous” • Group formed in 2008 originally after an internal Church of Scientology video was redacted from YouTube • Gained public prominence in 2010 during its defense and support of WikiLeaks and its leader Julian Assange • Anonymous mobilized, unleashing its Low Orbit Ion Cannon (LOIC) tool, with which anyone could participate in DDoS attacks • Attacks waged against Mastercard, Visa, PayPal • Since attacked various causes, from cartels in Mexico, child pornography, protests against U.S. actions • Government entities, CIA & FBI, Sony, Westboro Baptist Church
  • 7. September 9, 2013 Operation Payback: Against Anti-Piracy
  • 8. September 9, 2013 Tools: No Skills Required (Example: LOIC)
  • 9. September 9, 2013 Waves of DDoS Attacks Against US Banks • Bank of America, Chase, Citigroup, HSBC, Wells Fargo, US Bank, Capital One, PNC Financial Services, Ally Bank, SunTrust Bank, Regions Bank, BB&T, Fifth-Third Bank, etc. • U.S. intelligence officials said they believe the attacks against the banks have been carried out or condoned by the Iranian govt • “Suspicions point towards a special unit of Iran’s Revolutionary Guard” – Sen. Joe Lieberman (CSPAN interview, Sept. 2012) • Experts cautioned it is difficult to accurately identify
  • 10. September 9, 2013 Responsibility for the latest attacks against banks? • Izz ad-Din Al-Qassam • Syrian prophet who fought against the French, British and Zionist elements in eastern Mediterranean regions in the 20’s and 30’s • “Brigades” is military wing of the Islamic resistance movement Hamas • “Cyber Fighters” is the hacker collective • Retaliation for the portrayal of Muslims in a series of movie trailers posted to YouTube for the film “Innocence of Muslims.”
  • 11. September 9, 2013 Warning of Attacks Against US Banks http://www.youtube.com/watch?v=xYVfBNKbfRQ
  • 12. September 9, 2013 DDoS Attacks Hit US Banks: Operation Ababil
  • 13. September 9, 2013 Pay-to-Play “Booter” Services
  • 14. September 9, 2013 Why are DDoS Attacks Successful? • Attackers are acquiring more bandwidth
  • 16. September 9, 2013 Why are DDoS Attacks Successful? • Attackers are acquiring more bandwidth • No longer compromise and recruit thousands or tens of thousands of end-user PCs to carry out the distributed denial-of-service attacks • Instead, targeting a handful of web servers that have more bandwidth and processing power • Yapping Chihuahuas morphed into fire-breathing Godzillas • The extra horse power of servers can create peak floods exceeding 100Gbps, a volume big enough to knock even large sites offline
  • 17. September 9, 2013 Compromised Endpoints: Botnet Armies • Researchers from the security firm Incapsula researchers noticed a website located in the UK that was exhibiting suspicious behavior • Discovered a backdoor that had been planted on it that was programmed to receive instructions from remote attackers • Website traffic was being directed to send a flood of HTTP and UDP packets to major banks including PNC HSBC, and Fifth Third Bank Source: Ars Technica; Jan. 2013 http://arstechnica.com/security/2013/01/secret-footsoldier-targeting-banks- reveals-meaner-leaner-face-of-ddos/
  • 18. September 9, 2013 Attacking The Stack • DDoS security firm Prolexic reported they have found several compromised servers were outfitted with “itsoknoproblembro” • (pronounced "it's OK, no problem, bro”) • DDoS tools that allowed the attackers to unleash network packets based on the UDP, TCP, HTTP, and HTTPS protocols. • These flooded the banks' routers, servers, and server applications • Attacked layers 3, 4, and 7 of the networking stack Source: Threatpost October 2012 http://threatpost.com/en_us/blogs/automated-toolkits-named-massive-ddos-attacks-against-us-banks-100212
  • 19. September 9, 2013 Preparing for DoS Attacks
  • 20. September 9, 2013 What Can Be Done in Advance? • DoS attacks cannot be prevented! • Adversaries will launch attacks and no technology, provider, plans, etc. can stop those actions from occuring • Element of your Risk Assessment • Risk 101: • Risks can NEVER be eliminated…but they CAN be mitigated
  • 21. September 9, 2013 Incident Response Planning • Critical to establish your plans • Don’t assume you won’t be a target • Most banks cannot fight these attacks alone • Relying on infrastructure will eventually help attacks achieve objectives • Ensure that providers and ISPs are prepared • Blocking source addresses and blacklisting traffic from geographic regions must be done “upstream” • Test plans to ensure preparedness (ex. tabletop testing)
  • 22. September 9, 2013 Understanding Your Network • Baseline network activity • Without established baselines, it is difficult to be identify when an onslaught or attack is starting • Real-time monitoring of inbound TCP/UDP traffic • Understand “normal” connection counts for web applications (e.g. OLB) • Track bandwidth utilization – what is typical? Good? Bad?
  • 23. September 9, 2013 Securing the Perimeter • Load Balance Traffic • Explicit access-control lists should permit only authorized traffic • Immediately drop all malformed protocol requests • Pre-built access-lists to block non-domestic inbound traffic or shun bad sources • Set rate limits and embryonic connection thresholds • DNS cat-mouse techniques • Enhance monitoring of traffic (early detection, baselines) • Work with your critical providers and ISPs in advance
  • 25. September 9, 2013 Critical Distinction • Politically-motivated attacks are a reality for prominent US institutions • they are now at risk of being targeted for activities unrelated to their own business • Different threat scenario for community banks • Community banks will more likely be targeted in combination with an account takeover event • DDoS attacks are significantly mitigated with the absence of account takeover fraud • DDoS attacks represent ONLY the 2nd half of the equation
  • 27. September 9, 2013 Account Takeover Fraud • Account takeover is one of the more prevalent forms of fraud.  It is the result of an attacker taking over another person's account, first by gathering information about the intended victim • Estimates from the FBI project that financial fraud resulting from account takeover attacks will exceed $1 billion this year  • Motivated by financial gain, this has become an extremely lucrative, criminal business
  • 28. September 9, 2013 •Defense-in-depth (“deep” or “elastic”) •Derived from traditional military strategy • requires that a defender deploy resources at and well behind the front line •Reliance on any single control or mitigating factor is not sufficient •Prevents shortfalls in any single defense control Building a Layered Security Model
  • 29. September 9, 2013 • Strong multi-factor authentication • one-time passwords (OTPs), temporary access codes (TACs) • Out-of-band transaction authorization • Cannot only focus around authentication events • Anomaly detection for suspicious transactions based on characteristics/patterns • Dual Approval controls / Segregation of duties • Enhanced controls over account activities • Transactions limits, payment recipients, thresholds Fighting Account Takeover Fraud
  • 30. September 9, 2013 Out-of-Band Transaction Authorization • FFIEC’s June 2011 Guidance states: • “Out-of-band authentication means that a transaction that is initiated via one delivery channel [e.g.. online] must be re- authenticated or verified via an independent delivery channel [e.g.. telephone] in order for the transaction to be completed”  out-of-band authentication directed to through the same device that initiates the transaction may not be effective since that device may have been compromised • Out-of-band authorization is can be extremely effective in protecting customers against financial malware attacks and Trojans
  • 31. September 9, 2013 Leverage Alerts • Users must play a part and participate in fighting fraud • Real-time alerts delivered to a victim are timely and provide the opportunity to alert the financial institution of activity • Transactional Alerting  Ex: creation, authorization • Changes to profile settings • Security Event Alerts  Ex: changes to delivery targets, failed logon attempts
  • 32. September 9, 2013 Communicating with Customers • FFIEC has been critical of the lack of communication provided by banks and institutions that have been attacked • This represents a fine line, as any public communication may disclose response plans, details, or other information to attackers • Establish general communication templates that will be used in the event of an attack • Know how and at what point to communicate
  • 33. September 9, 2013 Summary & Wrap Up • Hacktivists attacks have illustrated severity of DoS • Better understanding of denial-of-service attacks • DoS attacks are being used in multifaceted fraud • Critical distinction between publicized attacks • Establish and test your plans • Reduce account takeover fraud with layered controls
  • 34. September 9, 2013 “The future ain’t what it used to be.” -Lawrence “Yogi” Berra New York Yankees, 1946-1964 Be Prepared
  • 35. September 9, 2013 Declare var $response if [?] >= ‘1’ then $response = ‘answer’ else $response = ‘thankyou’ end if; Questions
  • 36. September 9, 2013 linkedin.com/in/mclaughlinjay Email: jmclaughlin@q2ebanking.com Thank you

Editor's Notes

  1. 1. SYN->SYN/ACK->ACK 2. Goal of an attack: make services unavailable; disruption! 3. Work by pounding on infrastructure
  2. Riff over the Estonians' removal of the Bronze Soldier Soviet war memorial in central Tallinn
  3. Doxing – exposing or “outing” and individual or organization
  4. WikiLeaks came under fire from the U.S. government after the site obtained video footage from a U.S. helicopter strike in Iraq that killed two Reuters employees, as well as two children. Next, Assange began to coordinate--together with major newspapers in multiple countries--the release of hundreds of thousands of secret U.S. government cables beginning in December 2010. PayPal and credit-card processors MasterCard and Visa blocked payments to WikiLeaks, which relied on donations to lease server space and pay staff.
  5. Low Orbit Ion Cannon is an open source network stress testing and denial-of-service attack application which floods a server with TCP packets or UDP packets
  6. “ In [a] new phase [of coming attacks], the wideness and the number of attacks will increase explicitly; and [target banks] will not be able to imagine and forecast the widespread and greatness of these attacks.” The threat was delivered after weeks of silence following a slew of distributed denial-of-service (DDoS) attacks which spanned for more than a month against some of the nation’s largest financial institutions.
  7. 1)The controversial hacker known as The jester (th3j35t3r) claims that Anonymous hackers provided Izz ad-Din al-Qassam Cyber Fighters – the group who has been launching attacks against US banks – the necessary means to disrupt the financial institutions’ websites. 2)a DDOS attack lasting 5 hours would cost $15 (12 EUR), and one lasting for 1337 hours was priced at $300 (240 EUR).
  8. Attackers don’t directly launch attacks on enterprise networks - instead they plant malicious code in several computer that act as zombies and they take control over the computers through botnets to launch DoS attacks simultaneously from many sources.
  9. Attackers don’t directly launch attacks on enterprise networks - instead they plant malicious code in several computer that act as zombies and they take control over the computers through botnets to launch DoS attacks simultaneously from many sources.
  10. -the administration password was simply "admin” -demonstration of how security in the internet is always determined by the weakest link -simply neglecting to manage an administrative password in a small site in the UK can be very quickly exploited by botnet shepherds operating obscurely out of Turkey
  11. Other security firms have noted finding more automated toolkits installed on compromised servers
  12. Last point: who will have your back when these attacks occur?
  13. With a layered security model, the weakness in one control is compensated by the strength of another control. If the attacker breaches the perimeter, he is met with resistance as he attempts to advance further.
  14. Relative to electronic banking, t his approach relies on different controls at different points in the transaction.
  15. Jay intro, then Caity Out of band delivery is more effective Users must play a role in this – real time alerts can allow the user to be alerted to fraud before the FI knows about it Out of band delivery is more effective – highly recommend speaking to customers about setting these alerts up to be delivered to voice or SMS – email susceptible to being intercepted
  16. use this information to promote additional safeguards that your customers can use as protection against ATO fraud