the anatomy of a breach - sans · the anatomy of a breach- agenda • the legitimate purchase •...

59
© 2013 Trustwave Holdings, Inc. 1 Jonathan Spruill Senior Security Consultant, SpiderLabs The Anatomy of a Breach Smart security on demand

Upload: others

Post on 03-May-2020

11 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 1

Jonathan Spruill

Senior Security Consultant, SpiderLabs

The Anatomy of a Breach Smart security on demand

Page 2: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 2

The Anatomy of a Breach- Agenda

• The Legitimate Purchase

• Attackers Penetrate and Steal

• The Black Market

• Fraud

• Detection

• Investigation and Remediation

• The Hunt

• Conclusion

Page 3: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 3

The Attack Du Jour

• This presentation focuses on the theft of Cardholder Data

• Data breaches are all the same, the only thing that changes is the

target data

• The means, and method are a constant

• Once that has been recognized, investigative strategies can be

developed to maximize response time and minimize delays

3

Page 4: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 4 © 2012

THE ATTACKS

Page 5: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 5

The Attacks - POS

• IT companies and POS Integrators often support their customers remotely,

this reduces their costs and allows them to support dozens of customers

from a single location.

• There are several programs available that make it very easy for IT

companies to work this way.

• Microsoft Remote Desktop

• PCAnywhere

• Virtual Network Connection (VNC)

• All very popular and cheap or free.

Remote Access

Page 6: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 6

The Attacks - POS

• There are several major players in the Point of Sale

industry:

• Radiant/Aloha

• Micros

• PosiTouch

• Xpient

• Digital Dining

• Granbury/Firefly

• By default, they all have simple default usernames and

passwords.

Remote Access

Page 7: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 7

The Attacks - POS

Remote Access

• Radiant/Aloha

• Micros

• PosiTouch

• Xpient

• Digital Dining

• Granbury/Firefly

• aloha:hello

• micros:micros or M1cr0s9700

• posi:posi

• support:support

• ddpos:ddpos

• term1:term1

• pos:pos

Page 8: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 8

THE LEGITIMATE TRANSACTION Neighborhood Restaurant

POS Register Back of House Server

TXAUSTIN^SMITH$JOHN^1122 ELM ST

^?;63601234567855=151077441023?

TXAUSTIN^SMITH$JOHN^1122 ELM ST

^?;63601234567855=151077441023?

Page 9: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 9

The Attacks - POS

Malware - Keyloggers

POS Register

B3421303621931843^Starscream/Jules^091010100000019301000000877000000?;3421303621931843=0910101193010877?

• Card reader is usually a simple USB device that

is treated just like keyboard input.

Page 10: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 10

The Attacks - POS

Malware – Memory and Process Scrapers

B3421682999620492^Roboto/Pantera^140910100000019301000000877000000

B3421133323698695^Zappa/Frank^090710100000019301000000877000000?;3421133323698695=0907101193010877?

B3421303621931843^Starscream/Jules^091010100000019301000000877000000?;3421303621931843=0910101193010877?

Page 11: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 11

MALWARE IS SERVED Neighborhood Restaurant

POS Register Back of House Server

TXAUSTIN^SMITH$JOHN^1122 ELM ST

^?;63601234567855=151077441023?

TXAUSTIN^SMITH$JOHN^1122 ELM ST

^?;63601234567855=151077441023?

Page 12: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 12

EXAMPLE: POS MALWARE INFECTION A Large Fast Food Franchise

Franchise’s provider

uses default

username and

password for

POS remote

access.

Attackers gain

access to a single

location. Then find

IP address for all

locations.

All locations

breached. Custom

malware is

deployed.

Cardholder

data is

harvested for

7 months

before

discovery.

Page 13: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 13

The Attacks - Ecommerce

• Remote Access

– ColdFusion Administrator, JBOSS, phpMyAdmin

• Coding flaws

– SQL Injection

– Local and Remote File Inclusion

– Unrestricted image uploads

The attack vectors and the malware change but the point is still the same - Harvest credit cards.

Page 14: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 14

The Attacks - Ecommerce

• Stored data

– Bonus for attackers!

• 1.8 million is the current Trustwave record

– Weak or no encryption in place

• Code modifications are made

– Submit sends data to a file

– Or directly out to another server

Once access is gained, malware is installed or data is collected.

Page 15: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 15

THE LEGITIMATE TRANSACTION Online Clothing Retailer

John Smith

1122 Elm St

Salem’s Lot ME

63601234567855

11/16

6464

Page 16: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 16

MALWARE IS SERVED Online Clothing Retailer

John Smith

1122 Elm St

Salem’s Lot ME

63601234567855

11/16

6464

Page 17: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 17

EXAMPLE: E-COMMERCE DATA BREACH

The schema is

identified. Even

though data is

encrypted, the

“decrypt” function is

a stored procedure.

A complex SQL

statement decrypts

the data and

outputs to file in the

“images” directory,

encoded and

renamed.

.

Attackers

navigates to the

“images”

directory, and

export the

harvested data.

Online Clothing Retailer

Improper input

validation allows

attacker to send

SQL statements

to the database.

Page 18: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 18 © 2012

THE BLACK MARKET

Page 19: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 19

The Black Market

• Google “carding forum”

– The first 15 or so pages are hits for sites where you can create

an account, search for the type of cards you want to purchase

(Amex, Visa, MC…), and purchase the data for between $5

and $50.

– The big sites have started blending massive amounts of cards

from huge stored data breaches to make detection more

difficult.

The black market for credit card data is flourishing

Page 20: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 20

“DUMPS” BUSINESS CYCLE

Hackers

Card Processor

Database

Major Retailer

Database

Major Dumps Vendors

Reseller Reseller

Street-level Customer

Street-level Customer

Street-level Customer

Street-level Customer

Street-level Customer

Page 21: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 21

No Shortage of Dumps Vendors

Page 22: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 22

Dump Sites

C13.cc

Page 23: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 23

Dump Sites

C13.cc

Page 24: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 24

Page 25: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 25

BadB’s fully automated dumps vending website

Page 26: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 26

AUTOMATING STOLEN CARD SALES

• Dumps.name

• Trackservices.biz

• Zukkoshop.net

• CardRockCafe.biz

• Track2.name

• Cvvshop.com

• Cvv2shop.com

• Dumps.ws

• Darkservices.cc

• Autosell.cc

• FreshShop.su

• Mn0g0.su

• Hqcc.biz

• Cardt.ru

• CCshop.su

• Vaultmarket.org

• LTDcc.com

• Cvv2.su

• CC.am

• Killa.cc

• Bigseller.cc

• CCsell.biz

Page 27: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 27

Plastics

Counterfeit Plastics

Page 28: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 28

Plastics

So you bought yourself some track data and some nice plastic? Now what?

Page 29: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 29 © 2012

FRAUD

Page 30: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 30

Fraud

• Sophisticated carders will have a fake ID made and will

use a high limit card. High end electronics are a

favorite.

– Usually high end goods that can be easily sold again on Ebay,

Amazon, Craigslist, etc…

• Ever seen that innocent sounding ad on Craigslist “I received 2

iPads for Christmas, selling one at a slight discount?

– Carder

• “My new roommate has the same brand-new Xbox as me, need to

sell one”

– Carder

Card Present

Page 31: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 31

Fraud

• Another big scam related to CNP fraud is to run an Ebay shop

selling big heavy electronics like TV’s at a discount.

– Shopper buys product that the carder on the other end doesn’t

actually have.

• Carder makes fraudulent purchase from legitimate business like

Best Buy and ships directly to unwitting Ebay buyer who gets a

beautiful brand new TV.

– Airline tickets

• Another big CNP purchase, always for hot destinations like LAX to

Honolulu.

– “I bought these First Class tickets and now my wife and I can’t go,

please buy them at a discount”

Card Not Present

Page 32: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 32

Fraud-ATM

• Particularly nasty breach of a prepaid card provider

– Globally orchestrated event

– Direct attacker access to cash

– Attackers maintained total control over a provider database and

manipulated balances and accounts over a holiday weekend.

– Access to balances, Account numbers, TRACK DATA, PIN

reset system

– Simple attack utilizing SQL Injection (OWASP #1)

– Millions and millions in multiple currencies stolen

ATM Cashouts

Page 33: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 33

Fraud-ATM Profile of an ATM Cash Out Attack

Mexico

U.S.

Canada

Dominican Republic

UK

Russia

UAE

Japan

Estonia

Latvia

Italy

Germany

Ukraine

Pakistan

Sri Lanka

Spain

Egypt

Belgium

Romania

Thailand

Malaysia

Indonesia

Page 34: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 34 © 2012

PLAYERS

Page 35: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 37

Threat Landscape

37

Page 36: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 38

Threat Landscape

38

Page 37: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 39

Threat Landscape

39

Page 38: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 40

Threat Landscape

40

Dimitri Golubov

Page 39: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 41

Threat Landscape

41

Max Butler

$2,000,000 in credit card theft

Sentenced to 13 years in prison

Page 40: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 42

Threat Landscape

42

Albert Gonzalez

$170,000,000 in credit card, and ATM

fraud

Sentenced to 20 years in prison

Page 41: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 43

Threat landscape

43

Lin Min Poo

Egor Shevelev

Dimitri Smilianets

Brian Salcedo

Page 42: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 44 © 2012

DETECTION

Page 43: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 45

Detection Percentages

Page 44: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 46

Detection - Self

• Customer spots malware or a lot of customers come in

saying their cards were stolen right after a

stay/meal/beer.

– Rare for a customer or antivirus to detect card stealing

malware

– Even more for customers to accurately say which business is

leaking their data.

Least common (only 24% of the time)

Page 45: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 47

Detection-Law Enforcement

• Law Enforcement receives enough complaints about a

specific business to identify a Common Point, or

another case leads to a jump server and good old-

fashioned police work identifies more victim

businesses.

– Significantly more common than self-detection

– Usually much faster than the banks or card brands detection

Somewhat common

Page 46: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 48

Detection- Banks or Card Brands

• This is the most common detection method

– Many local banks, especially Credit Unions, seem to pick up

fraud on their own customers accounts pretty quickly.

Unfortunately they are the exception.

• Visa, MC, Amex, Discover • All have their own proprietary monitoring systems to detect high

percentages of fraud.

– 210 day average time to detection

– Attack “blending” on the dump sites is hurting their ability to detect

– -Bad news - You are usually forced to hire me as a PFI

Page 47: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 49

TIMELINE: INTRUSION TO CONTAINMENT

AVERAGE: 210 DAYS TO DETECTION

Businesses Slow to Detect

Page 48: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 50 © 2012

INVESTIGATION AND REMEDIATION

Page 49: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 51

Most Attacked:

Web & Mobile Applications

TOP TARGET ASSETS

Page 50: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 52

Malware Variations

Page 51: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 53 © 2012

THE HUNT

Page 52: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 54

“I rob banks…what do you do?”

- John Dillinger

“Why do I rob banks?

Because that’s where the money is.”

- Willie Sutton

The Original “Original Gangsters”

Page 53: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 55

The Hunt

Charles Williamson

A.K.A. “Guerilla Black”

Pled Guilty to federal

“Conspiracy, unauthorized

access to a protected

computer to facilitate fraud,

access device fraud, bank

fraud, and aggravated identity

theft” charges on July 9, 2013

– To be sentenced in October

2013.

Page 54: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 56

The Hunt

Christopher Schroebel - 21

A.K.A. “Junkie”

Serving 7 years for

“Obtaining Information From a

Protected Computer”

Captured with 84,000 credit card

numbers in his possession.

Rolled on his homies

Page 55: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 57

The Hunt

David Benjamin Schrooten

A.K.A. “Fortezza”

Dutch National

Head of the carding forum

“Kurupt.su”

Sentenced to 12 years after

pleading guilty to “Conspiracy

to Commit Access Device

Fraud and Bank Fraud,

Access Device Fraud, Bank

Fraud, Intentional Damage to

a Protected Computer, and

Aggravated Identity Theft.”

Page 56: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 58 © 2012

CONCLUSION

Page 57: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 59

Conclusion

• Until it is either too risky to continue or the profit is

gone, financial cybercrime will continue to grow.

• The same methods used to attack businesses and

institutions that hold financial data are used against

those which hold classified data.

• Be proactive about protecting your assets, I don’t want

to see your data on pastebin.

• Join up! If you have skills to offer your local ECTF,

inquire about joining.

Page 58: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 60

Resources

• Follow me or the Spiderlabs on Twitter

– @restrictedbytes

– @spiderlabs

• Download the 2014 GSR

– https://www.trustwave.com/gsr

• Read more about your local ECTF

– www.secretservice.gov/ectf.shtml

• Visit the Spiderlabs blog

– anterior.spiderlabs.com

Page 59: The Anatomy of a Breach - SANS · The Anatomy of a Breach- Agenda • The Legitimate Purchase • Attackers Penetrate and Steal • The Black Market ... selling big heavy electronics

© 2013 Trustwave Holdings, Inc. 61 © 2012

QUESTIONS?