30
Webinar series August 29, 2016

Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

Webinar series – August 29, 2016

Page 2: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

How to Prevent SWIFT Network Attacks

A Webinar series Brought to you by Global RADAR’s

BSA News Now

Copyright © Global RADAR®

Page 3: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

Presenter:

Paul Wilson Product Manager

Easy [email protected]

Product Manager DID and DTAMobile: +44 (0)7903 399 890

www.easysol.net

Copyright © Global RADAR®

Page 4: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

How to Prevent SWIFT Network Attacks

Paul Wilson

Product Manager

Page 5: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

AGENDA

• Recent attacks on the SWIFT network

• What are the SWIFT network’s vulnerabilities?

• Could the attacks on the SWIFT network have been prevented?

• How to quickly detect and stop fraudulent financial activity

Page 6: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

3

Cybercriminals attempted to steal approx. $1 billion in an attack on a Bangladeshi bank

Page 7: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

4

Highly Unusual Malware Used – mscoutc.exe

• Used a vulnerability in a common pdf reader as attack vector

• Deleted configuration and log files

• Uses wipe-out techniques to prevent files from being recovered forensically

• File-delete function

• Manipulated printers to prevent SWIFT network confirmation messages from being received

• Identical to Sony hack attack techniques

Page 8: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

5

Hackers steal US$9 Million from Ecuadorean bank via SWIFT

Page 9: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

6

These are just the attacks that have been made public through journalists and court records.

Page 10: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

7

The SWIFT network is a messaging system at its core.

Page 11: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

8

SWIFT recently launched a web access portal

• SWIFT has noted that the network itself wasn’t compromised

• ”…the attackers have exploited vulnerabilities in banks funds’ transfer initiation environments, prior to messages being sent over SWIFT.”

Page 12: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

What SWIFT Says

9

“Please remember that as a SWIFT user you are responsible for the security of your own systems interfacing with the SWIFT network and your related environment – starting with basic password protection practices – in much the same way as you are responsible for your other security considerations.”

Page 13: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

10

• SWIFT has noted that the network itself wasn’t compromised

• ”…the attackers have exploited vulnerabilities in banks funds’ transfer initiation environments, prior to messages being sent over SWIFT.”

Insiders are also a threat

• Malware was designed just for the bank attacked in Bangladesh, defeating systems and checks

• The SWIFT attacks have been so sophisticated and complex that it is surmised that an employee must have collaborated with the cybercriminals.

Page 14: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

11

Could the SWIFT Attacks Have Been Prevented?

Page 15: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

12

You may not know what future attacks will look like, but you can still make them harder for cybercriminals to launch.

Page 16: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

13

Multi-Factor Authentication –The Bare Minimum

Page 17: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

14

Malware Detection and Mitigation beyond Blacklists

• Threats are moving faster than legacy endpoint detection solutions can identify and stop them

• Having 100% of end users covered is crucial

• The goal is disabling malware, not removing it.

Page 18: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

15

Fraud Intelligence – Do you know if there are…

Suspicious connections to your portals?

Similar domains to yours on the web?

Social media profiles using your brands, that you didn’t create?

Unauthorized applications with your brand imagery on app stores?

Spoofers of your domains sending fake messages?

Page 19: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

16

16

• What if insiders disable all of your protection methods?

• What if social engineering tricks your employees into enabling an attack?

• What if the problem is at another less secure bank processing a transaction along with yours?

When Every Other Protection Layer Breaks Down

Page 20: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

17

All wire transactions passing from one bank

account to another through SWIFT must be recorded, tracked and

contextualized.

Page 21: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

18

A spelling mistake in a transaction order, noticed by a

bank employee, raised a red flag. It stopped millions of more dollars from being stolen.

Machine learning can automate the discovery and alerting of

such errors.

Page 22: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

19

Manually updating lists of known or

suspected fraudulent destinations, and the bank accounts tied to

them, is no longer enough.

Page 23: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

20

Rules for what you’ve seen before, machine learning and heuristic analysis to predict future fraud.

Page 24: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

21

Compound Evaluations

Events that might not indicate fraud by themselves may indicate it when found together.

Page 25: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

Filters and Rules

How to detect fraudulent transactions & activities

First Stage Second Stage Third Stage

Location Deviation

Time Deviation

Behavior Heuristic Engine Suspicious Activity Analyzers

Page 26: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

Taking a complete approach

• Behavioral Learning to react faster to new fraud strategies

• Rules and Suspicious Activity Analyzers

• Keep your best performing rules while leveraging heuristics for everything else

• Complete Solution for Fraud Management

23

DetectTA Dashboard

Page 27: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

In ReviewStopping SWIFT attacks in the future

• Anomaly detection

• Automated predictions through machine-based learning

• Automatic list updates of suspicious fraudulent accounts/destinations

• Compounded evaluations

• All a part of DetectTA from Easy Solutions

Page 28: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

QuestionsFor more information, you may visit www.GlobalRADAR.com

Copyright © Global RADAR®

Additional questions – For personalized responses to any questions, send requests to:

[email protected]

Page 29: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

Upcoming Webinars

De-Risking 101September 29, 2016 - 10:30 AM (EST)

Copyright © Global RADAR®

STANLEY I. FOODMAN, CEO

Page 30: Webinar series August 29, 2016 - Global RADAR · 2017-03-04 · over SWIFT.” Insiders are also a threat • Malware was designed just for the bank attacked in Bangladesh, defeating

Thank you.

BSA News Now and Global RADAR wish to thank you

for your participation in today’s webinar.