Treasury and Trade Solutions - Citibank · 2016. 5. 16. · China $71BN Japan $0.93BN Germany $54BN...

17
Elizabeth Petrie, Director Strategic Intelligence Analysis Your Personal Cyber Hygiene: What It Means to your Company 05 November 2015 Treasury and Trade Solutions

Transcript of Treasury and Trade Solutions - Citibank · 2016. 5. 16. · China $71BN Japan $0.93BN Germany $54BN...

Page 1: Treasury and Trade Solutions - Citibank · 2016. 5. 16. · China $71BN Japan $0.93BN Germany $54BN Average annualized cost of cybercrime to companies in 20143 ... Caller pretends

Elizabeth Petrie, Director Strategic Intelligence Analysis

Your Personal Cyber Hygiene: What It Means

to your Company

05 November 2015

Treasury and Trade Solutions

Page 2: Treasury and Trade Solutions - Citibank · 2016. 5. 16. · China $71BN Japan $0.93BN Germany $54BN Average annualized cost of cybercrime to companies in 20143 ... Caller pretends
Page 3: Treasury and Trade Solutions - Citibank · 2016. 5. 16. · China $71BN Japan $0.93BN Germany $54BN Average annualized cost of cybercrime to companies in 20143 ... Caller pretends
Page 4: Treasury and Trade Solutions - Citibank · 2016. 5. 16. · China $71BN Japan $0.93BN Germany $54BN Average annualized cost of cybercrime to companies in 20143 ... Caller pretends

Warning: We’ve already warned you and this is just the beginning. We continue until our request be met. We’ve obtained all of your internet data including your secrets and top secrets. If you don’t obey us, we’ll release data shown below to the world. Determine what you will do til August the 31st, 11PM (GMT). Data Link: https://www. https://www. https://www. https://www. https://www.

Picture Source: Library of Congress http://www.loc.gov/search/?q=halloween+pictures&sp=2

Page 5: Treasury and Trade Solutions - Citibank · 2016. 5. 16. · China $71BN Japan $0.93BN Germany $54BN Average annualized cost of cybercrime to companies in 20143 ... Caller pretends

Cyber Attack is an attempt by online criminals to access or damage a computer network/system

often stealing data or money, and using both technical and non-technical methods.

Cyber Attacks—Common Tactics and Impacts on Business

1. Computer Weekly; “Cyber crime is a threat to global economy, says researcher”; February 2015.

2. McAfee; “Net Losses: Estimating the Global Cost of Cybercrime”; June 2014.

3. Ponemon Institute; “2014 Global Report on the Cost of Cyber crime”; October 2014.

Social Engineering

Relying on human

interaction to trick people

into breaking security

procedures and sharing

useful information for

exploit efforts

$445 Billion Estimated global cost of cybercrime as of February 20151

All others

$203BN

US

$116BN

China

$71BN

Japan

$0.93BN

Germany

$54BN

Average annualized cost of cybercrime to companies in

20143

United States

Germany

Russia

Common Attack Methods Impact on Business

Malware

Software tools that enable

an unauthorized user to

gain control of a computer

system and gather

sensitive information

Spear Phishing

Emails or online posts

that masquerade as a

trustworthy party in an

attempt to trick the target

into divulging information

or downloading malware

Cyber Masquerading

Taking over executive

account to conduct cyber

espionage or complete

financial transaction

Human Effect

Human + Technology

Technology

$242 Billion

Combined cost to top four global economies2

$12.7 M

$6.8 M

$1.8 M

Page 6: Treasury and Trade Solutions - Citibank · 2016. 5. 16. · China $71BN Japan $0.93BN Germany $54BN Average annualized cost of cybercrime to companies in 20143 ... Caller pretends

• Laptop Malware

• Type: Backdoor

• 2008 Version

• Access user files to include confidential information

• Record user keystrokes

Malware Capabilities:

• Activate computer webcam and audio recorder

• Copy computer screenshots

• Delete, download, or alter files and file systems

Page 7: Treasury and Trade Solutions - Citibank · 2016. 5. 16. · China $71BN Japan $0.93BN Germany $54BN Average annualized cost of cybercrime to companies in 20143 ... Caller pretends

Search Google for

“Citi LinkedIn”

Charlie Accepts Connection Request

Page 8: Treasury and Trade Solutions - Citibank · 2016. 5. 16. · China $71BN Japan $0.93BN Germany $54BN Average annualized cost of cybercrime to companies in 20143 ... Caller pretends

A search through Charlie’s

connections finds the target

Targeting

Page 9: Treasury and Trade Solutions - Citibank · 2016. 5. 16. · China $71BN Japan $0.93BN Germany $54BN Average annualized cost of cybercrime to companies in 20143 ... Caller pretends

Interests: Portuguese Water Dogs, Kayaking, Snowboarding

Email: [email protected]

Compromise

Page 10: Treasury and Trade Solutions - Citibank · 2016. 5. 16. · China $71BN Japan $0.93BN Germany $54BN Average annualized cost of cybercrime to companies in 20143 ... Caller pretends

Charlie Donat <[email protected]>

Malware embedded in picture

Delivery

Page 11: Treasury and Trade Solutions - Citibank · 2016. 5. 16. · China $71BN Japan $0.93BN Germany $54BN Average annualized cost of cybercrime to companies in 20143 ... Caller pretends

What Aretha sees What the attacker sees

Page 12: Treasury and Trade Solutions - Citibank · 2016. 5. 16. · China $71BN Japan $0.93BN Germany $54BN Average annualized cost of cybercrime to companies in 20143 ... Caller pretends

Remote Desktop What the attacker sees

Page 13: Treasury and Trade Solutions - Citibank · 2016. 5. 16. · China $71BN Japan $0.93BN Germany $54BN Average annualized cost of cybercrime to companies in 20143 ... Caller pretends

Webcam Capture What the attacker sees

Page 14: Treasury and Trade Solutions - Citibank · 2016. 5. 16. · China $71BN Japan $0.93BN Germany $54BN Average annualized cost of cybercrime to companies in 20143 ... Caller pretends

What the attacker has access to

Emails Calendar Items Documents

Page 15: Treasury and Trade Solutions - Citibank · 2016. 5. 16. · China $71BN Japan $0.93BN Germany $54BN Average annualized cost of cybercrime to companies in 20143 ... Caller pretends

Cyber attackers are increasingly targeting financial centers to steal money and sensitive data.

The biggest threat is the combined type of attacks using various tactics.

Cyber Threat Trends Against Financial Centers and Assets

Trends in Cyber Crime Common Manifestation against Financial Centers

Targeted victims

Sophisticated tools

Persistence and

long-term outlook

New players:

Organized Crime

Indirect attacks

Caller pretends to be bank’s fraud team or Microsoft Help. Victim reveals

sensitive information or even allows screen sharing on their machine leading to

exploitation and fraud.

New malware programmers are using sophisticated methods that evade Anti-

Virus solutions. Banking malware now features file stealing capabilities.

Advanced tools are added to infected machines to steal valuable

intellectual property.

Blackmail and Extortion schemes, Data stealing, and even Drug and Human

Smuggling is being aided by cyber crime services.

Attacker targets third-party vendors in order to access sensitive financial center

data/systems and steal data/money.

Multi-vector attacks Attacks against treasurers are delivered in multiple phases, Using Email, Social

Media, unsecure Mobile/Personal devices to log into corporate assets.

Page 16: Treasury and Trade Solutions - Citibank · 2016. 5. 16. · China $71BN Japan $0.93BN Germany $54BN Average annualized cost of cybercrime to companies in 20143 ... Caller pretends

Attackers use a wide variety of tactics, techniques, and procedures to

accomplish successful cyber attacks.

Understanding the Anatomy of a Cyber Attack

Targeting and Compromise

Lateral Movements

Persistence Exploration Exfiltration Cover Tracks

Hacker targets

Treasurer based on

the LinkedIn

update and then

compromises the

LinkedIn account

via password

guessing

Hacker conducts

reconnaissance

and makes

connections with all

associates holding

a Treasurer title

linked to that

account

By using malware

to compromise

email accounts, the

Hacker ensures

that they have a

foothold into the

victim, even if the

LinkedIn

compromise is

discovered

Attacker conducts

lengthy research of

the victim network,

including

decryption of data

throughout the

compromised

networks

Attacker removes

data from the

victim network

(e.g. using of

encryption) to

make it difficult for

stolen data to

be identified

Attacker destroys

artifacts and

evidence of their

intrusion

Examples

Page 17: Treasury and Trade Solutions - Citibank · 2016. 5. 16. · China $71BN Japan $0.93BN Germany $54BN Average annualized cost of cybercrime to companies in 20143 ... Caller pretends

IRS Circular 230 Disclosure: Citigroup Inc. and its affiliates do not provide tax or legal advise. Any discussion of tax matters in these materials (i) is not intended or written to be used, and cannot

be used or relied upon, by you for the purpose of avoiding any tax penalties and (ii) may have been written in connection with the “promotion or marketing” of any transaction contemplated hereby

(“Transaction”). Accordingly, you should seek advice based on your particular circumstances from an independent tax advisor.

Any terms set forth herein are intended for discussion purposes only and are subject to the final terms as set forth in separate definitive written agreements. This presentation is not a commitment

or firm offer and does not obligate us to enter into such a commitment, nor are we acting as a fiduciary to you. By accepting this presentation, subject to applicable law or regulation, you agree to

keep confidential the information contained herein and the existence of and proposed terms for any Transaction.

We are required to obtain, verify and record certain information that identifies each entity that enters into a formal business relationship with us. We will ask for your complete name, street address,

and taxpayer ID number. We may also request corporate formation documents, or other forms of identification, to verify information provided.

© 2015 Citibank, N.A. All rights reserved. Citi and Citi and Arc Design are trademarks and service marks of Citigroup Inc. or its affiliates and are used and registered throughout the world.