lessons learned from bangladesh bank … and maintain project plan build use case. identify internal...

26
An independent member of UHY International © UHY Advisors, Inc. 2016 All Rights Reserved LESSONS LEARNED FROM BANGLADESH BANK HEIST ISACA GEEK WEEK 2016

Upload: dinhnga

Post on 09-May-2018

214 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: LESSONS LEARNED FROM BANGLADESH BANK … and Maintain Project Plan Build use case. Identify internal resources. Identify tools . Define milestones. Monetize the effort. Exploit People

An independent member of UHY International© UHY Advisors, Inc. 2016 All Rights Reserved

LESSONS LEARNED FROM BANGLADESH BANK HEISTISACA GEEK WEEK 2016

Page 2: LESSONS LEARNED FROM BANGLADESH BANK … and Maintain Project Plan Build use case. Identify internal resources. Identify tools . Define milestones. Monetize the effort. Exploit People

An independent member of UHY International© UHY Advisors, Inc. 2016 All Rights Reserved

WHAT’S GOING ON?

Page 3: LESSONS LEARNED FROM BANGLADESH BANK … and Maintain Project Plan Build use case. Identify internal resources. Identify tools . Define milestones. Monetize the effort. Exploit People

An independent member of UHY International© UHY Advisors, Inc. 2016 All Rights Reserved

Victim

WHAT’S GOING ON?

Page 4: LESSONS LEARNED FROM BANGLADESH BANK … and Maintain Project Plan Build use case. Identify internal resources. Identify tools . Define milestones. Monetize the effort. Exploit People

An independent member of UHY International© UHY Advisors, Inc. 2016 All Rights Reserved

WHAT’S GOING ON?

Criminal

Page 5: LESSONS LEARNED FROM BANGLADESH BANK … and Maintain Project Plan Build use case. Identify internal resources. Identify tools . Define milestones. Monetize the effort. Exploit People

An independent member of UHY International© UHY Advisors, Inc. 2016 All Rights Reserved

MAIA SANTOS DEGUITO

Rizal Bank Manager with Attorneys

Page 6: LESSONS LEARNED FROM BANGLADESH BANK … and Maintain Project Plan Build use case. Identify internal resources. Identify tools . Define milestones. Monetize the effort. Exploit People

An independent member of UHY International© UHY Advisors, Inc. 2016 All Rights Reserved

THE BANGLADESH HEIST

Page 7: LESSONS LEARNED FROM BANGLADESH BANK … and Maintain Project Plan Build use case. Identify internal resources. Identify tools . Define milestones. Monetize the effort. Exploit People

An independent member of UHY International© UHY Advisors, Inc. 2016 All Rights Reserved

$150MM USE CASE

Page 8: LESSONS LEARNED FROM BANGLADESH BANK … and Maintain Project Plan Build use case. Identify internal resources. Identify tools . Define milestones. Monetize the effort. Exploit People

An independent member of UHY International© UHY Advisors, Inc. 2016 All Rights Reserved

THREAT ACTORS

Insider

Project Managers

Hackers

Social Engineer

BackerThreat Actors

Page 9: LESSONS LEARNED FROM BANGLADESH BANK … and Maintain Project Plan Build use case. Identify internal resources. Identify tools . Define milestones. Monetize the effort. Exploit People

An independent member of UHY International© UHY Advisors, Inc. 2016 All Rights Reserved

BANGLADESH HEIST TIMELINE

Page 10: LESSONS LEARNED FROM BANGLADESH BANK … and Maintain Project Plan Build use case. Identify internal resources. Identify tools . Define milestones. Monetize the effort. Exploit People

An independent member of UHY International© UHY Advisors, Inc. 2016 All Rights Reserved

SWIFT SYSTEMS MALWARE ACTIVITY

Page 11: LESSONS LEARNED FROM BANGLADESH BANK … and Maintain Project Plan Build use case. Identify internal resources. Identify tools . Define milestones. Monetize the effort. Exploit People

An independent member of UHY International© UHY Advisors, Inc. 2016 All Rights Reserved

THE PLAN

Develop and Maintain Project Plan

Build use caseIdentify internal resourcesIdentify tools Define milestonesMonetize the effort

Exploit People & Processes

Use Bank of Bangladesh credentials to request transfersUse FRB to authorize transfersExploit holiday and weekend schedulesWithdraw funds with Rizal bank manager approval

Exploit Technologies

Bank of Bangladesh Systems*SWIFT SystemConfirmation message monitoringAudit logging

Page 12: LESSONS LEARNED FROM BANGLADESH BANK … and Maintain Project Plan Build use case. Identify internal resources. Identify tools . Define milestones. Monetize the effort. Exploit People

An independent member of UHY International© UHY Advisors, Inc. 2016 All Rights Reserved

INITIAL VECTORS OF ATTACK

Page 13: LESSONS LEARNED FROM BANGLADESH BANK … and Maintain Project Plan Build use case. Identify internal resources. Identify tools . Define milestones. Monetize the effort. Exploit People

An independent member of UHY International© UHY Advisors, Inc. 2016 All Rights Reserved

TARGETED SAMPLES

Page 14: LESSONS LEARNED FROM BANGLADESH BANK … and Maintain Project Plan Build use case. Identify internal resources. Identify tools . Define milestones. Monetize the effort. Exploit People

An independent member of UHY International© UHY Advisors, Inc. 2016 All Rights Reserved

TARGETED SAMPLES (CONT)

Page 15: LESSONS LEARNED FROM BANGLADESH BANK … and Maintain Project Plan Build use case. Identify internal resources. Identify tools . Define milestones. Monetize the effort. Exploit People

An independent member of UHY International© UHY Advisors, Inc. 2016 All Rights Reserved

COMMON HACKER PLAYBOOK

Acquire Targets Data Collection

Exploit People

InfiltrateCorporate Systems

Exploit Systems Permeate

•Locate affiliated groups

•Identify individual targets

- Colleagues- Spouse- Children- Parents

•Use collected data to deploy malware to targeted individuals

•Use malware-collected data to ‘passively’ authenticate to corporate systems

•Install system exploits and deteriorate logging

•Exfiltrate corporate data

•Place trapdoors throughout environment

Characteristics of cyber threats are no longer "infect as many machines as possible". Today’s attacks only need to compromise one targeted machine to be successful.

Page 16: LESSONS LEARNED FROM BANGLADESH BANK … and Maintain Project Plan Build use case. Identify internal resources. Identify tools . Define milestones. Monetize the effort. Exploit People

An independent member of UHY International© UHY Advisors, Inc. 2016 All Rights Reserved

NO “HACKERS” REQUIRED!

Page 17: LESSONS LEARNED FROM BANGLADESH BANK … and Maintain Project Plan Build use case. Identify internal resources. Identify tools . Define milestones. Monetize the effort. Exploit People

An independent member of UHY International© UHY Advisors, Inc. 2016 All Rights Reserved

EBAY

Page 18: LESSONS LEARNED FROM BANGLADESH BANK … and Maintain Project Plan Build use case. Identify internal resources. Identify tools . Define milestones. Monetize the effort. Exploit People

An independent member of UHY International© UHY Advisors, Inc. 2016 All Rights Reserved

SOPHISTICATED DISCIPLINED

Page 19: LESSONS LEARNED FROM BANGLADESH BANK … and Maintain Project Plan Build use case. Identify internal resources. Identify tools . Define milestones. Monetize the effort. Exploit People

An independent member of UHY International© UHY Advisors, Inc. 2016 All Rights Reserved

THE HACKER PERSONA

Page 20: LESSONS LEARNED FROM BANGLADESH BANK … and Maintain Project Plan Build use case. Identify internal resources. Identify tools . Define milestones. Monetize the effort. Exploit People

An independent member of UHY International© UHY Advisors, Inc. 2016 All Rights Reserved

THE REAL “HACKERS”

Page 21: LESSONS LEARNED FROM BANGLADESH BANK … and Maintain Project Plan Build use case. Identify internal resources. Identify tools . Define milestones. Monetize the effort. Exploit People

An independent member of UHY International© UHY Advisors, Inc. 2016 All Rights Reserved

THE HUMAN FIREWALL

Page 22: LESSONS LEARNED FROM BANGLADESH BANK … and Maintain Project Plan Build use case. Identify internal resources. Identify tools . Define milestones. Monetize the effort. Exploit People

An independent member of UHY International© UHY Advisors, Inc. 2016 All Rights Reserved

HUMAN FIREWALL FAILURE

Page 23: LESSONS LEARNED FROM BANGLADESH BANK … and Maintain Project Plan Build use case. Identify internal resources. Identify tools . Define milestones. Monetize the effort. Exploit People

An independent member of UHY International© UHY Advisors, Inc. 2016 All Rights Reserved

THE PARTY IS OVER

Page 24: LESSONS LEARNED FROM BANGLADESH BANK … and Maintain Project Plan Build use case. Identify internal resources. Identify tools . Define milestones. Monetize the effort. Exploit People

An independent member of UHY International© UHY Advisors, Inc. 2016 All Rights Reserved

MANAGING RISK & COMPLIANCE

Page 25: LESSONS LEARNED FROM BANGLADESH BANK … and Maintain Project Plan Build use case. Identify internal resources. Identify tools . Define milestones. Monetize the effort. Exploit People

An independent member of UHY International© UHY Advisors, Inc. 2016 All Rights Reserved

COMPLIANCE VS RISK MANAGEMENTBeing ‘Compliant’ does not equate to being ‘Secure’. It is easy to lose sight of the risk management drivers behind the Internal Audit Function.

Internal Audit Program

COSO

SOXPCI

Internal Priorities

Self-defined

risk matrix

Customer Expectations

NIST

COSO

Regulatory Obligations

SOX PCI

Shouldn’t Compliance be positioned as the byproduct of a mature information security and internal audit program, by ‘doing the right things’ and ‘proving it’?

Compliance Risk Management

Page 26: LESSONS LEARNED FROM BANGLADESH BANK … and Maintain Project Plan Build use case. Identify internal resources. Identify tools . Define milestones. Monetize the effort. Exploit People

An independent member of UHY International© UHY Advisors, Inc. 2016 All Rights Reserved

QUESTIONS?