You see phishing attacks - that's well what the PH - where emails constantly been
used to try to trick people into clicking on things they shouldn't click
o. But the sophistication of the new email attacks are quite different and
very difficult actually to detect and to respond to. Welcome to FOCUS, a podcast
dedicated to the business of higher education.
I'm your host, Heather Richmond, and we will be exploring the challenges and
opportunities facing today's higher learning institutions. In today's episode,
I caught up with Tom Arnold co-founder of payment and security experts to
discuss new trends in security threats for universities, including the business
email compromise which is a tricky new method of defrauding large transactions
between the institutions and vendors. Thanks for joining us today, Tom. Thank
you very much for having me. I appreciate it. Well I know that you've been in the
security and fraud detection business for some time no, can you tell us a
little bit about your experience and really educating on payment security and
data protection? Certainly, my experience goes way back in the industry from the
earliest days of the internet e-commerce and fraud. Where the rule of thumb was on
the internet nobody knows you're a dog is the bottom line. So early days we were
seeing everything from auctions where you know the phony baseball was being
sold into all sorts and tricks; and those have evolved over the years into rather
significant issues that relate to fraud or they relate to theft of information
that has been sold elsewhere. So that's a little bit of my background. Well, I
know in particular that payment technology and security have really
evolved pretty rapidly over the last decade. Can you tell us how this
evolution has offered more secure payment methods on one hand, but also
expose some payment methods for fraud and others? Yeah, that's exactly correct.
Recently over the past few years, we've seen the inclusion of
chips on credit cards and specifically what is called EMV chips. And EMV chips
have greatly reduced the fraud that was caused by bad guys stealing data and
creating fake cards, if you would. But that has just caused a lot of the frauds
to evolve towards electronic commerce. It's caused fraud to evolve in the
skimming and things like automatic teller machines where they're stealing
data and trying to steal the PINs as they're entered on the ATM devices. So
the creativity of the bad guys can never be underestimated is really the bottom
line. As to what they're capable of doing and how they're capable of stealing by
tricker device, which is what fraud is actually defined as the theft of
property from another by tricker device. And that's the what the
evolution caused. So is there an end to all fraud? No, definitely not.
Yeah, that's really interesting, and I know that data breaches in general
continue to make headlines and colleges and universities have really become a
target for these bad guys. What are some of the latest security trends that
you're seeing? Well we're seeing a variety of trends related to the
electronic commerce side of things, especially related to institutions. And
we're seeing some very, very troubling trends out of our forensics team,
specifically that are evolving and are actually noted by the FBI and the Secret
Service as being some of the most intense issues if you would, or the most
troubling issues that are occurring out there. So we see basically on where
third-party content is added to websites and calls are being made out to
third-party content providers, which means the target for a compromised a lot
of times is the third-party content provider. Then injects you know to a
consumers browser a script that's capable of
capturing the card data as its entered. That's just one type and the more
troubling trend right now we call business email compromise. Because email
systems to a large extent the security standards - let me explain - the security
standards focus on PII, they focus on protection of credit card data, on
payment data. So everyone's real concerned about that. And a lot of times
the email servers themselves don't receive the same level of scrutiny and
the same level of protection, which causes a potential for a bad actor to
step in between something like a transaction that is from a university to
a vendor who's supplying them, and an invoice to that vendor specifically or
to the university that ends up getting paid out to the bad guy instead of being
paid to the actual vendor, is a good example. And the email server is the
primary target for that sort of action. That's really interesting and I'd say
generally from a PCI scope perspective, email systems really are normally in
scope, are they. No, they're not and they're left very much to just having a
username and password. Somebody logging in via the web to
collect their email and that's it. And you see phishing attacks - and that's spelled
with the PH - where emails constantly been used to try to trick people into
clicking on things that they shouldn't click on, but the sophistication of the
new email attacks are quite different and very difficult actually to detect
and to respond to when a loss actually occurs. Yeah I know we were talking before
it sounds like the bad guys really getting in the middle and spoofing
both sides as both the vendor and the payer for instance, right. Yes and as a
matter of fact they go to the extent of even registering domains on the network.
As people may know when you're sending it to
an email to my school-dot-com or whatever the university might be or university-
dot-edu, they register a domain that might be close and have only one
character - a good example is it it might have an underbar character instead
of a space or a dot and that might be in there - they'll do things like that that
will make it very difficult unless somebody's very, very diligent looking at
it to understand what's happening. So let me give you an example of a case that we
recently worked where the attackers gained access to the Office 365 email server
and they sat on the server just watching email for about six months as the
institution was exchanging information from say the accounts payable department
from a member for services rendered. Watching at that point they create
basically a site and a mail server that mimics the vendor and also a site and
mail server that sort of mimics the institution at that point. And then when
they actually make the attack, they begin making messages and sending messages
that look like they're coming from the vendor saying, here you need to pay this
invoice and they may change basically the mechanism of payment specifically
that says the payment should be routed to somewhere else. And meanwhile while
the vendors sitting there going why haven't I been paid and they're sending
messages saying, hey here you know you usually pay your invoices in 30 days or
very quickly, why haven't you paid me the bad guys actually answering on behalf of
the person in the accounts payable department - and saying yes, we've got it
we're a little behind. We've had a system failure type situation. Their objective -
the bad actors objective - is to try to get the payment sent to an account that
they're under control of - instead of the vendor being in control of specifically -
and then spend basically five to seven days because that's what it would take
for a wire transfer to be reversed, if the feds got involved within the first
five to seven days of the loss. Once they passed the five to seven days, they just
disappear. And the losses can be staggering. The case that we worked on
was a single transaction of 97 approximately 97 thousand dollars in one
throw, basically. And if you look at the cost that the bad guys had to perform
the act they probably spend 1500 bucks for domains and other things to make
themselves in the middle basically of the email threads themselves. Plus, since
they're monitoring all the internal emails at that point they're watching to
see if they've been detected. And if they've been detected, they'll back out.
Is classically what they'll do. So they're monitoring what's going on at
the time that they're actually committing the criminal act, basically.
And that's what makes these things so difficult to respond to and so difficult
to find. Oftentimes the victim may be the university or swing it around where the
university has an invoice that there's something to someone else they become
the victim and losing the funds. And it's very hard to detect them in that five to
seven days to try to reverse the transaction. So that's basically what's
going on and that was difficult to explain. It's fairly complex, but at the
bottom line it's about securing the email server, training the staff and
learning basically how to begin to detect any of these sorts of anomalies.
And specifically if accounts payable receives a statement that says hey you
need to change to do this. What out-of-band method is going to be used
to approve that that change is actually legitimate, is the other third thing I
would say. Wow, so that does sound like a whole different level of complexity of what
was originally called the phishing scheme, right. So any tips on
to look for it sounds like again Accounts Payable they're told do
something different any other tips of what to look for on that to see if the
bad guys are trying to get in? Well the major things, there's there's sort of two
ways to look at this. There's a question of prevention and then there's a
question of detection. So let's look at those two topics separately. On the
prevention side you have people who are accessing their email via smartphones,
via you know tablet devices, via laptop computers, logging in from a coffee shop,
or logging in from home, or desktop machines logging in from inside the
network. It's extremely important that the user is logging in to the email
server actually be authenticated, and one of the only ways to actually really do
this is using a mechanism that in the industry we refer to as multi-factor
authentication. It's a little bit of a pain in the butt for the users, but when
you log in you have to then provide a code from your your smartphone that says
here's the six digit code that goes along with my log in. That will go a long
ways to protect the mail environment itself, specifically. If someone's logging
in from inside the local network of the University and you know the machine is
inside the local network of the university, you can make it a little
easier, but still you should monitor it. The second thing is if they're outside
or using a smartphone or using any sort of device like that it's really, really
important that when they these people log into their systems that they
actually get something that is proving to the fact that they are the person
logging in. That's an important feature on the prevention side of things.
The other key thing on the prevention side, if instructions are received from
someone that says, hey we've changed our bank account, we've altered something and
we want you to do this. There needs to be an out-of-band. And when I say
out-of-band I mean a telephone call, specifically, that says call to validate
it. You're never wrong to check if you get something and you go you know did
you actually send me this. I'm going to make a phone call
off to the Accounts Payable department and say, did you actually send me this? Or
the Accounts Payable Department is making a phone call to the person with
the invoice saying, is this true? Did you send me this? The next thing is if you're
changing a payment method and you've been paying by check or ACH - Automated
Clearing House - is what that stands for but that's sort of think of it as an
electronic check. And you suddenly get instructions that you're now supposed to
do a wire, instead. Then had a second validation point where that has to pause
and be revalidated by yet another person within the organization. We call this
dual control. In the sense that one person one accounts payable person acting
on their own doesn't just change the system right then and there to make the
change, because they think it's valid. Another set of eyes look at that change
and validate that change as being okay to actually do. And that's probably one
of the most important sort of defenses that's out there. On the detection side
of things, if a payment goes out and you get basically some sort of query or some
sort of follow-up, basically the accounts payable Department - and I hate to say
this because there can be a large volume of these - but for any
transactions say that's over $10,000 as a sort of a ceiling limit; basically that
there's a follow up that's saying did you receive this, and this is coming to
you. Basically and you need to expect it but that follow-up has to go absolutely
to a trusted person, and possibly should be done out of band as well. If there's a
detection that you've fallen victim to one of these or you call the vendor and
the vendor says we never sent you instructions to change that. We're just
expecting to see the check as always is the answer you get. It is extremely
important that you reach out the law enforcement as fast as you can at that
point. A lot of organizations and a lot of universities and a lot of
organizations as a whole don't want to admit they're a victim; and don't want to
make the police report right away. It is extremely important that the FBI gets
notified that you've fallen victim to something. Especially if it involves a
wire transfer because the clock is ticking. You have five to seven days for
them to act, basically, and to stop the transaction, and potentially recover the
funds. It's the important piece of that versus just being a victim and now
having to file insurance claims and all that sort of thing. So that's the other
piece of prevention and detection together have to work together. Yeah
that's great because you have that really short window that you have to
work within. So you have to have that awareness always happening for sure.
And it sounds like also that many of the threats are happening to the
actual network infrastructure. Can you expand on how the bad guys are getting
in there? Well that was infrastructure side which
is still becoming a challenge and this goes back to the prevention side of
things specifically. A lot of times they're going to mix sort of techniques.
I talked about techniques where elements of a website or a web interface are
modified so that they'll communicate with the bad guys specifically and that
there's potentially third-party content coming into play, as well. So in these
situations a lot of times the point of infiltration where the bad guys will
actually try to achieve access to the mail server or they'll try to achieve
access to something, involves a step that is very similar to the theft that we see
right now in ecommerce sites, where a malicious script that will be added to a
system and then passwords will be taken. And then you'll see login attempts and
you'll potentially even see a classic example we refer to it the
industries that dot forward, but it's a Ford then is added to the account. So I
steal your credentials using a router, using a technique that's been altered
basically, and by stealing your credentials, I then log in and tell your
mail server, oh by the way, duplicate every message to this account and
forward it to me and Russia; as a good example. Now I just get everything you
get and I'm monitoring the server - yes I have access to it - but I'm not actually
on there reading your email at the same time because that's slightly dangerous.
And what might be detected. This way all the mail's coming my direction, and I can
now monitor and begin the attack is what I can actually do as the bad guy. So in
those situations again, we fall back to the prevention of using multi-factor
authentication and definitely changing the passwords on a frequent basis and
having good complex password. It's not just the word my school one, my school two,
my school three. It's not just something like - believe it or not - the word password
or the word secret code. We've seen all these as passwords. We've seen passwords
or mail servers that are so old, they date back years since they were last
changed. So unfortunately changing the password becomes an important piece of
this if you can't use multi-factor authentication for certain areas
especially financial and accounting areas. Password should be changed 30 to
45 days, which is much tighter than what you see within the the PCI standard. The
other key detection point is looking at the logs and scanning the logs for the
locations that are coming in to attach to the accounts. Frequently users we are
all beings of habit. We go to the same coffee shops, we are at home we have an
IP address for home. It's when you see out of country or out of area IP addresses now accessing the email server for a given account that's definitely a
red flag to watch for. And especially if you see simultaneous logins to the email
servers themselves. Those are important to work watch for as well. So it sounds
like our IT departments have a lot on their hands to be looking at and making
sure not only having multi-factor authentication, but really having that
awareness and checking to see if anything's off. Is that something they
should do obviously probably on a daily basis, right? Well that's correct. I would
hope that the IT departments of most institutions would use a security
monitoring tool on the network that's monitoring the logs. And this is a matter
of crafting some rules that say this is sort of the location and geography that
we would expect , you know, Mary in the Accounts Payable department to be
logging into. And now let's look at what IP addresses are coming in, what failed
logins are occurring through the mail server itself. Now this assumes that
you're running the mail server. When it's a cloud server like office 365 - and
I'm just using as an example - we could use Gmail. We can use any of the Google
Docs systems as well. It's much more difficult for the IT department to watch
those environments. So when it comes to utilizing the cloud environments really
using multi-factor authentication is the major item to do; because you frequently
don't have access to those logs to be able to feed those to your security
information system to figure out, hey, what's going on here. So there's you know
different approaches for prevention depending on the environment that you're
dealing with. Yeah, so there's so much going on and you know so much time I
have to ask, how do you pay or do you feel comfortable paying at all/
Absolutely it's not a problem. As a consumer you know I could give some tips
to the consumer side of things, but absolutely a consumer, absolutely should
you know kind of know the site you're dealing with. Use the credit card
because there's laws that protect the credit cards. And debit cards are a
little more difficult but there's still laws that protect the transactions for
those, as well as, your online specifically. Unsolicited things that
sound too good to be true, are too good to be true. So don't fall for that.
You know, don't trust any anything that basically comes unsolicited; and the next
major item is to make certain that your, computer's, your smartphones, your tablets
are all kept up to date. Patching is extremely important and that is
extremely important for the IT department on the server side and on the
e-commerce server side as well. To maintain that patching regime. Patching
not only the server's themselves and the operating system, but patching the
applications as well is another extremely important thing. And I think
educating your family members and educating your children on safe browsing
and shopping, and not loaning your payment card out the even family members
to use when they're trying to do things, whether it's a PayPal account or
otherwise. You know when it comes to somebody using one of your accounts like
if your kids going to do it, you finish the transaction for them. Basically is,
you know, what I suggest out there, but absolutely, I feel comfortable using my
card. working with it. Because I know at the end of the day that if somebody
breaks into the site that I was at steals the card and starts using it
fraudulently, I have the absolute right as a consumer to to challenge that, to
charge it back, to dispute the transactions, to notify the card issuer
that I need a new card, that my cards been taken. And I can tell you that the
banks and the banks on the merchant side that is along with the credit card
companies do a lot of work to watch for bad transactions as they're taking place.
So as a consumer I feel very, very comfortable. Absolutely so along
the lines of payments, are you a mobile wallet guy? I am as far as you know I I
trust and use my Apple pay all the time. Basically I use it overseas as
well and so when it comes to transactions like that, yes. I think more
importantly versus on an e-commerce front instead of using a mobile wallet I
will utilize tools that will track my passwords. I will have complex passwords
that are unique to each site. I will track those passwords in a password
vault as I log in to the accounts themselves as I use them. And I am very
religious about changing my passwords as well. The devices and tools that I use to
track my passwords also contain the credit cards and payment card
information and I will use those devices to fill in the forms, basically, as well.
So yes, I am what you would call a mobile wallet user specifically. That's great it
sounds like really the responsibility of paying attention to potential fraud
protecting is really on both sides. The consumer side as well as our IT
departments; and a lot of times I think we try to push that off to somebody else.
So what else do our listeners need to know about new trends and security threats
and and how to be prepared. Well obviously one of the largest things to
do out there you if you're considering the standards. Standards are created at a
specific point in time and they may age. So the current PCI data security
standard right now is about two and a half three years old, but it's looking at
and you know as it was crafted it's over three years old it's probably
three-and-a-half years old when they were calculating the threats at that
period of time. So just as as a university and you're running the
e-commerce site or you're allowing students to pay the tuition online, you
have to realize that things like the payment card industry standard are
fairly old. So the one of the biggest things to understand is how to do threat
research and understand what the current threats are specifically that are
attacking institutions. One good example of that right now would be what's
referred - as mage card; and mage card really if
you think three-and-a-half years ago was quite different than it is today.
And so to keep abreast of what's going on,
to adjust your detection and your protection or prevention mechanisms, you
end up having to keep current with the threats and understand what types of
issues might be confronting both your student and your student population, as
well as, your staff at the universities themselves. And how you need to react to
those specifically to defend your system better. That's probably one of the major
items out there is keeping current on what the current threats are to the
environment that you're dealing with. Most institutions do not spend nearly
enough time understanding what the current threats are and how they have to
adjust to them. Larger institutions do this that the smaller institutions can
have serious challenges. Thanks, Tom, so much for all your insights. You're more
than welcome and just remember on the internet nobody
knows you're a dog. That's great. Well it sounds like there will always be new
data security threats that colleges and universities need to be aware of to help
protect their campuses. Thanks for tuning in to this episode of FOCUS. Don't forget
to subscribe, so you can stay up to date on the business of higher education. For
more information check us out at touchnet.com.
Transcript source: Provided by creator in RSS feed: download file