MALCOVERY S E C U R I T Y How a Major Bank Battled its Phishing: A Real World Case Study January 2014 © Copyright 2014 Malcovery Security, LLC. All rights reserved. MALCOVERY S E C U R I T Y Background Results Delivered The Major American Bank Corporation (MAB) is a multinational banking and financial services corporation headquartered in the Southeastern United States. It is one of the largest bank holding companies in the United States by assets. The bank has made acquisitions over the past 5 to 7 years making it one of the world’s largest wealth management corporations and a major player in the investment banking market. Table 1 provides a summary of the volume of data reported to MAB. Despite layers of security technology and tools, including security awareness and training for employees, web and email client filters, web gateway blacklists, implementing standards such as DMARC, and employing the use of takedown services (internally or externally), the phishing and malicious spam problem has grown – and has become even more successful. While all industries are subject to phishing over 20 percent of phishing attacks target financial institutions. It’s no surprise that banking and financial institutions have increasingly attracted unwanted criminal attention. When attacking banks and their users, cybercriminals go right to the money -- their main motivation. MAB and Malcovery After an initial evaluation period, Malcovery entered into a contract with MAB for phishing intelligence services, including monthly intelligence reports called Phishing Intelligence Report™, and access to Malcovery’s portal of intelligence regarding ‘credential phishing web sites,’ called PhishIQ™. Like many companies, and particularly financial institutions, MAB experiences millions of dollars of losses each year due to phishing. During its engagement with MAB, Malcovery demonstrated how its alignment with the bank’s three-tiered approach to phishing – incorporating pro-active and reactive measures with intelligence – could significantly reduce these losses. The intelligence provided by Malcovery is estimated to have enabled a savings for MAB of $2 million, for an excellent return of 800%. Malcovery delivered to MAB the most thorough and timely intelligence available anywhere about phishing. That is, detailed monthly reports were prepared by a threat intelligence team that included a Malcovery analyst working with MAB. These reports not only outlined statistics on hundreds of phishing web sites targeting MAB’s customers each month, but they also guided the bank in how to prioritize its investigative actions and mitigation efforts. Each monthly report provided an in-depth analysis about each of the five largest phishing clusters identified that month, along with spotlighting any new criminals and criminal methods identified. December 201X January 201X February 201X March 201X April 201X May 201X June 201X July 201X August 201X September 201X October 201X November 201X Total: PHISHING ATTACKS # WITH KITS UNIQUE CRIMINAL EMAIL ADDRESSES 554 167 162 789 254 50 516 190 30 146 6 15 169 16 15 957 3 6 74 6 10 1,076 289 172 214 81 140 461 149 176 520 166 214 678 89 214 6,154 1,416 1,204 Table 1 Summary of Phishing Data Reported to MAB The most important numbers in Table 1 are the 6,154 phishing attacks that targeted MAB and the 1,204 drop email addresses identified in the criminal toolkits. A high volume of phishing attacks not only points to high losses among consumers but also to the amount of forensic data that Malcovery analyzes for MAB. The more live phishing attacks that can be identified, the more forensic data there is to manipulate and find clues from correlation among attacks and from the inevitable mistakes that criminals make. Case Study / January 2014 © Copyright 2014 Malcovery Security, LLC. All rights reserved. 2 MALCOVERY S E C U R I T Y Malcovery also provided for up to twelve phishing investigative reports. MAB made requests that Malcovery responded to with detailed reports based on its process called The Seven Phases of Phishing Investigation. These reports were highly-detailed exposés that each focused on a large or interesting phishing attack from the previous month, with the goal of identifying and communicating to MAB the underlying patterns within the massive amounts of forensic data about the attacks. These patterns often included a range of IP addresses, components of the phishing web site Internet addresses (URL), a set of domain names, or a set of criminal email addresses. The patterns recognized were used to recommend specific actions for the bank, including actions such as initiating subpoenas to Internet Service Providers and looking further into the bank’s own computer logs for additional information about the phishing attack. Malcovery staffers have become familiar with the “look and feel” of all types of MAB phishing sites and have kept detailed records so that they could notify the bank’s representatives of any new actionable intelligence. Throughout the year, they sent email notifications to bank representatives whenever stolen credential lists, known as drop files, were identified. Malcovery also provided access for MAB representatives to its PhishIQ™ portal. The portal provides the most timely, complete, and convenient access for MAB to data about phishing web sites targeting the bank. During the year, Malcovery added a significant number of new features to the portal and enhanced the load and search times of the web interface. Some new features included the addition of screenshots of the main phishing pages, the ability to search on drop email addresses, and the option to export data to a CSV file. Finally, Malcovery started processing the MAB Abuse Box. This means that the bank forwarded to Malcovery all of the bank’s employees’ and customers’ email messages regarding suspected online fraud so that Malcovery could extract phishing web site addresses, process them, and add them to the Malcovery phishing data mine. Prior to directing the Abuse Box messages to Malcovery, the bank did not have the capacity to read and analyze each message received externally. Malcovery’s Automated processing provides a quicker response time so that MAB knows which messages concern phishing and which may be part of a malicious spam campaign. The Abuse Box is also a rich feed of phishing URLs that get correlated with Malcovery’s other sources of phishing attack data. T3: Additional Intelligence Regarding Email-Based Threats In response to the growing incidence of malicious spam over and above credential phishing, Malcovery built Today’s Top Threats (T3) from a threat alerting system that was known in its infancy at the University of Alabama at Birmingham (UAB) as Emerging Threats by Email. T3 identifies the most prolific malicious spam campaigns each day and delivers intelligence about them via emailed reports and via XML-formatted, machine-consumable files on Malcovery’s secure website. Recently Malcovery announced support for the STIX Threat Intelligence format for this data. Malicious spam reaches tens of millions of email users every day, with the goal of commandeering the user’s device through the delivery of either (1) malware as an attachment to a convincing email message spoofing one of over 100 wellknown brands, or (2) a link to customized malware enabled by criminal exploit kits such as Blackhole. The most common payload of malicious spam campaigns is the Zeus Banking Trojan, which can take over control of the victim’s computer and steal online banking credentials, among other PII (Personally Identifiable Information). As one of the largest banks in the country, MAB is a leader in protecting consumers from this growing menace by performing realtime, cross-channel fraud detection. With the intelligence provided in daily T3 reports, the bank is enabled to protect its own employees and networks and to further reduce fraud losses from email-based threats. Singularity of Capabilities and Offerings Malcovery’s database was initially built on data that was collected at the University of Alabama at Birmingham (UAB) starting in 2007. Due to the quantity of data collected and to the innovations of its researchers, UAB is at the forefront of all research universities worldwide in understanding this vector of fraud and how to mitigate it. An estimated $2.8 million was invested by the university to establish its state-of-theart anti-phishing technology. Additionally, UAB leaders formed and nourished relationships with other interested parties in commerce and law enforcement—such as the Anti-Phishing Working Group, the Federal Bureau of Investigation, and the Financial Services Information Sharing and Analysis Center– so that the intelligence amassed at UAB about phishing is unparalleled. Case Study / January 2014 © Copyright 2014 Malcovery Security, LLC. All rights reserved. 3 MALCOVERY S E C U R I T Y Due to these unique relationships and others, UAB was identifying more phishing sites than all other sources combined, and, more significantly, developed [now patented] computer software that could automatically identify the targeted brand associated with suspected phishing web sites and extract forensic evidence about phishing criminals. The bottom line? Malcovery’s services support the bank’s bottom line, not only by reducing phishing fraud losses but also by reducing personnel expenses and takedown costs, improving the efficiency and efficacy of investigations, and protecting the bank’s valuable brands by enhancing trust among its stakeholders. At the start of the contract with MAB, Malcovery licensed this historical data and the processes from UAB and has since expanded on and improved the collection and identification of phishing sites and the storage, manipulation, and analysis of the related intelligence. Contact: Malcovery’s turnkey phishing data collection processes do more than just identify a web site as a phishing web site targeting a brand. Although not a standard practice in the phishing takedown industry, it is essential to collect and store in a forensically-sound manner all the Internet files that are used to create phishing web sites. One component of these processes involves the automated extraction of criminal email addresses. While some of the email addresses are fairly easy to identify, many of them are obfuscated, or hidden, using encryption or other means of manipulating code so that it is hard for humans to find the email addresses. Malcovery automatically de-obfuscates eight different tricks of the criminals’ trade. It is this software that, along with the patented software that identifies the targeted brand of a suspected phishing web site, forms the basis for Seven Phases of Phishing Investigation and enables the successful and crucial prioritization of investigations. By being able to associate one criminal or criminal gang to a set of thousands of phishing web sites, the process eliminates what those in the phishing takedown industry refer to as Whac-a-Mole. Corporate and Development Office: Malcovery Security, LLC 2400 Oxford Drive #302 Bethel Park, PA 15102 Phone: 855-625-2683 Email: [email protected] Twitter: @malcovery Facebook: Malcovery LinkedIn: Malcovery Website: www.malcovery.com Google+: Malcovery Blog: http://www.malcovery.com/blog/ Research Office: Malcovery Security, LLC 1500 First Avenue North Suite 83 Birmingham, AL 35203 Conclusion In summary, all of these phishing services provided by Malcovery come together to identify phishing criminal activity through a nexus of very large amounts of archived data that includes IP addresses, phishing kit details, association to other phishing web sites, and comparison to similar web sites attacking other brands. Experience has shown that such extensive data is needed in order to support the large phishing investigations that have resulted from banks such as MAB, and their commitment to fighting phishing. The team of professionals that has been assembled at Malcovery provides in-depth knowledge of phishing attacks against MAB. This knowledge has become invaluable to MAB as it continues to combat fraud and other e-mail-based threats. Case Study / January 2014 © Copyright 2014 Malcovery Security, LLC. All rights reserved. 4
© Copyright 2026 Paperzz