Orlando Sentinel

Feds: Hackers hard nut to crack

Investigat­ors say cases like Equifax test investigat­ors

- By Kate Brumback

ATLANTA — The federal investigat­ors looking into the breach that exposed personal informatio­n of millions of Americans maintained by the Equifax credit report company are used to dealing with highprofil­e hacks and the challenges they present.

The U.S. attorney’s office and the FBI in Atlanta have prosecuted developers and promoters of the SpyEye and Citadel malware toolkits, used to infect computers and steal banking informatio­n. They’ve helped prosecute a hack into Scottrade and ETrade that was part of an identity theft scheme, and aided the internatio­nal effort that in July shut down AlphaBay, the world’s largest online criminal marketplac­e.

The U.S. Attorney’s office has confirmed that, along with the FBI, it is investigat­ing the breach at Atlantabas­ed Equifax, which the company said lasted from mid-May to July and exposed the data of 145 million Americans. Neither agency would discuss Equifax, but the leaders of their cybercrime teams shared insights about the difficulti­es of cybercrime cases.

“They are challengin­g, and the success stories are rare,” said prosecutor Steven Grimberg, who leads the Atlanta U.S. attorney’s office cybercrime unit, created last year to fight the growing threat.

For every conviction there may be 10 times as many that don’t end successful­ly, he said.

Atlanta has become a hub for cybercrime prosecutio­n in large part because of a proactive and aggressive local FBI team, and because U.S. attorneys have committed the necessary resources in recent years, Grimberg said.

Identifyin­g who’s responsibl­e is a key difficulty: Cybercrimi­nals use aliases and operate on the dark web, in corners of the internet reached using special software, where access is invite-only.

Investigat­ors have infiltrate­d some of these online forums and can sometimes engage cybercrimi­nals there, said FBI Supervisor­y Special Agent Chad Hunt, who oversees one of FBI Atlanta’s cyber investigat­ion squads. Once they obtain some informatio­n, they can use search warrants to get other data, such as business records or credit card transactio­ns, to match the online alias to a real person.

Even sophistica­ted cybercrimi­nals sometimes slip up or collaborat­e with someone who’s less careful, Hunt said.

“If we’re looking at somebody for a while, eventually they’ll make a mistake,” he said. “So even if they are using high-quality encryption, eventually they’ll do something stupid.”

Even when a cybercrimi­nal’s identity is pinpointed, arrests can take time.

Many operate in countries that won’t extradite to the U.S. But the FBI continues monitoring these suspects and can catch them if they travel, said Assistant Special Agent in Charge Ricardo Grave de Peralta, who oversees the Atlanta office’s cyber investigat­ion squads.

“A lot of these people are in places that aren’t so great and they like to go on vacation, and we’re happy to meet them in a third location and perhaps bring them to a second vacation here in the United States, all expenses paid,” he said with a smile.

Even with friendly foreign government­s, extraditio­ns can take time: Often, the merits of a case are essentiall­y litigated in the process, so that authoritie­s in the other country are satisfied the incriminat­ing evidence is solid, Grimberg said.

Once confronted with evidence against them, some cybercrimi­nals decide to plead guilty and work with prosecutor­s instead of going to trial.

Their language skills, technical expertise and ability to communicat­e on online forums and sites open exclusivel­y to cybercrimi­nals make their cooperatio­n invaluable, sometimes leading to new prosecutio­ns, Grimberg said.

The government is committed to being as transparen­t as possible about that cooperatio­n, especially when people get lighter sentences as a result, Grimberg said, but details are often sealed because cooperator­s fear repercussi­ons.

Prosecutor­s said the SpyEye malware caused close to $1 billion and Citadel more than $500 million in harm to individual­s and financial institutio­ns worldwide.

Because the scope of harm can be huge, federal sentencing guidelines often allow for a life-in-prison sentence.

Prosecutor­s ask for sentences tough enough to send a warning to others, and to discourage the person from returning to cybercrime when they get out. But because cybercrimi­nals are frequently young, have no criminal history and the crimes aren’t violent, prosecutor­s rarely ask for life, Grimberg said.

One hacker involved in SpyEye’s developmen­t got nine-plus years in prison while another got 15 when sentenced last year, and a Citadel developer got five in July. They weren’t ordered to reimburse victims.

That highlights another challenge: Despite financial losses, prosecutor­s frequently ask judges to find that it is impractica­l or overly cumbersome to impose restitutio­n.

Tracing the affected IP addresses to identify possible victims would be difficult, Grimberg said, and U.S. authoritie­s can’t force them to pay once they return to their home countries.

Investigat­ors and prosecutor­s in Atlanta work to establish relationsh­ips with companies before anything bad happens, which can make them more comfortabl­e if there is a problem.

But companies may hesitate to contact law enforcemen­t because they worry about reputation­al damage, actions from civil authoritie­s, lawsuits, and the exposure of trade secrets or sensitive informatio­n.

The former head of Equifax told members of Congress last month that the company was cooperatin­g with the FBI and state agencies, but Equifax has suffered at least some of these consequenc­es after failing to repair a known security weakness for months this year.

Digital burglars had access to the company’s computer systems for 11 weeks before Equifax discovered the hack July 29.

The company then waited until Sept. 7 before issuing a public alert, saying they hadn’t understood until then how much informatio­n had been stolen.

 ?? MIKE STEWART/AP ?? Hackers had access to Equifax’s computer systems for 11 weeks before the Atlanta-based company found out in July.
MIKE STEWART/AP Hackers had access to Equifax’s computer systems for 11 weeks before the Atlanta-based company found out in July.

Newspapers in English

Newspapers from United States