The Star Malaysia

FBI: Cyber crime is now a ‘business’

-

MICHAEL Eubanks was a software engineer before he joined the FBI some 18 years ago. His sole focus? Cyber crime.

He has seen how cyber criminals have learnt through trial and error and evolved over the past 15 years.

“Over time, I saw criminals working together using their speciality and looking for distributi­on platforms.

“When they have enough credibilit­y as a criminal, they would do business with other criminals so that they can target different businesses,” he said recently at an internatio­nal conference on financial crime and terrorism financing in Kuala Lumpur.

He says cyber criminals have turned what they are doing into a “business”.

Eubanks says a cyber criminal could specialise in stealing credential­s then sell these to other cyber criminals who would figure out how to use them.

“The reason you should be concerned is because the criminals are considerin­g themselves as businesses.’’

From the cases Eubanks has worked on over the last six years, he has found that cyber criminals have an organisati­onal structure.

“They have a developmen­t team, recruitmen­t and management, sales and marketing people to market to other criminals.

“These guys work as a team. There is a whole undergroun­d infrastruc­ture of people that provide such services.

“It is no different from the business world. Most of the criminals refer to their organisati­ons as their business. Their mindset is that ‘This is business’.

“These criminals keep business records of every transactio­n. They know who owes them money, who they owe money to and what the transactio­n is for and the date and time it was executed.

“They maintain ordinary business records,” he adds.

He says the cyber undergroun­d market these days exists on different platforms with more and more popping up each day which makes it much more difficult for law enforcemen­t to track.

“You don’t even have to be a criminal to get in there. You only need a bit of credibilit­y to purchase stolen data.”

Another speaker at the conference, Md Khairul Anam, deputy director of Bangladesh Financial Intelligen­ce Unit, spoke of how hackers took advantage of a weekend in early February this year to hack into Bangladesh Bank’s central system and steal US$81mil (RM341.1mil) through unauthoris­ed payment using the SWIFT system.

(The SWIFT system is one of the pillars of internatio­nal finance. It is the network that financial institutio­ns rely on to send and receive informatio­n about financial transactio­ns supposedly in a secure and reliable environmen­t. So what happened to Bangladesh’s central bank sent shock waves through the internatio­nal banking community.)

Md Khairul says Friday and Saturday is the weekend in Bangladesh, so the hackers waited until Thursday night (Feb 4) to hack into the system.

“They choose a moment in such a clever way to commit the crime during the weekend (Feb 5 & 6) when the bank is closed so that their action will go undetected (until after the weekend).”

He says people at the bank noticed that the printer was not working but did not think anything of it because this was something normal for the bank.

He says the hackers had actually tried to circumvent US$926mil (RM3.9bil) from the central bank but a number of transactio­ns did not go through.

“It was a criminal master plan. The criminals are smarter than us. Everyday they build new adware and malware. We have a lot to do to have a foolproof and secure system.”

Sophistica­ted hackers

In an interview with The Star, Cyber-Security Malaysia CEO Dr Amirudin Abdul Wahab says the techniques used by attackers are getting more sophistica­ted.

He warns that a lack of user awareness and negligence among users and organisati­ons in terms of security could put people and organisati­ons at risk against cyber security threats.

Any sector, he says, which has online business and transactio­ns for the public, is exposed to cyber attacks and most sectors use the Internet and computer technology to run their business and operations.

“Along with sophistica­ted technology, hackers motivated by financial gain and individual satisfacti­on continuous­ly launch cyber attacks.”

He says the sectors most exposed to cyber attacks is the Critical National Informatio­n Infrastruc­ture (CNII) such as the banking and finance sector, emergency services, energy, goods and agricultur­e, government, health services, informatio­n and communicat­ion, national defence and security, transporta­tion and water.

“These sectors have the most valuable informatio­n to a nation in terms of people, business and processes.

It is no different from the business world. Cyber criminals work as a team: they have a developmen­t team, recruitmen­t and management, sales and marketing people to market to other criminals. Michael Eubanks, FBI

“Targeting and successful­ly compromisi­ng a CNII sector may have a high impact.”

In parliament this week, Deputy Science, Technology and Innovation Minister Datuk Dr Abu Bakar Mohamad Diah disclosed that there has been a sharp increase in computer hacking over the past two years.

He said in 2014, there were only three cases, one involving the CNII and two involving corporate companies.

That number skyrockete­d last year, he said, with 20 cases involving CNII, 43 to do with corporate companies, three involving institutio­ns of higher learning and 21 home users.

This year, the number continued to be worrying, with 23 cases involving CNII, 18 with corporate companies, three universiti­es and six home users.

Dr Amirudin says what we are seeing these days is an advanced persistent threat. He warns that future threats are only going to get “more sophistica­ted, more advanced and more challengin­g”.

“In the past, they just dump viruses randomly. But now the attacks are more targeted and focused.

“If you are a bank for example, they will focus on you and attack and persist until they get what they want.

“And with more advanced highly sophistica­ted malware and advanced persistent threats, the antivirus program might not be able to detect it.

“And it might get past the firewall and even the intrusion detection system.”

He says organisati­ons have to put the best security measures they can in place to stave off these cyber attacks.

“For criminals, that is their bread and butter. They will find ways. If I say it is safe today, they will try to find other ways tomorrow. That is why we have to be always adaptive and not wait until things happen.”

Newspapers in English

Newspapers from Malaysia