Cyber Security
Transcription
Cyber Security
|Malaysian Communications and Multimedia Commission| Cyber Security NRE EXECUTIVE DISCOURSE MINISTRY OF NATIONAL RESOURCES & ENVIRONMENT 4 May 2012 Eneng Faridah Iskandar Digital Security Services Division |Malaysian Communications and Multimedia Commission| |Malaysian Communications and Multimedia Commission| SALIENT POINTS Internet in Malaysia Role of MCMC Cybercrime & Security Risks Cybercriminals Hiding Their Tracks Relevant Legal Provisions Action by SKMM & LEAs |Malaysian Communications and Multimedia Commission| Where are we? Until 11 April 2012 |Malaysian Communications and Multimedia Commission| Who are the players? Fixed Broadband Providers Wireless Broadband Providers Y MAX Content and Applications |Malaysian Communications and Multimedia Commission| Facebook in Malaysia Number of FB accounts: 12,231,940 17th of 213 countries around the world By Age Penetration Rate 46.76% (Total Population) 72.37% (Internet Users) Source: http://www.socialbakers.com/facebook-statistics/ By Gender |Malaysian Communications and Multimedia Commission| Internet in our daily life…. EMAIL INFORMATION CHAT SHOPPING SOCIAL NETWORK DOWNLOAD/ UPLOAD CONTENT |Malaysian Communications and Multimedia Commission| What’s the attraction? YOU CAN BE ANYONE CHEAP & FAST BORDERLESS |Malaysian Communications and Multimedia Commission| A bit about you! How many of you have Internet at home? On your mobile? What do you/ your kids like to do when on the Internet? What are your concerns – as an individual or parent – about the Internet? |Malaysian Communications and Multimedia Commission| SALIENT POINTS Internet in Malaysia Role of MCMC Cybercrime & Security Risks Cybercriminals Hiding Their Tracks Relevant Legal Provisions Action by SKMM & LEAs |Malaysian Communications and Multimedia Commission| ROLE OF MCMC • To regulate according to the : Communications and Multimedia Act (CMA) 1998 Postal Services Act 1991 (PSA) Digital Signature Act 1997 (DSA) Strategic Trade Act 2010 • Covers telecoms, broadcasters and ISPs; postal and courier services and digital certification authorities |Malaysian Communications and Multimedia Commission| ROLE OF MCMC 1. To advise the Minister on national policy objectives 2. To implement and enforce communications and multimedia laws 3. To regulate matters relating to communications and multimedia activities not related to communications and multimedia laws 4. To consider and recommend reforms to the communications and multimedia laws 5. To supervise and monitor communications and multimedia activities 6. To encourage and promote development of the communications and multimedia industry 7. To encourage and promote self regulation 8. To promote and maintain the integrity of licensees 9. To render assistance to persons engaged in communications and multimedia 10. To carry out any function as the Minister may prescribe NOTE: Abbreviated from Section 16 of the Malaysian Communications and Multimedia Commission Act 1998 (Act 589) |Malaysian Communications and Multimedia Commission| SALIENT POINTS Internet in Malaysia Role of MCMC Cybercrime & Security Risks Cybercriminals Hiding Their Tracks Relevant Legal Provisions Action by SKMM & LEAs |Malaysian Communications and Multimedia Commission| WHAT IS CYBERCRIME? Offences against Confidentiality, Integrity and Availability • • • • • Illegal access to a computer system Illegal interception Data interference System interference Misuse of devices Computer Related Offences • Fraud and forgery Content Related Offences • Child Pornography • Racism • Sedition Offences related to intellectual property rights and similar rights • Distribution of copyrighted music, video and books without owner’s permission |Malaysian Communications and Multimedia Commission| COMBINATION OF OFFENCES ICT facilitate the activities of organized criminal groups • Email-based phishing scam • Pretending to be legitimate company • Seeking to disclose information Organized Cybercrime Phishing and Identity Theft •Create propaganda •Collecting information •Providing information •Communication among terrorist •Terrorist financing •Training for real world attacks Terrorist use of the internet |Malaysian Communications and Multimedia Commission| How are cyber crimes committed? • Malware/Crimeware – – – – – Bots->Botnets Keyloggers Virus Spywares Trojans/Backdoors • Exploiting the vulnerabilities – Operating system-Windows,Linux ,OS X – Application / Services • Social Engineering • Ignorance 15 |Malaysian Communications and Multimedia Commission| Hacking • Unauthorized access / forced entry into a computer or network system • Can lead to – Information stealing->extortion – Steal/Use available resources-> increase operation cost – Information tampering or deletion->shame, damage to business (cost) – Planting time bomb for future execution-> attack when it hurts most 16 |Malaysian Communications and Multimedia Commission| Denial of Service (DOS) • Attack targeting on disrupting the service or resources of the provider until the provider unable to offer the service • Usually done using bots called zombies that are installed in hundreds/thousands (Distributed DOS) which are controlled by one computer • Can lead to – Extortion – Shame 17 |Malaysian Communications and Multimedia Commission| Anatomy of DDOS 18 |Malaysian Communications and Multimedia Commission| Phishing “Imitation is the best form of flattery” Phishing - misrepresent, cheat and steal relying on “social engineering” Financial institutions are mostly targeted Most “phishers” can be found in the US and Korea. Other places, China, Brazil, Russia and Canada…. |Malaysian Communications and Multimedia Commission| Example of Phishing Typical phishing email What should you do? Forward the email to antiphishing (at) cmc.gov.my MCMC is a member of the Internet Banking Task Force (IBTF) Working with international partners to take down phishing sites |Malaysian Communications and Multimedia Commission| Identity Theft • Impersonating victim in email, chat rooms and other services • Can result from – Hacking – Phishing/Pharming • Can lead to – Harassment – Crime committed under your identity 21 |Malaysian Communications and Multimedia Commission| Identity Theft NB. Social networking websites allow multiple registration of a single name |Malaysian Communications and Multimedia Commission| Identity Theft NB. Social networking websites also allow creation of community groups of ‘fan pages/profiles’ |Malaysian Communications and Multimedia Commission| Cyber pornography • Difficult to curb as it is legal in some countries • Many illegal child porn sites leads to promoting Paedophilia, or sexual attraction to children by an adult • Children (victims) on the internet are lured to give their addresses by pedophiles • Some free porn sites are traps that will activate installation of malware upon visit 24 |Malaysian Communications and Multimedia Commission| Offensive Content • Indecent, obscene, false, menacing, or offensive content. • Seditious tendency – (a) (b) (c) (d) (e) (f) to bring into hatred or contempt or to excite disaffection against any Ruler or against any Government; to excite the subjects of the Ruler or the inhabitants of any territory governed by any government to attempt to procure in the territory of the Ruler or governed by the Government, the alteration, otherwise than by lawful means, of any matter as by law established; to bring into hatred or contempt or to excite disaffection against the administration of justice in Malaysia or in any State; to raise discontent or disaffection amongst the subjects of the Yang di-Pertuan Agong or of the Ruler of any State or amongst the inhabitants of Malaysia or of any State; to promote feelings of ill-will and hostility between different races or classes of the population of Malaysia; or to question any matter, right, status, position, privilege, sovereignty or prerogative established or protected by the provisions of part III of the Federal constitution or Article 152, 153 or 181 of the Federal Constitution. 25 |Malaysian Communications and Multimedia Commission| Cyber Scam • Targets people to participate in some foolproof scheme which will return higher investment • Usually sent through a convincing email • Can lead to – Monetary loss – Shame 26 |Malaysian Communications and Multimedia Commission| Scam email • The Nigerian National Petroleum Company has large contract USD$ 40,000,000 and need non-Nigerian citizen to do some transaction. Commission 10% • But need USD$100,000 first to be legitimate transferee • Invest USD$100,000 -> USD$4,000,000 27 |Malaysian Communications and Multimedia Commission| SPAM • Abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages • Advertise some illegal sites selling drugs or pirated software/movies/music. • Very irritating and waste of resources • Main vehicle for spreading virus/malware/trojan and phishing sites. • Use of botnets to collect email addresses and send SPAMs 28 |Malaysian Communications and Multimedia Commission| Intellectual Property - Piracy • Making and distribute illegal copies of copyrighted materials like software, movies, songs and e-books. • Heavily perpetrated on P2P networks and auction sites • Websites providing cracks and serial keys (WAREZ) 29 |Malaysian Communications and Multimedia Commission| Cyber Espionage • Gaining crucial information like trade secrets, patents and confidential financial documents about competitors • Hacking, Backdoor and spyware used. • Virus can be sent to delete some important files 30 |Malaysian Communications and Multimedia Commission| Cyber Terrorism • Conduct of terrorism by terrorist using cyberspace • Ranging from DDOS attacks to hacking into Nuclear power plants (possible) • Using chat rooms and encrypted emails to coordinate attacks • Usually aims at the critical infrastructures like water, electricity and telecommunications to have the physical effect 31 |Malaysian Communications and Multimedia Commission| Critical Infrastructures STUXNET 32 |Malaysian Communications and Multimedia Commission| Estonian Incident • Started April 2007 • Motive: Protest against reallocation of the Bronze Soldier • Russian hackers suspected • Riots followed by DDOS • Estonia is a pioneer of "e-government" and one of the most wired countries in Europe, crippled • Government websites, Mobile networks and Rescue service network attacked • Forced to shutdown international links 33 |Malaysian Communications and Multimedia Commission| 34 |Malaysian Communications and Multimedia Commission| WIFI hijacking • • • • Use of WIFI spots without permission Crack if encrypted Harmless crime? Deprives ISPs revenue and steals bandwidth 35 |Malaysian Communications and Multimedia Commission| Why commit cyber crimes? • • • • • • • • Curiosity Being a hacker is cool? Abundance of resources and ready made software Vulnerabilities Monetary reasons Malicious reasons Political agenda Anonymity and difficult to trace 36 |Malaysian Communications and Multimedia Commission| Cybercrime today $$$ • Its mostly about money • Systems are built superfast to accommodate commercial needs • Information security is not taken seriously • Traceability is hard • Anonymity is easy |Malaysian Communications and Multimedia Commission| Is hacking cool? • The Orange County Register reports that a 19 year old from Washington state broke into the Orange County California 911 emergency system. He randomly selected the name and address of a Lake Forest, California couple and electronically transferred false information into the 911 system. The Orange County California Sheriff's Department's Special Weapons and Tactics Team was immediately sent to the home of a couple with two sleeping toddlers. The SWAT team handcuffed the husband and wife before deciding it was a prank. Says the article, 'Other law enforcement agencies have seen similar breaches into their 911 systems as part of a trend picked up by computer hackers in the nation called "SWATting“-Slashdot 38 |Malaysian Communications and Multimedia Commission| Meet Millionaire Spammer Jeremy Jaynes • One of the world's biggest spammers • Earns about an estimated US$500,000 to US$750,000 a month • Owns a million-dollar house, a restaurant and a Maserati • 16 High speed Internet lines at home with monthly bill up to US$20,000 • CDs containing more than 384 million emails addresses • He works from home 39 |Malaysian Communications and Multimedia Commission| Ignorance is not an excuse Ah Longs ‘book’ customers on Facebook LOAN sharks are getting tech-savvy — they are now sourcing for potential customers through Facebook, Nanyang Siang Pau reported. The daily said the loan sharks had appointed middlemen who would trawl the social networking site for customers. It quoted Deputy Inspector-General of Police Tan Sri Ismail Omar as saying that the loan sharks seemed to be very good at identifying people who had failed to obtain loans through legal channels. “They will then get in touch with them through Facebook and convince them to take a loan.” 40 |Malaysian Communications and Multimedia Commission| Modern-Day Revenge • A man in Sweden who was angry with his daughter's husband has been charged with libel for emailing the FBI that the son-in-law had links to al-Qaeda. • The son-in-law was arrested upon landing in Florida. He was placed in handcuffs, interrogated and placed in a cell for 11 hours before being put on a flight back to Europe 41 |Malaysian Communications and Multimedia Commission| Cybervillains for Hire • You can’t do it, just hire • 20 millions of mail's = €350 euro • Starter Kit = €140 – 5 Millions email address with spammer app configured in your own server • DDOS attack – Free for 10 mins – USD$20 for 1 hour and USD$100 for 24 hours 42 |Malaysian Communications and Multimedia Commission| SALIENT POINTS Internet in Malaysia Role of MCMC Cybercrime & Security Risks Cybercriminals Hiding Their Tracks Relevant Legal Provisions Action by SKMM & LEAs |Malaysian Communications and Multimedia Commission| Methods Anonymous Surfing Website hosted overseas subject to Anonymous Proxy privacy laws Wireless access False registration TOR Network Use of Hacked/Servers IP Spoofing Extra territoriality applies |Malaysian Communications and Multimedia Commission| SALIENT POINTS Internet in Malaysia Role of MCMC Cybercrime & Security Risks Cybercriminals Hiding Their Tracks Relevant Legal Provisions Action by SKMM & LEAs |Malaysian Communications and Multimedia Commission| RELEVANT PROVISIONS FROM CMA 1998 Section 231 Offence if use apparatus or device without authority Uses any apparatus or device with intent to obtain information, content, sender or addressee without an approval from SIRIM devices, gadgets meant for interception of data Section 232 Fraudulent use of network facilities, network service etc With intent to avoid payment or fraudulent use of service or facility: Stealing of telephone lines (PSTN / PCCB) Cellular cloning Tapping wireless internet for free service usage etc Section 233 Improper use of network facilities or network service Annoying, abusive, threatening, harassing, obscene:Emails (spamming), SMS, MMS Website content publishing, posting Viruses etc |Malaysian Communications and Multimedia Commission| RELEVANT PROVISIONS FROM CMA 1998 Section 234 Interception & disclosure of communications prohibited Interception of telephone line etc and use of the information compromising / jeopardizing an ongoing investigation Section 235 Damage to network facilities etc Sabotage of communication infrastructure or service Remote Denial of Service (DoS) attack e.g. virus that damage or halt internet service belonging to a provider Section 236 Fraud and related activity in connection with access devices Production, sale or use of devices or software that can be used to modify a gadget, device to gain illegal access to a service, content service etc E.g. card reader being modified to reader/writer which can gain access to MyKad database illegally. |Malaysian Communications and Multimedia Commission| THE DIGITAL SIGNATURE ACT 1997 Regulate the use of digital signatures Section 4 - Certification authorities under the DSA are licensed (also provision on exemption) Section 67 - Presumptions on digital signatures INFRINGEMENT OF COPYRIGHT Copyright (Amendment) Act 1997 Section 13 (nature of copyright in literacy, musical or artistic works, films and sound recordings. Section 41 (Offence) COMPUTER CRIMES ACT 1997 Section 3 (unauthorized access to computer materials) Section 4(unauthorized access with intent to commit or facilitate commission of further offence Section 5(unauthorized modification of contents of any computer) Section 6(wrongful communications ) ELECTRIC COMMERCE ACT 2006 & ELECTRONIC GOVERNMENT ACTIVITIES ACT 2007 Section 6 of ECA and Section 10 of EGAA (legal recognition of electronic message) |Malaysian Communications and Multimedia Commission| TELEMEDICINE ACT Practice of medicine using audio, visual and data communications. INTERNET DEFAMATION Section 500 of the Penal Code Section 28 of the ISA 1960 ONLINE SEDITION Section 211 of the CMA 1998 Section 3 and 4 of the Sedition Act 1948 Section 233 of the CMA 1998 Section 8 of Internal Security Act 1960 (any person who, by word of mouth or in writing or in any newspaper, periodical, book, circular or other printed publication or by any other means spreads false reports or makes false statements likely to cause public alarm, shall be guilty of an offence) Section 211 (prohibition on provision of offensive content) and Section 233 (Improper use of network facilities or network service) of the Communications and Multimedia Act 1998 CYBER PORNOGRAPHY AND EXPLOITATION OF CHILDREN Section 292, 293 and 294 of the Penal Code Section 5 of Film Censorship Act 2002 Section 31 Child Act 2001 |Malaysian Communications and Multimedia Commission| PROSTITUTION AND OTHER ILLEGAL CYBER SEXUAL ACTIVITIES Section 372 (person living on or trading in prostitution), 372B ( soliciting for purpose of prostitution) and 373 (suppression of brothels) of the Penal Code SPAM Spam Control Regulation has been finalized and forwarded to Ministry of Information, Communications and Culture on 9 February 2010. CYBER TERRORISM Penal Code contains provisions that deals with terrorism that may apply to cyber terrorism as well Chapter VIA Sections 130B -130T (incorporated in Penal Code on 6 March 2007) CROSS BORDER AND JURISDICTIONAL ISSUES Extradition Act 1992 Mutual Assistance in Criminal Matters Act 2002 Reciprocal Enforcement of Judgment Act 1958 |Malaysian Communications and Multimedia Commission| SALIENT POINTS Internet in Malaysia Role of MCMC Cybercrime & Security Risks Cybercriminals Hiding Their Tracks Relevant Legal Provisions Action by SKMM & LEAs |Malaysian Communications and Multimedia Commission| • A cybersecurity monitoring centre initiated by the Malaysian Communication and Multimedia Commission (SKMM) • In line with National Cyber security Policy (NCSP) and the 10th National Policy Objective under the Communications and Multimedia Act 1998 (CMA 1998) • Provide preventive early warnings to all relevant stakeholders in Malaysia • Serves as the national Internet network thermometer to provide overall understanding of macro cyber threat level with the involvement and cooperation of both public and private sectors |Malaysian Communications and Multimedia Commission| SNSC : Watch & Alert Monitors and analyze 1 Petabytes (1,000,000,000,000,000 Bytes) |Malaysian Communications and Multimedia Commission| MAIN RESPONSIBILITIES • Network Threat Monitoring and Management – Recommends threat level for Malaysian network – Monitor the criticality of threats coming into the local network • Incident Management, Network Forensic, Recovery and Advisory – Analyze network – forensic – Provide early warning, handling, advisory and coordination during incidences • Vulnerability Management – Network auditing activities to ensure continuous security |Malaysian Communications and Multimedia Commission| THE BIGGER PICTURE INTERNATIONAL SECURITY AGENCIES DOMESTIC CNIIs |Malaysian Communications and Multimedia Commission| SNSC-ISP Connectivity |Malaysian Communications and Multimedia Commission| Cyber Incidents Detected (2011) TOTAL: 3,921 |Malaysian Communications and Multimedia Commission| Phishing Cases Escalated (2011) |Malaysian Communications and Multimedia Commission| Content-Related Complaints |Malaysian Communications and Multimedia Commission| Content-Related Complaints TYPE ACCORDING TO MEDIUM WEBSITE/ BLOG/ EMAIL SOCIAL NETWORKING TOTAL COMPLAINTS 2011 1,112 716 1,828 1 Jan-11 Apr 2012 274 239 513 TYPE OFFENSIVE & MENACING FALSE OBSCENE HACKING OTHERS TOTAL COMPLAINTS 2011 789 362 183 196 298 1828 1 Jan-11 Apr 2012 144 148 58 55 108 513 |Malaysian Communications and Multimedia Commission| Action Taken (2011) |Malaysian Communications and Multimedia Commission| Investigation under CMA 1998 CATEGORY YEAR EMAIL BLOG FB/YOUTUBE WEBSITE TOTAL 2010 35 13 21 45 114 2011 35 14 23 47 119 11 4 6 12 33 81 31 50 104 266 2012 (UNTIL MAC 2012) TOTAL |Malaysian Communications and Multimedia Commission| |Malaysian Communications and Multimedia Commission| Enforcement Action under S.263(2) CMA 1998 (2011) CATEGORY AGENCY JAN FEB MAR APR MAY JUN JULY AUG SEPT OCT NOV DEC TOTAL PHISHING SITE SKMM/ PDRM 79 83 133 65 79 108 124 74 139 149 119 106 1258 LUCAH SKMM 124 0 21 0 4 0 0 0 0 0 17 0 166 JENAYAH SYARIAH JAIN/JAKIM 0 0 2 4 0 0 0 0 0 0 0 0 6 MEDICINE KKM 0 0 1 0 0 0 0 0 0 0 0 0 1 S233 CMA SKMM 0 0 0 0 0 0 0 1 0 0 0 0 1 S211 CMA SKMM 5 1 3 4 9 0 0 0 0 0 0 0 22 COPYRIGHT KPDNKK 0 0 0 0 10 0 0 0 0 0 0 0 10 FINANCIAL SSM 0 0 6 0 0 0 0 0 0 0 0 0 6 SECURITIES SC 1 0 0 0 0 0 0 0 0 0 0 0 1 ONLINE GAMBLING PDRM 0 0 4 0 0 0 0 0 0 0 0 0 4 209 84 170 73 102 108 124 75 139 149 136 106 1475 Total |Malaysian Communications and Multimedia Commission| CONCLUSIONS |Malaysian Communications and Multimedia Commission| Conclusions • Continuous and systematic monitoring due to overwhelming number of web presence – Issues requiring further action/ feedback • Pro-active action required:– Reporting to web host/ moderator – Media engagement through mainstream and alternative media on issues raised • Intensify awareness campaign – SKMM’s “Klik Dengan Bijak” Campaign – Participation in seminars, conferences etc. – Media engagement through multi-platforms |Malaysian Communications and Multimedia Commission| Conclusions Interface with international bodies and organizations to enhance cooperation and exchange of information, expertise and intelligence. Meridian Process Connecting and Protecting |Malaysian Communications and Multimedia Commission| ASIAN TELECOMMUNICATIONS REGULATORS COUNCIL APECTEL SECURITY & PROSPERITY STEERING GROUP |Malaysian Communications and Multimedia Commission| INTERNATIONAL COLLABORATION Chair of ASEAN Telecommunications Regulatory Council (ATRC) Network Security Working Group Member of the Security & Prosperity Steering Group (SPSG) of APEC Telecommunications and Information Working Group (APECTEL) Member of Steering Committee of the Meridian (A meeting and work shop for Governmental and Regulatory bodies responsible for the protection of critical infrastructure) Signatory of the Seoul-Melbourne MoU against Spam Member of the London Action Plan MoU with RSA (Security Division of EMC) – collaboration to take down phishing websites for foreign banks hosted in Malaysia |Malaysian Communications and Multimedia Commission| SKMM Contact Information: nsc@cmc.gov.my antiphishing@cmc.gov.my Thank you General Line : +60 3 8688 8000 Facsimile : +60 3 8688 1009 www.mcmc.gov.my |Malaysian Communications and Multimedia Commission| 70