Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

2/21/2017
12:30 PM
Connect Directly
Facebook
Twitter
RSS
E-Mail
50%
50%

Law Enforcement At RSAC: Collaboration Is Key To Online Crime Fighting

Agencies and investigators are reaching out across jurisdictions and international borders to vanquish spammers, botnet operators, and worse.

RSA CONFERENCE – San Francisco – An IP address that appeared to be German. A proxy, in front of a proxy, in front of another proxy. Then, after six months of investigation, plenty of back and forth with other international agencies and officials, and lots of dead-ends, the German federal police finally got their hands on the server and database powering the illegal sale of online access credentials, "a black Amazon," according to Mirko Manske, team lead, cyber intelligence ops for Bundeskriminalamt (BKA).

Except that wasn't the end of it. The server drive was encrypted, Manske says.

Relying on a network of collaboration that included a university to decrypt the drive, plus coordination with US and EU law enforcement officials, and data from the National Cyber-Forensics and Training Alliance. Collectively, they were able to pull the plug on the nefarious marketplace, which had 10,000 members buying and selling stolen credentials using Bitcoin and altcoin.

"We joined up with FBI and Europol, dividing up 180 suspects" from multiple countries, Manske told RSA attendees last week. He spoke as part of a larger session addressing law enforcement's increasing collaboration with other agencies, reaching out across jurisdictions and even international borders to vanquish spammers, botnet operators, and worse. The unambiguous message: Collaboration works, and in fact, may be the only way for law enforcement to shut down bad actors who can change identities, servers, and locations at will.

"Cops can't do it alone," Manske says. "If it had been just us, I wouldn't have known how to handle the workload. And without collaboration, I never would have been able to solve this case," he adds. "Stop hiding what you're doing and start sharing what you're working on," he urges other enforcement officials.

Taking down the infamous Avalanche network would have been impossible without broad-based collaboration, according to Keith Mularski, a supervisory special agent with the Federal Bureau of Investigation, another RSA panelist.

Avalanche, "a bullet-proof, criminal services hosting service" for malware propagation and money laundering operating since 2010, was responsible for infecting as many as 500,000 computers daily, the FBI estimates.

On the day of the takedown in late November 2016, the FBI coordinated with counterparts and private-sector participants in 40 countries including Sweden, the Netherlands, France, Canada, Ukraine, Germany, Finland, and Australia, among others.

The FBI and its partners worked with top-level domain registrars around the world to sinkhole approximately all the compromised domains in Avalanche, Mularksi estimates. "We had to make sure we got all of them, otherwise if we left one, the bad guys could take it back," and start reconstituting the whole operation, he adds.

The partners in the Avalanche takedown also performed victim identification and remediation; the Shadowserver Foundation helped identify the IP addresses so that ISPs could clean the machines. The net result from the internal cooperation: 50 servers seized worldwide and 830,000 malicious domains sinkholed, Mularski reports.

It took almost 12 years to find and capture Sergey "Fly" Vovnenko, according to James Meehan, deputy special agent in charge, US Secret Service. Among Vovnenko's many crimes were selling compromised payment card data, offering hackers for hire on elite forums, and running a botnet used to attack multiple companies. In real life, Vovnenko tried to frame security columnist Brian Krebs by sending heroin to Krebs' home.

Investigators identified Vovnenko's residence in Naples, Italy, in 2014; the Secret Service, the US Justice Department, and Italian authorities then spent several weeks coordinating the arrest operations.

"Collaboration is the key, having people on the ground who can help us," Meehan tells the RSA audience. "If I need help, I know who to pick up the phone and talk to." He also credits the Electronic Crimes Task Force -- started in the US in the 1980s and now with offices in Rome, London, and Paris – with making international collaboration easier.

Meehan said that online criminals were communicating more efficiently than law enforcement was, frequently on encrypted Jabber channels. Behind the scenes, an international search warrant could take 6-8 months to secure, allowing for translation and submission of legal documents. "Now we're working with prosecutors in other countries where we can just make a phone call," he says. "There's the trust factor now, where before they wouldn't do anything til they got the paperwork."

Related Content:

Save

Save

Save

Save

Save

Terry Sweeney is a Los Angeles-based writer and editor who has covered technology, networking, and security for more than 20 years. He was part of the team that started Dark Reading and has been a contributor to The Washington Post, Crain's New York Business, Red Herring, ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Jet Hedon
50%
50%
Jet Hedon,
User Rank: Apprentice
2/22/2017 | 4:47:35 AM
Names
"The FBI and its partners worked with top-level domain registrars around the world" --> Have you got their names ?
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Lessons from the NSA: Know Your Assets
Robert Lemos, Contributing Writer,  12/12/2019
4 Tips to Run Fast in the Face of Digital Transformation
Shane Buckley, President & Chief Operating Officer, Gigamon,  12/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19807
PUBLISHED: 2019-12-15
In the Linux kernel before 5.3.11, sound/core/timer.c has a use-after-free caused by erroneous code refactoring, aka CID-e7af6307a8a5. This is related to snd_timer_open and snd_timer_close_locked. The timeri variable was originally intended to be for a newly created timer instance, but was used for ...
CVE-2014-8650
PUBLISHED: 2019-12-15
python-requests-Kerberos through 0.5 does not handle mutual authentication
CVE-2014-3536
PUBLISHED: 2019-12-15
CFME (CloudForms Management Engine) 5: RHN account information is logged to top_output.log during registration
CVE-2014-3643
PUBLISHED: 2019-12-15
jersey: XXE via parameter entities not disabled by the jersey SAX parser
CVE-2014-3652
PUBLISHED: 2019-12-15
JBoss KeyCloak: Open redirect vulnerability via failure to validate the redirect URL.