1 / 33

Ancamanan Keamanan Informasi Pada Industri Finansial Universitas Bina Darma

Ancamanan Keamanan Informasi Pada Industri Finansial Universitas Bina Darma Palembang – 20 Juni 2014 Digit Oktavianto http://digitoktavianto.web.id digit dot oktavianto at gmail dot com. About Me. IT Security Enthusiast ( Opreker ) Member of Indonesian Honeynet Chapter

tryna
Download Presentation

Ancamanan Keamanan Informasi Pada Industri Finansial Universitas Bina Darma

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. AncamananKeamananInformasiPadaIndustriFinansial UniversitasBinaDarma Palembang – 20 Juni 2014 Digit Oktavianto http://digitoktavianto.web.id digit dot oktavianto at gmail dot com

  2. About Me • IT Security Enthusiast (Opreker) • Member of Indonesian Honeynet Chapter • Member OWASP Indonesian Chapter • Linux Activist (KPLI Jakarta) • IT Security Consultant

  3. Financial Services Industry Who? • Commercial Banking Service • Investment Service • Foreign Exchange Service • Insurance • Leasing Service • Stock Exchange

  4. Security Issue in Financial Industry Worldwide Issue : • Phishing • Malware Banking (PC, Mobile) • ATM Hacking • ATM Skimming • Attack on Infrastructure (Server, Application) • Attack on third party service (Merchant, Payment Gateway)

  5. Security Issue in Financial Industry (Cont’d..) Local Issue : • Phishing • ATM Skimming • Malware Banking (Recent Issue) • Insider Threat (Disgruntle Employee)

  6. Classification Security Threat in Financial Industry • Account Takeover • Phishing • Malware • End Point Infrastructure Attack • ATM Skimming • ATM Hacking • Third Party Payment Process Breach • EDC Vendor • Payment Gateway • Disgruntle Employee • Mobile Banking Exploitation • Fake Mobile Apps • Malware in Mobile Device • Attack in Infrastructure Server • Attacking Ibanking Server • DDoS

  7. Who? • Who is attacking you and why?

  8. Location Target

  9. Why?

  10. Case Study – Phishing • Phishing • Selalubermuladari Email • Biasanyamemberitahukanadanyaperubahansistem, atauperbaikan, danmemintamengklik link ygdisertakanpada email • Biasanyajugamenyertakan attachment • Link referalpada body email atau attachment biasanyamerupakan fake URL Bank ybs, namunketikadikliktampilannyapersissamadengan Bank ybs

  11. Case Study – Phishing • How it Works?

  12. Case Study – Phishing

  13. Case Study – Phishing

  14. Case Study – Phishing

  15. Case Study – ATM Skimming How it works? • Capture your data from your card • Capture your PIN Information

  16. Case Study – ATM Skimming

  17. Case Study – ATM Skimming

  18. Case Study – ATM Skimming

  19. Case Study – ATM Skimming

  20. Case Study – ATM Hacking • How it works? • Operating System Vulnerability • Malware • Insider Threat

  21. Case Study – ATM Hacking

  22. Case Study – ATM Hacking

  23. Case Study – ATM Hacking

  24. Case Study – Malware Banking What are they doing? • Keylogging • Form data capture • Screen captures and video recording • Injection of fraudulent form fields • Injection of fraudulent websites • Redirecting of banking websites • Man-in-the-middle technique (Man In The Browser)

  25. Case Study – Malware Banking How it works? • You are infected by Exploit Kit • Exploit Kit bring Botnet / Banking Trojan to your computer • Banking Trojan monitor everything you do on the Internet, including your online banking and credit card transactions • Banking Trojan records everything you type in, including userIDs, passwords, bank-account numbers, credit-card and PIN numbers and sends them back to the cyber-criminal’s computer where the information is stored in a sophisticated database • Banking Trojan steal your one time password from hardware token, two factor authentication SMS.

  26. Case Study – Malware Banking Skenario : • Anda login kehalaman Website Ibanking. MITB Malware bisamendeteksiapasajajenis Bank yang andagunakan (case study targeted customer di Indonesia) • Ketika browser memprosesIbanking website anda, Trojan akanmelakukan intercept, danmenyisipkanjavascriptke browser anda (Man In The Browser) danmeng-intercept username + password anda

  27. Case Study – Malware Banking SkenarioTransaksi : • Prosedurtransaksimenggunakanlayanan internet banking padasebagianbesar bank menggunakan Hardware Token • Customer A inginmelakukan transfer ke Customer B. • Cust A memasukkannomorrekeningtujuan, danjumlahtransaksi • Padaprosesdimana Bank memintaCust A memasukkan challenge key yang diberikanpada website, makaCust A akanmemasukkan challenge key tsbpada token hardware. Output response dari token hardware tsbdimasukkanpadakolom PIN transaksi.

  28. Case Study – Malware Banking • Padaprosestahap ke-3 tadi malware akanmelakukan intercept data pada browser. Dimanaseharusnya challenge key yang dikeluarkan 4 digit terakhiradalah 4 digit terkahirrekeningpenerima, namunkarenanomorrekeningtujuansudahdirubah, yang awalnyake B, makadirubahtujuannyakesi C. Rekening C inimerupakanrekening the bad guy. • Customer harus aware dimanaada challenge code yang diberikanbada website Ibanking, 4 digit terakhirharussamadengan 4 digit terakhirrekeningsipenerima yang seharusnya • 4 digit pertamamerupakanangka random, jadi yang harusdiperhatikanadalah 4 digit terakhirpada challenge code yang diberikan

  29. The Protection For End User / Customer : • Keep your operating system and application fully patched • Make sure your anti-virus definitions, which the software uses to detect new strains of malware, is always up to date. • Use Web content filters that block ads. Many anti-virus suites now incorporate this feature. • The most important : Information Security Awareness

  30. The Protection For Financial Industry : • Protect end point infrastructure • Update / patch OS and application in ATM Machine • Add new technology to prevent ATM Skimming • Enhance physical security protection • Create policy to strengthen security feature in Internet Banking transaction • Implement fraud management to detect anomaly behavior from customer transaction • Assess / Audit third party partner to make sure there is no “hole” in their infrastructure

  31. The Protection For Financial Industry : • Perform Audit and Assessment to the infrastructure and application • Enhance security perimeter to detect and prevent the “bad guy” • Perform Security Monitoring Threat to the infrastructure • Educate User / Customer about information security awareness

  32. FINISH Q & A

More Related