Deprecated: Function create_function() is deprecated in /home2/blogwebhostingbu/public_html/wp-content/plugins/facebook-like-box-responsive/facebook-like-box.php on line 29
{"id":759,"date":"2009-09-12T21:25:02","date_gmt":"2009-09-12T21:25:02","guid":{"rendered":"http:\/\/www.webhostingbuzz.com\/blog\/?p=759"},"modified":"2009-09-12T21:25:02","modified_gmt":"2009-09-12T21:25:02","slug":"targeted-attack-long-investigation-dead-end","status":"publish","type":"post","link":"https:\/\/blog.webhostingbuzz.com\/2009\/09\/12\/targeted-attack-long-investigation-dead-end\/","title":{"rendered":"Targeted Attack, Long Investigation, Dead End"},"content":{"rendered":"

I am currently enrolled in an upper division class on information systems security focusing on the CISSP examination. The class is part of a program certified by the National Security Agency and Department of Homeland Security as a Center of Academic Excellence in Information Assurance. Since cyber crime and electronic security are becoming such everyday topics – especially e-commerce related – I thought many of our readers might find it interesting to read some of my papers from the class.<\/p>\n

The first assignment was to describe a security attack that I had experienced or been a part of. I describe a situation I was in as a small hosting provider who was defaced by a targeted attack against one of my clients.<\/p>\n

The story goes back almost a year now (and is still being added to every day.) The story goes across 4 states and three nation\u2019s borders. Until you\u2019ve done a cyber investigation, you really have no idea how difficult situations like these can be – I sure didn\u2019t have any grasp of it going in, but I have learned lots from the process.
\n
\nI own a reseller web hosting account with a company based in Orlando, Florida and this allows me to do design and development services for small business clients across the country with the added advantage of bringing the hosting into a controllable environment. I host around 12-15 clients on the account and have a pretty close relationship with each one.<\/p>\n

In October 2008, I had just put a test version of a site up for a client on his brand new website. About a week after posting it, I received a phone call from my client to inform me that a former associate of his had visited the site and he was worried we may get attacked. Wondering how my client knew a former associate had been on his website, I started looking into the stats when I noticed the same thing my client did: the person was on a static IP address that was registered to a company he used to own. This person was my client\u2019s former web developer and they had a very bad disagreement before going their separate ways. This disagreement included the developer suing my client for somewhere around $12,000 and my client counter-suing for the rights to his website.<\/p>\n

The judge decided that my client did not owe the $12,000 and that the old developer needed to give my client a disk of his files. Needless to say, the former developer was not happy – he also happened to be the kind of person who likes to get revenge.<\/p>\n

Since my client\u2019s new site had not been publicly announced, I was curious how this guy found it – and soon found out. He had come from a referring address of Google, with a search of my customer\u2019s name and the domain name. Red flags went off everywhere, so I set a nice little trap for him the next time he arrived.<\/p>\n

A little bit of PHP and JavaScript later, I had a script that would give a red screen with a nice little warning message, two sets of 999 JavaScript alerts, and a notification script to send me both an email and a text message when this IP address visited my customer\u2019s site. The first time the person saw the script, it was obvious (and hilarious) to me that he was not very happy – you could tell by his visiting pattern.<\/p>\n

I sent an alert to my hosting company to alert them to watch for the IP address coming in on any port other than 80 and to look for any abnormal activity. They monitored the server for 48 hours and ended up giving up after no unusual activity was discovered. I also took down the red screen and chose to passively monitor him instead, leaving the text and email alerts in place.<\/p>\n

Over the next few months, I would get texts off and on, would find a computer to make sure everything on my server was okay. So far, everything was – but that all changed in January during an SGA meeting. My phone buzzed four or five times, indicating activity. 16 minutes later, I had a text from a different customer, who informed me his site had been hacked. Out of instinct, I sent a text to a good friend to check the sites, as I had no computer during the meeting. Pretty soon, my friend replied that it wasn\u2019t isolated to the one customer, but it had affected all customers on my account.<\/p>\n

Initially, I didn\u2019t put two and two together. I sat there and wondered what had happened. That was an important lesson – never be complacent or routine with security. After the meeting concluded, I went up to talk to a fellow Senator when it hit me like a brick – it wasn\u2019t an accident that my phone had gone off 16 minutes earlier, that alert was there for a reason.<\/p>\n

I rushed home to pour over the logs and notified the client who had alerted me about this guy. After reviewing the logs and speaking with security and abuse at my host, I determined I probably had enough to go on, and I called the Hays Police Department. This was at 9:06PM – and the fun really started here.<\/p>\n

This is when I was introduced to what law enforcement calls \u201cjurisdictional issues.\u201d Hays Police Department said \u201cWe don\u2019t have jurisdiction, it would be the job of the police in the town where the crime was executed in.\u201d In computer crime, that can get interesting. Just in my case, it appeared the attacker had gained control of a computer in Canada, owned by a California ISP and co-location provider, which was used to attack my server in Orlando, Florida. I – one of thirteen victims – was in Hays, Kansas. The suspect was in Butler County, Kansas. The twelve other victims were scattered across the US.<\/p>\n

Over the course of the next 20 hours (yes, I pulled an almost all-nighter, got about two hours of sleep the first night) I spoke to 5 different law enforcement agencies and discovered two major things: 1) 50% of detectives I spoke to did not know what a server was and 2) Of those who did know what a server was, 50% knew where I needed to go. Credit should be given to Brad Rickey at the Ellis County Sheriff\u2019s Office for pointing me – finally – in the right direction in contacting Orlando Police Department and asking for computer crimes\/fraud detective. The guy there was absolutely awesome, and actually went onsite later that day to check on things. I mailed him 50-75 pages of documentation, only to discover a day after he got the documents that the servers were housed in a suburb outside of town and he no longer had jurisdiction in the case either. He handed the case over to a detective in the small suburb, who didn\u2019t know what a server was, and the ball was dropped. <\/p>\n

Finally, when we had the jurisdiction nailed down to the right place, we were not able to make anything happen. It should have been a slam dunk case – the two endpoints made perfect sense and there was enough documentation to nail the case down, but when it came down to it, the ball was dropped and we were not able to make headway.<\/p>\n

Lessons learned:<\/p>\n

–\tMore detectives need to be trained to respond to cyber crimes<\/p>\n

–\tLaw enforcement relies on you to build as good of case as possible, and they will provide assistance, but only if they think they have jurisdiction in the matter<\/p>\n

–\tFederal law enforcement doesn\u2019t care about you unless it involves credit cards or more than $10,000 physical loss<\/p>\n

–\tIt is tough to determine loss on virtual assets<\/p>\n

–\tCyber Crime, even if you have the two endpoints and just have to connect the dots, can be extremely difficult. This is unnecessarily difficult, in my opinion<\/p>\n

–\tEvidence needs to be collected in accordance with strict handling guidelines that will hold up in court<\/p>\n

–\tCyber Crime jurisdiction needs major clarification and more openness<\/p>\n

–\tMore Federal assistance to state and local agencies is necessary to help relieve some of these issues until more detectives can be trained to handle the crimes<\/p>\n","protected":false},"excerpt":{"rendered":"

I am currently enrolled in an upper division class on information systems security focusing on the CISSP examination. The class is part of a program certified by the National Security Agency and Department of Homeland Security as a Center of Academic Excellence in Information Assurance. Since cyber crime and electronic security are becoming such everyday […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"yoast_head":"\nTargeted Attack, Long Investigation, Dead End - WebHostingBuzz US Blog<\/title>\n<link rel=\"canonical\" href=\"https:\/\/www.webhostingbuzz.com\/blog\/2009\/09\/12\/targeted-attack-long-investigation-dead-end\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Targeted Attack, Long Investigation, Dead End - WebHostingBuzz US Blog\" \/>\n<meta property=\"og:description\" content=\"I am currently enrolled in an upper division class on information systems security focusing on the CISSP examination. The class is part of a program certified by the National Security Agency and Department of Homeland Security as a Center of Academic Excellence in Information Assurance. Since cyber crime and electronic security are becoming such everyday […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.webhostingbuzz.com\/blog\/2009\/09\/12\/targeted-attack-long-investigation-dead-end\/\" \/>\n<meta property=\"og:site_name\" content=\"WebHostingBuzz US Blog\" \/>\n<meta property=\"article:published_time\" content=\"2009-09-12T21:25:02+00:00\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"7 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.webhostingbuzz.com\/blog\/#website\",\"url\":\"https:\/\/www.webhostingbuzz.com\/blog\/\",\"name\":\"WebHostingBuzz US Blog\",\"description\":\"Hosting, hosting, more hosting and a little of everything else\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.webhostingbuzz.com\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.webhostingbuzz.com\/blog\/2009\/09\/12\/targeted-attack-long-investigation-dead-end\/#webpage\",\"url\":\"https:\/\/www.webhostingbuzz.com\/blog\/2009\/09\/12\/targeted-attack-long-investigation-dead-end\/\",\"name\":\"Targeted Attack, Long Investigation, Dead End - WebHostingBuzz US Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.webhostingbuzz.com\/blog\/#website\"},\"datePublished\":\"2009-09-12T21:25:02+00:00\",\"dateModified\":\"2009-09-12T21:25:02+00:00\",\"author\":{\"@id\":\"https:\/\/www.webhostingbuzz.com\/blog\/#\/schema\/person\/bc5cd835468fd16cbc019eed8387b952\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.webhostingbuzz.com\/blog\/2009\/09\/12\/targeted-attack-long-investigation-dead-end\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.webhostingbuzz.com\/blog\/2009\/09\/12\/targeted-attack-long-investigation-dead-end\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.webhostingbuzz.com\/blog\/2009\/09\/12\/targeted-attack-long-investigation-dead-end\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.webhostingbuzz.com\/blog\/2009\/09\/12\/targeted-attack-long-investigation-dead-end\/\",\"url\":\"https:\/\/www.webhostingbuzz.com\/blog\/2009\/09\/12\/targeted-attack-long-investigation-dead-end\/\",\"name\":\"Targeted Attack, Long Investigation, Dead End\"}}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.webhostingbuzz.com\/blog\/#\/schema\/person\/bc5cd835468fd16cbc019eed8387b952\",\"name\":\"Matt Russell\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.webhostingbuzz.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/198b99da43836565333cce4988606664?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/198b99da43836565333cce4988606664?s=96&r=g\",\"caption\":\"Matt Russell\"},\"sameAs\":[\"http:\/\/blog.webhostingbuzz.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/blog.webhostingbuzz.com\/wp-json\/wp\/v2\/posts\/759"}],"collection":[{"href":"https:\/\/blog.webhostingbuzz.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.webhostingbuzz.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.webhostingbuzz.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.webhostingbuzz.com\/wp-json\/wp\/v2\/comments?post=759"}],"version-history":[{"count":0,"href":"https:\/\/blog.webhostingbuzz.com\/wp-json\/wp\/v2\/posts\/759\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.webhostingbuzz.com\/wp-json\/wp\/v2\/media?parent=759"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.webhostingbuzz.com\/wp-json\/wp\/v2\/categories?post=759"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.webhostingbuzz.com\/wp-json\/wp\/v2\/tags?post=759"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}