advertisement

Phish phry operation

60 %
40 %
advertisement
Information about Phish phry operation
Technology

Published on February 15, 2014

Author: zads

Source: slideshare.net

Description

Operation Phish Phry commenced in 2007 when FBI agents, working with United States financial institutions, took proactive steps to identify and disrupt sophisticated criminal enterprises targeting the financial infrastructure in the United States.
Investigators in both countries uncovered an international conspiracy allegedly operating an elaborate scheme to steal identities through a method commonly called “phishing.” The group is accused of conspiring to target American-based financial institutions and victimize an unknown number of account holders by fraudulently using their personal financial information.
The multinational investigative effort resulted in 53 defendants being named in the federal indictment and 47 suspects being identified by Egyptian authorities. The domestic defendants were arrested in California, Nevada, and North Carolina. In California, defendants reside in the counties of Los Angeles, Orange, San Bernardino, Riverside, and San Diego.
Egyptian-based hackers obtained bank account numbers and related personal identification information from an unknown number of bank customers through phishing
Defendants were accused with conspiracy to commit wire fraud and bank fraud. Various defendants are charged with bank fraud; aggravated identity theft; conspiracy to commit computer fraud, specifically unauthorized access to protected computers in connection with fraudulent bank transfers and domestic and international money laundering
advertisement

Our group "Amr Safwat”, "Nada Rady" and "Mohamed Zahran" The case Brief A Kickoff: What is Phishing? Phishing is a technique that involves sending email messages that appear to be official correspondence from banks or credit card vendors. In this process, bank customers are directed to fake websites purporting to be linked to financial institutions where the customers are asked to enter their account numbers, passwords and other personal identification information. Because the websites seem to be legitimate – complete with bank logos and legal disclaimers – customers do not realize that the websites do not belong to the legitimate financial institutions. Introduction: Phish Phry Operation: Operation Phish Phry commenced in 2007 when FBI agents, working with United States financial institutions, took proactive steps to identify and disrupt sophisticated criminal enterprises targeting the financial infrastructure in the United States. Investigators in both countries uncovered an international conspiracy allegedly operating an elaborate scheme to steal identities through a method commonly called “phishing.” The group is accused of conspiring to target American-based financial institutions and victimize an unknown number of account holders by fraudulently using their personal financial information. The multinational investigative effort resulted in 53 defendants being named in the federal indictment and 47 suspects being identified by Egyptian authorities. The domestic defendants were arrested in California, Nevada, and North Carolina. In California, defendants reside in the counties of Los Angeles, Orange, San Bernardino, Riverside, and San Diego. Egyptian-based hackers obtained bank account numbers and related personal identification information from an unknown number of bank customers through phishing Defendants were accused with conspiracy to commit wire fraud and bank fraud. Various defendants are charged with bank fraud; aggravated identity theft; conspiracy to commit computer fraud, specifically unauthorized access to protected computers in connection with fraudulent bank transfers and domestic and international money laundering. Egypt's part in the Phry: The indictment alleges that co-conspirators in Egypt collected victims' bank account information by using information obtained from their phishing activities. Armed with the bank account information, members of the conspiracy hacked into accounts at two banks.

Once they accessed the accounts, the individuals operating in Egypt communicated via text messages, telephone calls and Internet chat groups with co-conspirators in the United States. Through these communications, members of the criminal ring coordinated the illicit online transfer of funds from compromised accounts to newly created fraudulent accounts. US part in the Phry: The United States part of the ring was through the perpetration of the defendants who directed trusted associates to recruit “runners,” who set up bank accounts where the funds stolen from the compromised accounts could be transferred and withdrawn. A portion of the illegally obtained funds withdrawn were then transferred via wire services to the individuals operating in Egypt who had originally provided the bank account information obtained via phishing. The corporation between the Egyptian law enforcement and the USA FBI and the rules that ruled this cooperation  The start was information from the FBI to the Egyptian Force inform them about a criminal group in Egypt that use internet in professional way to hack into some American banks by the help of an American group and that the FBI is tracking that group about 2 years and they are sure about them  Order was given to the check about that information and to work according to the Egyptian Law , a Form of Special Technical team was assign  Technical cooperation was in Technical Ambush to down the proxy server (1)  that the criminal group was use to keep all their activity away from the Egyptian law enforcement authorities  All the action that the Egyptian Force taken with according to the Egyptian law  The arrange between FBI and the Egyptian Force to do the arrestment operation in the same time in Egypt and USA

 The corporation was in the principle of National sovereignty to each team, in the information side it was full corporation (1) proxy server is a server (a computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it 'caches' responses from the remote server, and returns subsequent requests for the same content directly. A proxy server has many potential purposes, including:  To keep machines behind it anonymous (mainly for security).[1]  To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.[2]  To apply access policy to network services or content, e.g. to block undesired sites.  To log / audit usage, i.e. to provide company employee Internet usage reporting.  To bypass security/ parental controls.  To scan transmitted content for malware before delivery.  To scan outbound content, e.g., for data leak protection.  To circumvent regional restrictions.

The legislations in Egypt concerning that case  Telecommunication Regulation Law No. 10 of Year 2003  Regulates telecommunication industry including internet services & net workings  Established an national authority for managing the telecommunication utility, which “National Telecommunication Regulatory Authority NTRA”  Regulates licensing of telecoms operators i.e. internet service providers  Regulates the import, manufacture & assemble of telecommunications equipments  Legally recognise & define important related technical matters i.e. operators, service providers, networks, interconnection … etc;  Set the criminal liability on different illegal actions, which considers cyber crimes i.e.  unauthorized establishing or operating of telecommunication networks  By – passing international phone calls over internet (Voip);  interception & recording of telecommunications content;  hiding, changing, altering , obstructing of any telecommunication messages;  Disclosure - without due - of right any information concerning telecommunication networks users, or their incoming or out going communications;  Intentionally disturbs or harasses other party by misusing telecommunication equipments;  Law No. 15 of Year 2004 Regulating Electronic Signature

& Establishing the Information Technology Industry Development Agency (ITIDA)  Established a General Agency ( ITIDA), which is responsible of regulating the e – signature services, & other activities related to electronic dealings and information technology industry, as well as, promoting ICTs industry,  Also, reservation of intellectual property rights through depositing, recording & registering the original copies of computer software;  Legally recognise & define important related matters i.e. e – writing, e – document, e – signature, e – medium, digital certificate … etc;  Legally recognise the e – signature & e – writing & documents, with the same conclusiveness prescribed for official & private writings & documents in Evidence laws  Criminalize all forms of relevant illegal acts, for example: Damages or forgery of e – signature, medium or e – document;  Uses of such faked electronic matters, while being aware of that;  Obtaining without due right any of the above mentioned electronic matters, or penetrating such mediums or obstructing it, or inactivates the performance of its function.  Egypt’s International Judicial Cooperation in Field of Combating Cyber Crime  According to Article (151) of Egyptian Constitution, treaties concluded & ratified by Egypt have the same force of national laws;  Egypt’s exchange mutual legal assistance through several international legal tools

References 1-Federal Bureau of investigations http://losangeles.fbi.gov/pressrel/2009/la100709.htm 2- Conversation with one of the Police officers in Egypt 3-Information from Judge Amr Abdelmoaty, President of Primary Court, Egypt

Add a comment

Related presentations

Presentación que realice en el Evento Nacional de Gobierno Abierto, realizado los ...

In this presentation we will describe our experience developing with a highly dyna...

Presentation to the LITA Forum 7th November 2014 Albuquerque, NM

Un recorrido por los cambios que nos generará el wearabletech en el futuro

Um paralelo entre as novidades & mercado em Wearable Computing e Tecnologias Assis...

Microsoft finally joins the smartwatch and fitness tracker game by introducing the...

Related pages

FBI — Operation 'Phish Phry'

Nearly 100 people were charged today in the U.S. and Egypt as part of Operation Phish Phry, one the largest cyber fraud phishing cases to date. It’s the ...
Read more

Feds Catch Their Illegal Limit In Operation Phish Phry

Operation Phish Phry, a multinational investigation conducted in the United States and Egypt that commenced in 2007, revealed how Egyptian-based ...
Read more

What is Operation Phish Phry? - Definition from WhatIs.com

Operation Phish Phry is a cybercrime investigation carried out by the United States Federal Bureau of Investigation (FBI), the Los Angeles Electronic ...
Read more

Operation Phish Phry Hooks 100 in U.S. and Egypt | PCWorld

More than 50 people in Southern California, Las Vegas and Charlotte, N.C., were indicted by a grand jury in Los Angeles for scheming to steal ...
Read more

Operation Phish Phry by Hazar Kodaimati on Prezi

What is Cybercrime? Where does it occur? Cybercrime is an activity or a crime that involves the Internet, a computer system, or computer technology ...
Read more

Operation Phish Phry Nets 100 Suspects | PCWorld

Authorities are rounding up 100 suspects indicted in connection with a two-year investigation dubbed "Operation Phish Phry."
Read more

Schlag gegen Phishing-Mafia: FBI sprengt internationale ...

Schlag gegen Phishing-Mafia FBI sprengt internationale Passwort-Bande. Erfolgreiche "Operation Phish Phry": In den USA und Ägypten sind 80 mutmaßliche ...
Read more

FBI — Five Domestic Defendants Linked to International ...

Five Domestic Defendants Linked to International Computer Hacking Ring Guilty of Federal Fraud Charges 46 People Charged in Operation ‘Phish Phry’ Have ...
Read more

'Operation Phish Phry' Nets 100 Suspects In Major Bank ...

The FBI yesterday announced indictments of 100 suspects spanning the U.S. and Turkey who allegedly operated a phishing scheme that stole personal ...
Read more