Lucene search

K
threatpostLisa VaasTHREATPOST:B796D491D9E59A6CE14A74FFE427D175
HistoryFeb 09, 2022 - 2:00 p.m.

Ex-Gumshoe Nabs Cybercrooks with FBI Tactics

2022-02-0914:00:57
Lisa Vaas
threatpost.com
529

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

Crooks are crooks, right?

Whatever motivates serial violent offenders doesn’t switch off when they stop mugging people and instead pick up a keyboard to transform into cyber actors who craft cyber threats.

At least, that was the thinking behind the 2012 creation of the FBI’s Cyber Behavioral Analysis Center (CBAC).

“Behavioral characteristics and motivations of cybercriminals in the real world and virtual world are the same,” said Crane Hassold, who helped to create the CBAC after spending more than 11 years as an FBI analyst, offering strategic and tactical analytical support to cyber, financial crime and violent crime cases. “The only thing that differentiates them is their choice to use a computer to facilitate a crime.”

During his stint at the FBI, Hassold researched a slew of cyber threat flavors: malware, network intrusions, denial-of-service attacks, botnets, phishing and hacktivism. He also served as a subject matter expert who trained others on collecting and analyzing open-source intelligence (OSINT) to identify investigative leads and adversary attribution. As well, Hassold spent his days scouring digital evidence to identify behavioral artifacts and investigative leads and reverse-engineering malicious code to better understand adversary motivations and tactics.

Now, he’s director of threat intelligence at cloud-native email security platform Abnormal Security.

After having honed his skills in the behavioral analysis unit, Hassold now goes undercover to connect with attackers directly, unfettered by the red tape of working at a law enforcement agency.

He’s got some interesting stories: stories about looking at cyber threats at a more human level, about delving into more than the tools, techniques and procedures (TTPs) – all those technical bells and whistles of cybercrime.

Hassold visited the Threatpost podcast recently to share his stories about using the concepts built by the FBI to understand how criminals exploit victims’ behavior in business email compromise (BEC), about engaging with BEC actors (first covertly and then overtly), and more. As well, he shared some key findings from Abnormal’s recent report about ransomware.

You can download the podcast below or listen here. For more podcasts, check out Threatpost’s podcast site.

Check out our freeupcoming live and on-demand online town halls** – unique, dynamic discussions with cybersecurity experts and the Threatpost community.**

(Brought to you by Specops Technology. Underwriters of Threatpost podcasts do not assert any editorial control over content.)

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C