Feds urge early cooperation in malware investigations

Cyber resiliency in financial services comes from public-private coordination and aggressive prosecution.

Shutterstock image: sphere of cyber connection.

The financial services industry has garnered a reputation among cybersecurity professionals for being among the more resilient sectors in the face of cyberattacks. Though the recently publicized hack of J.P. Morgan was a fresh reminder that financial services are always in the crosshairs of cyber criminals, the sector's information-sharing center has been praised for building resiliency against threats.

Law enforcement officials made the case at an Oct. 20 conference on cybercrime that this resiliency was due, in part, to public-private cooperation and aggressive federal prosecution of cybercriminals.  

"This is the new normal for the United States government," declared FBI Executive Assistant Director Robert Anderson, the bureau's top cyber official, after rattling off recent Justice Department prosecutions of cybercriminals.

Speakers at the conference hosted by the Financial Services Roundtable in Washington, D.C., tried to answer a common question from the private sector: Who do you call in the government when your firm has been hacked?  

A succinct answer was not forthcoming, though speakers implied that as long as one of a handful of agencies in the departments of Homeland Security or Justice is notified, the government’s response to the incident would be coordinated.

"Now I feel quite confident that if you just have a good, solid government point of contact … in cyber, you're going to get the right people in the room, and that's because our cyber centers are in lockstep," said Jason Truppi of the FBI’s Major Cyber Crimes Unit.

Ari Baranoff, assistant special agent in charge in the Secret Service's Criminal Investigative Division, offered an example of what this "whole-of-government" approach to a cyber breach looks like.

The Secret Service got word in July that a small store in Syracuse, N.Y., was the source of a significant amount of credit card data theft, Baranoff said. Two Secret Service agents trained in cyber forensics visited the store, found malware on its server and removed it. The agency then did some "reverse engineering" with the help of Chicago-based firm Trustwave to determine that the malware was original and not well-known to security professionals. The DHS Computer Emergency Readiness Team issued an alert to industry based on that analysis of the "Backoff" point-of-sale malware.

Upon seeing the CERT notice, the UPS Store realized that it had had the same malware on its system for months, according to Baranoff, and the firm was able to limit the malware’s spread as a result.

Federal officials hope the relatively fast government-industry response to the Backoff malware will become the norm. But many private firms tend to take an early crack at addressing cyber vulnerabilities before alerting authorities, said the Secret Service's Katherine Pierce. That is problematic because "when it comes to cybercrime investigations, your evidence trail can vanish quickly," she said.