crash course: how to be become a successful cyber criminal

Post on 22-Feb-2016

42 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Crash Course: how to be become a successful Cyber Criminal. Feb 2012. PLEASE NOTE: The following slides contain censored Cybercrime Intelligence visuals Contact me if you need any of the original visuals for internal use. Uri.rivner@rsa.com. Uri Rivner | Head of New Technologies - PowerPoint PPT Presentation

TRANSCRIPT

1© Copyright 2011 EMC Corporation. All rights reserved.

Crash Course: how to be become a successful Cyber Criminal

Uri Rivner | Head of New TechnologiesIdentify Protection | RSA, the security division of EMC

Feb 2012

PLEASE NOTE:The following slides contain censored Cybercrime Intelligencevisuals

Contact me if you need any of the original visuals for internal use.Uri.rivner@rsa.com

2© Copyright 2011 EMC Corporation. All rights reserved.

Join the Dark Cloud

3© Copyright 2011 EMC Corporation. All rights reserved.

Fraud Forums: Build your Identity

Dozens of active forums;Thousands of members per forum;

English, Russian – leading languages

4© Copyright 2011 EMC Corporation. All rights reserved.

Gain Credibility

5© Copyright 2011 EMC Corporation. All rights reserved.

Don’t Show Your Face to Web Camera!

6© Copyright 2011 EMC Corporation. All rights reserved.

Crimeware you can Afford

7© Copyright 2011 EMC Corporation. All rights reserved.

Seeing is Believing

8© Copyright 2011 EMC Corporation. All rights reserved.

5,000,000 PCs88% of Fortune 500

9© Copyright 2011 EMC Corporation. All rights reserved.

Online Dating

10© Copyright 2011 EMC Corporation. All rights reserved.

The Executive Assistant

11© Copyright 2011 EMC Corporation. All rights reserved.

Humans can’t be Patched

12© Copyright 2011 EMC Corporation. All rights reserved.

Advanced Persistent Threats See anything in common?

Attack Targets Entry Vector

Going After

Ghostnet Ministries, Embassies, Office of Dalai Lama

Spear Phishing

Sensitive documents

Aurora 34 companies: Google, Adobe, defense, internet, financial, critical infrastructure

Spear Phishing

Intellectual property

Night Dragon Critical infrastructure Spear Phishing

Intellectual property

13© Copyright 2011 EMC Corporation. All rights reserved.

Advanced Persistent ThreatsWhat’s New here?

1980-2010

2010-2020

14© Copyright 2011 EMC Corporation. All rights reserved.

top related