crash course: how to be become a successful cyber criminal
Post on 22-Feb-2016
42 Views
Preview:
DESCRIPTION
TRANSCRIPT
1© Copyright 2011 EMC Corporation. All rights reserved.
Crash Course: how to be become a successful Cyber Criminal
Uri Rivner | Head of New TechnologiesIdentify Protection | RSA, the security division of EMC
Feb 2012
PLEASE NOTE:The following slides contain censored Cybercrime Intelligencevisuals
Contact me if you need any of the original visuals for internal use.Uri.rivner@rsa.com
2© Copyright 2011 EMC Corporation. All rights reserved.
Join the Dark Cloud
3© Copyright 2011 EMC Corporation. All rights reserved.
Fraud Forums: Build your Identity
Dozens of active forums;Thousands of members per forum;
English, Russian – leading languages
4© Copyright 2011 EMC Corporation. All rights reserved.
Gain Credibility
5© Copyright 2011 EMC Corporation. All rights reserved.
Don’t Show Your Face to Web Camera!
6© Copyright 2011 EMC Corporation. All rights reserved.
Crimeware you can Afford
7© Copyright 2011 EMC Corporation. All rights reserved.
Seeing is Believing
8© Copyright 2011 EMC Corporation. All rights reserved.
5,000,000 PCs88% of Fortune 500
9© Copyright 2011 EMC Corporation. All rights reserved.
Online Dating
10© Copyright 2011 EMC Corporation. All rights reserved.
The Executive Assistant
11© Copyright 2011 EMC Corporation. All rights reserved.
Humans can’t be Patched
12© Copyright 2011 EMC Corporation. All rights reserved.
Advanced Persistent Threats See anything in common?
Attack Targets Entry Vector
Going After
Ghostnet Ministries, Embassies, Office of Dalai Lama
Spear Phishing
Sensitive documents
Aurora 34 companies: Google, Adobe, defense, internet, financial, critical infrastructure
Spear Phishing
Intellectual property
Night Dragon Critical infrastructure Spear Phishing
Intellectual property
13© Copyright 2011 EMC Corporation. All rights reserved.
Advanced Persistent ThreatsWhat’s New here?
1980-2010
2010-2020
14© Copyright 2011 EMC Corporation. All rights reserved.
top related