crash course: how to be become a successful cyber criminal

14
1 © Copyright 2011 EMC Corporation. All rights reserved. Crash Course: how to be become a successful Cyber Criminal Uri Rivner | Head of New Technologies Identify Protection | RSA, the security division of EMC Feb 2012 PLEASE NOTE: The following slides contain censored Cybercrime In visuals Contact me if you need any of the original visuals for inter [email protected]

Upload: jera

Post on 22-Feb-2016

42 views

Category:

Documents


0 download

DESCRIPTION

Crash Course: how to be become a successful Cyber Criminal. Feb 2012. PLEASE NOTE: The following slides contain censored Cybercrime Intelligence visuals Contact me if you need any of the original visuals for internal use. [email protected]. Uri Rivner | Head of New Technologies - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Crash Course: how to be become a successful Cyber Criminal

1© Copyright 2011 EMC Corporation. All rights reserved.

Crash Course: how to be become a successful Cyber Criminal

Uri Rivner | Head of New TechnologiesIdentify Protection | RSA, the security division of EMC

Feb 2012

PLEASE NOTE:The following slides contain censored Cybercrime Intelligencevisuals

Contact me if you need any of the original visuals for internal [email protected]

Page 2: Crash Course: how to be become a successful Cyber Criminal

2© Copyright 2011 EMC Corporation. All rights reserved.

Join the Dark Cloud

Page 3: Crash Course: how to be become a successful Cyber Criminal

3© Copyright 2011 EMC Corporation. All rights reserved.

Fraud Forums: Build your Identity

Dozens of active forums;Thousands of members per forum;

English, Russian – leading languages

Page 4: Crash Course: how to be become a successful Cyber Criminal

4© Copyright 2011 EMC Corporation. All rights reserved.

Gain Credibility

Page 5: Crash Course: how to be become a successful Cyber Criminal

5© Copyright 2011 EMC Corporation. All rights reserved.

Don’t Show Your Face to Web Camera!

Page 6: Crash Course: how to be become a successful Cyber Criminal

6© Copyright 2011 EMC Corporation. All rights reserved.

Crimeware you can Afford

Page 7: Crash Course: how to be become a successful Cyber Criminal

7© Copyright 2011 EMC Corporation. All rights reserved.

Seeing is Believing

Page 8: Crash Course: how to be become a successful Cyber Criminal

8© Copyright 2011 EMC Corporation. All rights reserved.

5,000,000 PCs88% of Fortune 500

Page 9: Crash Course: how to be become a successful Cyber Criminal

9© Copyright 2011 EMC Corporation. All rights reserved.

Online Dating

Page 10: Crash Course: how to be become a successful Cyber Criminal

10© Copyright 2011 EMC Corporation. All rights reserved.

The Executive Assistant

Page 11: Crash Course: how to be become a successful Cyber Criminal

11© Copyright 2011 EMC Corporation. All rights reserved.

Humans can’t be Patched

Page 12: Crash Course: how to be become a successful Cyber Criminal

12© Copyright 2011 EMC Corporation. All rights reserved.

Advanced Persistent Threats See anything in common?

Attack Targets Entry Vector

Going After

Ghostnet Ministries, Embassies, Office of Dalai Lama

Spear Phishing

Sensitive documents

Aurora 34 companies: Google, Adobe, defense, internet, financial, critical infrastructure

Spear Phishing

Intellectual property

Night Dragon Critical infrastructure Spear Phishing

Intellectual property

Page 13: Crash Course: how to be become a successful Cyber Criminal

13© Copyright 2011 EMC Corporation. All rights reserved.

Advanced Persistent ThreatsWhat’s New here?

1980-2010

2010-2020

Page 14: Crash Course: how to be become a successful Cyber Criminal

14© Copyright 2011 EMC Corporation. All rights reserved.