cyber espionage: a digital license to kill?

1
TOP SECRET Requests permissions to access contact data, SMS messages, location and Internet access on affected devices Mission: Silently record all incoming and outgoing calls and of course, check for specific incoming SMS messages Developed by the U.S. military; Activates cameras on mobile devices and accesses sensor data Mission: Reconstruct a 3D virtual model of a target location using the phone’s camera and orientation sensors Developed by the U.S. and Israeli governments; Spreads globally causing no harm until it finds and reaches its target. The most sophisticated malware ever created; Infects computers and searches for intelligence contained in emails, documents, and mes- sages. Encrypts files on computers and demands payment to recover your files Mission: Sabotage physical infrastructure. Mission: Make money to finance evil plots Mission: Steal money and have it wired to its creator Mission: Capture intelligence via screenshots or by activating audio and video devices - all under the cover of an encrypted channel Known as the most significant breach of the U.S. military’s classified computer systems; Collects and reports data back to its creator Mission: Disrupt the wealthiest company on the planet, Saudi Arabia's state oil company, ARAMCO If captured, it might be turned and go rogue to take down a power plant, or destabilize an active nuclear power plant. Mission: Find way into the Secret Internet Protocol Router Network, used by the DoD and State Department to transmit classified information A Trojan that lifts banking credentials to access corporate accounts Stole more than $3 million from dozens of U.S. accounts The most destructive corporate attack to date; Overwrites boot sectors and renders computers useless to cover its tracks CYBER ESPIONAGE: A DIGITAL LICENSE TO KILL? Malware attacks – be it for mobile devices or on major organizations – have been occurring for over 25 years now and the latest wave has become increasingly more complicated. Currently, cyber enemies are commonly criminals who target individuals & businesses via the Internet for financial purposes; 'hacktivist' collectives like Anonymous or LulzSec who use the web to attack organizations in protest, or even just for the 'lulz'; and increasingly, government-borne attackers who target other countries or international groups for political or defense reasons. BRIEFING But now there’s the emergence of a fourth cyber enemy: Terrorists. So if supervillains were real, money was no object, and secret agents, like James Bond, existed today, what types of malware are we likely to see used on a massive scale? – SUPERVILLAIN - – SUPERVILLAIN Shamoon: SECRET AGENT TOOL SECRET AGENT TOOL SECRET AGENT TOOL THE PEARL HARBOR OF CYBERATTACKS NEED A WAY IN? CASE ANY JOINT WITH THE ANDROID 3D SPYWARE From With Love STUXNET , NEVER SAY STUXNET FLAME IS FOREVER SECRET AGENT TOOL AGENT 007? NO. ANDROIDOS. ANDROIDOS.AGENT.A, MEET YOUR FIELD PARTNER, AGENT.BTZ. AGENT.A ZeuS SECRET AGENT TOOL – SUPERVILLAIN - of America's Predator and Reaper drones - Logged pilots key- strokes during missions over Afghanistan and other warzones - Infected 30 CREECH USB DRONE VIRUS – SUPERVILLAIN – SUPERVILLAIN - TOOL RANSOMCRYPT – Mikko Hyppönen, Chief Research Officer for F-Secure By launching Stuxnet, American officials opened Pandora's box. They will most likely end up regretting this decision Protecting the irreplaceable | www.f-secure.com

Upload: f-secure-corporation

Post on 26-Jan-2015

502 views

Category:

Technology


3 download

DESCRIPTION

To celebrate the release of the latest James Bond movie, F-Secure takes a look at the cyber threats that have the canniness and evil intentions of a Bond villain.

TRANSCRIPT

T O PS E C R E T

Requests permissions to access contact data, SMS messages, location and Internet access on affected devices

Mission: Silently record all incoming and outgoing calls and of course, check for specific incoming SMS messages

Developed by the U.S. military; Activates cameras on mobile devices and accesses sensor data

Mission: Reconstruct a 3D virtual model of a target location using the phone’s camera and orientation sensors

Developed by the U.S. and Israeli governments; Spreads globally causing no harm until it finds and reaches its target.

The most sophisticated malware ever created; Infects computers and searches for intelligence contained in emails, documents, and mes-sages.

Encrypts files on computers and demands payment to recover your files

Mission: Sabotage physical infrastructure.

Mission: Make money to finance evil plots

Mission: Steal money and have it wired to its creator

Mission: Capture intelligence via screenshots or by activating audio and video devices - all under the cover of an encrypted channel

Known as the most significant breach of the U.S. military’s classified computer systems; Collects and reports data back to its creator

Mission: Disrupt the wealthiest company on the planet, Saudi Arabia's state oil company, ARAMCO

If captured, it might be turned and go rogue to take down a power plant, or destabilize an active nuclear power plant.

Mission: Find way into the Secret Internet Protocol Router Network, used by the DoD and State Department to transmit classified information

A Trojan that lifts banking credentials to access corporate accountsStole more than $3 million from dozens of U.S. accounts

The most destructive corporate attack to date; Overwrites boot sectors and renders computers useless to cover its tracks

CYBER ESPIONAGE:A DIGITAL LICENSE

TO KILL?

Malware attacks – be it for mobile devices or on major organizations – have been occurring for over 25 years now and the latest wave has become increasingly more complicated.

Currently, cyber enemies are commonly criminals who target individuals & businesses via the Internet for financial purposes; 'hacktivist' collectives like Anonymous or LulzSec who use the web to attack organizations in protest, or even just for the 'lulz'; and increasingly, government-borne attackers who target other countries or international groups for political or defense reasons.

BRIEFING

But now there’s the emergence of a fourth cyber enemy:

Terrorists.

So if supervillains were real, money was no object, and secret agents, like James Bond, existed today, what types of malware are we likely to see used on a massive scale?

– SUPERVILLAIN -

– SUPERVILLAIN

Shamoon:

SECRET AGENT TOOL

SECRET AGENT TOOL

SECRET AGENT TOOL

THE PEARL HARBOR OF CYBERATTACKS

NEED A WAY IN? CASE ANY JOINT WITH THE

ANDROID 3D SPYWARE

From With Love

STUXNET,

NEVER SAY STUXNET

FLAME IS FOREVER

SECRET AGENT TOOL

AGENT 007? NO. ANDROIDOS.

ANDROIDOS.AGENT.A, MEET YOUR FIELD PARTNER,

AGENT.BTZ.

AGENT.A

ZeuS

SECRET AGENT TOOL

– SUPERVILLAIN -

of America's Predator and Reaper drones- Logged pilots key-strokes during missions over Afghanistan and other warzones

- Infected 30CREECH USB

DRONE VIRUS

– SUPERVILLAIN

– SUPERVILLAIN - T O O L

RANSOMCRYPT

– Mikko Hyppönen, Chief Research Officer for F-Secure

By launching Stuxnet, American officials opened Pandora's box. They will most likely end up regretting this decision

Protecting the irreplaceable | www.f-secure.com