Top Banner
Presented By: Brian Nienhaus
23

[PPT]An Introduction to Cyber Crime - University of Tulsapersonal.utulsa.edu/.../Abstracts/NienhausCybercrime.ppt · Web viewTitle An Introduction to Cyber Crime Author Brian Last

Apr 11, 2018

Download

Documents

nguyenxuyen
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: [PPT]An Introduction to Cyber Crime - University of Tulsapersonal.utulsa.edu/.../Abstracts/NienhausCybercrime.ppt · Web viewTitle An Introduction to Cyber Crime Author Brian Last

Presented By: Brian Nienhaus

Page 2: [PPT]An Introduction to Cyber Crime - University of Tulsapersonal.utulsa.edu/.../Abstracts/NienhausCybercrime.ppt · Web viewTitle An Introduction to Cyber Crime Author Brian Last

What is cybercrime? Running a cybercrime syndicate Cybercrime attacks Countermeasures Organization profiles

Page 3: [PPT]An Introduction to Cyber Crime - University of Tulsapersonal.utulsa.edu/.../Abstracts/NienhausCybercrime.ppt · Web viewTitle An Introduction to Cyber Crime Author Brian Last

Who, Where, When, Why

Page 4: [PPT]An Introduction to Cyber Crime - University of Tulsapersonal.utulsa.edu/.../Abstracts/NienhausCybercrime.ppt · Web viewTitle An Introduction to Cyber Crime Author Brian Last

“The degree of overlap between [organized crime and cybercrime] is likely to increase considerably in the next few years. This is something that needs to be recognized by business and government as an emerging and very serious threat to cyber-security.”

Page 5: [PPT]An Introduction to Cyber Crime - University of Tulsapersonal.utulsa.edu/.../Abstracts/NienhausCybercrime.ppt · Web viewTitle An Introduction to Cyber Crime Author Brian Last

Cybercrime is…? “offenses ranging from criminal activity against

data to content and copyright infringement” (Council of Europe’s CC Treaty)

United Nations refers to acts of fraud, forgery and unauthorized access

“…unlawful acts wherein the computer is either a tool or a target or both.”.

Page 6: [PPT]An Introduction to Cyber Crime - University of Tulsapersonal.utulsa.edu/.../Abstracts/NienhausCybercrime.ppt · Web viewTitle An Introduction to Cyber Crime Author Brian Last

The Internet encourages anonymity and is distributed in nature

Many countries have very few laws addressing cybercrime Love Bug Virus VB script that spread via email and

corrupted many different file types FBI traced the virus to the Philippines

The increasing growth of e-commerce

Page 7: [PPT]An Introduction to Cyber Crime - University of Tulsapersonal.utulsa.edu/.../Abstracts/NienhausCybercrime.ppt · Web viewTitle An Introduction to Cyber Crime Author Brian Last

22.3% increase in # from 2008211% increase in financial loss Median dollar loss: $575 Crimes with no documented loss or harm are not included

Top 5 categories:Non-delivered merchandise: 19.9%Identity Theft: 14.1%Credit Card Fraud: 10.4%Auction Fraud: 10.3%Computer Fraud: 7.9%

Page 8: [PPT]An Introduction to Cyber Crime - University of Tulsapersonal.utulsa.edu/.../Abstracts/NienhausCybercrime.ppt · Web viewTitle An Introduction to Cyber Crime Author Brian Last

UNORGANIZED ORGANIZED Usually the work of an

individual Decentralized Smaller resource base Hit and run

mentality/opportunistic

Centralized group of criminals

Many based in “hostile” nation

Extensive access to resources/business connections

Extended operations

Page 9: [PPT]An Introduction to Cyber Crime - University of Tulsapersonal.utulsa.edu/.../Abstracts/NienhausCybercrime.ppt · Web viewTitle An Introduction to Cyber Crime Author Brian Last
Page 10: [PPT]An Introduction to Cyber Crime - University of Tulsapersonal.utulsa.edu/.../Abstracts/NienhausCybercrime.ppt · Web viewTitle An Introduction to Cyber Crime Author Brian Last

Hackers discover vulnerabilities and sell to the highest bidder

Crimeware suites created and sold to less technically inclined users

Crimeware-as-a-service mentality Data supplier model Pricing profiles introduced

Credits cards = cheap Healthcare info/single logins for organizations = expensive

Cybercrime economy mirrors actual economy

Page 11: [PPT]An Introduction to Cyber Crime - University of Tulsapersonal.utulsa.edu/.../Abstracts/NienhausCybercrime.ppt · Web viewTitle An Introduction to Cyber Crime Author Brian Last
Page 12: [PPT]An Introduction to Cyber Crime - University of Tulsapersonal.utulsa.edu/.../Abstracts/NienhausCybercrime.ppt · Web viewTitle An Introduction to Cyber Crime Author Brian Last

Organized crime closely mimics the actual economy Regionally-specific & enterprise-specific

campaign Each attack campaign gathered centrally to

sell Campaigns managed remotely from these

central servers Data and asset management is just as

essential as in traditional business

Page 13: [PPT]An Introduction to Cyber Crime - University of Tulsapersonal.utulsa.edu/.../Abstracts/NienhausCybercrime.ppt · Web viewTitle An Introduction to Cyber Crime Author Brian Last
Page 14: [PPT]An Introduction to Cyber Crime - University of Tulsapersonal.utulsa.edu/.../Abstracts/NienhausCybercrime.ppt · Web viewTitle An Introduction to Cyber Crime Author Brian Last

(1) Boss deploys malicious code package

(2) Campaign managers retrieve package and customized as needed

(3) Malicious network used to inject package into legitimate sites. Commission-based

(4) Injected code served to users (5) Toolkit affects individual users (6) Infection data sent back to central

location (7) PII flows back to boss

Page 15: [PPT]An Introduction to Cyber Crime - University of Tulsapersonal.utulsa.edu/.../Abstracts/NienhausCybercrime.ppt · Web viewTitle An Introduction to Cyber Crime Author Brian Last
Page 16: [PPT]An Introduction to Cyber Crime - University of Tulsapersonal.utulsa.edu/.../Abstracts/NienhausCybercrime.ppt · Web viewTitle An Introduction to Cyber Crime Author Brian Last

Example of crimeware toolkit that originates from Eastern Europe, primarily Russia and the Ukraine

Utilizes three major components and powerful encryption: ZueS trojan ZueS config file Specifcation of dropsite

Page 17: [PPT]An Introduction to Cyber Crime - University of Tulsapersonal.utulsa.edu/.../Abstracts/NienhausCybercrime.ppt · Web viewTitle An Introduction to Cyber Crime Author Brian Last

Config file defines subset of targets ZueS collects session variables

during sessions Bypasses auth. Mechanisms and piggybacks

session Criminals are able to move money to third

parties in real-time ZueS Builder provides binary files for

constructing a botnet

Page 18: [PPT]An Introduction to Cyber Crime - University of Tulsapersonal.utulsa.edu/.../Abstracts/NienhausCybercrime.ppt · Web viewTitle An Introduction to Cyber Crime Author Brian Last

How simple is it? Number of new ZeuS binaries in the past

month: 18,985 Number of new ZeuS binaries seen in the

past week: 4,582 Number of new ZeuS binaries seen in one

day: 977

Page 20: [PPT]An Introduction to Cyber Crime - University of Tulsapersonal.utulsa.edu/.../Abstracts/NienhausCybercrime.ppt · Web viewTitle An Introduction to Cyber Crime Author Brian Last
Page 21: [PPT]An Introduction to Cyber Crime - University of Tulsapersonal.utulsa.edu/.../Abstracts/NienhausCybercrime.ppt · Web viewTitle An Introduction to Cyber Crime Author Brian Last

Consider: Hardware and software keeps getting

cheaper Combine the Internet and a global scope,

the the potential for attacks is limitless Security will always be breached Even when laws are passed to increase

technological safeguards, new technology will always outstrip legislation

Page 22: [PPT]An Introduction to Cyber Crime - University of Tulsapersonal.utulsa.edu/.../Abstracts/NienhausCybercrime.ppt · Web viewTitle An Introduction to Cyber Crime Author Brian Last

I3C Accepts complaints, investigates, and/or redirects

to appropriate law enforcement Joint operations with other agencies Publishes cyber-security information

IT Act(2000) Attempt to define various electronic specifications:

Digital Signatures Use/Retention of electronic records Security Certification Authorities Offenses

Page 23: [PPT]An Introduction to Cyber Crime - University of Tulsapersonal.utulsa.edu/.../Abstracts/NienhausCybercrime.ppt · Web viewTitle An Introduction to Cyber Crime Author Brian Last

http://www.ic3.gov/media/annualreport/2009_IC3Report.pdf

http://www.ic3.gov/media/annualreport/2009_IC3Report.pdf

http://us.trendmicro.com/imperia/md/content/us/trendwatch/researchandanalysis/zeusapersistentcriminalenterprise.pdf

http://www.legalserviceindia.com/cyber/itact.html http://www.symantec.com/norton/cybercrime/

definition.jsp http://www.securityworld.com/ia-420-love-bug-

virus.aspx http://www.finjan.com/Content.aspx?id=827