34
DeepSec Vienna 2007 7 Layers of Insecurity Chapter 12 Cybercrime Module 1: Security Essentials “What You Need to Know” Money makes the World Go Around Some Citation anyone? Please state source

Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Vienna 2007

7 Layers of InsecurityChapter 12Cybercrime Module 1: Security Essentials

“What You Need to Know”

Money makes the World Go Around

Some Citation anyone?

Please state source

Page 2: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Vienna 2007

7 Layers of Insecurity

12 - Cybercrime© November 2007 2

Copyright Information

Some rights reserved / Einige Rechte vorbehalten Michael Kafka, René Pfeiffer, Sebastian Meier

C.a.T. Consulting and Trainings, Vienna, Austria You may freely use, distribute and modify this work under following

agreement: Diese Arbeit darf frei genutzt, verbreitet und bearbeitet werden unter

folgenden Bedingungen:

http://www.creativecommons.com

Authors must be referenced (also for modification)Autoren müssen genannt werden (auch bei Bearbeitung)

Only for non commercial useNur für nichtkommerzielle Nutzung

Derivative work under same licenceDerivative Arbeit unter selber Lizenz

Page 3: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Vienna 2007

7 Layers of Insecurity

12 - Cybercrime© November 2007 3

Chapter 12Cybercrime Agenda

Phishing and Spamming Attacks on Payment Systems Bot Herding Industrial Espionage

Page 4: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Vienna 2007

7 Layers of Insecurity

12 - Cybercrime© November 2007 4

Phishing and Spamming

Gone Phishing

Page 5: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Vienna 2007

7 Layers of Insecurity

12 - Cybercrime© November 2007 5

Mimicking original sites

Phishing example Paypal

Page 6: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Vienna 2007

7 Layers of Insecurity

12 - Cybercrime© November 2007 6

Users can't Verify authenticity Implementation of CAs

Unsuitable for every day users Certificates themselves badly managed

High percentage of users will click Risk high, Impact high

Page 7: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Vienna 2007

7 Layers of Insecurity

Attacks on Payment Systems

Credit cards at Risks

Page 8: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Vienna 2007

7 Layers of Insecurity

Selling CC and Identities

Stolen Info: Identities CC Information Banking information

Risk: medium Impact very high

Page 9: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Vienna 2007

7 Layers of Insecurity

Example

Page 10: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Vienna 2007

7 Layers of Insecurity

Bot Herding

Modern Cowboys(But malicious)

Page 11: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Vienna 2007

7 Layers of Insecurity

Purpose of Bot Herding

Gaining control over “Zombies” Used for DDoS Used for Spam Traded with others

Risk very high Impact Medium

Page 12: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Vienna 2007

7 Layers of Insecurity

Botnet at Work

Page 13: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Vienna 2007

7 Layers of Insecurity

Communication via IRC

Page 14: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Vienna 2007

7 Layers of Insecurity

Industrial Espionage

Cyberspies“With a license to kill”

Page 15: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Vienna 2007

7 Layers of Insecurity

Highly Specialized Attacks

Very highly skilled Sometimes hired hackers

Not very common New risks emerging from Asia High impact, low risk

Page 16: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Vienna 2007

7 Layers of Insecurity

12 - Cybercrime© November 2007 16

Chapter 12Cybercrime Summary

Phishing and Spamming Targets Naive Users

Attacks on Payment Systems Cause Worldwide Losses

Bot Herding Affects All: Private Systems and Corporate Systems Behind Firewalls

Industrial Spies Are Rare but Dangerous

Page 17: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Vienna 2007

7 Layers of Insecurity

12 - Cybercrime© November 2007 17

Thank You

Questions?

Page 18: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Conference © November 2007

12 - Cybercrime 1

DeepSec Vienna 2007

7 Layers of Insecurity

12 - Cybercrime© November 2007 1

Chapter 12Cybercrime Module 1: Security Essentials

“What You Need to Know”

Money makes the World Go Around

Some Citation anyone?

Please state source

Page 19: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Conference © November 2007

12 - Cybercrime 2

DeepSec Vienna 2007

7 Layers of Insecurity

12 - Cybercrime© November 2007 2

Copyright Information

Some rights reserved / Einige Rechte vorbehalten Michael Kafka, René Pfeiffer, Sebastian Meier

C.a.T. Consulting and Trainings, Vienna, Austria You may freely use, distribute and modify this work under following

agreement: Diese Arbeit darf frei genutzt, verbreitet und bearbeitet werden unter

folgenden Bedingungen:

http://www.creativecommons.com

Authors must be referenced (also for modification)Autoren müssen genannt werden (auch bei Bearbeitung)

Only for non commercial useNur für nichtkommerzielle Nutzung

Derivative work under same licenceDerivative Arbeit unter selber Lizenz

This presentation is published under the CreativeCommons License which can be viewed in detail on their hompage: http://creativecommons.org/licenses/by-nc-sa/2.0/at/Read more on http://www.creativecommons.com

to Share — to copy, distribute and transmit the work

to Remix — to adapt the work

Under the following conditions:

You are free:

Attribution. You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work).

Noncommercial. You may not use this work for commercial purposes.

Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.

● For any reuse or distribution, you must make clear to others the license terms of this work. The best way to do this is with a link to this web page.

● Any of the above conditions can be waived if you get permission from the copyright holder.

● Nothing in this license impairs or restricts the author's moral rights.

Page 20: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Conference © November 2007

12 - Cybercrime 3

DeepSec Vienna 2007

7 Layers of Insecurity

12 - Cybercrime© November 2007 3

Chapter 12Cybercrime Agenda

Phishing and Spamming Attacks on Payment Systems Bot Herding Industrial Espionage

Page 21: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Conference © November 2007

12 - Cybercrime 4

DeepSec Vienna 2007

7 Layers of Insecurity

12 - Cybercrime© November 2007 4

Phishing and Spamming

Gone Phishing

Page 22: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Conference © November 2007

12 - Cybercrime 5

DeepSec Vienna 2007

7 Layers of Insecurity

12 - Cybercrime© November 2007 5

Mimicking original sites

Phishing example Paypal

Page 23: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Conference © November 2007

12 - Cybercrime 6

DeepSec Vienna 2007

7 Layers of Insecurity

12 - Cybercrime© November 2007 6

Click to add title

Users can't Verify authenticity Implementation of CAs

Unsuitable for every day users Certificates themselves badly managed

High percentage of users will click Risk high, Impact high

Page 24: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Vienna 2007

7 Layers of Insecurity

7

Attacks on Payment Systems

Credit cards at Risks

Page 25: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Vienna 2007

7 Layers of Insecurity

8

Selling CC and Identities

Stolen Info: Identities CC Information Banking information

Risk: medium Impact very high

Page 26: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Vienna 2007

7 Layers of Insecurity

9

Example

Page 27: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Vienna 2007

7 Layers of Insecurity

10

Bot Herding

Modern Cowboys(But malicious)

Page 28: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Vienna 2007

7 Layers of Insecurity

11

Purpose of Bot Herding

Gaining control over “Zombies” Used for DDoS Used for Spam Traded with others

Risk very high Impact Medium

Page 29: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Vienna 2007

7 Layers of Insecurity

12

Botnet at Work

Page 30: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Vienna 2007

7 Layers of Insecurity

13

Communication via IRC

Page 31: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Vienna 2007

7 Layers of Insecurity

14

Industrial Espionage

Cyberspies“With a license to kill”

Page 32: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Vienna 2007

7 Layers of Insecurity

15

Highly Specialized Attacks

Very highly skilled Sometimes hired hackers

Not very common New risks emerging from Asia High impact, low risk

Page 33: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Conference © November 2007

12 - Cybercrime 16

DeepSec Vienna 2007

7 Layers of Insecurity

12 - Cybercrime© November 2007 16

Chapter 12Cybercrime Summary

Phishing and Spamming Targets Naive Users

Attacks on Payment Systems Cause Worldwide Losses

Bot Herding Affects All: Private Systems and Corporate Systems Behind Firewalls

Industrial Spies Are Rare but Dangerous

Page 34: Chapter 12 Cybercrime - DeepSec€¦ · Cybercrime Module 1 ... work. The best way to do this is with a link to this web page

DeepSec Conference © November 2007

12 - Cybercrime 17

DeepSec Vienna 2007

7 Layers of Insecurity

12 - Cybercrime© November 2007 17

Thank You

Questions?