From viruses to theft Joakim von Braun Security Consultant von Braun Security Consultants Uppsala universitet 2006-10-03.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Primary Threats to Computer Security
By Hiranmayi Pai Neeraj Jain
7 Effective Habits when using the Internet Philip O’Kane 1.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Security for Internet Every Day Use Standard Security Practices and New Threats.
IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Cyber X-Force-SMS alert system for threats.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1. 2 A High Tech Crime Investigation Lessons learned by the National High Tech Crime Center Hans Oude Alink, project leader NHTCC November 2005.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Presentation By Timothy Mangas. Why should we worry? Crimes committed using the computer or Internet can be more costly (money wise) than other crimes.
Chapter 4 Hackers: How they get into Computers. Synopsis (I) What is a hacker? What is a cracker and what is the difference? Who are the crackers? What.
Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?
Quiz Review.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Security Chapter What Should I Ask Santa Claus For? spoofing: fraudulent activity in which the sender address and other parts of the.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
IT security By Tilly Gerlack.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Hurdles in implementation of cyber security in India.
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
What is Spam? d min.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Pacific Northwest Digital Government Summit Security – How Much is Enough? June 20, 2006 SA Kenneth A. Schmutz.
Open Malicious Source Symantec Security Response Kaoru Hayashi.
Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
Information Systems Week 7 Securing Information Systems.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems Design and Development Security Risks Computing Science.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
ISYM 540 Current Topics in Information System Management
Securing Information Systems
Risk of the Internet At Home
Networking for Home and Small Businesses – Chapter 8
Chapter # 3 COMPUTER AND INTERNET CRIME
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

From viruses to theft Joakim von Braun Security Consultant von Braun Security Consultants Uppsala universitet

Joakim von Braun Born 1955 B.A. In Political Sciences Professionell work in security for 35 years Advisor and consultant to SÄPO for 25 years Work for Military Intelligence Timbro Private business during 13 years Security advisor Symantec Consultant and advisor Professional speaker Journalist and writer

Crime on the Internet

Todays changing threats  variables  Threat posture  Botnets – spam and blackmail  Phishing  Crimeware

Knowledge?

Vulnerabilities easy to use

Threat posture 2006  From 450 to new threats in three years  The difference between worm and trojan is gone  Huge increase of botnets (Zombie networks)  Botnets with more than computers  new botnet worms every month  new vulnerabilties  6 days to patch an exploit  Hackers and coders are working for money!!!

Botnets can be rented

Money is everything  Botnets can be rented for 6, 24 hours or a week  Botnets are used to propagate Spam  Botnets are used for DoS attacks + blackmail  More than Phishing attacks per month  Crimeware has increased from 20 to in 3,5 years  A new unknown trojan can be bought for kronor

75 new worms per day!!!

More botnets

Blackmail more common

Phishing  HTML formatted sent to bank customers  An URL points to the bank homepage  The homepage is a copy of the original  Homepages are hidden on hacked computers  Customers reveal important economic data  USA, UK and Australia the first targets  350 % increase during 2004  Swedes customers in US companies targeted  Eurocard in Sverige first 22/  At least 7 Swedish attacks during 2005

November 2003

November 2005

Obfuscated Web adresses

Vulnerability in Internet Explorer Visible link: Called link : /my/index.htm Website:

AOL Billing Center

Hacked once again

Infected computers used – port 4444

Dramatic increase of maliciouse code

Worms and trojans steals information

Crimeware targets bank and CC customers  Increase from 20 to trojans in 3,5 years  Brasil, Australia, USA and UK mostly targeted  Germany and Scandinavia is next  Remote Access and Keylogging  Kills AV and personal firewalls  Logs everythin in certain open windows  Sniffs encrypted HTTPS traffic

Trojan Stawin

Trojan Bizex

Questions Joakim von Braun von Braun Security Consultants (cell) (home) (fax)