LAZARUS | GLOBAL kOS | MAFIABOY

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Breaking Trust On The Internet
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Cyber Crime The current threat to the UK Security Marking.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Computer Security and Penetration Testing
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Cyber-Warfare: The Future is Now!
Computer Hacking Cybercrime (1).
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.
1 Ethics of Computing MONT 113G, Spring 2012 Session 37 Digital Order.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Threat context TLP WHITE Cyber security panel
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
An Introduction to Cyber Dr Mark Hawksworth Technology Practice Group Leader.
A threat to global security and economy Koushik Mannepalli CMPE 294.
Introduction to Security Dr. John P. Abraham Professor UTPA.
Cyber Security – The Changing Landscape Erick Weber Department of Public Works Khaled Tawfik Cyber Security.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Cyber Security in Emerging Markets © 2012 Imperva, Inc. All rights reserved. Haiko Wolberink – Regional Director.
 Define hacking  Types of hackers  History  Intentions  Statistics  Facts  How to Protect yourself.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
October 28, 2015 Cyber Security Awareness Update.
Matt Jennings.  Introduction  Value Chains  Major value chains in the illegal market  Means of Communication  Conclusion.
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
ICT in Product Manufacture ISDN, LAN, WAN, Intranets and extranets, global networks
September 19, 2016 Steve Konecny CFE, CIRA, CEH, CRISC Hands on Hacking.
November 14, 2016 bit.ly/nercomp_defendingyourdata16
Business Process Compromise in Financial Institutes Kavya Kushnoor
IPW 2017 Managing Data Risks in the Digital Age
Nation State Actors Lex Dunlap.
Social Engineering Dr. X.
International Conflict & Cyber Security
Executive Director and Endowed Chair
Network Security Fundamentals
CYBER SECURITY...
A Real and Rising Concern
Real-time protection for web sites and web apps against ATTACKS
FYE Cybersecurity Dr. X.
Cyber Security & IT: What’s Next?
Equipo 1 Tema: Crímenes cibernéticos en 2016 Ana Yansi Mejía Mendoza (Informática) Lucia Arellano García (Derecho) Margarita Núñez Rosales (Lengua extranjera)
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Tackling Cyber threats together
White Hat vs. Black Hat White Hat Black Hat
Cyber Crimes Chunlian QU 9/18/2018.
Introduction to Security: Modern Network Security Threats
Unit 11 Task #1 Read the unit specification and create a glossary which defines each of the words / terms you don’t know.
Video: Digital citizenship is defined as the norms of appropriate,
Cybersecurity Awareness
4 ways to stay safe online 1. Avoid viruses and phishing scams
Social Engineering No class today! Dr. X.
Internet Security Threat Status
Societal Issues in Computing (COMP466)
SECURITY POLICIES, LAWS AND COMPUTER CRIMES (CCI410) PERTEMUAN 12
HOW DO I KEEP MY COMPUTER SAFE?
Tackling Cyber threats together
Strategic threat assessment
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

LAZARUS | GLOBAL kOS | MAFIABOY THREAT PROFILING LAZARUS | GLOBAL kOS | MAFIABOY

LAZARUS TYPE: ORGANIZED CRIME / APT INTENTION LIMITS HOSTILE HIDDEN COBRA TYPE: ORGANIZED CRIME / APT INTENTION LIMITS HOSTILE OUT OF THE LAW ACCESS VISIBILITY OUTSIDER COVERT SKILLS GOAL EXPERT TAKE RESOURCES OUTCOME ORGANIZATIONS ACQUISITION THEFT

LAZARUS TYPE: HISTORY TOOLS AND ATTACK ORGANIZED CRIME / APT HIDDEN COBRA TYPE: ORGANIZED CRIME / APT HISTORY TOOLS AND ATTACK 2009-2012 | OPERATION TROY : DDoS Attack aimed at South-Korean facilities Cyber Espionage 2014 | SONY BREACH : 4000 Employees PII leaked 1y long presence into their networks Accessed to unreleased movies From 2015 | BANK HEISTS: $12M from Banco del Austro $1M from Tien Phong Bank $81M from Bangladesh Bank $60M from Far Eastern Intl. Bank (WANNACRY) : Not confirmed but suspected role Custom - Made: Ransomware Trojan Rootkit TCP tunnel tools Keyloggers Attacks: Watering Hole DDoS Spear-Phishing Privilege Escalation … Limitless possibilities according to their final objective

OUT OF THE LAW (PARTIAL) DAMAGE / EMBARRASSMENT MAFIABOY (at 15 years-old) TYPE: SCRIPT KIDDY INTENTION LIMITS HOSTILE OUT OF THE LAW (PARTIAL) ACCESS VISIBILITY OUTSIDER COVERT SKILLS GOAL NOOB DAMAGE / DESTROY RESOURCES OUTCOME INDIVIDUAL / DOWNLOADERS DAMAGE / EMBARRASSMENT

MAFIABOY TYPE: HISTORY TOOLS AND ATTACK SCRIPT KIDDY (at 15 years-old) TYPE: SCRIPT KIDDY HISTORY TOOLS AND ATTACK 2000 | Project Rivolta: DDoS attack on Yahoo Shut down the search engine for one hour Followed by other DDoS attacks targeted on Ebay, CNN, Amazon Caused 1.2 billion USD damages in global economic damages He was 15 years old at that time so he didn’t face jail time but went to a juvenile center Till today: Enjoy a little fame but basically is threatless since this attack. DDoS software from Internet: Downloaded from the file sharing application Hotline who doesn’t exist anymore Motivation: For the lolz

DAMAGE / EMBARRASSMENT GLOBAL kOS TYPE: HACKTIVIST GROUP INTENTION LIMITS HOSTILE LAWFUL (GREY-HATS) ACCESS VISIBILITY OUTSIDER PUBLIC SKILLS GOAL EXPERT COPY / DAMAGE RESOURCES OUTCOME ORGANIZATION DAMAGE / EMBARRASSMENT

GLOBAL kOS TYPE: HISTORY TOOLS AND ATTACK HACKTIVIST GROUP 1996 | UP YOURS! : Development of DDoS software Helped launching the script kiddie movement Used to take down 40 politician websites that year or KuKluxClan’s 1997 | DIGITAL DESTRUCTION SUITE : Collection of hacker tools 1997 | PANTHER MODERN : DDoS tool 1997 | kOS CRACK: Password cracking utility 1998 | BATTLEPONG: IRC flooding utility 2000 | EXTINCTION Custom - Made: DDoS Flooding Script Attacks: Even if the group has not been directly linked to any attacks, it created a community made of script kiddies which would use those tools for trolling or political purpose. According to many interviews of their leader AcidAngel, there is real political engagement behind their actions which led to