1© Copyright 2011 EMC Corporation. All rights reserved. Crash Course: how to be become a successful Cyber Criminal Uri Rivner | Head of New Technologies Identify Protection | RSA, the security division of EMC Feb 2012 PLEASE NOTE: The following slides contain censored Cybercrime Intelligence visuals Contact me if you need any of the original visuals for internal use.
2© Copyright 2011 EMC Corporation. All rights reserved. Join the Dark Cloud
3© Copyright 2011 EMC Corporation. All rights reserved. Fraud Forums: Build your Identity Dozens of active forums; Thousands of members per forum; English, Russian – leading languages Dozens of active forums; Thousands of members per forum; English, Russian – leading languages
4© Copyright 2011 EMC Corporation. All rights reserved. Gain Credibility
5© Copyright 2011 EMC Corporation. All rights reserved. Don’t Show Your Face to Web Camera!
6© Copyright 2011 EMC Corporation. All rights reserved. Crimeware you can Afford
7© Copyright 2011 EMC Corporation. All rights reserved. Seeing is Believing
8© Copyright 2011 EMC Corporation. All rights reserved.
9 Online Dating
10© Copyright 2011 EMC Corporation. All rights reserved. The Executive Assistant
11© Copyright 2011 EMC Corporation. All rights reserved. Humans can’t be Patched
12© Copyright 2011 EMC Corporation. All rights reserved. Advanced Persistent Threats See anything in common? AttackTargetsEntry Vector Going After GhostnetMinistries, Embassies, Office of Dalai Lama Spear Phishing Sensitive documents Aurora34 companies: Google, Adobe, defense, internet, financial, critical infrastructure Spear Phishing Intellectual property Night DragonCritical infrastructureSpear Phishing Intellectual property
13© Copyright 2011 EMC Corporation. All rights reserved. Advanced Persistent Threats What’s New here?
14© Copyright 2011 EMC Corporation. All rights reserved.