1. 2 A High Tech Crime Investigation Lessons learned by the National High Tech Crime Center Hans Oude Alink, project leader NHTCC November 2005.

Slides:



Advertisements
Similar presentations
Viet Nam Hitech Crime Investigation Department Dr. Tran Van Hoa
Advertisements

UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Zombie or not to be: Trough the meshes of Botnets - Guillaume Lovet AVAR 2005 Tianjin, China.
Cyber Crime The current threat to the UK Security Marking.
Staffordshire Police Corporate PowerPoint Template by Carl Uttley Staffordshire Police Cyber Crime ACC Nick Baker.
Cyber Crime in the Digital Age
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
 What is a botnet?  How are botnets created?  How are they controlled?  How are bots acquired?  What type of attacks are they responsible for? 
Threats To A Computer Network
The problems associated with operating an effective anti-spam blocklist system in an increasingly hostile environment. Robert Gallagher September 2004.
BOTNETS/Cyber Criminals  How do we stop Cyber Criminals.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
LittleOrange Internet Security an Endpoint Security Appliance.
(Geneva, Switzerland, September 2014)
CYBER CRIME AND SECURITY TRENDS
Lesson 1: Understanding Browsers. This unit is a set of investigations into how to protect against digital threats, and how to detect digital crimes.
Norman SecureSurf Protect your users when surfing the Internet.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Session 4.2: Creation of national ICT security infrastructure for developing countries National IP-based Networks Security Centres for Developing Countries.
David M. Pujals CEO of T³ Corporation and On the Board of the White Hall Business Association Perspective & Scope of the Problem White Hall Business Association.
Confidential On-line Banking Risks & Countermeasures By Vishal Salvi – CISO HDFC Bank IBA Banking Security Summit 2009.
Combating cyber-crime: the context Justice Canada March 2005.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
BotNet Detection Techniques By Shreyas Sali
Cyber crime & Security Prepared by : Rughani Zarana.
COMP 2903 A27 – Why Spyware Poses Multiple Threats to Security Danny Silver JSOCS, Acadia University.
Copyright © 2005 Eset, spol. s r. Peter Kovac Malicious Software and Computer Crime Impact of some types of computer infiltrations.
Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Protecting the CNI BCS ELITE 9 June 2005 Mick Morgan Head of Response.
Cyber Attacks Response of the Criminal Law Margus Kurm State Prosecutor Office of the Prosecutor General of Estonia.
BOTNETS Presented By : Ramesh kumar Ramesh kumar 08EBKIT049 08EBKIT049 A BIGGEST THREAT TO INERNET.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 Fighting cybercrime in 2009 Magnus Kalkuhl, Senior Virus Analyst Kaspersky Lab ITU-T.
Awicaksi E-Commerce Security & Payment System E-Commerce.
Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus.
IPTS Workshop on Cyber Crime German Developments.
Hurdles in implementation of cyber security in India.
How we work as a national CERT in China ZHOU Yonglin CNCERT/CC, China 2 Addressing security challenges on a global scaleGeneva, 6-7 December 2010.
Training on “Albanian and Italian experience in investigation and prosecution of Cybercrime” General Prosecutor Office, Tirana 10 June 2014 VQA Ivano GABRIELLI.
S t a t e I n f o r m a t i o n T e c h n o l o g y A g e n c y PRESENTATION To the Portfolio Committee on Public Service and Administration By Peter Pedlar.
Pacific Northwest Digital Government Summit Security – How Much is Enough? June 20, 2006 SA Kenneth A. Schmutz.
Combatting Child Sexual Exploitation – the European Approach Europol Rob Wainwright Director Europol Unclassified - Basic Protection Level Europol Public.
Cybersecurity Test Review Introduction to Digital Technology.
Regional Cyber Crime Unit
CYBER RISKS IN THE HEALTHCARE INDUSTRY HIROC 's Annual Risk Management Conference, April 2015 Jim Patterson, Partner, Co-Head of Fraud Law, Toronto, Bennett.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
From viruses to theft Joakim von Braun Security Consultant von Braun Security Consultants Uppsala universitet
Security Risks Todays Lesson Security Risks Security Precautions
Securing Information Systems
CYBER SECURITY...
Melissa McBee Anderson Ethan Via Federal Bureau of Investigations
IT Security  .
Instructor Materials Chapter 7 Network Security
Securing Information Systems
Norton.com/Setup | +1(844) | Norton Internet Security
Risk of the Internet At Home
Cyber Crime Today we will look at: Different types of cyber-crime
E-Commerce Security and Fraud Issues and Protections
Chapter 9 E-Commerce Security and Fraud Protection
Presentation transcript:

1

2 A High Tech Crime Investigation Lessons learned by the National High Tech Crime Center Hans Oude Alink, project leader NHTCC November 2005

3 What is High Tech Crime Definition –Criminal activities with the help of (or used against) ICT or Internet Project HTC –Learning by doing –Vital infrastructures –Survey –International –PPP –Information exchange

4 Press release ‘Zombie’ network of more than 100,000 hacked computers Last week, The Dutch National Police arrested three men –members of a group of cyber criminals- suspected of large scale “hacking”. The men set up a worldwide network of over a hacked computers. The computers were automatically attacked and infected with a Trojan Horse, a piece of malware that will settle unnoticed in the computer of the victim. Experts of the National High Tech Crime Centre (NHTCC) assisted in the investigation, lead by the National Prosecutor. The network, a so-called ‘botnet’, was dismantled in co-operation with GOVCERT.NL, the Computer Emergency Response Team of the Dutch government, XS4All Internet and other providers. With over a 100,000 infected computers, the dismantled network is one of the largest investigated. The botnet existed of hacked servers en PC’s, receiving ‘zombie codes’ through computers all over the world. ‘Zombie’ networks are regarded the biggest threat of the security of the Internet. The government and the industry acknowledge the dangers of networks like these.

5 BOTNET ACTIVITY Screen capture Spam Malware Spyware Phishing ID-theft Keylogging

6 Crimes and techniques Crimes –Computer intrusion –Phishing –ID-theft –E-bay hacking Techniques –Hacking –Botnets –Trojans –Keyloggers –Screen capture –Good coding skills!

7 Modus Operandi Cease every opportunity Switch easily Grow more sophisticated –Use of encryption Connected to organized crime –Professionalisation of high tech crime

8 Sources of Information Law enforcement –Wanted in the USA; –Information about “virus gang” in EU; –Intelligence from the UK; –Group known in NL; Industry –Report of hack –Virus information –Online auctions –Operational info! –Botnet expertise –“zombie” IPs

9 Disruption! Many compromised networks –Impossible to investigate them all Only investigation is not enough; Technical measures, e.g.; –Block IP’s via CERT networks –Dismantle the botnets; –…;

10 Lessons learned Shift from dDoS to on-line fraud; Organised Crime discovered the internet; To many opportunities for flexible cyber criminals; What about disruption? LE and industry cooperation

11 Thanks for your attention!