Download presentation
Presentation is loading. Please wait.
1
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007
2
WHAT IS CYBERCRIME? “E-Crime”, “High Tech Crime”, “technology enabled crime” 1. CRIMES CREATED BY THE INTERNET 2. TRADITIONAL CRIMES HELPED BY THE INTERNET
3
Crimes created by the internet: INTERNET BANKING FRAUD BOTNETS COMPUTER INTRUSION - HACKING DISTRIBUTED DENIAL OF SERVICE ATTACKS (DDOS)
4
Traditional Crimes Helped By The Internet: FRAUDS and SCAMS MONEY LAUNDERING DRUG TRAFFICKING TERRORISM CHILD SEXUAL EXPLOITATION
5
Internet Banking Fraud
6
PHISHING E-MAILS
7
WIRE TRANSFERS TO INTERNATIONAL DESTINATIONS NUMBER OF PHISHING & TROJAN SITES REPORTED TO AUSCERT
8
AUSTRALIA - UK PHISHING COMPARISON
9
Position Entails: Our company has customers around all the world, and we require people able to receive money from our customers, and to send them to us into Russia using Western Union. If you live in United Kingdom, Australia, United States or Germany, if you think that you are reliable for this job, and you have bank account, so this job is for you. We will need from you essentials of your bank account, and also it is preferred you to have an ICQ number to discuss all details with our manager. In 3-4 hours after receiving money you HAVE TO give us western union payment details. Location: Work from home, sometimes business trips. Experience: none Salary: You receive 7% per every transaction. You have to send 93% of money amount received minus Western Union fees. We pay all Western Union fees. We hope for our successful cooperation. Start Date: Immediate after interview with financial manager. Mule Recruitment
10
WIRE TRANSFERS TO INTERNATIONAL DESTINATIONS AUSTRALIA - UK MULE RECRUITMENT INCIDENTS (2005 - 2006)
11
Transferring stolen funds out of Australia
12
WIRE TRANSFERS TO INTERNATIONAL DESTINATIONS WIRE TRANSFERS TO INTERNATIONAL DESTINATIONS
13
Methods & Technologies used by Criminals A BOTNET: Exploits large numbers of Internet connected computers Some of the uses of botnets include: –Sending out spam e-mails –Launching distributed denial of service attacks (DDoS) –Host fraudulent web sites (such as false bank websites)
14
Botnets – Distributed Denial of Service (DDoS)
16
Methods and technologies used vary tremendously –result of differences in the systems attacked –continual identification and patching of exploits in software and operating systems Microsoft’s Windows operating system –as the most widely used, is the most widely attacked – particularly old versions Variety of free tools –available on the Internet to exploit unpatched systems MAKING A BOTNET
17
Computer Intrusion – Hacking Trojans & Malware
19
Source: Symantec Corporation Top Downloaded Malware 1AdclickerTrojanGenerates traffic to Web sites and banner ads 2GampassTrojanSteals online gaming account information 3ZonebacTrojanLowers Internet Explorer security settings 4KillAVTrojanDisables security applications 5LineageTrojanSteals online gaming account information 6PeacommTrojanCreates a peer network and downloads other threats 7Rustock.BBackdoorAllows remote access and relays spam 8BzupTrojanSteals online banking account information 9GraybirdBack doorAllows remote access, logs keystrokes, and steals passwords 10HaxdoorBack doorAllows remote access
21
New Ways To Launder Money
24
Identity Crime Financial Crime Cyber Crime Organised Crime
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.