25
Cybercrime Threat Landscape: Cyber Criminals Never Sleep Etay Maor Senior Fraud Prevention Strategist

Cybercrime Threat Landscape: Cyber Criminals Never Sleep

  • View
    1.181

  • Download
    3

Embed Size (px)

DESCRIPTION

A Glimpse into the Cybercrime Underground In this session, Trusteer’s senior fraud prevention strategist, Etay Maor, will dive into the latest tools, techniques and threats developed and utilized by cybercriminals. The presentation will include a market overview of the latest offerings from the criminal underground, with a deep dive into some of the techniques discussed by cybercriminals, and review how they manifest as real attacks with real examples and case studies. A share of the presentation will also be dedicated to possible mitigation strategies and techniques. During this webinar you will learn about: New malware attack and evasion techniques The latest underground offerings on the “fraud as a service” market The latest rumors and discussions around malware and malware authors from the underground Real-time intelligence and adaptable counter measures

Citation preview

Page 1: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

Cybercrime Threat Landscape: Cyber Criminals Never Sleep

Etay MaorSenior Fraud Prevention Strategist

Page 2: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014

Security Silos FAIL!

Page 3: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014 3

Holistic Approach for Cybercrime

WWW

Phishing and Malware Fraud

Advanced Threats (Employees)

Online/Mobile Banking

Money, Intellectual Property, Business Data

Account Takeover, New Account Fraud

Mobile Fraud Risk

Page 4: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

Phishing

4

Page 5: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014 5

New C&Cs for Phishing

Page 6: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014 6

Targeting Security Solutions:

External and Perimeter Anti virus Sandbox VMs

Login Credential protection and encryption OTP SMS Device ID

Internal Behavior anomaly detection Clickstream analysis

Page 7: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014 7

Malware Protection

Page 8: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

Malware Protection - Outsource

Page 9: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014

Device Forging

Page 10: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014

Bypassing Device ID

Notification

LoginInjection

Page 11: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014

Bypassing Device ID

RDP

Transaction

Page 12: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014 12

Behavior and Device ID Tricks

The data source: Large European bank 3 weeks worth of data 1.5M accounts reviewed 10M login attempts

Fraudsters know behavioral profiling is in action Fraud does not happen on the first login

30% of the users come from a mobile device Confirmed fraud coming from the mobile channel. WHY?

Page 13: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

New Mobile Threats

13

Page 14: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014

How Times Have Changed…

Page 15: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014

Overlay Mobile Attack

Page 16: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014

Overlay Mobile Attack

Page 17: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014

Mobile Ransomware

Page 18: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

Cybercrime Services

18

Page 19: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014 19

Page 20: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014

A Page From a CT Book – Sounds Familiar?

Page 21: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014

Building a Solution

Advanced Fraud

Prevention

Real Time Intelligence• Integrated: fully

integrated to leverage threat data across channels

• Global: identify threats any time, anywhere for all channels

Seamless Experience• Transparent: minimize

“action items” to user• Automated: minimize

“action items” to staff

Accurate Analysis• Focused: root cause• Impactful: prevent,

detect, mitigate and remediate

Adaptive Controls• Intelligent: build with

the “unknowns” • Dynamic: rapidly

updatable software

Page 22: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014

And Always Remember – Security is in YOUR Hands

Page 23: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014 23

And Always Remember – Security is in YOUR Hands

Page 24: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014 24

And Always Remember – Security is in YOUR Hands

Page 25: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

Thank You