14
1 © Copyright 2011 EMC Corporation. All rights reserved. Crash Course: how to be become a successful Cyber Criminal Uri Rivner | Head of New Technologies Identify Protection | RSA, the security division of EMC Feb 2012 PLEASE NOTE: The following slides contain censored Cybercrime In visuals Contact me if you need any of the original visuals for inter [email protected]

1© Copyright 2011 EMC Corporation. All rights reserved. Crash Course: how to be become a successful Cyber Criminal Uri Rivner | Head of New Technologies

Embed Size (px)

Citation preview

1© Copyright 2011 EMC Corporation. All rights reserved.

Crash Course: how to be become a successful Cyber Criminal

Uri Rivner | Head of New TechnologiesIdentify Protection | RSA, the security division of EMC

Feb 2012

PLEASE NOTE:The following slides contain censored Cybercrime Intelligencevisuals

Contact me if you need any of the original visuals for internal [email protected]

2© Copyright 2011 EMC Corporation. All rights reserved.

Join the Dark Cloud

3© Copyright 2011 EMC Corporation. All rights reserved.

Fraud Forums: Build your Identity

Dozens of active forums;Thousands of members per forum;

English, Russian – leading languages

Dozens of active forums;Thousands of members per forum;

English, Russian – leading languages

4© Copyright 2011 EMC Corporation. All rights reserved.

Gain Credibility

5© Copyright 2011 EMC Corporation. All rights reserved.

Don’t Show Your Face to Web Camera!

6© Copyright 2011 EMC Corporation. All rights reserved.

Crimeware you can Afford

7© Copyright 2011 EMC Corporation. All rights reserved.

Seeing is Believing

8© Copyright 2011 EMC Corporation. All rights reserved.

5,000,000 PCs88% of Fortune 500

9© Copyright 2011 EMC Corporation. All rights reserved.

Online Dating

10© Copyright 2011 EMC Corporation. All rights reserved.

The Executive Assistant

11© Copyright 2011 EMC Corporation. All rights reserved.

Humans can’t be Patched

12© Copyright 2011 EMC Corporation. All rights reserved.

Advanced Persistent Threats See anything in common?

Attack Targets Entry Vector

Going After

Ghostnet Ministries, Embassies, Office of Dalai Lama

Spear Phishing

Sensitive documents

Aurora 34 companies: Google, Adobe, defense, internet, financial, critical infrastructure

Spear Phishing

Intellectual property

Night Dragon Critical infrastructure Spear Phishing

Intellectual property

13© Copyright 2011 EMC Corporation. All rights reserved.

Advanced Persistent ThreatsWhat’s New here?

1980-2010

2010-2020

14© Copyright 2011 EMC Corporation. All rights reserved.