Transcript
Page 1: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

Cybercrime Threat Landscape: Cyber Criminals Never Sleep

Etay MaorSenior Fraud Prevention Strategist

Page 2: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014

Security Silos FAIL!

Page 3: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014 3

Holistic Approach for Cybercrime

WWW

Phishing and Malware Fraud

Advanced Threats (Employees)

Online/Mobile Banking

Money, Intellectual Property, Business Data

Account Takeover, New Account Fraud

Mobile Fraud Risk

Page 4: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

Phishing

4

Page 5: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014 5

New C&Cs for Phishing

Page 6: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014 6

Targeting Security Solutions:

External and Perimeter Anti virus Sandbox VMs

Login Credential protection and encryption OTP SMS Device ID

Internal Behavior anomaly detection Clickstream analysis

Page 7: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014 7

Malware Protection

Page 8: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

Malware Protection - Outsource

Page 9: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014

Device Forging

Page 10: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014

Bypassing Device ID

Notification

LoginInjection

Page 11: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014

Bypassing Device ID

RDP

Transaction

Page 12: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014 12

Behavior and Device ID Tricks

The data source: Large European bank 3 weeks worth of data 1.5M accounts reviewed 10M login attempts

Fraudsters know behavioral profiling is in action Fraud does not happen on the first login

30% of the users come from a mobile device Confirmed fraud coming from the mobile channel. WHY?

Page 13: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

New Mobile Threats

13

Page 14: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014

How Times Have Changed…

Page 15: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014

Overlay Mobile Attack

Page 16: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014

Overlay Mobile Attack

Page 17: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014

Mobile Ransomware

Page 18: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

Cybercrime Services

18

Page 19: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014 19

Page 20: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014

A Page From a CT Book – Sounds Familiar?

Page 21: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014

Building a Solution

Advanced Fraud

Prevention

Real Time Intelligence• Integrated: fully

integrated to leverage threat data across channels

• Global: identify threats any time, anywhere for all channels

Seamless Experience• Transparent: minimize

“action items” to user• Automated: minimize

“action items” to staff

Accurate Analysis• Focused: root cause• Impactful: prevent,

detect, mitigate and remediate

Adaptive Controls• Intelligent: build with

the “unknowns” • Dynamic: rapidly

updatable software

Page 22: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014

And Always Remember – Security is in YOUR Hands

Page 23: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014 23

And Always Remember – Security is in YOUR Hands

Page 24: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

© IBM Trusteer, 2014 24

And Always Remember – Security is in YOUR Hands

Page 25: Cybercrime Threat Landscape: Cyber Criminals Never Sleep

Thank You


Recommended