SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Downloaden Sie, um offline zu lesen
THE LECTURERS
Fabio Ghioni - Roberto Preatoni




  Profiling modern State and
      Industrial Espionage
www.zone-h.org
   the Internet thermometer
HERO-Z comics



 TWO REASONS
 TO READ THEM




www.zone-h.org
   the Internet thermometer
Nmap’s fyodor                  HITB’s l33tdawg
 www.zone-h.org
    the Internet thermometer
MY ASS!
A visual definition of asymmetry




www.zone-h.org
   the Internet thermometer
INDEX
 2) Introduction: old and new threats
 3) Industrial Espionage and State-sponsored espionage
 4) Cyber defense methodology: from digital identification of attacker
    to counterattack strategy
 5) Cyber counterattacks: information leakage, Injected Interception




www.zone-h.org
     the Internet thermometer
In the aftermath of September 11th, security issues came into the limelight…
everybody focalized their attention on increasing anti-terrorist measures and
countering the increasing number of hacker attacks to business and government
networks…




   www.zone-h.org
          the Internet thermometer
… but hardly anyone has ever mentioned a more insidious and widespread
criminal activity: INDUSTRIAL ESPIONAGE




                                    WHY ?




   www.zone-h.org
         the Internet thermometer
Companies are often reluctant to publicly admit that they have been victims
 of industrial espionage for two main reasons:
•it implicitly means that THERE WAS SOME KIND OF VULNERABILITY to be
 exploited
•it implies the unveiling of MORE CONFIDENTIAL lines of business


REAL CASES
-CC companies
-T-mobile
-K




     www.zone-h.org
            the Internet thermometer
WHAT exactly is INDUSTRIAL ESPIONAGE?


The illegal acquisition of intellectual property and trade secrets, in other words
THEFT!
The techniques to steal information from outside a company range from the
traditional eavesdropping to social engineering tactics…




   www.zone-h.org
           the Internet thermometer
Since the 1990s Western Intelligence Agencies appear to have focused most
of their time and resources on industrial espionage
In most countries corporations rely on Government Agencies to carry out
investigations whose results can be used to boost the National economy…
France, the United States and Israeli have often been accused to spying on
competitors’ industrial secrets through scanning systems such as Echelon or
the Helios 1A satellite up until the more recent Carnivore software and
Magic Lantern used officially for lawful interception (now outdated by more
sophisticated solutions)




   www.zone-h.org
          the Internet thermometer
Conversely, the INDUSTRIAL/BUSINESS INTELLIGENCE process consists of
researching information on public source documents in order to draw
inferences about what competitors might be going to do and provide the
basis for possible counteraction




  www.zone-h.org
         the Internet thermometer
Situational Awareness is the key word…




www.zone-h.org
    the Internet thermometer
". . . attaining one hundred victories in one hundred battles is not the pinnacle of
excellence.
Subjugating the enemy's army without fighting is the true pinnacle of excellence."
Sun Tzu, The Art of War
"There are but two powers in the world, the sword and the mind. In the long run the
sword is always beaten by the mind."
Napoleon Bonaparte




   www.zone-h.org
            the Internet thermometer
Nevertheless, there is sometimes a fine   line between the legitimate tactics
of competitive intelligence gathering     and the illegitimate practice of
industrial espionage…




  www.zone-h.org
         the Internet thermometer
THE ATTACKS
AUTONOMOUS AGENTS / BOTNETS
Set up of botnets or drones instructed to perform searches within the traffic or within
the PC content
SOCIAL ENGINEERING
Exploitation of human vulnerabilities
Big mouths
INFORMATION LEAKAGE AND DATA MANIPULATION
•Intranet access due to loose access policies
•Weak corporate applications
•Exploitation of insiders

OPEN SOURCES GATHERING
•Old pal google
•Company pubblications

EMPLOYEES EXPLOITATION

                                                   www.zone-h.org
•Home pc compromission
•Mailbox hijacking                                          the Internet thermometer
The classic Intelligence Cycle




                              Source: Law Enforcement Intelligence: A Guide for State, Local,
                              and Tribal Law Enforcement Agencies


www.zone-h.org
   the Internet thermometer
                                      http://www.cops.usdoj.gov/mime/open.pdf?Item=1396
Modern espionage process flow
     open source                    target definition
 intelligence gathering             and acquisition

          exploit                  target vulnerability
                               assessment and profiling
      generation


         attack                        deception
  infrastructure setup                 array setup



                                      TARGET
                                   EXPLOITATION




www.zone-h.org
    the Internet thermometer
CASE STUDIES 1/5


Skynet 1.0
• A new application of Artificial Intelligence
• Set up of intelligent networked agents
• Underground work is in progress




    www.zone-h.org
            the Internet thermometer
CASE STUDIES 2/5


T-Mobile
• At the end of 2003 a hacker got access to the T-mobile users’ accounts and stole
  private material from jet-set users as well as a C.I.A. document located on a T-
  Mobile transit e-mail account belonging to a C.I.A. agent. The hacker exploited a
  Bea Weblogic interface flaw.
• Even though it was not a case of corporate sponsored espionage, the T-mobile
  subcribers data were posted on-sale on the Internet.




   www.zone-h.org
           the Internet thermometer
CASE STUDIES 3/5


Israel Trojan Horse
• In 2005 Israel was put in a difficult situation by an industrial espionage scandal
  involving several corporation and dozens of people.
• Once again data were stolen using a trojan and social engineering.
• Trojan-based attacks are growing rapidly and are considered as among the most
  important security risks for today’s corporations.




   www.zone-h.org
           the Internet thermometer
CASE STUDIES 4/5


Chinese Trojan Attacks
• Several American corporations got compromised in the last year by trojan attacks
  perpetrated by chinese citizens, according to the attacks' logs.
• Myfip, the trojan used for most of the attacks appeared to be one of the most
  sophisticated ever and one of its peculiarity was that it tried to steal also CAD/CAM files
  usually related to engineering design works.
• In Italy shoes factories identified successful intrusions in servers having the blueprints of
  new shoes models stolen even before they hit the production lines. North-West Italian
  shoe industry is now suffering a staggering 60% sales reduction
• According to an IBM report, in the first half of 2005, 'customized‘ attacks against
  governments, corporations and financial institutions jumped to 50 per cent.




      www.zone-h.org
               the Internet thermometer
CASE STUDIES 5/5


             MILITARY INDUSTRY




www.zone-h.org
   the Internet thermometer
PREVENTION AND DEFENSE




www.zone-h.org
   the Internet thermometer
www.zone-h.org
   the Internet thermometer
CYBER COUNTERATTACKS

                        INJECTED INTERCEPTION
•allows to trace the IP address of a target and gain direct access to all data
contained on the computer no matter what is the means of data transport (i.e.
physical or digital)




   www.zone-h.org
           the Internet thermometer
Tools




www.zone-h.org
        the Internet thermometer
                                   ?
Questions?                           ¿Preguntas?
                        English                 Spanish




‫َ ّة َ َا ِب‬
 ‫أي مط ل‬                     Domande?           вопросы?
                                  Italian                 Russian
    Arabic




                             Ερωτήσεις?
                                  Greek




tupoQghachmey                                    質問
              Klingon
                                                   Japanese

www.zone-h.org
    the Internet thermometer

Weitere ähnliche Inhalte

Was ist angesagt?

The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaZsolt Nemeth
 
Cehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackingCehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackinganonymousrider
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictZsolt Nemeth
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationJacqueline Fick
 
Social engineering tales
Social engineering tales Social engineering tales
Social engineering tales Ahmed Musaad
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
Cyber Security for Teenagers/Students
Cyber Security for Teenagers/StudentsCyber Security for Teenagers/Students
Cyber Security for Teenagers/Studentsrainrjcahili
 

Was ist angesagt? (20)

Incident handling of cyber espionage
Incident handling of cyber espionageIncident handling of cyber espionage
Incident handling of cyber espionage
 
Cyber Forensics & Challenges
Cyber Forensics & ChallengesCyber Forensics & Challenges
Cyber Forensics & Challenges
 
CYBER AWARENESS
CYBER AWARENESSCYBER AWARENESS
CYBER AWARENESS
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
Info sec 12 v1 2
Info sec 12 v1 2Info sec 12 v1 2
Info sec 12 v1 2
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
 
Cyber of things 2.0
Cyber of things 2.0Cyber of things 2.0
Cyber of things 2.0
 
Cehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackingCehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hacking
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber Conflict
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
 
Cyber Security in 2018
Cyber Security in 2018Cyber Security in 2018
Cyber Security in 2018
 
Social engineering tales
Social engineering tales Social engineering tales
Social engineering tales
 
Hacking
Hacking Hacking
Hacking
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Internet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wallInternet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wall
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
223 - Computer ethics
223 - Computer ethics223 - Computer ethics
223 - Computer ethics
 
Cyber Security for Teenagers/Students
Cyber Security for Teenagers/StudentsCyber Security for Teenagers/Students
Cyber Security for Teenagers/Students
 

Ähnlich wie By Roberto Preatoni Fabio Ghioni Corp Vs Corp

InfoSec Deep Learning in Action
InfoSec Deep Learning in ActionInfoSec Deep Learning in Action
InfoSec Deep Learning in ActionSatnam Singh
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza Belayneh
 
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...FecomercioSP
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSmart Assessment
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesPraveen Vackayil
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newDr. Arun Verma
 
Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismPost Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismRichard Stiennon
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trumpMAXfocus
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...Hackito Ergo Sum
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011Andrea Rossetti
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshopforensicsnation
 

Ähnlich wie By Roberto Preatoni Fabio Ghioni Corp Vs Corp (20)

Forensics Expo, London 2015
Forensics Expo, London  2015Forensics Expo, London  2015
Forensics Expo, London 2015
 
InfoSec Deep Learning in Action
InfoSec Deep Learning in ActionInfoSec Deep Learning in Action
InfoSec Deep Learning in Action
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
 
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
 
Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 
Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismPost Apocalyptic Cyber Realism
Post Apocalyptic Cyber Realism
 
cyber forensics
cyber forensicscyber forensics
cyber forensics
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber espionage
Cyber espionageCyber espionage
Cyber espionage
 
Tracking and Surveillance
Tracking and SurveillanceTracking and Surveillance
Tracking and Surveillance
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
 
File000154
File000154File000154
File000154
 
File000146
File000146File000146
File000146
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 

Mehr von Fabio Ghioni

Fabio Ghioni Hero Z Private Investigation
Fabio Ghioni Hero Z Private InvestigationFabio Ghioni Hero Z Private Investigation
Fabio Ghioni Hero Z Private InvestigationFabio Ghioni
 
Fabio Ghioni Intervista Andromeda
Fabio Ghioni Intervista AndromedaFabio Ghioni Intervista Andromeda
Fabio Ghioni Intervista AndromedaFabio Ghioni
 
Fabio Ghioni Hero Z Private Investigations
Fabio Ghioni Hero Z Private InvestigationsFabio Ghioni Hero Z Private Investigations
Fabio Ghioni Hero Z Private InvestigationsFabio Ghioni
 
Fabio Ghioni La Nona Emanazione
Fabio Ghioni La Nona EmanazioneFabio Ghioni La Nona Emanazione
Fabio Ghioni La Nona EmanazioneFabio Ghioni
 
Fabio Ghioni - Preatoni Ombre asimmetriche. La guerra cibernetica ei suoi pro...
Fabio Ghioni - Preatoni Ombre asimmetriche. La guerra cibernetica ei suoi pro...Fabio Ghioni - Preatoni Ombre asimmetriche. La guerra cibernetica ei suoi pro...
Fabio Ghioni - Preatoni Ombre asimmetriche. La guerra cibernetica ei suoi pro...Fabio Ghioni
 
Fabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealedFabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealedFabio Ghioni
 
Fabio Ghioni, Roberto Preatoni The Biggest Brother
Fabio Ghioni, Roberto Preatoni   The Biggest BrotherFabio Ghioni, Roberto Preatoni   The Biggest Brother
Fabio Ghioni, Roberto Preatoni The Biggest BrotherFabio Ghioni
 

Mehr von Fabio Ghioni (7)

Fabio Ghioni Hero Z Private Investigation
Fabio Ghioni Hero Z Private InvestigationFabio Ghioni Hero Z Private Investigation
Fabio Ghioni Hero Z Private Investigation
 
Fabio Ghioni Intervista Andromeda
Fabio Ghioni Intervista AndromedaFabio Ghioni Intervista Andromeda
Fabio Ghioni Intervista Andromeda
 
Fabio Ghioni Hero Z Private Investigations
Fabio Ghioni Hero Z Private InvestigationsFabio Ghioni Hero Z Private Investigations
Fabio Ghioni Hero Z Private Investigations
 
Fabio Ghioni La Nona Emanazione
Fabio Ghioni La Nona EmanazioneFabio Ghioni La Nona Emanazione
Fabio Ghioni La Nona Emanazione
 
Fabio Ghioni - Preatoni Ombre asimmetriche. La guerra cibernetica ei suoi pro...
Fabio Ghioni - Preatoni Ombre asimmetriche. La guerra cibernetica ei suoi pro...Fabio Ghioni - Preatoni Ombre asimmetriche. La guerra cibernetica ei suoi pro...
Fabio Ghioni - Preatoni Ombre asimmetriche. La guerra cibernetica ei suoi pro...
 
Fabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealedFabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealed
 
Fabio Ghioni, Roberto Preatoni The Biggest Brother
Fabio Ghioni, Roberto Preatoni   The Biggest BrotherFabio Ghioni, Roberto Preatoni   The Biggest Brother
Fabio Ghioni, Roberto Preatoni The Biggest Brother
 

Kürzlich hochgeladen

20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 

Kürzlich hochgeladen (20)

20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 

By Roberto Preatoni Fabio Ghioni Corp Vs Corp

  • 1. THE LECTURERS Fabio Ghioni - Roberto Preatoni Profiling modern State and Industrial Espionage www.zone-h.org the Internet thermometer
  • 2. HERO-Z comics TWO REASONS TO READ THEM www.zone-h.org the Internet thermometer
  • 3. Nmap’s fyodor HITB’s l33tdawg www.zone-h.org the Internet thermometer
  • 5. A visual definition of asymmetry www.zone-h.org the Internet thermometer
  • 6. INDEX 2) Introduction: old and new threats 3) Industrial Espionage and State-sponsored espionage 4) Cyber defense methodology: from digital identification of attacker to counterattack strategy 5) Cyber counterattacks: information leakage, Injected Interception www.zone-h.org the Internet thermometer
  • 7. In the aftermath of September 11th, security issues came into the limelight… everybody focalized their attention on increasing anti-terrorist measures and countering the increasing number of hacker attacks to business and government networks… www.zone-h.org the Internet thermometer
  • 8. … but hardly anyone has ever mentioned a more insidious and widespread criminal activity: INDUSTRIAL ESPIONAGE WHY ? www.zone-h.org the Internet thermometer
  • 9. Companies are often reluctant to publicly admit that they have been victims of industrial espionage for two main reasons: •it implicitly means that THERE WAS SOME KIND OF VULNERABILITY to be exploited •it implies the unveiling of MORE CONFIDENTIAL lines of business REAL CASES -CC companies -T-mobile -K www.zone-h.org the Internet thermometer
  • 10. WHAT exactly is INDUSTRIAL ESPIONAGE? The illegal acquisition of intellectual property and trade secrets, in other words THEFT! The techniques to steal information from outside a company range from the traditional eavesdropping to social engineering tactics… www.zone-h.org the Internet thermometer
  • 11. Since the 1990s Western Intelligence Agencies appear to have focused most of their time and resources on industrial espionage In most countries corporations rely on Government Agencies to carry out investigations whose results can be used to boost the National economy… France, the United States and Israeli have often been accused to spying on competitors’ industrial secrets through scanning systems such as Echelon or the Helios 1A satellite up until the more recent Carnivore software and Magic Lantern used officially for lawful interception (now outdated by more sophisticated solutions) www.zone-h.org the Internet thermometer
  • 12. Conversely, the INDUSTRIAL/BUSINESS INTELLIGENCE process consists of researching information on public source documents in order to draw inferences about what competitors might be going to do and provide the basis for possible counteraction www.zone-h.org the Internet thermometer
  • 13. Situational Awareness is the key word… www.zone-h.org the Internet thermometer
  • 14. ". . . attaining one hundred victories in one hundred battles is not the pinnacle of excellence. Subjugating the enemy's army without fighting is the true pinnacle of excellence." Sun Tzu, The Art of War "There are but two powers in the world, the sword and the mind. In the long run the sword is always beaten by the mind." Napoleon Bonaparte www.zone-h.org the Internet thermometer
  • 15. Nevertheless, there is sometimes a fine line between the legitimate tactics of competitive intelligence gathering and the illegitimate practice of industrial espionage… www.zone-h.org the Internet thermometer
  • 16. THE ATTACKS AUTONOMOUS AGENTS / BOTNETS Set up of botnets or drones instructed to perform searches within the traffic or within the PC content SOCIAL ENGINEERING Exploitation of human vulnerabilities Big mouths INFORMATION LEAKAGE AND DATA MANIPULATION •Intranet access due to loose access policies •Weak corporate applications •Exploitation of insiders OPEN SOURCES GATHERING •Old pal google •Company pubblications EMPLOYEES EXPLOITATION www.zone-h.org •Home pc compromission •Mailbox hijacking the Internet thermometer
  • 17. The classic Intelligence Cycle Source: Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies www.zone-h.org the Internet thermometer http://www.cops.usdoj.gov/mime/open.pdf?Item=1396
  • 18. Modern espionage process flow open source target definition intelligence gathering and acquisition exploit target vulnerability assessment and profiling generation attack deception infrastructure setup array setup TARGET EXPLOITATION www.zone-h.org the Internet thermometer
  • 19. CASE STUDIES 1/5 Skynet 1.0 • A new application of Artificial Intelligence • Set up of intelligent networked agents • Underground work is in progress www.zone-h.org the Internet thermometer
  • 20. CASE STUDIES 2/5 T-Mobile • At the end of 2003 a hacker got access to the T-mobile users’ accounts and stole private material from jet-set users as well as a C.I.A. document located on a T- Mobile transit e-mail account belonging to a C.I.A. agent. The hacker exploited a Bea Weblogic interface flaw. • Even though it was not a case of corporate sponsored espionage, the T-mobile subcribers data were posted on-sale on the Internet. www.zone-h.org the Internet thermometer
  • 21. CASE STUDIES 3/5 Israel Trojan Horse • In 2005 Israel was put in a difficult situation by an industrial espionage scandal involving several corporation and dozens of people. • Once again data were stolen using a trojan and social engineering. • Trojan-based attacks are growing rapidly and are considered as among the most important security risks for today’s corporations. www.zone-h.org the Internet thermometer
  • 22. CASE STUDIES 4/5 Chinese Trojan Attacks • Several American corporations got compromised in the last year by trojan attacks perpetrated by chinese citizens, according to the attacks' logs. • Myfip, the trojan used for most of the attacks appeared to be one of the most sophisticated ever and one of its peculiarity was that it tried to steal also CAD/CAM files usually related to engineering design works. • In Italy shoes factories identified successful intrusions in servers having the blueprints of new shoes models stolen even before they hit the production lines. North-West Italian shoe industry is now suffering a staggering 60% sales reduction • According to an IBM report, in the first half of 2005, 'customized‘ attacks against governments, corporations and financial institutions jumped to 50 per cent. www.zone-h.org the Internet thermometer
  • 23. CASE STUDIES 5/5 MILITARY INDUSTRY www.zone-h.org the Internet thermometer
  • 24. PREVENTION AND DEFENSE www.zone-h.org the Internet thermometer
  • 25. www.zone-h.org the Internet thermometer
  • 26. CYBER COUNTERATTACKS INJECTED INTERCEPTION •allows to trace the IP address of a target and gain direct access to all data contained on the computer no matter what is the means of data transport (i.e. physical or digital) www.zone-h.org the Internet thermometer
  • 27. Tools www.zone-h.org the Internet thermometer ?
  • 28. Questions? ¿Preguntas? English Spanish ‫َ ّة َ َا ِب‬ ‫أي مط ل‬ Domande? вопросы? Italian Russian Arabic Ερωτήσεις? Greek tupoQghachmey 質問 Klingon Japanese www.zone-h.org the Internet thermometer