SlideShare ist ein Scribd-Unternehmen logo
1 von 39
Nullcon 2012
International Security Conference
What is the talk about?

•Only reported incidents
•Mostly pertaining to government and corporate establishments.


What is the Talk not about?

•Unreported activities of intelligence agencies
•Data gatheredIntelligence agencies
Who am I?
Hacked Industries
Healthcare               Automotive       Hospitality    Internet   Credit Card Issuer
                                                         Service
                                                         Provider




             Education                         Finance                Government




 Music                                Sports
Hacked Industries
United States           Search Engines                    Newspaper
  University



                                                         Recruitment




          Web 2.0                Travel                 Social Networking




                         Internet Service Provider




         News                                        Entertainment
Statistics




 Application Weakness in the                Outcome in the Year 2011-12
        Year 2011-12                                  Miscellaneous               Defacement
                                      Monetary Loss       13%                        16%
                        Improper IO
                                          7%
    Misc                  Handling
(IPV,ITLP,PRL               25%         Planting of
     etc)                                Malware
     41%                                    7%
                                                                                     Downtime
                                                          Leakage of
                                                                                       30%
                                                         Information
                       Insufficient                          27%
         Inefficient      Anti-
            AAA        Automation
             7%           27%




                                                                       Source : projects.webappsec.org
Statistics




Attack Entity Geography Year                         Attacked Entity Field in Year
            2011-12                                           2011-12
               Australia
      Europe                                                                        Government
                 4%
       17%                                                                             24%
                                     North America        Misc (Retail,
                                         44%                 36%                               Education
        Asia                                                                                      3%
        19%
                                                                 Technology
                                                                    20%
                                                                                               Entertainment
      Africa               South America                                                            9%
       3%                       13%                                                  Finance
                                                                                        8%




                                                                              Source : projects.webappsec.org
Reasons why cybercrimes occur?


                                                      Monetary

                                             Hackers steal $6.7M in cyber bank
                      1st April 2012         robbery all this over new year break




Monetary (Computer hacker tries to steal
$1.8 million from Arlington's bank account                          Jan 18th 2012
Reasons why cybercrimes occur?



                              Recognition


                Hactivism:
                DOS/DDOS Attacks
                April 2012, February 2012, June
                2011 CIA website Downed by
                Anonymous on three occasions
Reasons why cybercrimes occur?



                  Political




 North Korea, South Korea
Reasons why cybercrimes occur?



                                Political



Geopolitical rivalry manifesting in corporate cybercrime
3rd January 2012 Saudi Hackers Post Israeli Credit Card
Numbers Online
      Intelligence:FBI Partner website hacked
         FBI Partner Organization Website
       Dayton FBI partner website hacked
Reasons why cybercrimes occur?



                            Defacement




                27th April 2012

                Taliban Website Hacked As
                Afghan Cyberwar Heats
Reasons why cybercrimes occur?


                                           Fun


     black hat/ white hat/GreyHat??

                         January 2012 to March 2012

                          15-year-old arrested for
                          hacking 259 companies



       Google kills Iranian blog with 3
       million hacked bank accounts
Anonymous


        video :
   anonymous message
   to the world and CIA




                           who are they?
“First, who is this group called Anonymous? Put simply, it is an
international cabal of criminal hackers dating back to 2003, who have
shut down the websites of the U.S. Department of Justice and the
F.B.I. They have hacked into the phone lines of Scotland Yard. They are
responsible for attacks against MasterCard, Visa, Sony and the
Governments of the U.S., U.K., Turkey, Australia, Egypt, Algeria, Libya,
Iran, Chile, Colombia and New Zealand. ”
                                             —Canadian MP Marc Garneau, 2012
Hacktivist Group
Anonymous
Govt site taken down in censorship protest - Jun 10, 2012
Hacks in 2012

CSLEA hack                         Taking down Monsanto's Hungarian website

Occupy Nigeria
                                   Symantec source code leak
Operation Megaupload
                                   April 2012 Chinese attack
Anti-ACTA activism in Europe

Operation Russia                   Operation Bahrain and Formula One attacks

Boston Police Department attacks   Occupy Philippines

Syrian Government E-mail Hack      Operation India
AntiSec Leak and CIA Attack
                                   Operation Quebec
Interpol Attack
                                   Operation Japan
AIPAC Attack
                                   Operation Anaheim
Vatican website DDoS Attacks
                                   AAPT attack
Bureau of Justice leak
                                   Operation Myanmar
Case 1 Tunisian Government
Date :
18 December 2010 – 14 January 2011
who:
Tunisian Revolution

• 8 websites affected (including, the president, prime minister, ministry of
   industry, ministry of foreign affairs, and the stock exchange.)
• Ben Ali's administration has tightly restricted the flow of information out
  of Tunisia
• Reports of civil disobedience and police action filtered out on Twitter.
• Anonymous claimed responsibility for the cyber attack (called it #OpTunisia)
• Part of #OpPayback, initially aligned with wikileaks (Zimbabwe) then the
   people of Tunisia.
• felt government had unilaterally declared war on free speech, democracy,
   and even [its] own people".
• "Cyber attacks will persist until the Tunisian government respects all
  Tunisian citizens' right to free speech and information and ceases the
  censoring of the internet".
Case 2 Government
Date :
09/12/11
who:
Congress Website hacked
(congress.org.in & aicc.org.in)

what
(Defacement)Sonia Gandhi profile changed with one
paragraph of obscene Language.(Photo of Sonia Gandhi)
why:
KapilSibal asked social media networks, including Facebook,
Twitter and Google, to remove offensive material from their websites.

Interesting Fact :
Case 3 Government
Date :
Dec 2010- Jun 2011

who:
117 Govt. of India Websites (NIC, Army, CBI)

Group responsible:
Indian offshoot of Anonymous, PCA(well….at least reportedly, also
hacked 270 other sites)

why:
Retaliation for ICA's Attack on 26/11/10

Interesting Fact :
Indian government departments and agencies do not follow the
procedures set for regular audits of the sites
Case 1 Corporate

Date :
15/01/12
who:
Zappos (Aquired by Amazon since 2008)

what:
24m Records Breached Information including names, email
addresses, billing and shipping addresses, phone numbers, the
last four digits of credit card numbers, and encrypted passwords
may have been exposed.
how:
zero day vulnerability

Interesting Fact :
Case 2 Corporate
Zuckerberg'sFacebook Account Hacked
Date :
Till Nov 27, 2011
who:
Bug in the application

how:
A subscriber uses the Report/Block link that appears in the bottom right
when you roll over a picture to report another subscriber's photo as
pornographic. The blocking tool then asks for your help in identifying
other photos that should be blocked as part of that account - which is
where the bug comes in. Not only were the public photos of that
account presented, but private photos as well.
Output:
Mark Zuckeberg's private photos started to show up
across the web
Case 3 Corporate
Date :
06/06/12
who:
Linkedin
how:
Vulnerable Front end
SQL Injection (could have been sqlmap or Havij)
Outcome:
According to Per Thorsheim, security analyst, A list of 6.5 million
passwords appeared on a russian forum.
  • All hashed using the SHA-1 algorithm. No Salting
  • Many Password "1234LinkedIn" with SHA-1 Hash is
    ―abf26a4849e5d97882fcdce5757ae6028281192a.‖
  • No Username or Data, but Could be a plan to crowd source
    hacking effort, because some unique passwords also found.
Case 4 Corporate
Date :
19/04/2012 (realised 7 days later.)
who:
Sony Playstation, Playstation portable, &Qriocity(Music
Streaming)
what:
•Supposed hacker chat-logs reveal PSN security lapses




• 77m stolen names, addresses, birthdates, PSN passwords and
  credit card numbers.
•55m (PSN, PS3 + playstation Mobile ) and 22m (Qriocity)
•all details stolen indicate they were in unencrypted form
  (against common Industry practice.)
Other    Hacks


When:
May 22nd

Who:
               Greece

What:
Hacked

Attack mode:
SQL injection, automated
Other                  Hacks
Article mentions that when this whole attack on Sony is over it might
come to be one of the most secure web presence on the www.


When:
May 24th 2012

Who:
Sony music Japan

What:
Hacked

By:
Lulzsec
Other   Hacks




When:
June 5th 2011


Who:
Sony Music Brazil


By:
Lulzsec
Other     Hacks

When:
June 6th 2012

Who:
Sony Europe

By:
Lebanese Hacker (Idahc)
What:
Stole 120
usernames, passwords, em
ail addresses through
Attack mode:
SQL injection
Other   Hacks



When:
July 5 2011

Who:
Sony Music
Ireland website

By:
Hackers
Other   Hacks

When:
January 6th 2012

Who:
Sony picture
website and FB

What:
page hacked

By:
Other        Hacks


When:
August 2012

Who:
Sony

What:
hacked again

By:



                       SQL Injection Vaccination?
Types of Attacks in 2011
When             Who           By & How                    Outcome

March 17, 2011                 Hacked by an Advanced       Used SecurId codes
                               Persistent Threat (APT)     they stole from the
                                                           RSA break-in to hack
                                                           Lockheed Martin
June 2, 2011                   Through Spear phishing      Gmail accounts of
                               used by Chinese Hackers     select members of
                                                           the U.S. Government
                                                           had been
                                                           compromised
May, 2011                      200,000 Customer A/c were   Citi ordered new
                               compromised by a cyber-     credit cards for
                               attack. Hackers accessed    100,000 customers
                               account holders'            absorbing the $2
                               names, email                million cost
                               addresses, and account
                               numbers
June 11, 2011                  Hackers used a "spear       Degree of the
                               phishing" technique         compromise was not
                                                           specified
Types of Attacks in 2012
When            Who                                By & How                     Outcome

August, 2012                                       Hactivist Group              Site was unavailable
                                                   Anonymous                    Demanding freedom
                                                                                for Wikileaks founder
                                                                                JulianAssange
                Interpol   British Police   SOCA
July 12, 2012                                      Group of Hackers used        SQL injection retrieved
                                                   Union based SQL              453,000 user names
                                                   injection                    and passwords stored
                                                                                in plaintext

September 25,                                      Muslim hackers launched      Bank was forced to
2012                                               a distributed a denial-of-   shut down the website
                                                   service attack against it
• Incidents will continue to happen

• Regulatory Authority required to Penalize
 for no compliance
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)Global Business Events
 
The Critical Need to Secure the Web in Your Company
The Critical Need to Secure the Web in Your CompanyThe Critical Need to Secure the Web in Your Company
The Critical Need to Secure the Web in Your CompanyOsterman Research, Inc.
 
Is Big Data A Risky Business in Isaca Journal
Is Big Data A Risky Business in Isaca JournalIs Big Data A Risky Business in Isaca Journal
Is Big Data A Risky Business in Isaca JournalTushar Kale
 
Why computers will never be safe
Why computers will never be safeWhy computers will never be safe
Why computers will never be safeCAST
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats ReportMcafeeCareers
 
Abay.vn Share - Social media in asia. oct.2012
Abay.vn Share - Social media in asia. oct.2012Abay.vn Share - Social media in asia. oct.2012
Abay.vn Share - Social media in asia. oct.2012Nguyen Quan
 
Cybercrime - View and perceptions from EU citizens
Cybercrime - View and perceptions from EU citizensCybercrime - View and perceptions from EU citizens
Cybercrime - View and perceptions from EU citizensGabriella Bergaglio
 
Safety, Sanctuary and Security
Safety, Sanctuary and SecuritySafety, Sanctuary and Security
Safety, Sanctuary and SecurityPaige Rasid
 
The Newest Element of Risk Metrics: Social Media
The Newest Element of Risk Metrics: Social MediaThe Newest Element of Risk Metrics: Social Media
The Newest Element of Risk Metrics: Social MediaPriyanka Aash
 
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad BotsDistil Networks
 
Estudio cibercimen-2013-ciberinvestigacion
Estudio cibercimen-2013-ciberinvestigacionEstudio cibercimen-2013-ciberinvestigacion
Estudio cibercimen-2013-ciberinvestigacionSelva Orejón
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in IraqAyub Nuri
 
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...KKess
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShowAdam Heller
 
Russian internet market and yandex overview iss london.18 may 2011
Russian internet market and yandex overview iss london.18 may 2011Russian internet market and yandex overview iss london.18 may 2011
Russian internet market and yandex overview iss london.18 may 2011Preston Carey
 
Russian Internet Market and Yandex Overview
Russian Internet Market and Yandex OverviewRussian Internet Market and Yandex Overview
Russian Internet Market and Yandex OverviewPreston Carey
 
Mobile apps market of Russia (2018)
Mobile apps market of Russia (2018)Mobile apps market of Russia (2018)
Mobile apps market of Russia (2018)Erzhena Mironova
 

Was ist angesagt? (20)

InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
 
The Critical Need to Secure the Web in Your Company
The Critical Need to Secure the Web in Your CompanyThe Critical Need to Secure the Web in Your Company
The Critical Need to Secure the Web in Your Company
 
Is Big Data A Risky Business in Isaca Journal
Is Big Data A Risky Business in Isaca JournalIs Big Data A Risky Business in Isaca Journal
Is Big Data A Risky Business in Isaca Journal
 
Why computers will never be safe
Why computers will never be safeWhy computers will never be safe
Why computers will never be safe
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats Report
 
Abay.vn Share - Social media in asia. oct.2012
Abay.vn Share - Social media in asia. oct.2012Abay.vn Share - Social media in asia. oct.2012
Abay.vn Share - Social media in asia. oct.2012
 
Cybercrime - View and perceptions from EU citizens
Cybercrime - View and perceptions from EU citizensCybercrime - View and perceptions from EU citizens
Cybercrime - View and perceptions from EU citizens
 
Safety, Sanctuary and Security
Safety, Sanctuary and SecuritySafety, Sanctuary and Security
Safety, Sanctuary and Security
 
The Newest Element of Risk Metrics: Social Media
The Newest Element of Risk Metrics: Social MediaThe Newest Element of Risk Metrics: Social Media
The Newest Element of Risk Metrics: Social Media
 
Digital Ad Fraud Is Not Illegal Yet
Digital Ad Fraud Is Not Illegal YetDigital Ad Fraud Is Not Illegal Yet
Digital Ad Fraud Is Not Illegal Yet
 
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
 
Estudio cibercimen-2013-ciberinvestigacion
Estudio cibercimen-2013-ciberinvestigacionEstudio cibercimen-2013-ciberinvestigacion
Estudio cibercimen-2013-ciberinvestigacion
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
 
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
Russian internet market and yandex overview iss london.18 may 2011
Russian internet market and yandex overview iss london.18 may 2011Russian internet market and yandex overview iss london.18 may 2011
Russian internet market and yandex overview iss london.18 may 2011
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Russian Internet Market and Yandex Overview
Russian Internet Market and Yandex OverviewRussian Internet Market and Yandex Overview
Russian Internet Market and Yandex Overview
 
Mobile apps market of Russia (2018)
Mobile apps market of Russia (2018)Mobile apps market of Russia (2018)
Mobile apps market of Russia (2018)
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 

Andere mochten auch

Andere mochten auch (7)

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 

Ähnlich wie Cyber Crime : Incident Highlights of 2011-2012

The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearThe Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearBob Wall
 
Mary Meeker Internet Trends Report for 2019
Mary Meeker Internet Trends Report for 2019Mary Meeker Internet Trends Report for 2019
Mary Meeker Internet Trends Report for 2019Eric Johnson
 
State of IT security 2012
State of IT security 2012State of IT security 2012
State of IT security 2012Arun Bhatia
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18Symantec
 
Enhancing Cybersecurity Readiness Through International Cooperation
Enhancing Cybersecurity Readiness Through International CooperationEnhancing Cybersecurity Readiness Through International Cooperation
Enhancing Cybersecurity Readiness Through International CooperationPositive Hack Days
 
Flurry report 2013 simonkhalaf
Flurry report 2013 simonkhalaf Flurry report 2013 simonkhalaf
Flurry report 2013 simonkhalaf Dmitriy Aleshin
 
Flurry: Mobile Outlook 2013
Flurry: Mobile Outlook 2013Flurry: Mobile Outlook 2013
Flurry: Mobile Outlook 2013Leonid Bogolubov
 
12 must-know-cybersecurity
12 must-know-cybersecurity12 must-know-cybersecurity
12 must-know-cybersecurityAdrian Hall
 
Industry Trendsin Information Security
Industry Trendsin Information SecurityIndustry Trendsin Information Security
Industry Trendsin Information SecurityGary Bahadur
 
Symantec Intelligence Report
Symantec Intelligence ReportSymantec Intelligence Report
Symantec Intelligence ReportSymantec
 
phishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdfphishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdfchauhan323234
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation AniketPandit18
 
E Crime 2008 Survey
E Crime 2008 SurveyE Crime 2008 Survey
E Crime 2008 SurveyJimGroark
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012Lumension
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterPatricia M Watson
 

Ähnlich wie Cyber Crime : Incident Highlights of 2011-2012 (20)

The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearThe Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
 
Mary Meeker Internet Trends Report for 2019
Mary Meeker Internet Trends Report for 2019Mary Meeker Internet Trends Report for 2019
Mary Meeker Internet Trends Report for 2019
 
State of IT security 2012
State of IT security 2012State of IT security 2012
State of IT security 2012
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18
 
Data Loss Barometer 2012
Data Loss Barometer 2012Data Loss Barometer 2012
Data Loss Barometer 2012
 
Enhancing Cybersecurity Readiness Through International Cooperation
Enhancing Cybersecurity Readiness Through International CooperationEnhancing Cybersecurity Readiness Through International Cooperation
Enhancing Cybersecurity Readiness Through International Cooperation
 
2012 Data Breach Investigations Report
2012 Data Breach Investigations Report 2012 Data Breach Investigations Report
2012 Data Breach Investigations Report
 
Flurry report 2013 simonkhalaf
Flurry report 2013 simonkhalaf Flurry report 2013 simonkhalaf
Flurry report 2013 simonkhalaf
 
Flurry: Mobile Outlook 2013
Flurry: Mobile Outlook 2013Flurry: Mobile Outlook 2013
Flurry: Mobile Outlook 2013
 
12 must-know-cybersecurity
12 must-know-cybersecurity12 must-know-cybersecurity
12 must-know-cybersecurity
 
Industry Trendsin Information Security
Industry Trendsin Information SecurityIndustry Trendsin Information Security
Industry Trendsin Information Security
 
Turn To Digital In A Downturn
Turn To Digital In A DownturnTurn To Digital In A Downturn
Turn To Digital In A Downturn
 
Symantec Intelligence Report
Symantec Intelligence ReportSymantec Intelligence Report
Symantec Intelligence Report
 
Protecting Data Privacy
Protecting Data PrivacyProtecting Data Privacy
Protecting Data Privacy
 
We present Bugscout
We present BugscoutWe present Bugscout
We present Bugscout
 
phishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdfphishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdf
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
E Crime 2008 Survey
E Crime 2008 SurveyE Crime 2008 Survey
E Crime 2008 Survey
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise Chapter
 

Kürzlich hochgeladen

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Kürzlich hochgeladen (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Cyber Crime : Incident Highlights of 2011-2012

  • 2. What is the talk about? •Only reported incidents •Mostly pertaining to government and corporate establishments. What is the Talk not about? •Unreported activities of intelligence agencies •Data gatheredIntelligence agencies
  • 4. Hacked Industries Healthcare Automotive Hospitality Internet Credit Card Issuer Service Provider Education Finance Government Music Sports
  • 5. Hacked Industries United States Search Engines Newspaper University Recruitment Web 2.0 Travel Social Networking Internet Service Provider News Entertainment
  • 6. Statistics Application Weakness in the Outcome in the Year 2011-12 Year 2011-12 Miscellaneous Defacement Monetary Loss 13% 16% Improper IO 7% Misc Handling (IPV,ITLP,PRL 25% Planting of etc) Malware 41% 7% Downtime Leakage of 30% Information Insufficient 27% Inefficient Anti- AAA Automation 7% 27% Source : projects.webappsec.org
  • 7. Statistics Attack Entity Geography Year Attacked Entity Field in Year 2011-12 2011-12 Australia Europe Government 4% 17% 24% North America Misc (Retail, 44% 36% Education Asia 3% 19% Technology 20% Entertainment Africa South America 9% 3% 13% Finance 8% Source : projects.webappsec.org
  • 8. Reasons why cybercrimes occur? Monetary Hackers steal $6.7M in cyber bank 1st April 2012 robbery all this over new year break Monetary (Computer hacker tries to steal $1.8 million from Arlington's bank account Jan 18th 2012
  • 9. Reasons why cybercrimes occur? Recognition Hactivism: DOS/DDOS Attacks April 2012, February 2012, June 2011 CIA website Downed by Anonymous on three occasions
  • 10. Reasons why cybercrimes occur? Political North Korea, South Korea
  • 11. Reasons why cybercrimes occur? Political Geopolitical rivalry manifesting in corporate cybercrime 3rd January 2012 Saudi Hackers Post Israeli Credit Card Numbers Online Intelligence:FBI Partner website hacked FBI Partner Organization Website Dayton FBI partner website hacked
  • 12. Reasons why cybercrimes occur? Defacement 27th April 2012 Taliban Website Hacked As Afghan Cyberwar Heats
  • 13. Reasons why cybercrimes occur? Fun black hat/ white hat/GreyHat?? January 2012 to March 2012 15-year-old arrested for hacking 259 companies Google kills Iranian blog with 3 million hacked bank accounts
  • 14. Anonymous video : anonymous message to the world and CIA who are they? “First, who is this group called Anonymous? Put simply, it is an international cabal of criminal hackers dating back to 2003, who have shut down the websites of the U.S. Department of Justice and the F.B.I. They have hacked into the phone lines of Scotland Yard. They are responsible for attacks against MasterCard, Visa, Sony and the Governments of the U.S., U.K., Turkey, Australia, Egypt, Algeria, Libya, Iran, Chile, Colombia and New Zealand. ” —Canadian MP Marc Garneau, 2012
  • 16. Anonymous Govt site taken down in censorship protest - Jun 10, 2012
  • 17. Hacks in 2012 CSLEA hack Taking down Monsanto's Hungarian website Occupy Nigeria Symantec source code leak Operation Megaupload April 2012 Chinese attack Anti-ACTA activism in Europe Operation Russia Operation Bahrain and Formula One attacks Boston Police Department attacks Occupy Philippines Syrian Government E-mail Hack Operation India AntiSec Leak and CIA Attack Operation Quebec Interpol Attack Operation Japan AIPAC Attack Operation Anaheim Vatican website DDoS Attacks AAPT attack Bureau of Justice leak Operation Myanmar
  • 18. Case 1 Tunisian Government Date : 18 December 2010 – 14 January 2011 who: Tunisian Revolution • 8 websites affected (including, the president, prime minister, ministry of industry, ministry of foreign affairs, and the stock exchange.) • Ben Ali's administration has tightly restricted the flow of information out of Tunisia • Reports of civil disobedience and police action filtered out on Twitter. • Anonymous claimed responsibility for the cyber attack (called it #OpTunisia) • Part of #OpPayback, initially aligned with wikileaks (Zimbabwe) then the people of Tunisia. • felt government had unilaterally declared war on free speech, democracy, and even [its] own people". • "Cyber attacks will persist until the Tunisian government respects all Tunisian citizens' right to free speech and information and ceases the censoring of the internet".
  • 19. Case 2 Government Date : 09/12/11 who: Congress Website hacked (congress.org.in & aicc.org.in) what (Defacement)Sonia Gandhi profile changed with one paragraph of obscene Language.(Photo of Sonia Gandhi) why: KapilSibal asked social media networks, including Facebook, Twitter and Google, to remove offensive material from their websites. Interesting Fact :
  • 20.
  • 21. Case 3 Government Date : Dec 2010- Jun 2011 who: 117 Govt. of India Websites (NIC, Army, CBI) Group responsible: Indian offshoot of Anonymous, PCA(well….at least reportedly, also hacked 270 other sites) why: Retaliation for ICA's Attack on 26/11/10 Interesting Fact : Indian government departments and agencies do not follow the procedures set for regular audits of the sites
  • 22.
  • 23. Case 1 Corporate Date : 15/01/12 who: Zappos (Aquired by Amazon since 2008) what: 24m Records Breached Information including names, email addresses, billing and shipping addresses, phone numbers, the last four digits of credit card numbers, and encrypted passwords may have been exposed. how: zero day vulnerability Interesting Fact :
  • 24.
  • 25. Case 2 Corporate Zuckerberg'sFacebook Account Hacked Date : Till Nov 27, 2011 who: Bug in the application how: A subscriber uses the Report/Block link that appears in the bottom right when you roll over a picture to report another subscriber's photo as pornographic. The blocking tool then asks for your help in identifying other photos that should be blocked as part of that account - which is where the bug comes in. Not only were the public photos of that account presented, but private photos as well. Output: Mark Zuckeberg's private photos started to show up across the web
  • 26. Case 3 Corporate Date : 06/06/12 who: Linkedin how: Vulnerable Front end SQL Injection (could have been sqlmap or Havij) Outcome: According to Per Thorsheim, security analyst, A list of 6.5 million passwords appeared on a russian forum. • All hashed using the SHA-1 algorithm. No Salting • Many Password "1234LinkedIn" with SHA-1 Hash is ―abf26a4849e5d97882fcdce5757ae6028281192a.‖ • No Username or Data, but Could be a plan to crowd source hacking effort, because some unique passwords also found.
  • 27.
  • 28. Case 4 Corporate Date : 19/04/2012 (realised 7 days later.) who: Sony Playstation, Playstation portable, &Qriocity(Music Streaming) what: •Supposed hacker chat-logs reveal PSN security lapses • 77m stolen names, addresses, birthdates, PSN passwords and credit card numbers. •55m (PSN, PS3 + playstation Mobile ) and 22m (Qriocity) •all details stolen indicate they were in unencrypted form (against common Industry practice.)
  • 29. Other Hacks When: May 22nd Who: Greece What: Hacked Attack mode: SQL injection, automated
  • 30. Other Hacks Article mentions that when this whole attack on Sony is over it might come to be one of the most secure web presence on the www. When: May 24th 2012 Who: Sony music Japan What: Hacked By: Lulzsec
  • 31. Other Hacks When: June 5th 2011 Who: Sony Music Brazil By: Lulzsec
  • 32. Other Hacks When: June 6th 2012 Who: Sony Europe By: Lebanese Hacker (Idahc) What: Stole 120 usernames, passwords, em ail addresses through Attack mode: SQL injection
  • 33. Other Hacks When: July 5 2011 Who: Sony Music Ireland website By: Hackers
  • 34. Other Hacks When: January 6th 2012 Who: Sony picture website and FB What: page hacked By:
  • 35. Other Hacks When: August 2012 Who: Sony What: hacked again By: SQL Injection Vaccination?
  • 36. Types of Attacks in 2011 When Who By & How Outcome March 17, 2011 Hacked by an Advanced Used SecurId codes Persistent Threat (APT) they stole from the RSA break-in to hack Lockheed Martin June 2, 2011 Through Spear phishing Gmail accounts of used by Chinese Hackers select members of the U.S. Government had been compromised May, 2011 200,000 Customer A/c were Citi ordered new compromised by a cyber- credit cards for attack. Hackers accessed 100,000 customers account holders' absorbing the $2 names, email million cost addresses, and account numbers June 11, 2011 Hackers used a "spear Degree of the phishing" technique compromise was not specified
  • 37. Types of Attacks in 2012 When Who By & How Outcome August, 2012 Hactivist Group Site was unavailable Anonymous Demanding freedom for Wikileaks founder JulianAssange Interpol British Police SOCA July 12, 2012 Group of Hackers used SQL injection retrieved Union based SQL 453,000 user names injection and passwords stored in plaintext September 25, Muslim hackers launched Bank was forced to 2012 a distributed a denial-of- shut down the website service attack against it
  • 38. • Incidents will continue to happen • Regulatory Authority required to Penalize for no compliance