• Tidak ada hasil yang ditemukan

CyberSecurity Malaysia | An Agency Under MOSTI

N/A
N/A
Protected

Academic year: 2017

Membagikan "CyberSecurity Malaysia | An Agency Under MOSTI"

Copied!
23
0
0

Teks penuh

(1)

People First, Performance Now

Ministry od Science, Technology and Innovation

BRIDGING BARRIERS:

LEGAL

AND

TECHNICAL

OF

CYBERCRIME CASES

People First, Performance Now

Ministry od Science, Technology and Innovation

The
Scenes
of
Cyber
Crime


Toralv
Dirro


EMEA
Security
Strategist,
McAfee
Labs


(2)
(3)

People First, Performance Now

Ministry od Science, Technology and Innovation

3

July 5, 2011

3

Cyber Crime Altering Threat Landscape

Malware Growth

(Main Variations)

200,000

400,000

100,000

300,000

500,000

2003

2004

2005

2006

2000

2001

2002

2007

Source: McAfee Labs

Virus and Bots

PUP

Trojan

(4)

4

July 5, 2011

2003

2004

2005

2006

2000

2001

2002

2007

Malware Growth

(Main Variations)

400,000

(5)

People First, Performance Now

Ministry od Science, Technology and Innovation

5

July 5, 2011

5

2008

Virus and Bots

PUP

Trojan

Cyber Crime Altering Threat Landscape

Malware Growth

(Main Variations)

2,400,000

(6)

Key Trend: Malware Growth Continues

The growth in the number of new malware continues unabated. McAfee Labs identifies approximately

55,000 pieces of new malware each day. At its current pace the total number of malware samples in the

McAfee zoo will reach 75 million by the end of 2011.

Total Malware Samples in the Database

10,000,000 

20,000,000 

30,000,000 

40,000,000 

50,000,000 

60,000,000 

70,000,000 

(7)

People First, Performance Now

Ministry od Science, Technology and Innovation

Key Trend: Malware Growth Continues

The growth in the number of new malware continues unabated. McAfee Labs identifies approximately

55,000 pieces of new malware each day. At its current pace the total number of malware samples in the

McAfee zoo will reach 75 million by the end of 2011.

55,000 pieces of new malware each day.

10,000,000 

20,000,000 

30,000,000 

40,000,000 

50,000,000 

60,000,000 

70,000,000 

(8)
(9)

People First, Performance Now

Ministry od Science, Technology and Innovation

(10)

10

Malware / Crimeware

URLZone

The Trojan calls back to its command and control server for specific

instructions on exactly how much to steal from the victim's bank account

without raising any suspicion, and to which money mule account to send

it the money. Then it forges the victim's on-screen bank statements so

the person and bank don't see the unauthorized transaction.

http://vil.nai.com/vil/content/v_237377.htm

(Downloader-BQZ.a)

10

This statement shows a transaction of

53.94 Euros when actually 8,571.31

Euros was removed from the account.

The balance has been changed by the

Trojan.

(

(11)

People First, Performance Now

Ministry od Science, Technology and Innovation

ZeuS - “human” MITM – Step 1

(12)

ZeuS - “human” MITM – Step 2

(13)

People First, Performance Now

Ministry od Science, Technology and Innovation

ZeuS - “human” MITM – Step 3

(14)

ZeuS - “human” MITM – Step 4

(15)

People First, Performance Now

Ministry od Science, Technology and Innovation

ZeuS - “human” MITM – Step 5

(16)

ZeuS - “human” MITM – Step 6

(17)

People First, Performance Now

Ministry od Science, Technology and Innovation

(18)

Key Trend: Android 3

rd

Most Popular Mobile Target

Overall mobile malware activity growth slowed to 5% quarter over quarter, but

there was a marked increase in the activity on the Android platform, which moved

from the #5 most popular target to #3.

The mobile attack strategies are starting to mirror the approaches historically

used to attack PC operating systems. A maliciously altered application obtains

root access and then connects the device to a botnet-like command center,

which issues subsequent instructions to extract data from the device or (over

time) extend the attack to other devices.

Total Mobile Malware Samples

Mobile Malware Targets

-

Symbian OS

(19)

People First, Performance Now

Ministry od Science, Technology and Innovation

Mobile Crimeware

Q1

Geinimi : A new Trojan affecting Android devices has recently emerged in China

Geinimi is the first Android malware in the wild that displays

botnet-like capabilities. Once the malware is installed on a

user s phone, it has the potential to receive commands

from a remote server that allow the owner of that server to

control the phone.

Send location coordinates (fine location)

Send device identifiers (IMEI and IMSI)

Download and prompt the user to install an app

Prompt the user to uninstall an app

Enumerate and send a list of installed apps to the server

Read and collect SMS messages

Send and delete selected SMS messages

Pull all contact information and send it to a remote server

(number, name, the time they were last contacted)

Place a phone call

Silently download files

Launch a web browser with a specific URL

Credit for screenshot:

http://m.hauri.co.kr/info/virus_view.html?

(20)

Mobile Crimeware

Q1

A variant of the ZeuS trojan is targeting the mobile phone based, two-factor

authentication used by Polish ING Bank Slaski

Polish Security Consultant,

Piotr Konieczny reported that

operators of the Zeus botnet

are attempting to reach into the

mobile sphere with two new

variants targeting users on

Window Mobile and Symbian

phones. Zeus in the

Mobile (or Zitmo), are again

attempting to authenticate bank

transactions by intercepting the

mTan authentication code sent

to mobile devices.

An mTAN (mobile Transaction Authentication Number) is used by some online banking

services in Europe to authorize financial transactions by sending an SMS to the

customer s phone. TANs were put in to add an extra layer of security in order to complete

large transactions. It is believed that Zitmo was developed to circumvent this added layer

of security implemented by the banks.

Credit for screenshot:

(21)

People First, Performance Now

Ministry od Science, Technology and Innovation

$70mio International Cybercrime Ring

Busted

October 1st 2010: Operation Trident Breach

Investigations began in May 2009

60 criminals charged, 10 arrested

International Partnership with SBU and other authorities

The Federal Bureau of Investigation, including the New York Money Mule Working Group, the Newark Cyber

Crime Task Force, the Omaha Cyber Crime Task Force, the Netherlands Police Agency, the Security Service of

Ukraine, the SBU, and the United Kingdom s Metropolitan Police Service participated in the operation.

The cyber thieves targeted small- to medium-sized companies,

municipalities, churches, and individuals, infecting their

(22)

Key Trend: Fake Malware Detection Software

Fake anti-virus, also known as bogus or rogue security software, had a very strong quarter and its

growth shows no real signs of slowing. This will remain an actively developing area of malware due to

the amount of money cybercriminals can earn with these fake technologies.

50,000 

100,000 

150,000 

200,000 

250,000 

300,000 

350,000 

400,000 

(23)

People First, Performance Now

Ministry od Science, Technology and Innovation

23

Questions? More Info?

Read the McAfee Labs Security Blog

http://blogs.mcafee.com/mcafee-labs

Listen to the AudioParasitics Podcast

http://www.audioparasitics.com

Read the Monthly Spam Report

http://www.mcafee.com

Read the McAfee Quarterly Threat Report

http://www.mcafee.com

Read the McAfee Security Journal

http://www.mcafee.com

Watch the Stop H*Commerce Series

Referensi

Dokumen terkait

Oleh karena skema kebijakan ini me- manfaatkan dana aPBD, maka proses penentuan alokasinya dilakukan melalui mekanisme penganggaran daerah. Untuk menentukan besarnya

[r]

Dokumen Kualifikasi yang Asli atau yang sudah dilegalisir oleh pihak yang berwenang. sesuai dengan Isian Kualifikasi yang telah disampaikan dan menyerahkan salinan

[r]

memperoleh pendidikan merupakan hak dasar yang harus dipenuhi negara-negara anggota Perserikatan Bangsa-bangsa, jika tidak ingin dianggap sebagai pelanggar HAM. Selain

MENUJU JAMINAN AKSES KESEHATAN UNIVERSAL DI INDONESIA: PERBANDINGAN MODEL DAN KELEMBAGAAN SISTEM JAMINAN KESEHATAN DI DAERAH ... 53 Adenantera Dwicaksono dan

[r]

[r]