Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cynet

50 views

Published on

Cyber Security

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Cynet

  1. 1. THE EVOLUTION OF CYBERCRIME- WHAT’S NEXT? 11.06.2017 Presented by: Michael
  2. 2. 1 Cynet: Advanced Threat Detection & Response Platform ABOUT US Company Founded 2015 Number of Customers Over 70 Renewal Rate 95% Founder Seed $1M Round A Lazarus Group $7M
  3. 3. 2 Cynet: Advanced Threat Detection & Response Platform WORLD CLASS SECURITY 2017 Cybersecurity Startup of the Year Top Cyber Security Leaders of 2016 Top 10 Innovative Security Startups Top 10 Cybersecurity Startups to Watch In 2016 Recognized in Market Guides for: • Endpoint Detection & Response Solutions • User and Entity Behavior Analytics • Best Practices for Detecting and Mitigating APTs Israel’s largest provider of Cyber Security Services. Founded in 2005
  4. 4. 3 Cynet: Advanced Threat Detection & Response Platform Cybercrime is growing much, much faster than I think we anticipated Source: Julian King Oct. 9, 2017 European Union Commissionaire
  5. 5. 4 Cynet: Advanced Threat Detection & Response Platform THE NUMBERS What will be the costs of Cyber crime damage by 2021? What is the Global ransomware damage costs are predicted in 2017? How many unfilled cybersecurity jobs are predicted to reach by 2021? $5B $6T 3.5M
  6. 6. 5 Cynet: Advanced Threat Detection & Response Platform MOTIVATIONS BEHIND ATTACKS - 2017 Cyber Crime Cyber Espionage Cyber Werfare Hacktivism 77.78% 5.56% 6.67% 10.00%
  7. 7. 6 Cynet: Advanced Threat Detection & Response Platform The Evolution Of Cybercrime 1997 2004 2007 2010 2013 Today Malicious code, Trojans, Advanced worms Identity theft, Phishing DNS attacks, Rise of Botnets, Sql attacks, Anti Spam sites, Competitive sabotage escalation Social engineering, DoS, BotNets, Malicious Email, Ransomware attack, PoS comprised Banking Malware, Key logger, Bitcoin Wallet Stealer, Identity theft, Phone hijacking, Ransomware, PoS attack, Cyber Warfare, Android hack etc. Cyber crime and viruses initiated, Morris Worm and others
  8. 8. 7 Cynet: Advanced Threat Detection & Response Platform So What’s next?
  9. 9. 8 Cynet: Advanced Threat Detection & Response Platform ATTACKER MINDSET BEHIND TARGETED ATTACK • What is my target? • Who is the key person? • When can I get in? • How to stay under the radar? • How long will it take: -To penetrate -To achieve my goal
  10. 10. 9 Cynet: Advanced Threat Detection & Response Platform FILELESS ATTACK FLOW Target’s servers are hacked using a known exploit for an unpatched vulnerability Attackers combine & adapt well-known tools – Meterpreter, PowerShell scripts – to infect computer Code hides in the memory – Windows registry. No malware files on hard drive. ‘Invisible’ to security whitelists. Gathers info – e.g. passwords of system administrators Lack of malware artefacts makes detection and investigation difficult Use standard utilities (NETSH) for tunnel to C2 server – providing attackers with remote access Nearly all traces disappear on reboot 1 2 3 4 5 6
  11. 11. Copyright © 2017 Cynet US Office: 17 State Street, Suite 4000 New York NY 10004, USA T: (212) 634 9358 E: info @ cynet.com Israel R&D Center: 11 Moshe Levi Street, UMI Building Rishon Lezion 75070, Israel T: (972) 3 962 2655 E: info @ cynet.com www.cynet.com THANK YOU! Name@cynet.com

×