Here is an example of our approach in action. This is the Koobface attack, which is still active in the wild.Starts as a link to a non-existent video on a malicious site sent via IM, email, or webmail. The first layer of protection is web filtering to block access to the site. If the user clicks on the link, he would receive a phony alert telling him his player is not working, and to download a non-existent new version on a malicious site. By clicking on the “OK” button on the phony Error message, the user is actually instructing his system to install the virus. Antivirus protection would detect the file that the user is trying to install, and block itOnce installed, the worm would try to propagate. The IPS technology would detect the propagation effort, and block it before it could succeed.
Cyber crime trends in 2013
LHSSS-4 Cyber Crime Trends in 2013 Harsh Jangra Director – Technical Operations (Security) www.LearnHackingSecurity.com
About Myself Harsh Jangra IMS Tech Manager Director – Technical Operations (Security) MCSE (Microsoft Certified Solutions Expert), MCT, MCITP-Ent Administrator, MVP, CCNA,CCNA-Security CCNP, JN-CIS etc.. Speaker – TechDays, Microsoft Virtual Academy, Microsoft FLC Email : Harsh . Jangra@eCoreTechnoS.com
What is Cyber Terrorism?• Online Scams • Identity Theft » Auctions : Selling and buying » Social Engineering goods online has become popular • Forgery » Security flaws• Fraud » Credit-Cards • Scams and Biometrics » ATM’s and » Crime Fighting and Privacy Telecommunications• Embezzlement and Sabotage » Insider Attacks
This is an International Problem.. • International Trends in Cyber Crime » Backdrop • Insecure Web Infrastructure, Constantly evolving Technology • Cloud Computing, System Virtualization • Cyber Threats » Malware, Intrusions, SPAM, Financial fraud » Child exploitation • Social Websites, Trojans Attacks, Access Computer resources
Integrated Threat Protection in ActionProblem: Error message: “Drops” copy of itself on “Innocent” Video Link: system and attempts to Redirects to malicious Website propagate “Out of date” Flash player error: “Download” malware fileSolution: Integrated Web Filtering Blocks access to malicious Website Network Antivirus Blocks download of virus Intrusion Protection Blocks the spread of the worm
Integrated Threat Protection in Action • Application Control: Unwanted Services and P2P Limiting Botnet command channel, compromised Facebook applications, independent of port or protocol • Intrusion Prevention: Vulnerabilities and Exploits Browser and website attack code crafted by hackers and criminal gangs. • Web Filtering: Multiple categories and Malicious sites Botnet command, phishing, search poisoning, inappropriate content • Vulnerability Management: Real time exploit updates Multiple scanning points Firewall Gate, Analyzer, Web, DB, and Scan • Antispam: Unsolicited messages Phishing, Malware, Social Engineering and Junk • Antivirus: All malicious code Documents, macros, scripts, executable Delivered via Web, Email, USB, Instant messaging, social networks, etc.
LHS Connections and Updates #harsh_ jangra #HackingTechnoS Get Latest Facebook Hacking & Security Updates Security Updates Connect with us Subscribed on Facebook.com/HackingTechn Hands-On Labs LHS/ePaper ologies