SlideShare a Scribd company logo
1 of 32
Download to read offline
Cybercrime :
 a basis for cyberwar ?

                        "Cyberthreats – Cyberwar – Cyberdefence :
                        Pearl Harbor or a Death of thousand cuts ?"

Brussels, 19 November 2012

© Luc Beirens - Federal Computer Crime Unit - Direction economical and financial crime
Presentation

 @LucBeirens
 Chief Commissioner
 Head of the Federal Computer Crime Unit
 Belgian Federal Judicial Police
 Direction Economical and financial crime




                   Chairman of the EU Cybercrime task force
                   representing the organization of heads of
                   national hightech crime units of the EU
War ?

 Vom Krieg - Carl Von Clausewitz 19th C
   War is the continuation of Politik
    by other means => Imposing your will to opponent
 Antoine-Henri Jomini => Occupy his territory

 Art of War - Sun Tzu (500 BC)
     Find weak points
     Be first to occupy terrain
     Use deception & keep secrecy
     Use spies
                                 © Luc Beirens - Belgian Federal Computer Crime Unit
Goal of my presentation

 General trends in our society

 Analysis of “ordinary” cybercrime
   Tools and techniques / infrastructure

 Can these be the “other means” ?

 Do they allow to engage in war
  according Sun Tzu’s art of war ?
                             © Luc Beirens - Belgian Federal Computer Crime Unit
General trends today
 Evolution towards e-society
      replace persons by e-applications
      Interconnecting all systems (admin, industrial, control)
      Mobile systems – Cloud (24/7 connected/big data based on apps)
      Social networks (private data / contact lists / geolocation)

 IP is common platform offered by many ISPs
  integrating telephony / data / VPN & all new apps
  =opportunities / Achilles tendon / scattered traces
 Poor security in legacy applications and protocols
  (userid+pw)=> identity fraud is easy
 Enduser is not yet educated to act properly
                                          © Luc Beirens - Belgian Federal Computer Crime Unit
First conclusions ?

 Society is thus very heavily depending on ICT
 ICT = important vulnerability of our society
 End user = weakest link => biggest danger

 Data is more and more in the cloud
   Accessible from all over the world
   Outside jurisdiction of your country


                                © Luc Beirens - Belgian Federal Computer Crime Unit
Cybercrime today


               © Luc Beirens - Belgian Federal Computer Crime Unit
What do criminals want ?

 Become rich / powerfull
 rapidly, easily, very big ROI
 in an illegal way if needed


 Destabilaze (e-)society
 by causing troubles


                           © Luc Beirens - Belgian Federal Computer Crime Unit
Cybercrime against citizens
 Creation of false internet profiles
 Hacking / abuse of internet accounts

 Payment card fraud (credit/debit/fuel)
   Shouldersurfing / skimming / hacking DB

 eBanking fraud

 Extortion with data / pictures / videos
                             © Luc Beirens - Belgian Federal Computer Crime Unit
Cybercrime against
 organizations
 Defacement of websites
 Hacking of internet servers & extortion
 Divulging of confidential/personal data

 Long duration state/economical espionage

 Bring down of websites / internet nodes
 Abuse of process control systems SCADA
                         © Luc Beirens - Belgian Federal Computer Crime Unit
Cybercrime threats © Belgian Federal Computer Crime Unit
                                                © Luc Beirens - Belgian Federal Computer Crime Unit
Threats against infrastructure

 ePaymentsystems
   2010 Wikileaks case : “Anonymous”
    attack on VISA, Paypal, Mastercard,...


 DNS – system (hinders routing)
 Certification authorities (Diginotar)
 Datacenters (blocks all servers in it)

                             © Luc Beirens - Belgian Federal Computer Crime Unit
© Luc Beirens - Belgian Federal Computer Crime Unit
Risks of cybercrime

 Economical disaster
   Large scale : critical infrastructure
   Small scale : enterprise

 Individual & corporate (secret) data

 Loss of trust in e-society

 Preparing infrastructure for cyberwar ?
                               © Luc Beirens - Belgian Federal Computer Crime Unit
How to combat
cyber criminals ?
Analyse their methods and tools




                         © Luc Beirens - Belgian Federal Computer Crime Unit
Cyber criminal’s toolbox
 MALWARE => trojan horses
   distribution via mail, p2p, social networks, websites
   auto-update & auto-propagation in network
   very high rate of new versions

 remote control of infected systems
  => BOTNETS

 creation of knowledge databases
   collected & keylogged info of infected pc
 keyservers in safe haven countries
                                  © Luc Beirens - Belgian Federal Computer Crime Unit
Webserver / node

                                                      Computer
                                                       Crash
       Hacker

                                     Internet

      Info                            Access line
Cmd
                                      blocked


                  My IP is x.y.z.z

 Command &        Botnet attack on a webserver / node
 Control Server                       © Luc Beirens - Belgian Federal Computer Crime Unit
Interesting DDOS


   2004 UK : gambling website down (+ hoster + ISP)
   2005 Netherlands : 2 botnets : millions of zombies
   2005 Belgium : Commercial firm during social conflict
   2006 Sweden : Gov websites after police raid on P2P
   2007 Estonia : political inspired widespread DDOS attack
   2008 Georgia : cyber war during military conflict
   2010 Worldwide : Wikileaks cyberconflict
   2011 – 2012 : Anonymous attacks on Gov sites
                                       © Luc Beirens - Belgian Federal Computer Crime Unit
What are botnets used for ?
Getting data & making money !
 Sometimes still for fun (scriptkiddies)

   Spam distribution via Zombie
   Click generation on banner publicity
   Dialer installation on zombie to make premium rate calls
   Spyware / malware / ransomware installation

 Espionage : banking details / passwords / keylogging
 Transactions via zombie PC

 Capacity for distributed denial of service attacks DDOS
  => disturb functioning of internet device (server/router)
                                     © Luc Beirens - Belgian Federal Computer Crime Unit
Webserver / node




      Hacker         Knowledge server


                                            Internet


                       trigger
                       event

                                           MW update

                                        Very frequent MW
                                        update request

                                                Malware update server

Command &        Malware update / knowledge transfer
Control Server                                © Luc Beirens - Belgian Federal Computer Crime Unit
Large firm hacking
using internal botnet   Internet




                                                                          Hacker



 Company
 network



                                   © Luc Beirens - Belgian Federal Computer Crime Unit
Hacking of
large institutions / firms
   Focussed infection of workstations
   Take-over of company servers
   Keylogging / screenshots
   Encrypted files on PC
   Internal botnet in company network
   Long time unaware of hacking
   Intermediate step to other networks
   Often no complaint
                           © Luc Beirens - Belgian Federal Computer Crime Unit
Latest malware developments

  Stuxnet : very complex and elaborated trojan

  Duqu based upon Stuxnet : spying purposes

  But also less known malware versions
   => extortion
    Activation of webcam / microphone



                                  © Luc Beirens - Belgian Federal Computer Crime Unit
New evolutions

 Political motivated attacks (hacktivism)

 Apple no longer out of range of malware

 Mobile devices & smartphone - botnets

 P2P botnets : no longer C&C

                           © Luc Beirens - Belgian Federal Computer Crime Unit
But the criminal cyber architecture
also includes ...

 Underground fora and chatrooms
     Botnets for hire
     Malware on demand / off the shelf packages
     Trade stolen Credit cards / credentials
     Money laundering services

 Organized Cyber criminals
   take over / set up ISP’s
   infiltrate in development firms
                              © Luc Beirens - Belgian Federal Computer Crime Unit
If technical security is ok ...

 They are informed of webactivity over the botnet
 They know you ! (knowledge base & social networks)

 They will switch to social engineering
  They will make you believe they are someone else
  to make you do something they want / need

 Abusing expected “normal user behaviour”
    Fear of / willingness to help / coope with hierarchy
     security services / helpdesk / vendors / (business) partners
    Love for (new) friends
    Greed
                                           © Luc Beirens - Belgian Federal Computer Crime Unit
Causes of success of
cybercriminals
   Unawareness of users / firms / authorities
   Bad protection technical & organizational
   Outdated ID techniques (username+pw)
   Not detected (no detection systems)
   Not reported (even if detected)
   If reported : Minimize incident & bad coop
   Difference in goals of incident handling
   International aspect hinders investigations
                            © Luc Beirens - Belgian Federal Computer Crime Unit
Involvement of States ?

 No immediate evidence of State’s involvement
  organized crime / commercial entities ?

 Generalized analysis of different cases
      Bots are scattered all over the world
      eBanking fraud : links to Eastern Europe and beyond
      Espionage : links to China
      Internet fraud : links to West-Africa

 International cooperation difficult
  but sometimes OK                 © Luc Beirens - Belgian Federal Computer Crime Unit
Police action ?

 Internationally : cybercrime
   EU Ministers JHA Empact strategy
   EC EEAS cyber strategy
   European Cybercrime Centre C3 => Europol

 National security plan =>police - justice

 Lacking : integrated approach
   LEA – other parties (operators/Cert/private)
                             © Luc Beirens - Belgian Federal Computer Crime Unit
Conclusion to cyberwar ?


    Criminal ICT infrastructure is in place : they
    => already occupy the terrain
    => stay often secretly => spying
    => control important cyber infrastructure
    => have striking power within attacked area



                               © Luc Beirens - Belgian Federal Computer Crime Unit

    So YES
    the tools and cyber infrastructure
    used by cybercriminals

    are ideal tools for conducting cyber war

    and the already criminally occupied territory
    could be recuperated for political goals

                               © Luc Beirens - Belgian Federal Computer Crime Unit
Contact information
Federal Judicial Police
Direction for Economical and Financial crime
Federal Computer Crime Unit
Notelaarstraat 211 - 1000 Brussels – Belgium


Tel office      : +32 2 743 74 74
Fax             : +32 2 743 74 19

E-mail          : luc.beirens@fccu.be
Twitter         : @LucBeirens

                                          © Luc Beirens - Belgian Federal Computer Crime Unit

More Related Content

What's hot

International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...USAID CEED II Project Moldova
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)GrittyCC
 
National framework for digital forensics bangladesh context
National framework for digital forensics   bangladesh context National framework for digital forensics   bangladesh context
National framework for digital forensics bangladesh context Bank Alfalah Limited
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekarPravinGhosekar
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeVishni Ganepola
 
20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threatLuc Beirens
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
An Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAn Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAnuj Khandelwal
 
An introduction to cyber law
An introduction to cyber lawAn introduction to cyber law
An introduction to cyber lawshreya sanghvi
 
20120329 Cybercrime threats on e-world
20120329 Cybercrime threats on e-world20120329 Cybercrime threats on e-world
20120329 Cybercrime threats on e-worldLuc Beirens
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesVishni Ganepola
 
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012armaexen
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Don zaal a 11.15 11.45 fccu
Don zaal a 11.15 11.45 fccuDon zaal a 11.15 11.45 fccu
Don zaal a 11.15 11.45 fccuwebwinkelvakdag
 

What's hot (20)

International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)
 
National framework for digital forensics bangladesh context
National framework for digital forensics   bangladesh context National framework for digital forensics   bangladesh context
National framework for digital forensics bangladesh context
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
 
20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
cybercrime landscape for moldova
cybercrime landscape for moldovacybercrime landscape for moldova
cybercrime landscape for moldova
 
An Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAn Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a Newbie
 
An introduction to cyber law
An introduction to cyber lawAn introduction to cyber law
An introduction to cyber law
 
20120329 Cybercrime threats on e-world
20120329 Cybercrime threats on e-world20120329 Cybercrime threats on e-world
20120329 Cybercrime threats on e-world
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber Crimes
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Don zaal a 11.15 11.45 fccu
Don zaal a 11.15 11.45 fccuDon zaal a 11.15 11.45 fccu
Don zaal a 11.15 11.45 fccu
 

Similar to 20121119 Cybercrime : a basis for cyberwar ?

20130321 Cybercrime threats on e-commerce online shops
20130321 Cybercrime threats on e-commerce online shops20130321 Cybercrime threats on e-commerce online shops
20130321 Cybercrime threats on e-commerce online shopsLuc Beirens
 
20120613 e-banking fraud situation - BE law enforcement reaction
20120613 e-banking fraud situation - BE law enforcement reaction20120613 e-banking fraud situation - BE law enforcement reaction
20120613 e-banking fraud situation - BE law enforcement reactionLuc Beirens
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing BotBellaj Badr
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptxsakshiyad2611
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxprtabal_25
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessImran Khan
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd Iaetsd
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptJatinRajput67
 
1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdfTouhemiJamel
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 

Similar to 20121119 Cybercrime : a basis for cyberwar ? (20)

20130321 Cybercrime threats on e-commerce online shops
20130321 Cybercrime threats on e-commerce online shops20130321 Cybercrime threats on e-commerce online shops
20130321 Cybercrime threats on e-commerce online shops
 
20120613 e-banking fraud situation - BE law enforcement reaction
20120613 e-banking fraud situation - BE law enforcement reaction20120613 e-banking fraud situation - BE law enforcement reaction
20120613 e-banking fraud situation - BE law enforcement reaction
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Why there will be a Cyber-9/11. Soon (Cyber security, cybercrime, terrorism)
Why there will be a Cyber-9/11. Soon (Cyber security, cybercrime, terrorism)Why there will be a Cyber-9/11. Soon (Cyber security, cybercrime, terrorism)
Why there will be a Cyber-9/11. Soon (Cyber security, cybercrime, terrorism)
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awareness
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeand
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
 
1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Botnet
BotnetBotnet
Botnet
 

Recently uploaded

College Call Girls Kolhapur Aanya 8617697112 Independent Escort Service Kolhapur
College Call Girls Kolhapur Aanya 8617697112 Independent Escort Service KolhapurCollege Call Girls Kolhapur Aanya 8617697112 Independent Escort Service Kolhapur
College Call Girls Kolhapur Aanya 8617697112 Independent Escort Service KolhapurCall girls in Ahmedabad High profile
 
25042024_First India Newspaper Jaipur.pdf
25042024_First India Newspaper Jaipur.pdf25042024_First India Newspaper Jaipur.pdf
25042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxKAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxjohnandrewcarlos
 
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...Axel Bruns
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoSABC News
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012ankitnayak356677
 
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Krish109503
 
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docxkfjstone13
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...Ismail Fahmi
 
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct CommiteemenRoberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemenkfjstone13
 
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docxkfjstone13
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkbhavenpr
 
Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Ismail Fahmi
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...AlexisTorres963861
 
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxLorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxlorenzodemidio01
 
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Pooja Nehwal
 
Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxMinto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxAwaiskhalid96
 
26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfLorenzo Lemes
 
Vashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call GirlsVashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call GirlsPooja Nehwal
 

Recently uploaded (20)

College Call Girls Kolhapur Aanya 8617697112 Independent Escort Service Kolhapur
College Call Girls Kolhapur Aanya 8617697112 Independent Escort Service KolhapurCollege Call Girls Kolhapur Aanya 8617697112 Independent Escort Service Kolhapur
College Call Girls Kolhapur Aanya 8617697112 Independent Escort Service Kolhapur
 
25042024_First India Newspaper Jaipur.pdf
25042024_First India Newspaper Jaipur.pdf25042024_First India Newspaper Jaipur.pdf
25042024_First India Newspaper Jaipur.pdf
 
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxKAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
 
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election Manifesto
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012
 
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!
 
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
 
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct CommiteemenRoberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
 
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpk
 
Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
 
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxLorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
 
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
 
Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxMinto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptx
 
26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdf
 
Vashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call GirlsVashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call Girls
 

20121119 Cybercrime : a basis for cyberwar ?

  • 1. Cybercrime : a basis for cyberwar ? "Cyberthreats – Cyberwar – Cyberdefence : Pearl Harbor or a Death of thousand cuts ?" Brussels, 19 November 2012 © Luc Beirens - Federal Computer Crime Unit - Direction economical and financial crime
  • 2. Presentation  @LucBeirens Chief Commissioner Head of the Federal Computer Crime Unit Belgian Federal Judicial Police Direction Economical and financial crime Chairman of the EU Cybercrime task force representing the organization of heads of national hightech crime units of the EU
  • 3. War ?  Vom Krieg - Carl Von Clausewitz 19th C  War is the continuation of Politik by other means => Imposing your will to opponent  Antoine-Henri Jomini => Occupy his territory  Art of War - Sun Tzu (500 BC)  Find weak points  Be first to occupy terrain  Use deception & keep secrecy  Use spies © Luc Beirens - Belgian Federal Computer Crime Unit
  • 4. Goal of my presentation  General trends in our society  Analysis of “ordinary” cybercrime  Tools and techniques / infrastructure  Can these be the “other means” ?  Do they allow to engage in war according Sun Tzu’s art of war ? © Luc Beirens - Belgian Federal Computer Crime Unit
  • 5. General trends today  Evolution towards e-society  replace persons by e-applications  Interconnecting all systems (admin, industrial, control)  Mobile systems – Cloud (24/7 connected/big data based on apps)  Social networks (private data / contact lists / geolocation)  IP is common platform offered by many ISPs integrating telephony / data / VPN & all new apps =opportunities / Achilles tendon / scattered traces  Poor security in legacy applications and protocols (userid+pw)=> identity fraud is easy  Enduser is not yet educated to act properly © Luc Beirens - Belgian Federal Computer Crime Unit
  • 6. First conclusions ?  Society is thus very heavily depending on ICT  ICT = important vulnerability of our society  End user = weakest link => biggest danger  Data is more and more in the cloud  Accessible from all over the world  Outside jurisdiction of your country © Luc Beirens - Belgian Federal Computer Crime Unit
  • 7. Cybercrime today © Luc Beirens - Belgian Federal Computer Crime Unit
  • 8. What do criminals want ?  Become rich / powerfull rapidly, easily, very big ROI in an illegal way if needed  Destabilaze (e-)society by causing troubles © Luc Beirens - Belgian Federal Computer Crime Unit
  • 9. Cybercrime against citizens  Creation of false internet profiles  Hacking / abuse of internet accounts  Payment card fraud (credit/debit/fuel)  Shouldersurfing / skimming / hacking DB  eBanking fraud  Extortion with data / pictures / videos © Luc Beirens - Belgian Federal Computer Crime Unit
  • 10. Cybercrime against organizations  Defacement of websites  Hacking of internet servers & extortion  Divulging of confidential/personal data  Long duration state/economical espionage  Bring down of websites / internet nodes  Abuse of process control systems SCADA © Luc Beirens - Belgian Federal Computer Crime Unit
  • 11. Cybercrime threats © Belgian Federal Computer Crime Unit © Luc Beirens - Belgian Federal Computer Crime Unit
  • 12. Threats against infrastructure  ePaymentsystems  2010 Wikileaks case : “Anonymous” attack on VISA, Paypal, Mastercard,...  DNS – system (hinders routing)  Certification authorities (Diginotar)  Datacenters (blocks all servers in it) © Luc Beirens - Belgian Federal Computer Crime Unit
  • 13. © Luc Beirens - Belgian Federal Computer Crime Unit
  • 14. Risks of cybercrime  Economical disaster  Large scale : critical infrastructure  Small scale : enterprise  Individual & corporate (secret) data  Loss of trust in e-society  Preparing infrastructure for cyberwar ? © Luc Beirens - Belgian Federal Computer Crime Unit
  • 15. How to combat cyber criminals ? Analyse their methods and tools © Luc Beirens - Belgian Federal Computer Crime Unit
  • 16. Cyber criminal’s toolbox  MALWARE => trojan horses  distribution via mail, p2p, social networks, websites  auto-update & auto-propagation in network  very high rate of new versions  remote control of infected systems => BOTNETS  creation of knowledge databases  collected & keylogged info of infected pc  keyservers in safe haven countries © Luc Beirens - Belgian Federal Computer Crime Unit
  • 17. Webserver / node Computer Crash Hacker Internet Info Access line Cmd blocked My IP is x.y.z.z Command & Botnet attack on a webserver / node Control Server © Luc Beirens - Belgian Federal Computer Crime Unit
  • 18. Interesting DDOS  2004 UK : gambling website down (+ hoster + ISP)  2005 Netherlands : 2 botnets : millions of zombies  2005 Belgium : Commercial firm during social conflict  2006 Sweden : Gov websites after police raid on P2P  2007 Estonia : political inspired widespread DDOS attack  2008 Georgia : cyber war during military conflict  2010 Worldwide : Wikileaks cyberconflict  2011 – 2012 : Anonymous attacks on Gov sites © Luc Beirens - Belgian Federal Computer Crime Unit
  • 19. What are botnets used for ? Getting data & making money !  Sometimes still for fun (scriptkiddies)  Spam distribution via Zombie  Click generation on banner publicity  Dialer installation on zombie to make premium rate calls  Spyware / malware / ransomware installation  Espionage : banking details / passwords / keylogging  Transactions via zombie PC  Capacity for distributed denial of service attacks DDOS => disturb functioning of internet device (server/router) © Luc Beirens - Belgian Federal Computer Crime Unit
  • 20. Webserver / node Hacker Knowledge server Internet trigger event MW update Very frequent MW update request Malware update server Command & Malware update / knowledge transfer Control Server © Luc Beirens - Belgian Federal Computer Crime Unit
  • 21. Large firm hacking using internal botnet Internet Hacker Company network © Luc Beirens - Belgian Federal Computer Crime Unit
  • 22. Hacking of large institutions / firms  Focussed infection of workstations  Take-over of company servers  Keylogging / screenshots  Encrypted files on PC  Internal botnet in company network  Long time unaware of hacking  Intermediate step to other networks  Often no complaint © Luc Beirens - Belgian Federal Computer Crime Unit
  • 23. Latest malware developments  Stuxnet : very complex and elaborated trojan  Duqu based upon Stuxnet : spying purposes  But also less known malware versions => extortion  Activation of webcam / microphone © Luc Beirens - Belgian Federal Computer Crime Unit
  • 24. New evolutions  Political motivated attacks (hacktivism)  Apple no longer out of range of malware  Mobile devices & smartphone - botnets  P2P botnets : no longer C&C © Luc Beirens - Belgian Federal Computer Crime Unit
  • 25. But the criminal cyber architecture also includes ...  Underground fora and chatrooms  Botnets for hire  Malware on demand / off the shelf packages  Trade stolen Credit cards / credentials  Money laundering services  Organized Cyber criminals  take over / set up ISP’s  infiltrate in development firms © Luc Beirens - Belgian Federal Computer Crime Unit
  • 26. If technical security is ok ...  They are informed of webactivity over the botnet  They know you ! (knowledge base & social networks)  They will switch to social engineering They will make you believe they are someone else to make you do something they want / need  Abusing expected “normal user behaviour”  Fear of / willingness to help / coope with hierarchy security services / helpdesk / vendors / (business) partners  Love for (new) friends  Greed © Luc Beirens - Belgian Federal Computer Crime Unit
  • 27. Causes of success of cybercriminals  Unawareness of users / firms / authorities  Bad protection technical & organizational  Outdated ID techniques (username+pw)  Not detected (no detection systems)  Not reported (even if detected)  If reported : Minimize incident & bad coop  Difference in goals of incident handling  International aspect hinders investigations © Luc Beirens - Belgian Federal Computer Crime Unit
  • 28. Involvement of States ?  No immediate evidence of State’s involvement organized crime / commercial entities ?  Generalized analysis of different cases  Bots are scattered all over the world  eBanking fraud : links to Eastern Europe and beyond  Espionage : links to China  Internet fraud : links to West-Africa  International cooperation difficult but sometimes OK © Luc Beirens - Belgian Federal Computer Crime Unit
  • 29. Police action ?  Internationally : cybercrime  EU Ministers JHA Empact strategy  EC EEAS cyber strategy  European Cybercrime Centre C3 => Europol  National security plan =>police - justice  Lacking : integrated approach  LEA – other parties (operators/Cert/private) © Luc Beirens - Belgian Federal Computer Crime Unit
  • 30. Conclusion to cyberwar ?  Criminal ICT infrastructure is in place : they => already occupy the terrain => stay often secretly => spying => control important cyber infrastructure => have striking power within attacked area © Luc Beirens - Belgian Federal Computer Crime Unit
  • 31. So YES the tools and cyber infrastructure used by cybercriminals are ideal tools for conducting cyber war and the already criminally occupied territory could be recuperated for political goals © Luc Beirens - Belgian Federal Computer Crime Unit
  • 32. Contact information Federal Judicial Police Direction for Economical and Financial crime Federal Computer Crime Unit Notelaarstraat 211 - 1000 Brussels – Belgium Tel office : +32 2 743 74 74 Fax : +32 2 743 74 19 E-mail : luc.beirens@fccu.be Twitter : @LucBeirens © Luc Beirens - Belgian Federal Computer Crime Unit