SlideShare a Scribd company logo
CYBER - RAKSHA

ONLINE SAFETY IN DIGITAL INDIA
A HACKDOOR INITIATIVE


HTTPS://WWW.FACEBOOK.COM/CYBER.RAKSHA/ 

By
VANSHIT MALHOTRA
@vanshitmalhotra
DISCLAIMER
The slides and Seminar are purely for educational
and awareness purposes. The author is not
responsible if any of the techniques shown during the
seminar are misused to cause any damage to
anyone. You and only you are responsible if these
techniques/knowledge are used for illegal purposes.
2
WHO-AM-I
Vanshit Malhotra
Certified Ethical Hacker C|EH , C|HFI
Cyber Security Expert
Ethical Hacker and Cyber Security Researcher
Speaker at International Security Conferences
Previously worked as a Security Consultant for Government of India [UIDAI]
Cyber Crime Prevention and Investigation Consultant
sec.maniac@yahoo.com vanshitm
@vanshitmalhotra vanshitmalhotra
3
CHAT WITH ME !
• Cyber Crime by QR Code jacking !
• Quick Demo !
• Don't scan the unknown QR !
4
CYBER CRIME
PAST - PRESENT
State Sponsored HacksScript Kiddie
V/s
5
U THINK U PROTECTED ?
• Remote Exploit - Eternal Blue
• Quick Demo !
• NSA Exploit Leaked by Shadow Brokers !
• Video Link : https://www.youtube.com/watch?
v=KdjRtqSJee8&t=23s
6
STATE SPONSORED HACKS
• Governments Hacking Governments !
• Cyber Criminals hired by Governments
• More time is spent on Research than attack !
• Very Difficult toTrace !
• Deep Web is used -
7
DEEP WEB
• Google Shows only 0.04% of Internet !
• Deep Web - Hidden Web
• NotVisible in Google Searches
• Transactions are generally in BitCoins - Untraceable.
• Sometimes special software needed to connect to Deep
Web -TOR
8
ORGANISED CYBER CRIME
• Cyber Criminals use deep Web to provide
services : Drugs,Weapons,Assassins , Human
Trafficking !
• Even Report Abuse option to block bad
Drugs :p !!!
9
Silk Road - Market Place on Dark Web
10
CYBER ESPIONAGE
• A new way of Shutting Down Rival Business !
• If Website is down - Customer Cant order !
11
EQUIFAX HACK
• Keeps Financial Records for almost every American Citizen , 145 million !
• Apache Struts, and CVE-2017-5638 vulnerability
• Data included but not Limited to : Social Security Numbers, Date of Birth,
Drivers License,A/c Info
• Your Account Can be Accessed and New ones opened !
• Equifax hackers stole 200k credit card accounts in one fell swoop
• This information is available on Dark Web for SALE !
12
E-COMMERCE !
• Money is now Online : Paytm, Uber, BigBasket,
Amazon !
• E-Commerce is HOT target due to financial data
presence.
• Card Data Sold on Dark Web !
13
CYBER CRIME IN INDIA
• Cyber Crime is Everywhere
• Every 10 minutes Cyber crime is happening in
India
National Crime Record Bureau of India
• Maximum Cyber Criminals are young
14
CYBER CRIME IN INDIA
Misuse of
Social Media
Banking Frauds and
Financial Frauds
15
INFAMOUS SOCIAL MEDIA
CRIMES
• Blue Whale , Momo Challenge
• People create impressions due to viral social media
posts.
• Privacy Breach due to sharing of content on Social
Media.
• If it is free, its probably jacked !
16
INFAMOUS BANKING CYBER
CRIMES
• Calling from the Bank - Phone Call Frauds
• Card Frauds
• Rural Areas -Victim to OTP frauds to verify
Aadhar
17
TRANSFORMING
DIGITAL INDIA
TO
SECURE DIGITAL INDIA
• Secure Frameworks for Developers and Programers
• Report Cyber Crimes to Law Enforcement Authorities.
(Even a stolen smartphone)
• Update all software and Firmware.
• Law Enforcement and Judiciaries need to be empowered.
18
CYBER SECURITY FOR
CORPORATES
• People ~> Progress ~>Technology
• Buy and Implement SecureTechnology
• Train Employees on Cyber Security - Don’t Spend all money on
SecureTechnology, train employees on Cyber Security.
• Corporates must have a dedicated budget for Cyber Security
• Use Secure Development frameworks for developing applications
• Understand how your application can be attacked.
19
FINAL NOTES
• India is not a Country Run By the Rules ! Be Cyber Aware !
• Basic Cyber Security Awareness needed for every Indian Citizen. Only
then we can transform Digital India into Secure Digital India.
• We can Patch theTechnology but there is no “Patch for Human
Stupidity” !
• Virtual World is not a game, its a life !
• Our Aim is to Build a Culture of Cyber Safety education specially in
Colleges, Schools, Rural Areas and Corporates.
20
CYBER RAKSHA
HACKDOOR INITIATIVE
VANSHIT MALHOTRA
21

More Related Content

What's hot

I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark Web
John Liu
 
Cyber security
Cyber securityCyber security
Cyber security
PawanKalyanAmbati
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
Goutama Bachtiar
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
Arjun Chetry
 
Utilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and InvestigationUtilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and Investigation
Goutama Bachtiar
 
Hacking 2018
Hacking 2018Hacking 2018
Hacking 2018
JosephSuresh6
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Akshay Kale
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
Arjun Chetry
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Pushkar Pashupat
 
Phishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | IntellipaatPhishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Intellipaat
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
little robie
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Sumit Dutta
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Goutham Shetty
 
General Aware Ness On Cyber Security & Ethical
General Aware Ness On Cyber Security & EthicalGeneral Aware Ness On Cyber Security & Ethical
General Aware Ness On Cyber Security & Ethical
diwakar sharma
 
Cyber Fraud and Risk Management By Bolaji Bankole
Cyber Fraud and Risk Management  By Bolaji BankoleCyber Fraud and Risk Management  By Bolaji Bankole
Cyber Fraud and Risk Management By Bolaji Bankole
Bolaji James Bankole CCSS,CEH,MCSA,MCSE,MCP,CCNA,
 
Prakash Padariya - IoT Cyber Warfare
Prakash Padariya - IoT Cyber WarfarePrakash Padariya - IoT Cyber Warfare
Prakash Padariya - IoT Cyber Warfare
PrakashPadariya1
 
cyber crime
 cyber crime cyber crime
cyber crime
sonalpandey11
 
IT Risk Management In The Age of Wikileaks
IT Risk Management In The Age of WikileaksIT Risk Management In The Age of Wikileaks
IT Risk Management In The Age of Wikileaks
Anderson Ruysam, BBA (IS) CISSP, CRISC, DevSecOps
 

What's hot (20)

I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark Web
 
Cyber security
Cyber securityCyber security
Cyber security
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
 
Utilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and InvestigationUtilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and Investigation
 
Hacking 2018
Hacking 2018Hacking 2018
Hacking 2018
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Phishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | IntellipaatPhishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
General Aware Ness On Cyber Security & Ethical
General Aware Ness On Cyber Security & EthicalGeneral Aware Ness On Cyber Security & Ethical
General Aware Ness On Cyber Security & Ethical
 
Cyber Fraud and Risk Management By Bolaji Bankole
Cyber Fraud and Risk Management  By Bolaji BankoleCyber Fraud and Risk Management  By Bolaji Bankole
Cyber Fraud and Risk Management By Bolaji Bankole
 
Prakash Padariya - IoT Cyber Warfare
Prakash Padariya - IoT Cyber WarfarePrakash Padariya - IoT Cyber Warfare
Prakash Padariya - IoT Cyber Warfare
 
cyber crime
 cyber crime cyber crime
cyber crime
 
IT Risk Management In The Age of Wikileaks
IT Risk Management In The Age of WikileaksIT Risk Management In The Age of Wikileaks
IT Risk Management In The Age of Wikileaks
 

Similar to Cyber Raksha - by Vanshit Malhotra

Cyber security (2) (2)
Cyber security (2) (2)Cyber security (2) (2)
Cyber security (2) (2)
ameyjakate
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
Andreaa Viv
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
Journalist Ish
 
Cybercrime
CybercrimeCybercrime
Cybercrime
SERCOD
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
Roshan Mastana
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
Dr. Amitabha Yadav
 
Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function
Parag Deodhar
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
SABBY GILL
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
Syed Rizwan Ali
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
Sazed Salman
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
awareness.pdf
awareness.pdfawareness.pdf
awareness.pdf
jolag93795
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
PREMTRIVEDI5
 
Cyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxCyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptx
javed75
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
MalikMumtaz6
 
Cyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdfCyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdf
BalaMurali958529
 
cybersec-01.pptx
cybersec-01.pptxcybersec-01.pptx
cybersec-01.pptx
EarthElemental
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
Abzetdin Adamov
 
day-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdf
day-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdfday-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdf
day-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdf
swatigairola2017
 

Similar to Cyber Raksha - by Vanshit Malhotra (20)

Cyber security (2) (2)
Cyber security (2) (2)Cyber security (2) (2)
Cyber security (2) (2)
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
awareness.pdf
awareness.pdfawareness.pdf
awareness.pdf
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
Cyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxCyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptx
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
Cyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdfCyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdf
 
cybersec-01.pptx
cybersec-01.pptxcybersec-01.pptx
cybersec-01.pptx
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
day-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdf
day-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdfday-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdf
day-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdf
 

Recently uploaded

Assignment 1 (Introductions to Microsoft Power point 2019) kiran.pptx
Assignment 1 (Introductions to Microsoft Power point 2019) kiran.pptxAssignment 1 (Introductions to Microsoft Power point 2019) kiran.pptx
Assignment 1 (Introductions to Microsoft Power point 2019) kiran.pptx
kirannaveed6
 
7 Habits of Highly Effective People.pptx
7 Habits of Highly Effective People.pptx7 Habits of Highly Effective People.pptx
7 Habits of Highly Effective People.pptx
gpangilinan2017
 
ProSocial Behaviour - Applied Social Psychology - Psychology SuperNotes
ProSocial Behaviour - Applied Social Psychology - Psychology SuperNotesProSocial Behaviour - Applied Social Psychology - Psychology SuperNotes
ProSocial Behaviour - Applied Social Psychology - Psychology SuperNotes
PsychoTech Services
 
一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理
一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理
一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理
ghyke
 
Personal Growth Unleashed: Key Strategies from Tim Han’s LMA Course
Personal Growth Unleashed: Key Strategies from Tim Han’s LMA CoursePersonal Growth Unleashed: Key Strategies from Tim Han’s LMA Course
Personal Growth Unleashed: Key Strategies from Tim Han’s LMA Course
Tim Han Success Insider
 
Aggression - Applied Social Psychology - Psychology SuperNotes
Aggression - Applied Social Psychology - Psychology SuperNotesAggression - Applied Social Psychology - Psychology SuperNotes
Aggression - Applied Social Psychology - Psychology SuperNotes
PsychoTech Services
 
Stealth attraction for mens gets her with your words
Stealth attraction for mens gets her with your wordsStealth attraction for mens gets her with your words
Stealth attraction for mens gets her with your words
ichettrisagar95
 
1-CIE-IGCSE-Additional-Mathematics-Topical-Past-Paper-Functions.pdf
1-CIE-IGCSE-Additional-Mathematics-Topical-Past-Paper-Functions.pdf1-CIE-IGCSE-Additional-Mathematics-Topical-Past-Paper-Functions.pdf
1-CIE-IGCSE-Additional-Mathematics-Topical-Past-Paper-Functions.pdf
shahul62
 
Understanding of Self - Applied Social Psychology - Psychology SuperNotes
Understanding of Self - Applied Social Psychology - Psychology SuperNotesUnderstanding of Self - Applied Social Psychology - Psychology SuperNotes
Understanding of Self - Applied Social Psychology - Psychology SuperNotes
PsychoTech Services
 

Recently uploaded (9)

Assignment 1 (Introductions to Microsoft Power point 2019) kiran.pptx
Assignment 1 (Introductions to Microsoft Power point 2019) kiran.pptxAssignment 1 (Introductions to Microsoft Power point 2019) kiran.pptx
Assignment 1 (Introductions to Microsoft Power point 2019) kiran.pptx
 
7 Habits of Highly Effective People.pptx
7 Habits of Highly Effective People.pptx7 Habits of Highly Effective People.pptx
7 Habits of Highly Effective People.pptx
 
ProSocial Behaviour - Applied Social Psychology - Psychology SuperNotes
ProSocial Behaviour - Applied Social Psychology - Psychology SuperNotesProSocial Behaviour - Applied Social Psychology - Psychology SuperNotes
ProSocial Behaviour - Applied Social Psychology - Psychology SuperNotes
 
一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理
一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理
一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理
 
Personal Growth Unleashed: Key Strategies from Tim Han’s LMA Course
Personal Growth Unleashed: Key Strategies from Tim Han’s LMA CoursePersonal Growth Unleashed: Key Strategies from Tim Han’s LMA Course
Personal Growth Unleashed: Key Strategies from Tim Han’s LMA Course
 
Aggression - Applied Social Psychology - Psychology SuperNotes
Aggression - Applied Social Psychology - Psychology SuperNotesAggression - Applied Social Psychology - Psychology SuperNotes
Aggression - Applied Social Psychology - Psychology SuperNotes
 
Stealth attraction for mens gets her with your words
Stealth attraction for mens gets her with your wordsStealth attraction for mens gets her with your words
Stealth attraction for mens gets her with your words
 
1-CIE-IGCSE-Additional-Mathematics-Topical-Past-Paper-Functions.pdf
1-CIE-IGCSE-Additional-Mathematics-Topical-Past-Paper-Functions.pdf1-CIE-IGCSE-Additional-Mathematics-Topical-Past-Paper-Functions.pdf
1-CIE-IGCSE-Additional-Mathematics-Topical-Past-Paper-Functions.pdf
 
Understanding of Self - Applied Social Psychology - Psychology SuperNotes
Understanding of Self - Applied Social Psychology - Psychology SuperNotesUnderstanding of Self - Applied Social Psychology - Psychology SuperNotes
Understanding of Self - Applied Social Psychology - Psychology SuperNotes
 

Cyber Raksha - by Vanshit Malhotra

  • 1. CYBER - RAKSHA
 ONLINE SAFETY IN DIGITAL INDIA A HACKDOOR INITIATIVE 
 HTTPS://WWW.FACEBOOK.COM/CYBER.RAKSHA/ 
 By VANSHIT MALHOTRA @vanshitmalhotra
  • 2. DISCLAIMER The slides and Seminar are purely for educational and awareness purposes. The author is not responsible if any of the techniques shown during the seminar are misused to cause any damage to anyone. You and only you are responsible if these techniques/knowledge are used for illegal purposes. 2
  • 3. WHO-AM-I Vanshit Malhotra Certified Ethical Hacker C|EH , C|HFI Cyber Security Expert Ethical Hacker and Cyber Security Researcher Speaker at International Security Conferences Previously worked as a Security Consultant for Government of India [UIDAI] Cyber Crime Prevention and Investigation Consultant sec.maniac@yahoo.com vanshitm @vanshitmalhotra vanshitmalhotra 3
  • 4. CHAT WITH ME ! • Cyber Crime by QR Code jacking ! • Quick Demo ! • Don't scan the unknown QR ! 4
  • 5. CYBER CRIME PAST - PRESENT State Sponsored HacksScript Kiddie V/s 5
  • 6. U THINK U PROTECTED ? • Remote Exploit - Eternal Blue • Quick Demo ! • NSA Exploit Leaked by Shadow Brokers ! • Video Link : https://www.youtube.com/watch? v=KdjRtqSJee8&t=23s 6
  • 7. STATE SPONSORED HACKS • Governments Hacking Governments ! • Cyber Criminals hired by Governments • More time is spent on Research than attack ! • Very Difficult toTrace ! • Deep Web is used - 7
  • 8. DEEP WEB • Google Shows only 0.04% of Internet ! • Deep Web - Hidden Web • NotVisible in Google Searches • Transactions are generally in BitCoins - Untraceable. • Sometimes special software needed to connect to Deep Web -TOR 8
  • 9. ORGANISED CYBER CRIME • Cyber Criminals use deep Web to provide services : Drugs,Weapons,Assassins , Human Trafficking ! • Even Report Abuse option to block bad Drugs :p !!! 9
  • 10. Silk Road - Market Place on Dark Web 10
  • 11. CYBER ESPIONAGE • A new way of Shutting Down Rival Business ! • If Website is down - Customer Cant order ! 11
  • 12. EQUIFAX HACK • Keeps Financial Records for almost every American Citizen , 145 million ! • Apache Struts, and CVE-2017-5638 vulnerability • Data included but not Limited to : Social Security Numbers, Date of Birth, Drivers License,A/c Info • Your Account Can be Accessed and New ones opened ! • Equifax hackers stole 200k credit card accounts in one fell swoop • This information is available on Dark Web for SALE ! 12
  • 13. E-COMMERCE ! • Money is now Online : Paytm, Uber, BigBasket, Amazon ! • E-Commerce is HOT target due to financial data presence. • Card Data Sold on Dark Web ! 13
  • 14. CYBER CRIME IN INDIA • Cyber Crime is Everywhere • Every 10 minutes Cyber crime is happening in India National Crime Record Bureau of India • Maximum Cyber Criminals are young 14
  • 15. CYBER CRIME IN INDIA Misuse of Social Media Banking Frauds and Financial Frauds 15
  • 16. INFAMOUS SOCIAL MEDIA CRIMES • Blue Whale , Momo Challenge • People create impressions due to viral social media posts. • Privacy Breach due to sharing of content on Social Media. • If it is free, its probably jacked ! 16
  • 17. INFAMOUS BANKING CYBER CRIMES • Calling from the Bank - Phone Call Frauds • Card Frauds • Rural Areas -Victim to OTP frauds to verify Aadhar 17
  • 18. TRANSFORMING DIGITAL INDIA TO SECURE DIGITAL INDIA • Secure Frameworks for Developers and Programers • Report Cyber Crimes to Law Enforcement Authorities. (Even a stolen smartphone) • Update all software and Firmware. • Law Enforcement and Judiciaries need to be empowered. 18
  • 19. CYBER SECURITY FOR CORPORATES • People ~> Progress ~>Technology • Buy and Implement SecureTechnology • Train Employees on Cyber Security - Don’t Spend all money on SecureTechnology, train employees on Cyber Security. • Corporates must have a dedicated budget for Cyber Security • Use Secure Development frameworks for developing applications • Understand how your application can be attacked. 19
  • 20. FINAL NOTES • India is not a Country Run By the Rules ! Be Cyber Aware ! • Basic Cyber Security Awareness needed for every Indian Citizen. Only then we can transform Digital India into Secure Digital India. • We can Patch theTechnology but there is no “Patch for Human Stupidity” ! • Virtual World is not a game, its a life ! • Our Aim is to Build a Culture of Cyber Safety education specially in Colleges, Schools, Rural Areas and Corporates. 20