SlideShare a Scribd company logo
1 of 19
Cyber Crime
Prepare for the next wave:
          Business Process Hacking


Richard Stiennon – Chief Research Analyst, IT-Harvest
The Rise of Cybercrime
                        INHIBITORS
                         Better security


International cooperation (or not)‫‏‬
                                                                       BPH!

                                                                    Organization
                                                            Insider recruitment
                                                    30 million bots
                                            Success (profits)‫‏‬
                                    Market for identities
                            New vulnerabilities

         Ubiquitous Internet                   DRIVERS
      IT-Harvest 2011
Historical Criminal Societies




IT-Harvest 2011
The first wave: the adware economy

       E-commerce Sites
                                           Affiliate Web Sites
                                           Software parasites
                          Hit Stats
                                           Worms
                          Fake “Top Ten”
                                           Viruses
                          Brokers
                                           Spam
                          Webrings
                                           Infected Desktops
                                           ADware




IT-Harvest 2011
The Adware economy


   E-commerce Sites
                                          Affiliate Web Sites
                      Hit Stats           Software parasites
                      Popularity- Stats   Worms
                      Brokers             Viruses
                      Webrings            Spam
                                          Infected Desktops
                                          ADware




IT-Harvest 2011
IP theft as a service in Israel




IT-Harvest 2011
Physical presence targets “where
the money is” - Willie Sutton
• Sumitomo Mitsui Bank Branch




IT-Harvest 2011
Cyber Defense :-)
Sumitomo Best Practice




IT-Harvest 2011
Stop&Shop




IT-Harvest 2011
Stop&Shop cyber defense




IT-Harvest 2011
TJX: targeting data repositories
TJ MAXX, Marshall’s
45 Million Credit cards
@ $80/card
=$3.6 Billion in costs!



    Pringle’s can or…?




IT-Harvest 2011
Business Process Hacking
• Step one: identify the business process
• Step two: identify key vulnerabilities and trust
  relationships
    Insiders
    Customers
    Partners
• Step three: steal something
• Step four: monitization




IT-Harvest 2011                        12
An insider’s perspective
• Major railroad in US
• Major computer manufacturer in US




IT-Harvest 2011                   13
Pump and dump
•    Break in to online trading account
•    Sell off owner’s portfolio
•    Purchase penny stocks
•    Dump attacker’s holdings when stock price jumps
•    Leave account holder with worthless portfolio
•    Canadian attacks thwarted $11 million frozen in
     Lithuanian bank.




IT-Harvest 2011                       14
E-ticketing fraud
• Indian railway reservations. Scalpers use software to
  corner the market for tickets and resell them at a
  mark up.
• Concert tickets. Scammers snipe tickets when they
  go on sale using elaborate hacks to avoid fraud
  detection schemes. They resell them immediately on
  sites such as StubHub.com or TicketsNow.com
  ($1,000)
• Even better: scammers buy seats and block others
  from getting seats.


IT-Harvest 2011                      15
Carbon credits
• 2010 Phishing attack against dozens of companies
• Seven out of 2,000 German companies fall for it
• Carbon credits transferred to two accounts owned by
  attackers
• $4 million stolen

• 2011 1.6 million carbon credits stolen from the Romanian
  branch of Swiss cement company Holcim. $36 million.




IT-Harvest 2011                           16
Vulnerable business processes
•    Treasury functions
•    Logistics
•    Payroll
•    Trading platforms for energy, natural resources, commodities,
     securities
•    Voting platforms
•    Gaming sites
•    Foreign Exchange
•    “Deal rooms”
•    Central banks
•


IT-Harvest 2011                              17
Beyond theft

• Commerce relies on trust. Break
  that trust and commerce fails.




IT-Harvest 2011         18
richard@it-harvest.com
threatchaos.com
twitter.com/stiennon

More Related Content

What's hot

The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingat MicroFocus Italy ❖✔
 
Wellspring intellectual property complexity trends
Wellspring intellectual property complexity trendsWellspring intellectual property complexity trends
Wellspring intellectual property complexity trendsWellspring
 
Amb's Herbal Bath Care
Amb's Herbal Bath CareAmb's Herbal Bath Care
Amb's Herbal Bath CareAnika Mckenzie
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereGoutama Bachtiar
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce JenVidaB
 
Red Flags Rule General
Red Flags Rule GeneralRed Flags Rule General
Red Flags Rule GeneralTeo Leonard
 
The New Industrial Revolution(s)? Exploring blockchains and the future of val...
The New Industrial Revolution(s)? Exploring blockchains and the future of val...The New Industrial Revolution(s)? Exploring blockchains and the future of val...
The New Industrial Revolution(s)? Exploring blockchains and the future of val...Robin Teigland
 
Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Sooraj Maurya
 
Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Kevin Murphy
 
IT in Business - Digital Piracy
IT in Business - Digital PiracyIT in Business - Digital Piracy
IT in Business - Digital PiracyErick Prajogo
 
Corporate-Espionage
Corporate-EspionageCorporate-Espionage
Corporate-EspionageSam
 
Internet of Things-A trillion dollar market
Internet of Things-A trillion dollar marketInternet of Things-A trillion dollar market
Internet of Things-A trillion dollar marketsksaif95
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptxPranavRaj96
 

What's hot (19)

The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hacking
 
Wellspring intellectual property complexity trends
Wellspring intellectual property complexity trendsWellspring intellectual property complexity trends
Wellspring intellectual property complexity trends
 
Apt 510 slideshare
Apt 510 slideshareApt 510 slideshare
Apt 510 slideshare
 
Presentation3
Presentation3Presentation3
Presentation3
 
Amb's Herbal Bath Care
Amb's Herbal Bath CareAmb's Herbal Bath Care
Amb's Herbal Bath Care
 
ihegc012
ihegc012ihegc012
ihegc012
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking Sphere
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
Challenge Accepted
Challenge AcceptedChallenge Accepted
Challenge Accepted
 
Red Flags Rule General
Red Flags Rule GeneralRed Flags Rule General
Red Flags Rule General
 
The New Industrial Revolution(s)? Exploring blockchains and the future of val...
The New Industrial Revolution(s)? Exploring blockchains and the future of val...The New Industrial Revolution(s)? Exploring blockchains and the future of val...
The New Industrial Revolution(s)? Exploring blockchains and the future of val...
 
Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER
 
Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015
 
IT in Business - Digital Piracy
IT in Business - Digital PiracyIT in Business - Digital Piracy
IT in Business - Digital Piracy
 
Corporate-Espionage
Corporate-EspionageCorporate-Espionage
Corporate-Espionage
 
Chinese Facial Recognition Will Take over the World in 2019
Chinese Facial Recognition Will Take over the World in 2019Chinese Facial Recognition Will Take over the World in 2019
Chinese Facial Recognition Will Take over the World in 2019
 
Data breach at sony
Data breach at sonyData breach at sony
Data breach at sony
 
Internet of Things-A trillion dollar market
Internet of Things-A trillion dollar marketInternet of Things-A trillion dollar market
Internet of Things-A trillion dollar market
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 

Similar to Cybercrime and Business Process Hacking

2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats ReportMcafeeCareers
 
Developing a corporate intelligence strategy from online sources
Developing a corporate intelligence strategy from online sourcesDeveloping a corporate intelligence strategy from online sources
Developing a corporate intelligence strategy from online sourcesEnterprise Security Risk Management
 
Symantec Website Security Threat Report
Symantec Website Security Threat ReportSymantec Website Security Threat Report
Symantec Website Security Threat Reportcheinyeanlim
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...Jonathan Care
 
DSS @SFK Conference_2012_Cybercrime_welcomes_you
DSS @SFK Conference_2012_Cybercrime_welcomes_youDSS @SFK Conference_2012_Cybercrime_welcomes_you
DSS @SFK Conference_2012_Cybercrime_welcomes_youAndris Soroka
 
Ivanti threat thursday deck july final - read-only
Ivanti threat thursday deck july final  -  read-onlyIvanti threat thursday deck july final  -  read-only
Ivanti threat thursday deck july final - read-onlyIvanti
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011Andrea Rossetti
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Government
 
domain names management whitepaper
domain names management whitepaperdomain names management whitepaper
domain names management whitepaperVAYTON
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019Omar Bshara
 
Social Engineering
Social EngineeringSocial Engineering
Social EngineeringCyber Agency
 
Oracle tech db-02-hacking-neum-15.04.2010
Oracle tech db-02-hacking-neum-15.04.2010Oracle tech db-02-hacking-neum-15.04.2010
Oracle tech db-02-hacking-neum-15.04.2010Oracle BH
 
Risk base approach for security management fujitsu-fms event 15 aug 2011
Risk base approach for security management   fujitsu-fms event 15 aug 2011Risk base approach for security management   fujitsu-fms event 15 aug 2011
Risk base approach for security management fujitsu-fms event 15 aug 2011IbuSrikandi
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudInternet Law Center
 

Similar to Cybercrime and Business Process Hacking (20)

2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats Report
 
Developing a corporate intelligence strategy from online sources
Developing a corporate intelligence strategy from online sourcesDeveloping a corporate intelligence strategy from online sources
Developing a corporate intelligence strategy from online sources
 
Symantec Website Security Threat Report
Symantec Website Security Threat ReportSymantec Website Security Threat Report
Symantec Website Security Threat Report
 
Apresentação Allen ES
Apresentação Allen ESApresentação Allen ES
Apresentação Allen ES
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
 
DSS @SFK Conference_2012_Cybercrime_welcomes_you
DSS @SFK Conference_2012_Cybercrime_welcomes_youDSS @SFK Conference_2012_Cybercrime_welcomes_you
DSS @SFK Conference_2012_Cybercrime_welcomes_you
 
Ivanti threat thursday deck july final - read-only
Ivanti threat thursday deck july final  -  read-onlyIvanti threat thursday deck july final  -  read-only
Ivanti threat thursday deck july final - read-only
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat Analysis
 
Vodqa why cybersecurity
Vodqa   why cybersecurityVodqa   why cybersecurity
Vodqa why cybersecurity
 
domain names management whitepaper
domain names management whitepaperdomain names management whitepaper
domain names management whitepaper
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Oracle tech db-02-hacking-neum-15.04.2010
Oracle tech db-02-hacking-neum-15.04.2010Oracle tech db-02-hacking-neum-15.04.2010
Oracle tech db-02-hacking-neum-15.04.2010
 
Forensics Expo, London 2015
Forensics Expo, London  2015Forensics Expo, London  2015
Forensics Expo, London 2015
 
Risk base approach for security management fujitsu-fms event 15 aug 2011
Risk base approach for security management   fujitsu-fms event 15 aug 2011Risk base approach for security management   fujitsu-fms event 15 aug 2011
Risk base approach for security management fujitsu-fms event 15 aug 2011
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet Fraud
 

More from Richard Stiennon

Cyber security industry trends
Cyber security industry trendsCyber security industry trends
Cyber security industry trendsRichard Stiennon
 
The Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarThe Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarRichard Stiennon
 
How the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwarsHow the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwarsRichard Stiennon
 
Why Risk Management is Impossible
Why Risk Management is ImpossibleWhy Risk Management is Impossible
Why Risk Management is ImpossibleRichard Stiennon
 
Stiennon Keynote at Trusted Computing Conference 2013, Orlando
Stiennon Keynote at Trusted Computing Conference 2013, OrlandoStiennon Keynote at Trusted Computing Conference 2013, Orlando
Stiennon Keynote at Trusted Computing Conference 2013, OrlandoRichard Stiennon
 
How the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security ForeverHow the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security ForeverRichard Stiennon
 
Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismPost Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismRichard Stiennon
 
What makes the IT industry tick?
What makes the IT industry tick? What makes the IT industry tick?
What makes the IT industry tick? Richard Stiennon
 
Surviving Cyber War April09
Surviving Cyber War April09Surviving Cyber War April09
Surviving Cyber War April09Richard Stiennon
 

More from Richard Stiennon (15)

Why Risk Management Fails
Why Risk Management FailsWhy Risk Management Fails
Why Risk Management Fails
 
Cyber security industry trends
Cyber security industry trendsCyber security industry trends
Cyber security industry trends
 
The Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarThe Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be Cyberwar
 
There WIll Be Cyberwar
There WIll Be Cyberwar There WIll Be Cyberwar
There WIll Be Cyberwar
 
How the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwarsHow the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwars
 
Why Risk Management is Impossible
Why Risk Management is ImpossibleWhy Risk Management is Impossible
Why Risk Management is Impossible
 
Stiennon Keynote at Trusted Computing Conference 2013, Orlando
Stiennon Keynote at Trusted Computing Conference 2013, OrlandoStiennon Keynote at Trusted Computing Conference 2013, Orlando
Stiennon Keynote at Trusted Computing Conference 2013, Orlando
 
How the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security ForeverHow the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security Forever
 
Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismPost Apocalyptic Cyber Realism
Post Apocalyptic Cyber Realism
 
What makes the IT industry tick?
What makes the IT industry tick? What makes the IT industry tick?
What makes the IT industry tick?
 
New definition for APT
New definition for APTNew definition for APT
New definition for APT
 
Titan Rain
Titan RainTitan Rain
Titan Rain
 
Cyberwar Update2010
Cyberwar Update2010Cyberwar Update2010
Cyberwar Update2010
 
Surviving Cyber War April09
Surviving Cyber War April09Surviving Cyber War April09
Surviving Cyber War April09
 
Surviving Cyber War
Surviving Cyber WarSurviving Cyber War
Surviving Cyber War
 

Recently uploaded

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

Cybercrime and Business Process Hacking

  • 1. Cyber Crime Prepare for the next wave: Business Process Hacking Richard Stiennon – Chief Research Analyst, IT-Harvest
  • 2. The Rise of Cybercrime INHIBITORS Better security International cooperation (or not)‫‏‬ BPH! Organization Insider recruitment 30 million bots Success (profits)‫‏‬ Market for identities New vulnerabilities Ubiquitous Internet DRIVERS IT-Harvest 2011
  • 4. The first wave: the adware economy E-commerce Sites Affiliate Web Sites Software parasites Hit Stats Worms Fake “Top Ten” Viruses Brokers Spam Webrings Infected Desktops ADware IT-Harvest 2011
  • 5. The Adware economy E-commerce Sites Affiliate Web Sites Hit Stats Software parasites Popularity- Stats Worms Brokers Viruses Webrings Spam Infected Desktops ADware IT-Harvest 2011
  • 6. IP theft as a service in Israel IT-Harvest 2011
  • 7. Physical presence targets “where the money is” - Willie Sutton • Sumitomo Mitsui Bank Branch IT-Harvest 2011
  • 8. Cyber Defense :-) Sumitomo Best Practice IT-Harvest 2011
  • 11. TJX: targeting data repositories TJ MAXX, Marshall’s 45 Million Credit cards @ $80/card =$3.6 Billion in costs! Pringle’s can or…? IT-Harvest 2011
  • 12. Business Process Hacking • Step one: identify the business process • Step two: identify key vulnerabilities and trust relationships  Insiders  Customers  Partners • Step three: steal something • Step four: monitization IT-Harvest 2011 12
  • 13. An insider’s perspective • Major railroad in US • Major computer manufacturer in US IT-Harvest 2011 13
  • 14. Pump and dump • Break in to online trading account • Sell off owner’s portfolio • Purchase penny stocks • Dump attacker’s holdings when stock price jumps • Leave account holder with worthless portfolio • Canadian attacks thwarted $11 million frozen in Lithuanian bank. IT-Harvest 2011 14
  • 15. E-ticketing fraud • Indian railway reservations. Scalpers use software to corner the market for tickets and resell them at a mark up. • Concert tickets. Scammers snipe tickets when they go on sale using elaborate hacks to avoid fraud detection schemes. They resell them immediately on sites such as StubHub.com or TicketsNow.com ($1,000) • Even better: scammers buy seats and block others from getting seats. IT-Harvest 2011 15
  • 16. Carbon credits • 2010 Phishing attack against dozens of companies • Seven out of 2,000 German companies fall for it • Carbon credits transferred to two accounts owned by attackers • $4 million stolen • 2011 1.6 million carbon credits stolen from the Romanian branch of Swiss cement company Holcim. $36 million. IT-Harvest 2011 16
  • 17. Vulnerable business processes • Treasury functions • Logistics • Payroll • Trading platforms for energy, natural resources, commodities, securities • Voting platforms • Gaming sites • Foreign Exchange • “Deal rooms” • Central banks • IT-Harvest 2011 17
  • 18. Beyond theft • Commerce relies on trust. Break that trust and commerce fails. IT-Harvest 2011 18

Editor's Notes

  1. \n
  2. The purpose of this presentation is to depict a scenario. It is only through imagining the worst that we can prepare for it and hopefully curtail the chances of a particular scenario playing out in real life. \n\nThe cyber crime scenario is fueled by the lack of balance between the fundemental drivers and the countervailing inhibitors. \nDRIVERS\nCriminals historically prey on their immediate neighbors. The Internet changes all that\nThe monthly barrage of vulnerability announcements, particularly from MSFT give cyber criminals the opportunities they need. Total impact of Vista will be…ZERO\nOnline trading sites for identities create a market for thieves to sell to more sophisticated criminals.\nSuccess (profits) breeds more success. Just as eBay created a new generation of garage sale entrepreneurs, Cyber crime is sucking in more and more players. \nLarge botnets, in particular a million member army being prepped for the holiday season indicate growing power. \nOrganized crime is turning to bribery and infiltration to steal identities. \n
  3. The Wild West, Chicago in the 20’s, the Caribbean previous centuries and Columbia as well as aspects of Russia and Italy today are all examples of where unchecked crime can lead. This is the scenario that we must avoid. \n
  4. \n
  5. \n
  6. Since May 30, Memorial Day weekend, Israel’s business community has been in an uproar. Here is a snapshot of the outbreak of a major industrial espionage incident. Spyware plays a crucial role in this fiasco. \n\nThis slide depicts the targets, the perpetrators, and the Private Investigators that carried off these invasions. The story started when an Israeli author noticed that his unpublished works were being posted to the Internet. Suspecting his step-daughters ex-husband he called in the Israeli police. The police discovered the HotWar Trojan on his home computer. Files, emails, and everything the author typed were being sent to FTP servers in Germany, the UK and the US. When those servers were seized by local authorities in each country they were found to contain internal documents from dozens of companies in Israel including the state owned telephone company, Bezeq, a cell phone company, a car dealer, satellite TV company(Hot!), a cell phone company (Patner), a water company (Gal-Al), a defense contractor and more. \n\nIt turns out that at least a dozen companies in Israel had hired Private Investigators to gather competitive intelligence on their counterparts. The PI’s had purchased software from Michael Hephrati in the UK and sent it to the targets disguised as a legitimate email proposal. While 22 people are under arrest, one was indicted this week (June 20), and the investigation continues.:\n-The CEO of one of the PI firms through himself down a stairwell at the police station and is in critical condition with multiple head and spine injuries. \n-The private firms that were in the process of purchasing Bezeq have asked for a new sale to take place. \n-The water company that was hacked lost documents that detailed heavy water extraction techniques. Heavy water is critical to the manufacture of H bombs. \n-Israeli authorities themselves have been using spyware to gather information from PC of the wife of the Syrian President. \nStay tuned. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n