SlideShare a Scribd company logo
© 2015 APWG
Phishing Trends and Collaborative
Efforts to Fight Cybercrime
Foy Shiver
APWG.ORG
Jordi Aguilà
APWG.EU / CaixaBank
© 2015 APWG
APWG Who Are We
• Founded in 2003 to focus on Phishing
• Began collecting data and create process for tracking
Phishing
• Currently 2000+ companies, NGOs, government, law
enforcement agencies, and treaty organizations worldwide
• Membership restricted to cybercrime stakeholders:
Financial institutions ISPs
Technology companies Law enforcement agencies
Government agencies Treaty organizations
E-commerce sites and solutions providers
Research partners - (CERTs, universities, industrial laboratories,
volunteer responder organizations)
© 2015 APWG
APWG Spheres of Influence
• Tracking Trends and Activities
• eCrime Research
• Cyber Policy
• Education / User Awareness
• Data Logistics
© 2015 APWG
Why APWG.EU
• Interest of APWG, Inc. USA for expanding activities in Europe and
Asia
• Globalization: E-crime as a global problem. IT governance is a must
in Europe. Europe has its own personality fighting against cybercrime.
• Europe is a huge community on research with a long tradition
(Universities, public research, private research)
• The European Union itself has specific research programs focused in
e-crime. (H2020, etc.)
• Being a “European something” – business corporation, enterprise,
research center, limited or anonymous society, foundation, etc. - is
necessary to obtain grants from the European Union
• Private companies on the sector interested in APWG.EU
© 2015 APWG
Activities of APWG.EU
APWG.EU is a scientific research foundation
which aims to provide focused RDI support to private industry by:
Developing RDI activities
– in consortium with other organizations:
Universities, law enforcement, R&D centers, private companies
Creating a European trust network
– for sharing e-crime intelligence information and repositories of common
interest information
Promoting best practices, guidelines, and knowledge
– in the areas of e-crime, phishing, malware, and other aspects related with
the e-crime sectors
Organizing European e-crime events
– meetings, workshops, and scientific conferences
© 2015 APWG
Research of APWG.EU
 Objective: Establish a network of high level talents to conduct
RESEARCH PROJECTS of common interest over Europe in the
cybercrime fields.
 Tools: Common clearinghouse with research centers (universities,
private, law enforcement) to automatic sharing of information,
knowledge and tools.
 Actually four main lines we are developing in europe H2020
programs
 Research on information sharing
 Research on advanced Authentication Systems
 Dissemination of security information
 Security on mobile systems
 Cloud security
© 2015 APWG
APWG’s Big Question:
How Does a World of Localities
Engage a Problem of Global
Dimensions Like Cybercrime and
Respond as a Unified Authority?
© 2015 APWG
Data Logistics as Cybercrime
Response Instrument
The design and optimization of
processes to manage the movement
and presentation of data to enable
crybercrime responders and forensic
analsysts to take action – or receive
data – at a time and place for a specific
counter-cybercrime application
© 2015 APWG
Examples of APWG
Cybersafety Data Logistics
• The Stop. Think. Connect. Messaging Convention
• Phishing Repository & URL Block List
• eCrime Exchange
• Malicious Domain Suspension System
• Phishing Education Landing Pages
• eCrime Classification System
• Bot-Infected System Alerting and Notification
System
© 2015 APWG
STOP. THINK. CONNECT.
• Re-animates the oldest logistical schema: standardization
• Over 20 international companies founded the project
• Rigorously informed, crafted and tested messaging
instrumentation offered at no cost
• Repurpose communications avenues and networks of all the
Messaging Convention participants
• Leverage every web page, ATM receipt, account statement
and communications instrument
to deliver awareness messaging
© 2015 APWG
APWG eCrime Exchange:
A Member Network
For Collaborative eForensics
© 2015 APWG
Organizational Objective of
eCX
Ganging Up on the Bad Guys
• Exchanging Data Programmatically
Consolidating data across industries and
geographies for more effective security routines
Example: URL Block List
• Teaming Around eCrime Events
Enterprises and groups recognizing they face
common adversaries can combine data and
insights needed to neutralize the attackers
© 2015 APWG
Phishing Repository and URL
Block List
• APWG Phishing Attack Data Repository
– 8.5+ million historical entries
– Informs research and development of counter-eCrime
technology
• Phishing URL Block List (UBL)
– Updated constantly
– Informs browser warning systems and anti-phishing tool
bars
– Signaling systems for security teams
– CERTs, brand-holders, telecom companies, security
companies, software developers and the public
© 2015 APWG
Accredited Reporter Data
Submission Program
• Broadens the number of qualified
contributors to APWG Systems
• Establishes a formal mechanism for an
enterprise to be accredited by APWG and
send reports to the UBL directly
• Qualifying organizations can use their
credentials to submit reports in bulk for
processing
© 2015 APWG
APWG Malicious Domain Suspension
Process (AMDoS)
World’s First and Only Auditable, Scalable Malicious
Domain Name Suspension Request System for
Professional Interveners and the Registrys
© 2015 APWG
What are we trying to
accomplish?
• Complement (not circumvent) court orders
or legal instruments to allow
– Responsible (and transparent) action in
– A timeframe measured by hours rather than
days, weeks, or months and to
– Hold reporting parties to a standard of practice
and accountability
• Replace ad hoc processes used to suspend
domains today with a uniform, auditable
process based on signed attestations
© 2015 APWG
APWG Malicious Domain
Suspension Process
• AMDoS mediates formal correspondence between
an Accredited Intervener and a Registry Authority
– trusted-introducer/trusted-channel system
– a medium for transmission of suspension requests
for abusive domains
• Objectives
– Enhance speed and scalability of interventions
– Provide formal tracking
– Provide accuracy, accountability. transparency
© 2015 APWG
Trusted Introducer System
formal, auditable communications channel
© 2015 APWG
AMDoS Functional Overview
• Benefits to Interveners
– Credibility. Your trustworthiness is not questioned
– Your suspension requests are taken seriously
– Fair, equitable evaluation process
• Benefits to Registry/Regisrar Authorities
– Confidence. Suspension requests are from party
with capacity to judge criminality of domains
– Competitive advantage (trustworthy operator)
© 2015 APWG
Domains Eligible for Suspension
• AMDoS is for maliciously registered domains
– Domains registered with the intent to perpetrate
phishing, malware distribution, financial fraud
• What is criteria for domain to be considered
“criminally abusive”?
– Use of a domain name exclusively for the
animation of fraud to steal or coopt funds or
personal data in order to further a fraud or theft
© 2015 APWG
Registry Authority owns
process
• Registry Authorities participate voluntarily
– Under no obligation to participate or act
– Registry can assess request against explicit
criteria before making a decision to suspend
• Expectation is that
– A signed attestation from
– A vetted reporting party with
– Documentation that demonstrates criminal use
will be persuasive
© 2015 APWG
Other Goals
• Metrics!!
• Shame bad registries/registrars into
being good registries/registrars
© 2015 APWG
Foy Shiver
foy@apwg.org
Jordi Aguilà
jaguila@lacaixa.es
Thank You

More Related Content

Similar to Phishing trends and Collaborative Efforts to Fight Cybercrime

HSB - Gert Wabeke - AbuseHUB
HSB - Gert Wabeke - AbuseHUBHSB - Gert Wabeke - AbuseHUB
HSB - Gert Wabeke - AbuseHUB
Splend
 
Real-time Decisioning for Big Data
Real-time Decisioning for Big DataReal-time Decisioning for Big Data
Real-time Decisioning for Big Data
Openet
 
HSB - Advanced Cyber Defense Center - Michel van Eeten
HSB - Advanced Cyber Defense Center - Michel van EetenHSB - Advanced Cyber Defense Center - Michel van Eeten
HSB - Advanced Cyber Defense Center - Michel van Eeten
Splend
 
Allot Real Life Use Cases for Customer Enagagement
Allot Real Life Use Cases for Customer EnagagementAllot Real Life Use Cases for Customer Enagagement
Allot Real Life Use Cases for Customer Enagagement
Allot Communications
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
PECB
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
Deloitte United States
 
Cybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected AgeCybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected Age
dlblumen
 
IAB Tuesday Webinar: Tackling ad supported intellectual property infringement
IAB Tuesday Webinar: Tackling ad supported intellectual property infringementIAB Tuesday Webinar: Tackling ad supported intellectual property infringement
IAB Tuesday Webinar: Tackling ad supported intellectual property infringement
IAB Europe
 
Presentation on Federated identity and Access Management
Presentation on Federated identity and Access ManagementPresentation on Federated identity and Access Management
Presentation on Federated identity and Access Management
okoliec
 
Digital platforms to drive innovation - platform-thinking and design-thinking
Digital platforms to drive innovation - platform-thinking and design-thinkingDigital platforms to drive innovation - platform-thinking and design-thinking
Digital platforms to drive innovation - platform-thinking and design-thinking
Francis D'Silva
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
Anton Lishchuk
 
Securing the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicySecuring the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use Policy
Allot Communications
 
The 3 ‘R’s of Research
The 3 ‘R’s of ResearchThe 3 ‘R’s of Research
The 3 ‘R’s of Research
MRS
 
National policy and strategy
National policy and strategyNational policy and strategy
National policy and strategy
Bright Boateng
 
“Security” In a Digital Interconnected World
“Security” In a Digital Interconnected World “Security” In a Digital Interconnected World
“Security” In a Digital Interconnected World
Internet Society
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
Benjamin Ang
 
03-02-15 SENTIGUARD PresentationFA
03-02-15 SENTIGUARD PresentationFA03-02-15 SENTIGUARD PresentationFA
03-02-15 SENTIGUARD PresentationFA
Christopher Born
 
How APNIC can support law enforcement agencies in cybercrime investigtaion
How APNIC can support law enforcement agencies in cybercrime investigtaionHow APNIC can support law enforcement agencies in cybercrime investigtaion
How APNIC can support law enforcement agencies in cybercrime investigtaion
APNIC
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT Updates
APNIC
 
WHOIS Database for Incident Response & Handling
WHOIS Database for Incident Response & HandlingWHOIS Database for Incident Response & Handling
WHOIS Database for Incident Response & Handling
APNIC
 

Similar to Phishing trends and Collaborative Efforts to Fight Cybercrime (20)

HSB - Gert Wabeke - AbuseHUB
HSB - Gert Wabeke - AbuseHUBHSB - Gert Wabeke - AbuseHUB
HSB - Gert Wabeke - AbuseHUB
 
Real-time Decisioning for Big Data
Real-time Decisioning for Big DataReal-time Decisioning for Big Data
Real-time Decisioning for Big Data
 
HSB - Advanced Cyber Defense Center - Michel van Eeten
HSB - Advanced Cyber Defense Center - Michel van EetenHSB - Advanced Cyber Defense Center - Michel van Eeten
HSB - Advanced Cyber Defense Center - Michel van Eeten
 
Allot Real Life Use Cases for Customer Enagagement
Allot Real Life Use Cases for Customer EnagagementAllot Real Life Use Cases for Customer Enagagement
Allot Real Life Use Cases for Customer Enagagement
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
Cybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected AgeCybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected Age
 
IAB Tuesday Webinar: Tackling ad supported intellectual property infringement
IAB Tuesday Webinar: Tackling ad supported intellectual property infringementIAB Tuesday Webinar: Tackling ad supported intellectual property infringement
IAB Tuesday Webinar: Tackling ad supported intellectual property infringement
 
Presentation on Federated identity and Access Management
Presentation on Federated identity and Access ManagementPresentation on Federated identity and Access Management
Presentation on Federated identity and Access Management
 
Digital platforms to drive innovation - platform-thinking and design-thinking
Digital platforms to drive innovation - platform-thinking and design-thinkingDigital platforms to drive innovation - platform-thinking and design-thinking
Digital platforms to drive innovation - platform-thinking and design-thinking
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
Securing the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicySecuring the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use Policy
 
The 3 ‘R’s of Research
The 3 ‘R’s of ResearchThe 3 ‘R’s of Research
The 3 ‘R’s of Research
 
National policy and strategy
National policy and strategyNational policy and strategy
National policy and strategy
 
“Security” In a Digital Interconnected World
“Security” In a Digital Interconnected World “Security” In a Digital Interconnected World
“Security” In a Digital Interconnected World
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
 
03-02-15 SENTIGUARD PresentationFA
03-02-15 SENTIGUARD PresentationFA03-02-15 SENTIGUARD PresentationFA
03-02-15 SENTIGUARD PresentationFA
 
How APNIC can support law enforcement agencies in cybercrime investigtaion
How APNIC can support law enforcement agencies in cybercrime investigtaionHow APNIC can support law enforcement agencies in cybercrime investigtaion
How APNIC can support law enforcement agencies in cybercrime investigtaion
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT Updates
 
WHOIS Database for Incident Response & Handling
WHOIS Database for Incident Response & HandlingWHOIS Database for Incident Response & Handling
WHOIS Database for Incident Response & Handling
 

More from APNIC

APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
APNIC
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
APNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
APNIC
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
APNIC
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
APNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APNIC
 

More from APNIC (20)

APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 

Recently uploaded

7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 

Recently uploaded (20)

7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 

Phishing trends and Collaborative Efforts to Fight Cybercrime

  • 1. © 2015 APWG Phishing Trends and Collaborative Efforts to Fight Cybercrime Foy Shiver APWG.ORG Jordi Aguilà APWG.EU / CaixaBank
  • 2. © 2015 APWG APWG Who Are We • Founded in 2003 to focus on Phishing • Began collecting data and create process for tracking Phishing • Currently 2000+ companies, NGOs, government, law enforcement agencies, and treaty organizations worldwide • Membership restricted to cybercrime stakeholders: Financial institutions ISPs Technology companies Law enforcement agencies Government agencies Treaty organizations E-commerce sites and solutions providers Research partners - (CERTs, universities, industrial laboratories, volunteer responder organizations)
  • 3. © 2015 APWG APWG Spheres of Influence • Tracking Trends and Activities • eCrime Research • Cyber Policy • Education / User Awareness • Data Logistics
  • 4. © 2015 APWG Why APWG.EU • Interest of APWG, Inc. USA for expanding activities in Europe and Asia • Globalization: E-crime as a global problem. IT governance is a must in Europe. Europe has its own personality fighting against cybercrime. • Europe is a huge community on research with a long tradition (Universities, public research, private research) • The European Union itself has specific research programs focused in e-crime. (H2020, etc.) • Being a “European something” – business corporation, enterprise, research center, limited or anonymous society, foundation, etc. - is necessary to obtain grants from the European Union • Private companies on the sector interested in APWG.EU
  • 5. © 2015 APWG Activities of APWG.EU APWG.EU is a scientific research foundation which aims to provide focused RDI support to private industry by: Developing RDI activities – in consortium with other organizations: Universities, law enforcement, R&D centers, private companies Creating a European trust network – for sharing e-crime intelligence information and repositories of common interest information Promoting best practices, guidelines, and knowledge – in the areas of e-crime, phishing, malware, and other aspects related with the e-crime sectors Organizing European e-crime events – meetings, workshops, and scientific conferences
  • 6. © 2015 APWG Research of APWG.EU  Objective: Establish a network of high level talents to conduct RESEARCH PROJECTS of common interest over Europe in the cybercrime fields.  Tools: Common clearinghouse with research centers (universities, private, law enforcement) to automatic sharing of information, knowledge and tools.  Actually four main lines we are developing in europe H2020 programs  Research on information sharing  Research on advanced Authentication Systems  Dissemination of security information  Security on mobile systems  Cloud security
  • 7. © 2015 APWG APWG’s Big Question: How Does a World of Localities Engage a Problem of Global Dimensions Like Cybercrime and Respond as a Unified Authority?
  • 8. © 2015 APWG Data Logistics as Cybercrime Response Instrument The design and optimization of processes to manage the movement and presentation of data to enable crybercrime responders and forensic analsysts to take action – or receive data – at a time and place for a specific counter-cybercrime application
  • 9. © 2015 APWG Examples of APWG Cybersafety Data Logistics • The Stop. Think. Connect. Messaging Convention • Phishing Repository & URL Block List • eCrime Exchange • Malicious Domain Suspension System • Phishing Education Landing Pages • eCrime Classification System • Bot-Infected System Alerting and Notification System
  • 10. © 2015 APWG STOP. THINK. CONNECT. • Re-animates the oldest logistical schema: standardization • Over 20 international companies founded the project • Rigorously informed, crafted and tested messaging instrumentation offered at no cost • Repurpose communications avenues and networks of all the Messaging Convention participants • Leverage every web page, ATM receipt, account statement and communications instrument to deliver awareness messaging
  • 11. © 2015 APWG APWG eCrime Exchange: A Member Network For Collaborative eForensics
  • 12. © 2015 APWG Organizational Objective of eCX Ganging Up on the Bad Guys • Exchanging Data Programmatically Consolidating data across industries and geographies for more effective security routines Example: URL Block List • Teaming Around eCrime Events Enterprises and groups recognizing they face common adversaries can combine data and insights needed to neutralize the attackers
  • 13. © 2015 APWG Phishing Repository and URL Block List • APWG Phishing Attack Data Repository – 8.5+ million historical entries – Informs research and development of counter-eCrime technology • Phishing URL Block List (UBL) – Updated constantly – Informs browser warning systems and anti-phishing tool bars – Signaling systems for security teams – CERTs, brand-holders, telecom companies, security companies, software developers and the public
  • 14. © 2015 APWG Accredited Reporter Data Submission Program • Broadens the number of qualified contributors to APWG Systems • Establishes a formal mechanism for an enterprise to be accredited by APWG and send reports to the UBL directly • Qualifying organizations can use their credentials to submit reports in bulk for processing
  • 15. © 2015 APWG APWG Malicious Domain Suspension Process (AMDoS) World’s First and Only Auditable, Scalable Malicious Domain Name Suspension Request System for Professional Interveners and the Registrys
  • 16. © 2015 APWG What are we trying to accomplish? • Complement (not circumvent) court orders or legal instruments to allow – Responsible (and transparent) action in – A timeframe measured by hours rather than days, weeks, or months and to – Hold reporting parties to a standard of practice and accountability • Replace ad hoc processes used to suspend domains today with a uniform, auditable process based on signed attestations
  • 17. © 2015 APWG APWG Malicious Domain Suspension Process • AMDoS mediates formal correspondence between an Accredited Intervener and a Registry Authority – trusted-introducer/trusted-channel system – a medium for transmission of suspension requests for abusive domains • Objectives – Enhance speed and scalability of interventions – Provide formal tracking – Provide accuracy, accountability. transparency
  • 18. © 2015 APWG Trusted Introducer System formal, auditable communications channel
  • 19. © 2015 APWG AMDoS Functional Overview • Benefits to Interveners – Credibility. Your trustworthiness is not questioned – Your suspension requests are taken seriously – Fair, equitable evaluation process • Benefits to Registry/Regisrar Authorities – Confidence. Suspension requests are from party with capacity to judge criminality of domains – Competitive advantage (trustworthy operator)
  • 20. © 2015 APWG Domains Eligible for Suspension • AMDoS is for maliciously registered domains – Domains registered with the intent to perpetrate phishing, malware distribution, financial fraud • What is criteria for domain to be considered “criminally abusive”? – Use of a domain name exclusively for the animation of fraud to steal or coopt funds or personal data in order to further a fraud or theft
  • 21. © 2015 APWG Registry Authority owns process • Registry Authorities participate voluntarily – Under no obligation to participate or act – Registry can assess request against explicit criteria before making a decision to suspend • Expectation is that – A signed attestation from – A vetted reporting party with – Documentation that demonstrates criminal use will be persuasive
  • 22. © 2015 APWG Other Goals • Metrics!! • Shame bad registries/registrars into being good registries/registrars
  • 23. © 2015 APWG Foy Shiver foy@apwg.org Jordi Aguilà jaguila@lacaixa.es Thank You

Editor's Notes

  1. Needs update for NANOG : new potential title “Unified Response Leveraging a Common Universally Accessible eCrime Event Data Set” IEEE Stop eCrime effect a more unified response. Such a response system could be fashioned along the lines of a public health model, specifically its operational profile of routine event data exchange and analysis, and its coordinated program of response. Key words are industry and government and unified response The way civilization responds to the flu - in terms of the ground level data logistics
  2. Puts a UI on top of the URL Block List Provides researchers and security teams with a Web interface to search URLs related to phishing attacks. Custom searches and grouping Sharing with other members Notification field that tells the user of those Workgroups that are monitoring records with the same data strings