SlideShare a Scribd company logo
Конференция UISG #7
The Pocket Botnet

     Jart Armin
HostExploit – CyberDefcon
 DeepEnd Research Org


  Kiev – Ukraine – USIG
    December 2011
   Specialist international team via HostExploit and CyberDefcon that
    provides cybercrime analysis and quarterly reports on all the world’s
    hosts and Internet servers.
   Quarterly series of Top 50 Bad Hosts & Networks.
   CSF (Cyber Security Foundation)
    Team member of DeepEnd Research




                                                                            Конференция UISG #7 - Jart Armin



   UNICRI, ENISA, APWG
Конференция UISG #7 - Jart Armin
3rd Quarter World Host Report – Oct 2011
Overview

    Botnets - Problem? What Problem?




       The Market




                                       Конференция UISG #7 - Jart Armin
       Mobile Malware




    The Pocket Botnet
Botnets in General - A Problem – What Problem?
                            Currently around 5,720
                             measurably active botnets

                           • IRC (still around 30%),
                             Jabber, I2P, P2P, HTTP,
                             mini, Pocket Botnet




                                                         Конференция UISG #7 - Jart Armin
                            DDoS, RFI, vulnerability
                             scanning, spam, phishing,
                             malware, data
                             exfiltration…. APT

                            Covert channels

                            Bad guys & gray guys?
Smartphone Market Oct 2011 (a)




                                                                            Конференция UISG #7 - Jart Armin
 468 million units by the end of 2011, a rise of 60% compared 2010 (296m)
Smartphone Market (a) O/S 2012




Конференция UISG #7 - Jart Armin
Smartphone Market (b)
O/S – 2010 / 2015




                        Конференция UISG #7 - Jart Armin
Smartphone Shipping – 2010 /
2015                      PC Ref:

                            Est. 500m
                            PCs sold
                            2011, and 2




                                             Конференция UISG #7 - Jart Armin
                            billion PCs in
                            use around
                            the world, in
                            2015
Mobile Security Habits – Oct 2011
  • People choose convenience over security practices
  • Towards 50% use to connect to banks or financial
    accounts
  • 97% use to connect to email accounts either work or




                                                               Конференция UISG #7 - Jart Armin
    personal
  • 87% of phones are not supplied by an employer
  • One third leave apps/accounts constantly logged in
  • Best example – Reported as a major hack against USA –
  A US contractor for SCADA (Illinois water authority) login
  and maintaining data while on trip to Egypt & Russia via
  his mobile phone !!!
Mobile Malware – Pocket Botnet Ready
             • 1,700 versions (NetQin)
             • 113 samples (Contagio / Deepend)
             • 1410% increase in mobile malware
               samples (Trend Micro)




                                                        Конференция UISG #7 - Jart Armin
             • Zitmo Android Edition (Zeus for
               mobile)
             • SpyEye – SMS banking hijacks
               (mTANs)
             • Premium SMS, root kits, data stealers,
               click fraud, spyware, malware
Android.SmsSend family – 6 to 60 in 2011




                                           Конференция UISG #7 - Jart Armin
Primarily the same deception as fake A/V
ANSERVER.A




                                     Конференция UISG #7 - Jart Armin
Permissions     Using a C&C server
Pocket Botnet - ThemeInstaller.A –
(zombie – China)

 • Infected 1 million Symbian smartphones in 1 week &




                                                           Конференция UISG #7 - Jart Armin
   slower propagation (CNcert)

 • Concealment – clear logs, self destruction, acts when
   phone not used
 • Defence – attacks security software
 • Transmission – infects other devices via SMS,
   downloads new malware from C&C
The Pocket Botnet




Конференция UISG #7 - Jart Armin
Pocket Botnet Takedown – US Telco & GG tracker

  GG tracker (abusing premium SMS by malware)

   • Signup via website, SMS used to authenticate




                                                    Конференция UISG #7 - Jart Armin
   • Subscriber pays $9.99 / call
   • Operator pays SMS aggregator
   • Aggregator pays to content provider
   • Content provider pays spammers etc.
   • Around 30,000 victims mid 2011
Pocket Botnet, another method to infect the PC?




                                                               Конференция UISG #7 - Jart Armin
  Note: recent SpyEye banking SMS hijacking (blended threat)
Pocket Botnet - DDoS
     DDoS– partly smart phone based




                                      Конференция UISG #7 - Jart Armin
The Pocket Botnet – Build your Own? -
Android.Pjapps




                                        Конференция UISG #7 - Jart Armin
The Pocket Botnet - Android.Pjapps
Trojan C&C building manifest




                                     Конференция UISG #7 - Jart Armin
The Pocket Botnet – Build Your Own?
Hijacking Android or Symbian - Example
Establish a dial in server - based on modem configuration for mgetty
 • Establish: #/AutoPPP/ - a_ppp /usr/sbin/pppd auth -chap +pap
   login debug




                                                                       Конференция UISG #7 - Jart Armin
 • Change to = /AutoPPP/ - a_ppp /usr/sbin/pppd auth -chap +pap
   login debug
 • Setup PPP options e.g. ms-dns 3.4.5.6 #replace 3.4.5.6 with DNS
   address Slave
 • Add users (zombies) to pap-secrets
 • Create Linux users
 • Broadcast
Pocket Botnet – warning notice :




                                   Конференция UISG #7 - Jart Armin
The Pocket Botnet - Discussion
• With market growth increasing target is
  Android, but all O/S vulnerable
• Different to pc based botnets, shorter
  lived but as a wildfire




                                            Конференция UISG #7 - Jart Armin
• The ‘free app’ & similar to PCs‘fake
  A/V’ syndrome.
• Telcos’ have an advantage to strike
  down, but example of China Telecom
  only method was to block & takedown
  C&Cs / download servers
Action Perspective
 • The main effort for manufacturers is to prevent
   smartphones from becoming mini ISPs/re-broadcasting
   hubs.
 • Avoid the unit becoming a router and using PPP (Point-




                                                            Конференция UISG #7 - Jart Armin
   to-Point Protocol); through using “mgetty” or similar
   commands; or in Microsoft Windows RAS (Remote
   Access Service).
 • Best if the platform reveals the phone number of the
   device only to the smartphone’s modem
 • Issue an IPv6 IP and public encryption for each
   smartphone
The Pocket Botnet
             Contact presenter at jart@cyberdefcon.com if you
             have further interest:

             CyberDefcon – Cybercrime Clearing House & Early warning
             Coalition

             DeepEndResearch.org - fostering collaborative security
             research and analysis efforts

             UNICRI - United Nations Interregional Crime and Justice
             Research Institute

             ENISA -the European Network and Information Security
             Agency

             The opinions hereby expressed are those of the Authors and
             do not necessarily represent the ideas and opinions of the
             United Nations, the UN agency “UNICRI”, ENISA, ENISA PSG,
             nor others.
Useful Community Sources
• Eicar 2011 - New type of threat: Mobile botnets on Symbian - Cao Yang, Zou Shihong, Li
  Wei
• Niebezpiecznik (Pl) http://niebezpiecznik.pl/post/zeus-straszy-polskie-banki/
• Collin Mulliner and Jean-Pierre Seifert IEEE (Fr)
  http://mulliner.org/collin/academic/publications/ibots_MALWARE2010.pdf




                                                                                           Конференция UISG #7 - Jart Armin
• Georgia Weider ShmooCon
  http://www.grmn00bs.com/GeorgiaW_Smartphone_Bots_SLIDES_Shmoocon2011.pdf
• AnserverBot - AnserverBot_Analysis.pdf
• HostExploit (hosts)
• DeependResearch.org (botnets+)
• Contagio.Blogspot (mobile malware samples)

• Commercial: Trend Micro, Damballa, Lookout Mobile Security, Symantec

More Related Content

What's hot

iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
 iParanoid: an IMSI Catcher - Stingray Intrusion Detection System iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
Luca Bongiorni
 
Defcon 22-robert-rowley-detecting-defending-against-surveill
Defcon 22-robert-rowley-detecting-defending-against-surveillDefcon 22-robert-rowley-detecting-defending-against-surveill
Defcon 22-robert-rowley-detecting-defending-against-surveill
Priyanka Aash
 
Risk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Factory: Let's Get Physical
Risk Factory: Let's Get Physical
Risk Crew
 
LPR
LPRLPR
LPR
ibzmir
 
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CloudIDSummit
 
IIJmio meeting 31 SIMフリースマホの昔と今
IIJmio meeting 31 SIMフリースマホの昔と今IIJmio meeting 31 SIMフリースマホの昔と今
IIJmio meeting 31 SIMフリースマホの昔と今
techlog (Internet Initiative Japan Inc.)
 
Implementing Trusted Endpoints in the Mobile World
Implementing Trusted Endpoints in the Mobile WorldImplementing Trusted Endpoints in the Mobile World
Implementing Trusted Endpoints in the Mobile World
LINE Corporation
 
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security ThreatsBank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
Michelle Morgan-Nelsen
 
Device Hacking
Device HackingDevice Hacking
Device Hacking
Damian T. Gordon
 
Vulnerability in Security Products
Vulnerability in Security ProductsVulnerability in Security Products
Vulnerability in Security Products
DaveEdwards12
 
Tatyana-Arnaudova - English
Tatyana-Arnaudova - EnglishTatyana-Arnaudova - English
Tatyana-Arnaudova - English
Tatyana Arnaudova
 
Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular Systems
ACMBangalore
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析
Onward Security
 
Luxemburg event - airtight networks
Luxemburg event - airtight networksLuxemburg event - airtight networks
Luxemburg event - airtight networks
Kappa Data
 
Using FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT DevicesUsing FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT Devices
FIDO Alliance
 

What's hot (15)

iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
 iParanoid: an IMSI Catcher - Stingray Intrusion Detection System iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
 
Defcon 22-robert-rowley-detecting-defending-against-surveill
Defcon 22-robert-rowley-detecting-defending-against-surveillDefcon 22-robert-rowley-detecting-defending-against-surveill
Defcon 22-robert-rowley-detecting-defending-against-surveill
 
Risk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Factory: Let's Get Physical
Risk Factory: Let's Get Physical
 
LPR
LPRLPR
LPR
 
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
 
IIJmio meeting 31 SIMフリースマホの昔と今
IIJmio meeting 31 SIMフリースマホの昔と今IIJmio meeting 31 SIMフリースマホの昔と今
IIJmio meeting 31 SIMフリースマホの昔と今
 
Implementing Trusted Endpoints in the Mobile World
Implementing Trusted Endpoints in the Mobile WorldImplementing Trusted Endpoints in the Mobile World
Implementing Trusted Endpoints in the Mobile World
 
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security ThreatsBank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
 
Device Hacking
Device HackingDevice Hacking
Device Hacking
 
Vulnerability in Security Products
Vulnerability in Security ProductsVulnerability in Security Products
Vulnerability in Security Products
 
Tatyana-Arnaudova - English
Tatyana-Arnaudova - EnglishTatyana-Arnaudova - English
Tatyana-Arnaudova - English
 
Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular Systems
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析
 
Luxemburg event - airtight networks
Luxemburg event - airtight networksLuxemburg event - airtight networks
Luxemburg event - airtight networks
 
Using FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT DevicesUsing FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT Devices
 

Viewers also liked

Jagdeep SAP SD Consultant
Jagdeep SAP SD ConsultantJagdeep SAP SD Consultant
Jagdeep SAP SD Consultant
Jagdeep Singh
 
Like and as
Like and asLike and as
Like and as
Lizzi Vistin
 
Dillon
DillonDillon
Dillon
d3navarro
 
Geo science global climate change lec
Geo science   global climate change lecGeo science   global climate change lec
Geo science global climate change lec
fvine
 
Emprendedurismo
EmprendedurismoEmprendedurismo
Story part 2
Story part 2Story part 2
Story part 2
Taiwan Report
 
Nevera Balay 3FC1552L
Nevera Balay 3FC1552LNevera Balay 3FC1552L
Nevera Balay 3FC1552L
Alsako Electrodomésticos
 
Nevera Balay 3FF3700B
Nevera Balay 3FF3700BNevera Balay 3FF3700B
Nevera Balay 3FF3700B
Alsako Electrodomésticos
 
Nevera Balay 3FC1502B
Nevera Balay 3FC1502BNevera Balay 3FC1502B
Nevera Balay 3FC1502B
Alsako Electrodomésticos
 
Encimera Balay 3ETG391BP
Encimera Balay 3ETG391BPEncimera Balay 3ETG391BP
Encimera Balay 3ETG391BP
Alsako Electrodomésticos
 
POS Malware: Is your Debit/Credit Transcations Secure?
POS Malware: Is your Debit/Credit Transcations Secure?POS Malware: Is your Debit/Credit Transcations Secure?
POS Malware: Is your Debit/Credit Transcations Secure?
Cysinfo Cyber Security Community
 
Sensory branding
Sensory branding Sensory branding
Sensory branding
Jayesh Gawde
 
Memoria cpx 2015d
Memoria cpx 2015dMemoria cpx 2015d
Memoria cpx 2015d
CenproexFormacion
 

Viewers also liked (13)

Jagdeep SAP SD Consultant
Jagdeep SAP SD ConsultantJagdeep SAP SD Consultant
Jagdeep SAP SD Consultant
 
Like and as
Like and asLike and as
Like and as
 
Dillon
DillonDillon
Dillon
 
Geo science global climate change lec
Geo science   global climate change lecGeo science   global climate change lec
Geo science global climate change lec
 
Emprendedurismo
EmprendedurismoEmprendedurismo
Emprendedurismo
 
Story part 2
Story part 2Story part 2
Story part 2
 
Nevera Balay 3FC1552L
Nevera Balay 3FC1552LNevera Balay 3FC1552L
Nevera Balay 3FC1552L
 
Nevera Balay 3FF3700B
Nevera Balay 3FF3700BNevera Balay 3FF3700B
Nevera Balay 3FF3700B
 
Nevera Balay 3FC1502B
Nevera Balay 3FC1502BNevera Balay 3FC1502B
Nevera Balay 3FC1502B
 
Encimera Balay 3ETG391BP
Encimera Balay 3ETG391BPEncimera Balay 3ETG391BP
Encimera Balay 3ETG391BP
 
POS Malware: Is your Debit/Credit Transcations Secure?
POS Malware: Is your Debit/Credit Transcations Secure?POS Malware: Is your Debit/Credit Transcations Secure?
POS Malware: Is your Debit/Credit Transcations Secure?
 
Sensory branding
Sensory branding Sensory branding
Sensory branding
 
Memoria cpx 2015d
Memoria cpx 2015dMemoria cpx 2015d
Memoria cpx 2015d
 

Similar to Short 1100 Jart Armin - The Pocket Botnet

NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
ssuser57b3e5
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
mahendrarm2112
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
Vasco Veloso
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
Pragati Rai
 
IOT Security
IOT SecurityIOT Security
IOT Security
Sylvain Martinez
 
Defcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosDefcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddos
Priyanka Aash
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
Jimmy Shah
 
Visualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber SecurityVisualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber Security
Cambridge Intelligence
 
IRJET- Smart Door Security System using Raspberry Pi with Telegram
IRJET- Smart Door Security System using Raspberry Pi with TelegramIRJET- Smart Door Security System using Raspberry Pi with Telegram
IRJET- Smart Door Security System using Raspberry Pi with Telegram
IRJET Journal
 
Securing mobile population for White Hats
Securing mobile population for White HatsSecuring mobile population for White Hats
Securing mobile population for White Hats
Vladimir Jirasek
 
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmUnauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token Algorithm
IJSRED
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
Santosh Satam
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
Duo Security
 
Lightweight Distributed Attack Detection and Prevention for the Safe Internet...
Lightweight Distributed Attack Detection and Prevention for the Safe Internet...Lightweight Distributed Attack Detection and Prevention for the Safe Internet...
Lightweight Distributed Attack Detection and Prevention for the Safe Internet...
Vladimir Eliseev
 
Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0
mobileironmarketing
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technology
OKsystem
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CloudIDSummit
 
Info security - mobile approach
Info security -  mobile approachInfo security -  mobile approach
Info security - mobile approach
EY Belgium
 
S.W.A.T – Motion Based Intrusion Detection System
S.W.A.T – Motion Based Intrusion Detection SystemS.W.A.T – Motion Based Intrusion Detection System
S.W.A.T – Motion Based Intrusion Detection System
IRJET Journal
 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinha
Avinash Sinha
 

Similar to Short 1100 Jart Armin - The Pocket Botnet (20)

NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
Defcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosDefcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddos
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
 
Visualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber SecurityVisualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber Security
 
IRJET- Smart Door Security System using Raspberry Pi with Telegram
IRJET- Smart Door Security System using Raspberry Pi with TelegramIRJET- Smart Door Security System using Raspberry Pi with Telegram
IRJET- Smart Door Security System using Raspberry Pi with Telegram
 
Securing mobile population for White Hats
Securing mobile population for White HatsSecuring mobile population for White Hats
Securing mobile population for White Hats
 
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmUnauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token Algorithm
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
 
Lightweight Distributed Attack Detection and Prevention for the Safe Internet...
Lightweight Distributed Attack Detection and Prevention for the Safe Internet...Lightweight Distributed Attack Detection and Prevention for the Safe Internet...
Lightweight Distributed Attack Detection and Prevention for the Safe Internet...
 
Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technology
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
Info security - mobile approach
Info security -  mobile approachInfo security -  mobile approach
Info security - mobile approach
 
S.W.A.T – Motion Based Intrusion Detection System
S.W.A.T – Motion Based Intrusion Detection SystemS.W.A.T – Motion Based Intrusion Detection System
S.W.A.T – Motion Based Intrusion Detection System
 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinha
 

More from UISGCON

Vladimir Kozak - Информационная безопасность и защита персональных данных в к...
Vladimir Kozak - Информационная безопасность и защита персональных данных в к...Vladimir Kozak - Информационная безопасность и защита персональных данных в к...
Vladimir Kozak - Информационная безопасность и защита персональных данных в к...UISGCON
 
Vladimir Bezmaly - Расследование инцидентов в ОС Windows #uisgcon9
Vladimir Bezmaly - Расследование инцидентов в ОС Windows #uisgcon9Vladimir Bezmaly - Расследование инцидентов в ОС Windows #uisgcon9
Vladimir Bezmaly - Расследование инцидентов в ОС Windows #uisgcon9UISGCON
 
Mikhail Kader - Можно ли обеспечить безопасность облачных вычислений? #uisgcon9
Mikhail Kader - Можно ли обеспечить безопасность облачных вычислений? #uisgcon9Mikhail Kader - Можно ли обеспечить безопасность облачных вычислений? #uisgcon9
Mikhail Kader - Можно ли обеспечить безопасность облачных вычислений? #uisgcon9UISGCON
 
Mikhail Emelyannikov - А Вы готовы обменять свою приватность на безопасность ...
Mikhail Emelyannikov - А Вы готовы обменять свою приватность на безопасность ...Mikhail Emelyannikov - А Вы готовы обменять свою приватность на безопасность ...
Mikhail Emelyannikov - А Вы готовы обменять свою приватность на безопасность ...UISGCON
 
Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9
UISGCON
 
Kimberly Zenz - Financial Options for Cyber Criminals #uisgcon9
Kimberly Zenz - Financial Options for Cyber Criminals #uisgcon9Kimberly Zenz - Financial Options for Cyber Criminals #uisgcon9
Kimberly Zenz - Financial Options for Cyber Criminals #uisgcon9
UISGCON
 
Dmitriy Ponomarev - Thinking outside the box #uisgcon9
Dmitriy Ponomarev - Thinking outside the box #uisgcon9Dmitriy Ponomarev - Thinking outside the box #uisgcon9
Dmitriy Ponomarev - Thinking outside the box #uisgcon9UISGCON
 
Alexander Dmitriev - Практика построения ключевых процессов менеджмента инфор...
Alexander Dmitriev - Практика построения ключевых процессов менеджмента инфор...Alexander Dmitriev - Практика построения ключевых процессов менеджмента инфор...
Alexander Dmitriev - Практика построения ключевых процессов менеджмента инфор...UISGCON
 
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
UISGCON
 
Alex Eden - Не доверяй и проверяй
Alex Eden - Не доверяй и проверяйAlex Eden - Не доверяй и проверяй
Alex Eden - Не доверяй и проверяйUISGCON
 
Владимир Гнинюк - Управление Риском: Почему не работает?
Владимир Гнинюк - Управление Риском: Почему не работает?Владимир Гнинюк - Управление Риском: Почему не работает?
Владимир Гнинюк - Управление Риском: Почему не работает?UISGCON
 
Владимир Илибман - Межсетевые экраны следующего поколения. Определение и мето...
Владимир Илибман - Межсетевые экраны следующего поколения. Определение и мето...Владимир Илибман - Межсетевые экраны следующего поколения. Определение и мето...
Владимир Илибман - Межсетевые экраны следующего поколения. Определение и мето...UISGCON
 
Брудский Кузьма Ефимович - Несанкционированный доступ к персональным данным: ...
Брудский Кузьма Ефимович - Несанкционированный доступ к персональным данным: ...Брудский Кузьма Ефимович - Несанкционированный доступ к персональным данным: ...
Брудский Кузьма Ефимович - Несанкционированный доступ к персональным данным: ...UISGCON
 
Безмалый Владимир Федорович - Сервисы репутации в информационной безопасности
Безмалый Владимир Федорович - Сервисы репутации в информационной безопасности Безмалый Владимир Федорович - Сервисы репутации в информационной безопасности
Безмалый Владимир Федорович - Сервисы репутации в информационной безопасности UISGCON
 
Медведев Вячеслав Владимирович - Беззащитность участников систем дистанционно...
Медведев Вячеслав Владимирович - Беззащитность участников систем дистанционно...Медведев Вячеслав Владимирович - Беззащитность участников систем дистанционно...
Медведев Вячеслав Владимирович - Беззащитность участников систем дистанционно...UISGCON
 
Александр Дмитриев - Практические аспекты внедрения системы менеджмента инфор...
Александр Дмитриев - Практические аспекты внедрения системы менеджмента инфор...Александр Дмитриев - Практические аспекты внедрения системы менеджмента инфор...
Александр Дмитриев - Практические аспекты внедрения системы менеджмента инфор...UISGCON
 
Дмитрий Петращук - Аутсорсинг системы мониторинга событий информационной безо...
Дмитрий Петращук - Аутсорсинг системы мониторинга событий информационной безо...Дмитрий Петращук - Аутсорсинг системы мониторинга событий информационной безо...
Дмитрий Петращук - Аутсорсинг системы мониторинга событий информационной безо...UISGCON
 
Алексей Лукацкий - Как сформировать правильную модель сетевых угроз
Алексей Лукацкий - Как сформировать правильную модель сетевых угроз Алексей Лукацкий - Как сформировать правильную модель сетевых угроз
Алексей Лукацкий - Как сформировать правильную модель сетевых угроз UISGCON
 
Владимир Ткаченко - Эффективная программа повышения осведомленности в вопроса...
Владимир Ткаченко - Эффективная программа повышения осведомленности в вопроса...Владимир Ткаченко - Эффективная программа повышения осведомленности в вопроса...
Владимир Ткаченко - Эффективная программа повышения осведомленности в вопроса...UISGCON
 
Владимир Стыран - Пентест следующего поколения, который ваша компания не може...
Владимир Стыран - Пентест следующего поколения, который ваша компания не може...Владимир Стыран - Пентест следующего поколения, который ваша компания не може...
Владимир Стыран - Пентест следующего поколения, который ваша компания не може...
UISGCON
 

More from UISGCON (20)

Vladimir Kozak - Информационная безопасность и защита персональных данных в к...
Vladimir Kozak - Информационная безопасность и защита персональных данных в к...Vladimir Kozak - Информационная безопасность и защита персональных данных в к...
Vladimir Kozak - Информационная безопасность и защита персональных данных в к...
 
Vladimir Bezmaly - Расследование инцидентов в ОС Windows #uisgcon9
Vladimir Bezmaly - Расследование инцидентов в ОС Windows #uisgcon9Vladimir Bezmaly - Расследование инцидентов в ОС Windows #uisgcon9
Vladimir Bezmaly - Расследование инцидентов в ОС Windows #uisgcon9
 
Mikhail Kader - Можно ли обеспечить безопасность облачных вычислений? #uisgcon9
Mikhail Kader - Можно ли обеспечить безопасность облачных вычислений? #uisgcon9Mikhail Kader - Можно ли обеспечить безопасность облачных вычислений? #uisgcon9
Mikhail Kader - Можно ли обеспечить безопасность облачных вычислений? #uisgcon9
 
Mikhail Emelyannikov - А Вы готовы обменять свою приватность на безопасность ...
Mikhail Emelyannikov - А Вы готовы обменять свою приватность на безопасность ...Mikhail Emelyannikov - А Вы готовы обменять свою приватность на безопасность ...
Mikhail Emelyannikov - А Вы готовы обменять свою приватность на безопасность ...
 
Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9
 
Kimberly Zenz - Financial Options for Cyber Criminals #uisgcon9
Kimberly Zenz - Financial Options for Cyber Criminals #uisgcon9Kimberly Zenz - Financial Options for Cyber Criminals #uisgcon9
Kimberly Zenz - Financial Options for Cyber Criminals #uisgcon9
 
Dmitriy Ponomarev - Thinking outside the box #uisgcon9
Dmitriy Ponomarev - Thinking outside the box #uisgcon9Dmitriy Ponomarev - Thinking outside the box #uisgcon9
Dmitriy Ponomarev - Thinking outside the box #uisgcon9
 
Alexander Dmitriev - Практика построения ключевых процессов менеджмента инфор...
Alexander Dmitriev - Практика построения ключевых процессов менеджмента инфор...Alexander Dmitriev - Практика построения ключевых процессов менеджмента инфор...
Alexander Dmitriev - Практика построения ключевых процессов менеджмента инфор...
 
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
 
Alex Eden - Не доверяй и проверяй
Alex Eden - Не доверяй и проверяйAlex Eden - Не доверяй и проверяй
Alex Eden - Не доверяй и проверяй
 
Владимир Гнинюк - Управление Риском: Почему не работает?
Владимир Гнинюк - Управление Риском: Почему не работает?Владимир Гнинюк - Управление Риском: Почему не работает?
Владимир Гнинюк - Управление Риском: Почему не работает?
 
Владимир Илибман - Межсетевые экраны следующего поколения. Определение и мето...
Владимир Илибман - Межсетевые экраны следующего поколения. Определение и мето...Владимир Илибман - Межсетевые экраны следующего поколения. Определение и мето...
Владимир Илибман - Межсетевые экраны следующего поколения. Определение и мето...
 
Брудский Кузьма Ефимович - Несанкционированный доступ к персональным данным: ...
Брудский Кузьма Ефимович - Несанкционированный доступ к персональным данным: ...Брудский Кузьма Ефимович - Несанкционированный доступ к персональным данным: ...
Брудский Кузьма Ефимович - Несанкционированный доступ к персональным данным: ...
 
Безмалый Владимир Федорович - Сервисы репутации в информационной безопасности
Безмалый Владимир Федорович - Сервисы репутации в информационной безопасности Безмалый Владимир Федорович - Сервисы репутации в информационной безопасности
Безмалый Владимир Федорович - Сервисы репутации в информационной безопасности
 
Медведев Вячеслав Владимирович - Беззащитность участников систем дистанционно...
Медведев Вячеслав Владимирович - Беззащитность участников систем дистанционно...Медведев Вячеслав Владимирович - Беззащитность участников систем дистанционно...
Медведев Вячеслав Владимирович - Беззащитность участников систем дистанционно...
 
Александр Дмитриев - Практические аспекты внедрения системы менеджмента инфор...
Александр Дмитриев - Практические аспекты внедрения системы менеджмента инфор...Александр Дмитриев - Практические аспекты внедрения системы менеджмента инфор...
Александр Дмитриев - Практические аспекты внедрения системы менеджмента инфор...
 
Дмитрий Петращук - Аутсорсинг системы мониторинга событий информационной безо...
Дмитрий Петращук - Аутсорсинг системы мониторинга событий информационной безо...Дмитрий Петращук - Аутсорсинг системы мониторинга событий информационной безо...
Дмитрий Петращук - Аутсорсинг системы мониторинга событий информационной безо...
 
Алексей Лукацкий - Как сформировать правильную модель сетевых угроз
Алексей Лукацкий - Как сформировать правильную модель сетевых угроз Алексей Лукацкий - Как сформировать правильную модель сетевых угроз
Алексей Лукацкий - Как сформировать правильную модель сетевых угроз
 
Владимир Ткаченко - Эффективная программа повышения осведомленности в вопроса...
Владимир Ткаченко - Эффективная программа повышения осведомленности в вопроса...Владимир Ткаченко - Эффективная программа повышения осведомленности в вопроса...
Владимир Ткаченко - Эффективная программа повышения осведомленности в вопроса...
 
Владимир Стыран - Пентест следующего поколения, который ваша компания не може...
Владимир Стыран - Пентест следующего поколения, который ваша компания не може...Владимир Стыран - Пентест следующего поколения, который ваша компания не може...
Владимир Стыран - Пентест следующего поколения, который ваша компания не може...
 

Recently uploaded

Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 

Recently uploaded (20)

Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 

Short 1100 Jart Armin - The Pocket Botnet

  • 1. Конференция UISG #7 The Pocket Botnet Jart Armin HostExploit – CyberDefcon DeepEnd Research Org Kiev – Ukraine – USIG December 2011
  • 2. Specialist international team via HostExploit and CyberDefcon that provides cybercrime analysis and quarterly reports on all the world’s hosts and Internet servers.  Quarterly series of Top 50 Bad Hosts & Networks.  CSF (Cyber Security Foundation) Team member of DeepEnd Research Конференция UISG #7 - Jart Armin   UNICRI, ENISA, APWG
  • 3. Конференция UISG #7 - Jart Armin 3rd Quarter World Host Report – Oct 2011
  • 4. Overview Botnets - Problem? What Problem? The Market Конференция UISG #7 - Jart Armin Mobile Malware The Pocket Botnet
  • 5. Botnets in General - A Problem – What Problem?  Currently around 5,720 measurably active botnets • IRC (still around 30%), Jabber, I2P, P2P, HTTP, mini, Pocket Botnet Конференция UISG #7 - Jart Armin  DDoS, RFI, vulnerability scanning, spam, phishing, malware, data exfiltration…. APT  Covert channels  Bad guys & gray guys?
  • 6. Smartphone Market Oct 2011 (a) Конференция UISG #7 - Jart Armin 468 million units by the end of 2011, a rise of 60% compared 2010 (296m)
  • 7. Smartphone Market (a) O/S 2012 Конференция UISG #7 - Jart Armin
  • 8. Smartphone Market (b) O/S – 2010 / 2015 Конференция UISG #7 - Jart Armin
  • 9. Smartphone Shipping – 2010 / 2015 PC Ref: Est. 500m PCs sold 2011, and 2 Конференция UISG #7 - Jart Armin billion PCs in use around the world, in 2015
  • 10. Mobile Security Habits – Oct 2011 • People choose convenience over security practices • Towards 50% use to connect to banks or financial accounts • 97% use to connect to email accounts either work or Конференция UISG #7 - Jart Armin personal • 87% of phones are not supplied by an employer • One third leave apps/accounts constantly logged in • Best example – Reported as a major hack against USA – A US contractor for SCADA (Illinois water authority) login and maintaining data while on trip to Egypt & Russia via his mobile phone !!!
  • 11. Mobile Malware – Pocket Botnet Ready • 1,700 versions (NetQin) • 113 samples (Contagio / Deepend) • 1410% increase in mobile malware samples (Trend Micro) Конференция UISG #7 - Jart Armin • Zitmo Android Edition (Zeus for mobile) • SpyEye – SMS banking hijacks (mTANs) • Premium SMS, root kits, data stealers, click fraud, spyware, malware
  • 12. Android.SmsSend family – 6 to 60 in 2011 Конференция UISG #7 - Jart Armin Primarily the same deception as fake A/V
  • 13. ANSERVER.A Конференция UISG #7 - Jart Armin Permissions Using a C&C server
  • 14. Pocket Botnet - ThemeInstaller.A – (zombie – China) • Infected 1 million Symbian smartphones in 1 week & Конференция UISG #7 - Jart Armin slower propagation (CNcert) • Concealment – clear logs, self destruction, acts when phone not used • Defence – attacks security software • Transmission – infects other devices via SMS, downloads new malware from C&C
  • 16. Pocket Botnet Takedown – US Telco & GG tracker GG tracker (abusing premium SMS by malware) • Signup via website, SMS used to authenticate Конференция UISG #7 - Jart Armin • Subscriber pays $9.99 / call • Operator pays SMS aggregator • Aggregator pays to content provider • Content provider pays spammers etc. • Around 30,000 victims mid 2011
  • 17. Pocket Botnet, another method to infect the PC? Конференция UISG #7 - Jart Armin Note: recent SpyEye banking SMS hijacking (blended threat)
  • 18. Pocket Botnet - DDoS DDoS– partly smart phone based Конференция UISG #7 - Jart Armin
  • 19. The Pocket Botnet – Build your Own? - Android.Pjapps Конференция UISG #7 - Jart Armin
  • 20. The Pocket Botnet - Android.Pjapps Trojan C&C building manifest Конференция UISG #7 - Jart Armin
  • 21. The Pocket Botnet – Build Your Own? Hijacking Android or Symbian - Example Establish a dial in server - based on modem configuration for mgetty • Establish: #/AutoPPP/ - a_ppp /usr/sbin/pppd auth -chap +pap login debug Конференция UISG #7 - Jart Armin • Change to = /AutoPPP/ - a_ppp /usr/sbin/pppd auth -chap +pap login debug • Setup PPP options e.g. ms-dns 3.4.5.6 #replace 3.4.5.6 with DNS address Slave • Add users (zombies) to pap-secrets • Create Linux users • Broadcast
  • 22. Pocket Botnet – warning notice : Конференция UISG #7 - Jart Armin
  • 23. The Pocket Botnet - Discussion • With market growth increasing target is Android, but all O/S vulnerable • Different to pc based botnets, shorter lived but as a wildfire Конференция UISG #7 - Jart Armin • The ‘free app’ & similar to PCs‘fake A/V’ syndrome. • Telcos’ have an advantage to strike down, but example of China Telecom only method was to block & takedown C&Cs / download servers
  • 24. Action Perspective • The main effort for manufacturers is to prevent smartphones from becoming mini ISPs/re-broadcasting hubs. • Avoid the unit becoming a router and using PPP (Point- Конференция UISG #7 - Jart Armin to-Point Protocol); through using “mgetty” or similar commands; or in Microsoft Windows RAS (Remote Access Service). • Best if the platform reveals the phone number of the device only to the smartphone’s modem • Issue an IPv6 IP and public encryption for each smartphone
  • 25. The Pocket Botnet Contact presenter at jart@cyberdefcon.com if you have further interest: CyberDefcon – Cybercrime Clearing House & Early warning Coalition DeepEndResearch.org - fostering collaborative security research and analysis efforts UNICRI - United Nations Interregional Crime and Justice Research Institute ENISA -the European Network and Information Security Agency The opinions hereby expressed are those of the Authors and do not necessarily represent the ideas and opinions of the United Nations, the UN agency “UNICRI”, ENISA, ENISA PSG, nor others.
  • 26. Useful Community Sources • Eicar 2011 - New type of threat: Mobile botnets on Symbian - Cao Yang, Zou Shihong, Li Wei • Niebezpiecznik (Pl) http://niebezpiecznik.pl/post/zeus-straszy-polskie-banki/ • Collin Mulliner and Jean-Pierre Seifert IEEE (Fr) http://mulliner.org/collin/academic/publications/ibots_MALWARE2010.pdf Конференция UISG #7 - Jart Armin • Georgia Weider ShmooCon http://www.grmn00bs.com/GeorgiaW_Smartphone_Bots_SLIDES_Shmoocon2011.pdf • AnserverBot - AnserverBot_Analysis.pdf • HostExploit (hosts) • DeependResearch.org (botnets+) • Contagio.Blogspot (mobile malware samples) • Commercial: Trend Micro, Damballa, Lookout Mobile Security, Symantec