SlideShare a Scribd company logo
Tom Gilheany, CISSP
Twitter: @TomGilheany
http://gilheany.net
Loading… _
CYBER SECURITY
INTRODUCTORY SEMINAR
Defenders
Tools
Laws & Regs.
7 Hackers
Target: YOU
Attacks
The seven hackers you will
encounter in the wilds of
the internet… _
Attacks are EVERYWHERE
YOU are the TARGET…
Intended or Not!
? ? ?
?
? ?
?YOU MAY BE ASKING:
• Who would want to attack ME?
• Who ARE these people?
• What’s their MOTIVATION?_
? ? ?
?
? ?
?
? ? ?
?
? ?
?
WHO ARE THEY?
• Limited Technical Knowledge
• Use downloaded software kits.
• Some kits = advanced damage!
• Unaware or do not care about
consequences. MOTIVATIONS:
• Immaturity
• Ego-Boosting
• Thrill Seeking.
EXAMPLE:
The Movie Wargames…
©1983, MGM Pictures
WHO ARE THEY? High-Tech, Low-Life
• Disregard for Authority, Societal Norms – Cultural
Rebels
• Hard-Boiled Hacker with Anarchist Tendencies
• More technically sophisticated than Script-Kiddies
• Counts on “Slap on the Wrist”
• Predominantly 12-18yo Males
• Techno-Revolutionary, Manifestos, Rave/Techo
MOTIVATIONS:
• Recognition from Peers, “Respect” (or fear) from “the
system”
• “Cling to a cult of individualism, in a culture
characterized by corporate control and mass
conformity.”
EXAMPLE: High-Tech Low-Life
The Matrix
©1999, Warner Bros.
WHO ARE THEY?
• Defacing or DDoS’ing sites,
claiming “civil disobedience”.
• Individuals & loosely organized
groups/mobs distributed across the
internet.
• May be from
other categories,
“Hacktivism”
as justification.
MOTIVATIONS:
• Revenge, Power,
Greed, Marketing,
Media Attention
• Vigilante Justice
• Political Agenda
EXAMPLE: Anonymous
WHO ARE THEY?
• Common Criminals (part-time)
• Credit Cards, BitCoin, Wire Theft
• Identity Theft
• Intellectual Property Theft
• Service Theft (AWS, VoIP, Storage)
• Organized Crime
• Large Scale
• Sophisticated
• Hired Teams: Specialists
• Theft of ANYTHING of value…
MOTIVATIONS:
• Money
• Greed
EXAMPLE:
• Petty  Organized Crime.
© 2001, Warner Bros.
WHO ARE THEY?
• Adolescent  College Student 
Adult  Ex-Writer
• Skill varies.
• Writer may not be one who releases
it into the wild.
MOTIVATIONS:
• Mental Challenge  Attention
• Raw Thrill  Bragging Rights
EXAMPLES:
https://krebsonsecurity.com/2013/04/who-wrote-the-flashback-
os-x-worm/
https://www.trustwave.com/Resources/SpiderLabs-Blog/Hacking-
a-Reporter--Writing-Malware-For-Fun-and-Profit-%28Part-1-of-
3%29/
https://grahamcluley.com/2014/11/write-regin-malware/
http://www.scmagazine.com/russian-man-claims-he-wrote-target-
pos-malware-as-a-security-program/article/330337/
WHO ARE THEY?
• VERY Sophisticated – Creators of
Advanced Persistent Threats.
• Custom, High-Threat Attacks.
• Avail. for-hire – Org. Crime, foreign
governments.
• Advanced Training
• Clandestine
• (Ex?)Intelligence
• Cyber Warfare Recon. & Intel.
MOTIVATIONS:
• Profession
PLA Unit #61398,
and #61486
EXAMPLE:
WHO ARE THEY?
• Extortionists.
• Cyber-Warfare / Intelligence
• Connection to Physical World
MOTIVATIONS:
• Power
• Political
• Extortion=Greed
EXAMPLE:
Script-Kiddies
Cyber-Punks
Hacktivists
Thieves
Malware
Writers
Cyber-Terrorists
Professionals
Growing Groups:
• Political
Activists
• Insiders
• Organized Crime
• Cyber Warriors
Wide Range of Insiders:
• Begrudged Employee
• Developers/Engineers
• Sales People
• Unwittingly Co-Opted people.
LESSON: Have clear well-known policies on
Intellectual Property (IP) protection!
GENERAL MOTIVES: Understand yourself as a target
• Revenge
• Is there anyone with an axe to grind?
• Would cost of a security breach be high?
• Brand Damage
• Political Damage
• Costly Fines or Penalties
• Loss of Information Assets/Control
• Notoriety
• Could somebody get famous or gain “street
credibility” for hacking your company, product,
or service?
• Curiosity
• Do you have interesting information, computing
environments or assets? (NASA, Computer-Game
Company…).
Financial Motives: Understand yourself as a
target
Black Market Price$:Adwords: $1000
(to drain competitors AdWords Budget)
Botnets – USA: $180 / 1,000 Computers
– Canada: $270
– UK: $240
– France: $200
– Russia: $200
– Worldwide: $35
Credit Cards – Premium Big Balance: $250
– Regular CC w/ SSN: $5
Doxing Someone: $25-$100
Health Insurance Info: $1200 - $1300
Twitter Followers: $15 / 10,000 Fake Follows
Email Accounts – Gmail: $200 / 1,000
– Hotmail $12 / 1,000
– Yahoo: $10 / 1,000
Facebook – Likes: $15 / 1,000
– Spam: $13 page w/ 30k fans
Hacked Webcams – Male: $0.01 Female: $1
Online Bank Account – USA: 2% Acct. Bal.
– EU 4%-6% Acct. Bal.
Online Funds to Cash: 9% - 40% Commission
PayPal Account: 6%-20% of Balance
Online Game Hackers: $16k/mo in China
Remote Admin Tool: $40 for Blackshades
Website Traffic: $1 for 1,000 Fake Visitors
Thought: If a hacker is selling access to compromised
computer for 18 cents, or gmail account for 20 cents,
how much must it cost to break into that computer???
Skill Level
Revenge
Curiosity
Financial
Notoriety
++
+
+
NV: Novice
OG: Old Guard Hackers
CP: Cyber-Punks
PA: Political Activists
PT: Petty Thieves
PC: Pro Criminals
IW: Info Warriors
IN: Internals
MW: Malware Writers
NV
OG
MW
IN
IW
PT
PC
PACP
It is said that if you
know your
enemies
and know yourself,
you will not be imperiled
in a hundred battles…
-Sun Tzu, The Art of War (6th Century
CyberSecurity Primer
Defenders
Tools
Laws & Regs.
7 Hackers
Target: YOU
Attacks
Bibliography:
The Psyche of Cybercriminals: A
Psycho-Social Perspective
Marcus K. Rogers
http://202.154.59.182/mfile/files/Information%20System/Cybercrimes%20A%20Multidisciplinary%20Analysis/Chapter%201
4%20The%20Psyche%20of%20Cybercriminals%3B%20A%20Psycho-Social%20Perspective.pdf
Bibliography:
Black Market Pricing:
http://www.havocscope.com/black-market-prices/hackers/
Bibliography:
Live CyberAttack Map, courtesy of Norse CyberSecurity:
http://map.ipviking.com/
Data Breaches (Bubble Infographic)
http://www.informationisbeautiful.net/visualizations/worlds-
biggest-data-breaches-hacks/static/

More Related Content

Viewers also liked

How to Lead Customer Value Creation by Dan Olsen at Leading the Product Melbo...
How to Lead Customer Value Creation by Dan Olsen at Leading the Product Melbo...How to Lead Customer Value Creation by Dan Olsen at Leading the Product Melbo...
How to Lead Customer Value Creation by Dan Olsen at Leading the Product Melbo...
Dan Olsen
 
Leading and Motivating Engineers - what product managers need to know - prod...
Leading and Motivating Engineers -  what product managers need to know - prod...Leading and Motivating Engineers -  what product managers need to know - prod...
Leading and Motivating Engineers - what product managers need to know - prod...
Ron Lichty
 
C All 2008 7 26
C All 2008 7 26C All 2008 7 26
C All 2008 7 26
Donna Davidson
 
Lil bibby
Lil bibbyLil bibby
Lil bibby
Kroy Create
 
Vincent Laberge colloque EDUlib 2017
Vincent Laberge colloque EDUlib 2017Vincent Laberge colloque EDUlib 2017
Vincent Laberge colloque EDUlib 2017
Vincent Laberge
 
Carta Náutica do Porto de Lisboa - março de 2017
Carta Náutica do Porto de Lisboa - março de 2017Carta Náutica do Porto de Lisboa - março de 2017
Carta Náutica do Porto de Lisboa - março de 2017
APL - Administração do Porto de Lisboa
 
Pierce Transit White Paper Summary for 25th ESV Conference
Pierce Transit White Paper Summary for 25th ESV ConferencePierce Transit White Paper Summary for 25th ESV Conference
Pierce Transit White Paper Summary for 25th ESV Conference
Robert Huyck
 
Do work
Do workDo work
Do work
Shasi Panda
 
N2W Partnership overview
N2W Partnership overviewN2W Partnership overview
N2W Partnership overview
Tara Jones
 
Sosiale media vir klein sake
Sosiale media vir klein sakeSosiale media vir klein sake
Sosiale media vir klein sake
Chris Vermeulen
 

Viewers also liked (10)

How to Lead Customer Value Creation by Dan Olsen at Leading the Product Melbo...
How to Lead Customer Value Creation by Dan Olsen at Leading the Product Melbo...How to Lead Customer Value Creation by Dan Olsen at Leading the Product Melbo...
How to Lead Customer Value Creation by Dan Olsen at Leading the Product Melbo...
 
Leading and Motivating Engineers - what product managers need to know - prod...
Leading and Motivating Engineers -  what product managers need to know - prod...Leading and Motivating Engineers -  what product managers need to know - prod...
Leading and Motivating Engineers - what product managers need to know - prod...
 
C All 2008 7 26
C All 2008 7 26C All 2008 7 26
C All 2008 7 26
 
Lil bibby
Lil bibbyLil bibby
Lil bibby
 
Vincent Laberge colloque EDUlib 2017
Vincent Laberge colloque EDUlib 2017Vincent Laberge colloque EDUlib 2017
Vincent Laberge colloque EDUlib 2017
 
Carta Náutica do Porto de Lisboa - março de 2017
Carta Náutica do Porto de Lisboa - março de 2017Carta Náutica do Porto de Lisboa - março de 2017
Carta Náutica do Porto de Lisboa - março de 2017
 
Pierce Transit White Paper Summary for 25th ESV Conference
Pierce Transit White Paper Summary for 25th ESV ConferencePierce Transit White Paper Summary for 25th ESV Conference
Pierce Transit White Paper Summary for 25th ESV Conference
 
Do work
Do workDo work
Do work
 
N2W Partnership overview
N2W Partnership overviewN2W Partnership overview
N2W Partnership overview
 
Sosiale media vir klein sake
Sosiale media vir klein sakeSosiale media vir klein sake
Sosiale media vir klein sake
 

Similar to The Seven Hackers v6

Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Steve Poole
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Tyler Shields
 
Surfing with Sharks KS ED TECH 2012
Surfing with Sharks   KS ED TECH 2012Surfing with Sharks   KS ED TECH 2012
Surfing with Sharks KS ED TECH 2012
inf8nity
 
Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and Concerns
PINT Inc
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Steve Poole
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker SideCybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker Side
Steve Poole
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
Steve Poole
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
Madhusudhan G
 
NPTs
NPTsNPTs
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
Steve Poole
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
Yumonomics
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal PrivacyDoubleXDS
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
Steve Poole
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime finalHarsha Matta
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
Lokender Yadav
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYDoubleXDS
 
Hunt for the red DA
Hunt for the red DAHunt for the red DA
Hunt for the red DA
Neil Lines
 
Hacker culture
Hacker cultureHacker culture
Hacker cultureJack Hsu
 
workers participation in management
workers participation in managementworkers participation in management
workers participation in managementlily004
 
SEO2India - Cyber crime
SEO2India - Cyber crimeSEO2India - Cyber crime
SEO2India - Cyber crime
SEO2India - Devang Barot - SEO2India
 

Similar to The Seven Hackers v6 (20)

Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Surfing with Sharks KS ED TECH 2012
Surfing with Sharks   KS ED TECH 2012Surfing with Sharks   KS ED TECH 2012
Surfing with Sharks KS ED TECH 2012
 
Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and Concerns
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker SideCybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker Side
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
NPTs
NPTsNPTs
NPTs
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime final
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
 
Hunt for the red DA
Hunt for the red DAHunt for the red DA
Hunt for the red DA
 
Hacker culture
Hacker cultureHacker culture
Hacker culture
 
workers participation in management
workers participation in managementworkers participation in management
workers participation in management
 
SEO2India - Cyber crime
SEO2India - Cyber crimeSEO2India - Cyber crime
SEO2India - Cyber crime
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

The Seven Hackers v6

Editor's Notes

  1. http://map.ipviking.com/ Norse tracks >50,000 attacks per second. 10,000 new species/variants of malware per day 1 Billion IP Addresses Operates in 47 countries 6,000 common types of devices attacked.
  2. http://map.ipviking.com/ Norse tracks >50,000 attacks per second. 10,000 new species/variants of malware per day 1 Billion IP Addresses Operates in 47 countries 6,000 common types of devices attacked.
  3. http://map.ipviking.com/ Norse tracks >50,000 attacks per second. 10,000 new species/variants of malware per day 1 Billion IP Addresses Operates in 47 countries 6,000 common types of devices attacked.
  4. http://map.ipviking.com/ Norse tracks >50,000 attacks per second. 10,000 new species/variants of malware per day 1 Billion IP Addresses Operates in 47 countries 6,000 common types of devices attacked.
  5. The Matrix, © 1999, Warner Brothers. Image 1 is from a fan site, identifying the various pieces of technology used as props. (Original screen does not have the number overlays). Image 2 & 3 are screen captures posted by fansites. All images © 1999, Warner Brothers Pictures.
  6. What’s in YOUR wallet???
  7. Motivations of Malware Creation Malware writers can have various reasons for creating and spreading malware. The following are common reasons: 1. Fun/Hobby/Spreading of ideological Some malware writers consider their creations to be works of art, and see malware writing as a creative hobby. 2. Jocks/Pranks Pranks are harmless that merely display an annoying message to programs that can destroy files or disable a computer altogether. 3. Showing computing knowledge/ Gaining respect A widely spread malware and is observed by mass media can show malware writers’ knowledge and gain great respect in a small group of like-minded people. 4. Industrial espionage Obtaining secret information about a company by using weaknesses and defects in the company's IT-system is something that is quite common today. 5. Experimental/ Research/Proof of Concepts Malware are written in laboratories and research facilities for experimental or research purpose. Most of these malware do not spread. Usually malware in labs and research facilities test systems is called in-the-field. Others malware that have been found infecting users’ computers worldwide in real world are called in-thewild. 6. Vandalism/Graffiti The intentional destruction of property is popularly referred to as vandalism. It includes behavior such as breaking windows, slashing tires, spray painting a wall with graffiti, and destroying a computer system through the use of a computer malware. Vandalism is a malicious act and may reflect personal ill will, although the perpetrators need not know their victim to commit vandalism. 7. Revenge There are always employees who are not particularly satisfied with their employer. When a programmer or system administrator about to be fired from a job may leave behind backdoors or software "time bombs" that will allow them to damage the former employer's systems or destroy their own earlier work. Malware are used to attack the products of specific companies or web sites. According to the FBI, revenge from employees is a very common reason for ITrelated crimes. 8. Political message Malware which infects executable files on compromised computers and displays a political message when launched. This type of malware usually targets particular government organizations. 9. Profit/Financial gain/Extortion Most malware writers motivated by profit/financial gain are more and more likely to be working with spammers and hackers. One of the most common methods is by stealing sensitive information which is then sold on the black market to criminal organizations to make a profit. Some Malware will encrypt some of your files on your computer then it leaves a message to contact a certain email address with a reference number so that you can buy back your own files.
  8. Joe McReynolds, a researcher of China's network warfare and capabilities for the US Center for Intelligence Research and Analysis Chinese Professional Hacking (3 groups): [1] Specialized military network warfare forces -- focus on carrying out network cyberattacks and defense. (PLA Unit#61398, 12-storey building). [2] Unit of civilian teams granted the go-ahead by the Chinese military to carry out "network warfare operations.” [3] Umbrella Unit for "external entities" which "can be organized and mobilized for network warfare operations," but act outside of government departments. Each unit targets US companies in order to steal valuable data related to business and trade. This, in turn, can give Chinese firms a boost in the global economy. _____________________________________________________ References: http://www.justice.gov/opa/pr/us-charges-five-chinese-military-hackers-cyber-espionage-against-us-corporations-and-labor http://www.zdnet.com/article/china-reveals-existence-of-cyber-warfare-hacking-teams/ Joe McReynolds, a researcher of China's network warfare and capabilities for the US Center for Intelligence Research and Analysis   According to McReynolds, China's digital military strategy has been split up into three separate sections. One unit, called "specialized military network warfare forces," focus on carrying out network cyberattacks and defense. Secondly, another unit comprises of civilian teams which have been given the go-ahead by the Chinese military to carry out "network warfare operations." Finally, another unit acts as an umbrella for "external entities" which "can be organized and mobilized for network warfare operations," but act outside of government departments. The Chinese military expert says that each unit targets US companies in order to steal valuable data related to business and trade. This, in turn, can give Chinese firms a boost in the global economy. In May, the United States charged five Chinese nationals described as "military hackers" with breaking into US corporate networks to steal sensitive data. These men allegedly belonged to Unit 61398, the focus of a study conducted by FireEye's Mandiant cyberforensics team in 2013. The report claimed that a 12-story building associated with the PLA hosted this unit, which connects a number of sophisticated Chinese hacking groups including the "Comment Crew" and "Shanghai Group." Mandiant says that Unit 61398 was likely responsible for an "overwhelming" number of cyberattacks, whereas at the time Chinese officials dismissed the allegations as "groundless."
  9. Example: SONY
  10. CYBER WARRIORS / CYBER-WARFARE: Identify Point-of-Entry Gather Intelligence on Point-of-Entry Compromise Perimeter via Point-of-Entry - Execute Entry-plan: Targeted Spearphishing, Insiders, “weak underbelly”. ONCE INSIDE: Reconnoiter / Gather Intelligence Map Terrain / Connectivity Identify Primary, Secondary Targets Identify Vulnerabilitiies Identify Diversionary Targets Map Defenses Profile Individuals, Applications, Behaviors to leverage (avoid detection, compromise systems). Gain High Ground (acquire a position) Plan attack. Establish command-and-control Establish offsite place to exfiltrate information. Identify a buyer (or use-point for what is stolen – a ‘fence’). Execute the attack-plan while avoiding detection and prevention. CommunicationsDirector@issa-sv.org  Add to social profiles & can re-tweet member’s news.
  11. CYBER WARRIORS / CYBER-WARFARE: Identify Point-of-Entry Gather Intelligence on Point-of-Entry Compromise Perimeter via Point-of-Entry - Execute Entry-plan: Targeted Spearphishing, Insiders, “weak underbelly”. ONCE INSIDE: Reconnoiter / Gather Intelligence Map Terrain / Connectivity Identify Primary, Secondary Targets Identify Vulnerabilitiies Identify Diversionary Targets Map Defenses Profile Individuals, Applications, Behaviors to leverage (avoid detection, compromise systems). Gain High Ground (acquire a position) Plan attack. Establish command-and-control Establish offsite place to exfiltrate information. Identify a buyer (or use-point for what is stolen – a ‘fence’). Execute the attack-plan while avoiding detection and prevention. CommunicationsDirector@issa-sv.org  Add to social profiles & can re-tweet member’s news.
  12. Prices Updated August 2014. (What can be stolen / used for financial gain?) Information, Services Info: For own use, to sell, or hold hostage. Customer Information Software / Product and R&D Designs Financial Records Keys/Control Information to “Hard Assets” Personal/Private Information (photos, etc). Services Computing Power, Information Storage, Control Services (Phone Service, Cloud) If I am selling a compromised computer for 18 cents, or gmail account for 20 cents, how much must it cost to break into that computer?