SlideShare una empresa de Scribd logo
1 de 13
Augustine Fou- 1 -
Digital Extortion Cases
Ransom or DDoS
Dr. Augustine Fou
http://linkd.in/augustinefou
acfou @mktsci .com
June 2014
Augustine Fou- 2 -
Author’s Commentary
“Now that the bad guys have large botnets, they
can commit a large variety of crimes from digital
ad fraud to outright extortion, as the following
examples show. The botnets can be used to
generate billions of fake ad impressions to rip off
advertisers or to DDoS sites (i.e. take-down)
websites by overwhelming them with fake traffic)
in exchange for ransom money. But these are only
scratching the surface.”
Augustine Fou- 3 -
Feedly (Jun 2014)
On June 11, 2014, Feedly was attacked by a DDoS. The criminals tried
to extort money but Feedly refused to comply. Source:blog.feedly
Augustine Fou- 4 -
Evernote (Jun 2014)
On June 10, 2014 Evernote members were temporarily unable to
synchronize their notes their notes due to a DDoS attack. Source : bbc
Augustine Fou- 5 -
TypePad (May 2014)
In April 2014, Typepad experienced a DDoS attack that forced the site to go
offline for nearly five days. Then in May TypePad experienced another
attack. Source : techcrunch
Augustine Fou- 6 -
Basecamp (Mar 2014)
On March 24, 2014 Basecamp was
hit with a distributed denial attack
(DDoS) rendering its services
temporarily unavailable. The
criminals behind the attack had tried
to extort money in return for ending
the attack. Basecamp refused to
comply with the requests. Instead,
the company worked to mitigate the
effects of the DDoS. Basecamp
confirmed that no user data was
compromised in the attack.
Source: techcrunch
Augustine Fou- 7 -
Meetup (Feb 2014)
On February 27, 2014 a hacker contacted Meetup’s CEO asking for $300 to
prevent a DDoS attack. The attack immediately began and caused the
company to be unavailable for nearly 24 hours. Source: blog.meetup
Augustine Fou- 8 -
Vimeo (Jan 2013)
Vimeo experiences a DDoS attack in early 2013 which prevented about
half of its users from accessing the site. Source : vimeo's facebook
Augustine Fou- 9 -
Other examples
of extortion
Augustine Fou- 10 -
Miss Teen USA Hacked Photos
Miss Teen USA was the victim of a “sextortion” scam. Her webcam was
hacked into and the hacker took photos of her undress. The hacker then
asked for more pictures or a “performance” on Skype or else he would
release the photos. The hacker did this to several other girls as well.
Source : nydailynews
Augustine Fou- 11 -
CryptoLocker
CryptoLocker is a
randsomware trojan that
targets Microsoft Windows.
It is often disguised as a
legitimate email
attachment. It encrypts
certain files and then
displays a message that
offers to decrypt the data if
a payment is made.
Source : wikipedia
Augustine Fou- 12 -
Dr. Augustine Fou – Digital Consigliere
“I research digital ad fraud and other
cyber crimes that bad guys commit using
their armies of bots. I advise clients on
both technical and financial forms of
mitigating these kinds of risk.”
FORMER CHIEF DIGITAL OFFICER, HCG (OMNICOM)
MCKINSEY CONSULTANT
CLIENT SIDE / AGENCY SIDE EXPERIENCE
PROFESSOR AND COLUMNIST
ENTREPRENEUR / SMALL BUSINESS OWNER
PHD MATERIALS SCIENCE (MIT '95) AT AGE 23
@acfou
ClickZ Articles: http://bit.ly/augustine-fou-clickz
Slideshares: http://bit.ly/augustine-fou-slideshares
LinkedIn: https://www.linkedin.com/today/author/84444-augustinefou
Augustine Fou- 13 -
Related Articles
Augustine Fou- 13 -
http://www.slideshare.net/augustinefou/ad-fraud-estimates-by-augustine-fou-
technical-forensics-32293935
http://www.slideshare.net/augustinefou/facebook-ad-fraud-corroborated-by-
augustine-fou-ad-fraud-forensics
http://www.slideshare.net/augustinefou/digital-ad-fraud-briefing-by-
augustine-fou-1h-2014
http://www.slideshare.net/augustinefou/the-good-guys-of-ad-fraud-2014-
augustine-fou
http://www.slideshare.net/augustinefou/qna-about-digital-ad-fraud-with-
augustine-fou-technical-forensics

Más contenido relacionado

Más de Dr. Augustine Fou - Independent Ad Fraud Researcher

Más de Dr. Augustine Fou - Independent Ad Fraud Researcher (20)

Digital ad dollars trickle down chart
Digital ad dollars trickle down chartDigital ad dollars trickle down chart
Digital ad dollars trickle down chart
 
Still nothing but ad fraud 2021 dr augustine fou
Still nothing but ad fraud 2021 dr augustine fouStill nothing but ad fraud 2021 dr augustine fou
Still nothing but ad fraud 2021 dr augustine fou
 
Bad guys optimize ad fraud efficiency
Bad guys optimize ad fraud efficiencyBad guys optimize ad fraud efficiency
Bad guys optimize ad fraud efficiency
 
Alternative to ANA's end to end supply chain transparency study v final
Alternative to ANA's end to end supply chain transparency study v finalAlternative to ANA's end to end supply chain transparency study v final
Alternative to ANA's end to end supply chain transparency study v final
 
Impact of Loss of 3P Cookies on Publishers' Ad Revenue
Impact of Loss of 3P Cookies on Publishers' Ad RevenueImpact of Loss of 3P Cookies on Publishers' Ad Revenue
Impact of Loss of 3P Cookies on Publishers' Ad Revenue
 
Entire ecosystem supporting ad fraud 2018
Entire ecosystem supporting ad fraud 2018Entire ecosystem supporting ad fraud 2018
Entire ecosystem supporting ad fraud 2018
 
Digital Media Trust Collaborative
Digital Media Trust CollaborativeDigital Media Trust Collaborative
Digital Media Trust Collaborative
 
Programmatic reach analysis 2021
Programmatic reach analysis 2021Programmatic reach analysis 2021
Programmatic reach analysis 2021
 
2021 update on ad fraud brand safety privacy
2021 update on ad fraud brand safety privacy2021 update on ad fraud brand safety privacy
2021 update on ad fraud brand safety privacy
 
Browser and OS Share Jan 2021
Browser and OS Share Jan 2021Browser and OS Share Jan 2021
Browser and OS Share Jan 2021
 
Checking abnormal referrer traffic in google analytics
Checking abnormal referrer traffic in google analyticsChecking abnormal referrer traffic in google analytics
Checking abnormal referrer traffic in google analytics
 
History and Impact of Digital Ad Fraud
History and Impact of Digital Ad FraudHistory and Impact of Digital Ad Fraud
History and Impact of Digital Ad Fraud
 
Digital Fraud Viewability Benchmarks Q4 2020
Digital Fraud Viewability Benchmarks Q4 2020Digital Fraud Viewability Benchmarks Q4 2020
Digital Fraud Viewability Benchmarks Q4 2020
 
What CFEs can do about digital ad fraud
What CFEs can do about digital ad fraudWhat CFEs can do about digital ad fraud
What CFEs can do about digital ad fraud
 
Four types of digital ad spend updated august 2020
Four types of digital ad spend updated august 2020Four types of digital ad spend updated august 2020
Four types of digital ad spend updated august 2020
 
How to Use FouAnalytics For Marketers
How to Use FouAnalytics   For MarketersHow to Use FouAnalytics   For Marketers
How to Use FouAnalytics For Marketers
 
FouAnalytics DIY site media analytics fraud detection baked in
FouAnalytics DIY site media analytics fraud detection baked inFouAnalytics DIY site media analytics fraud detection baked in
FouAnalytics DIY site media analytics fraud detection baked in
 
Investigating digital ad fraud spi virtual meeting
Investigating digital ad fraud   spi virtual meetingInvestigating digital ad fraud   spi virtual meeting
Investigating digital ad fraud spi virtual meeting
 
Fraud by Browser Study
Fraud by Browser StudyFraud by Browser Study
Fraud by Browser Study
 
Digital Ad Fraud FAQ Question 1
Digital Ad Fraud FAQ Question 1Digital Ad Fraud FAQ Question 1
Digital Ad Fraud FAQ Question 1
 

Último

Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 

Último (11)

Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 

Digital Extortion Cases Ransom or DDoS Investigated by Augustine Fou

  • 1. Augustine Fou- 1 - Digital Extortion Cases Ransom or DDoS Dr. Augustine Fou http://linkd.in/augustinefou acfou @mktsci .com June 2014
  • 2. Augustine Fou- 2 - Author’s Commentary “Now that the bad guys have large botnets, they can commit a large variety of crimes from digital ad fraud to outright extortion, as the following examples show. The botnets can be used to generate billions of fake ad impressions to rip off advertisers or to DDoS sites (i.e. take-down) websites by overwhelming them with fake traffic) in exchange for ransom money. But these are only scratching the surface.”
  • 3. Augustine Fou- 3 - Feedly (Jun 2014) On June 11, 2014, Feedly was attacked by a DDoS. The criminals tried to extort money but Feedly refused to comply. Source:blog.feedly
  • 4. Augustine Fou- 4 - Evernote (Jun 2014) On June 10, 2014 Evernote members were temporarily unable to synchronize their notes their notes due to a DDoS attack. Source : bbc
  • 5. Augustine Fou- 5 - TypePad (May 2014) In April 2014, Typepad experienced a DDoS attack that forced the site to go offline for nearly five days. Then in May TypePad experienced another attack. Source : techcrunch
  • 6. Augustine Fou- 6 - Basecamp (Mar 2014) On March 24, 2014 Basecamp was hit with a distributed denial attack (DDoS) rendering its services temporarily unavailable. The criminals behind the attack had tried to extort money in return for ending the attack. Basecamp refused to comply with the requests. Instead, the company worked to mitigate the effects of the DDoS. Basecamp confirmed that no user data was compromised in the attack. Source: techcrunch
  • 7. Augustine Fou- 7 - Meetup (Feb 2014) On February 27, 2014 a hacker contacted Meetup’s CEO asking for $300 to prevent a DDoS attack. The attack immediately began and caused the company to be unavailable for nearly 24 hours. Source: blog.meetup
  • 8. Augustine Fou- 8 - Vimeo (Jan 2013) Vimeo experiences a DDoS attack in early 2013 which prevented about half of its users from accessing the site. Source : vimeo's facebook
  • 9. Augustine Fou- 9 - Other examples of extortion
  • 10. Augustine Fou- 10 - Miss Teen USA Hacked Photos Miss Teen USA was the victim of a “sextortion” scam. Her webcam was hacked into and the hacker took photos of her undress. The hacker then asked for more pictures or a “performance” on Skype or else he would release the photos. The hacker did this to several other girls as well. Source : nydailynews
  • 11. Augustine Fou- 11 - CryptoLocker CryptoLocker is a randsomware trojan that targets Microsoft Windows. It is often disguised as a legitimate email attachment. It encrypts certain files and then displays a message that offers to decrypt the data if a payment is made. Source : wikipedia
  • 12. Augustine Fou- 12 - Dr. Augustine Fou – Digital Consigliere “I research digital ad fraud and other cyber crimes that bad guys commit using their armies of bots. I advise clients on both technical and financial forms of mitigating these kinds of risk.” FORMER CHIEF DIGITAL OFFICER, HCG (OMNICOM) MCKINSEY CONSULTANT CLIENT SIDE / AGENCY SIDE EXPERIENCE PROFESSOR AND COLUMNIST ENTREPRENEUR / SMALL BUSINESS OWNER PHD MATERIALS SCIENCE (MIT '95) AT AGE 23 @acfou ClickZ Articles: http://bit.ly/augustine-fou-clickz Slideshares: http://bit.ly/augustine-fou-slideshares LinkedIn: https://www.linkedin.com/today/author/84444-augustinefou
  • 13. Augustine Fou- 13 - Related Articles Augustine Fou- 13 - http://www.slideshare.net/augustinefou/ad-fraud-estimates-by-augustine-fou- technical-forensics-32293935 http://www.slideshare.net/augustinefou/facebook-ad-fraud-corroborated-by- augustine-fou-ad-fraud-forensics http://www.slideshare.net/augustinefou/digital-ad-fraud-briefing-by- augustine-fou-1h-2014 http://www.slideshare.net/augustinefou/the-good-guys-of-ad-fraud-2014- augustine-fou http://www.slideshare.net/augustinefou/qna-about-digital-ad-fraud-with- augustine-fou-technical-forensics