SlideShare una empresa de Scribd logo
1 de 14
PRESENTATION
Organized Cybercrime
            ON
      CYBER CRIME
HISTORY

  “With just a few keystrokes, cybercriminals around the world
    can disrupt our economy.” - Ralph Basham, Director of the
    U.S. Secret Service at RSA 2005.



 “With just a few keystrokes, I can turn those pundits off and
                      watch porn instead.” – jrandom, NMRC,
2005
Outline
The Players

The Weapons

Precision Tactics

Examples
The Players
Former Soviet Military

Russian Mafia

Professional Hackers

Spammers

Traditional Mafia

Basic Cybercrime

Organizations
Former Soviet Military
Military industrial complex in Soviet Russia was
 even more corrupt than their USA counterparts

With the collapse of communism, many upper
 military personnel in Russia had few skills that
 paid well

  Good at money laundering
  Good at moving goods across borders
  Connections with international crime
Russian Mafia

Dolgopruadnanskaya is the second-largest
gang operating out of Russia. They are
considered ruthless and also are believed to
be behind numerous current cybercrime
activities.
Russian Mafia
Cybercrime elements are considered “divisions”

   The actual hackers themselves are kept compartmentalized


Due to protection from a corrupt Russian government,
 most “big cases” do not net the big players, e.g. Operation
 Firewall

When new hacking talent is needed, they will force
 hackers to work for them (or kill them and/or their
 families)
Professional Hackers
Paid per the job, usually flat rates

State-side hackers can earn up to $200K a year

The work is usually writing tools for others to use,
 developing/finding new exploits, and coding up
 malware
Spammers

They earn millions per year selling their direct
 mail services

They are the main employer of professional
 hackers
Traditional Mafia
They are currently leaving most of the “work” to
 others
Online ventures are sticking close to such things
 as pr0n, online gambling, etc
They are taking advantage of technology, using
 computers heavily, and using reliable encryption
Basic Cybercrime Organizations
Fluid and change members frequently


Although the most troublesome, they are
 considered the bottom feeders

  Think criminal script kiddies
  This is usually who the Feds get, not the big guys
The Weapons
Botnets

   Average size is 5000 computers, some have been as large as
    500,000 computer.

Phishing

   You guys *do* know what phishing is, right?


The usual Internet attack tools

   Metasploit, etc
Cyber crime

Más contenido relacionado

La actualidad más candente

The JPMC Data Breach Column
The JPMC Data Breach ColumnThe JPMC Data Breach Column
The JPMC Data Breach ColumnMichael Sexton
 
Sans Fire09 Pedro Bueno Rev1
Sans Fire09 Pedro Bueno Rev1Sans Fire09 Pedro Bueno Rev1
Sans Fire09 Pedro Bueno Rev1pedrobueno
 
Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Bich (Evelyn) Chu
 
data of crime or crime of data?
data of crime or crime of data?data of crime or crime of data?
data of crime or crime of data?Katerina Ex
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) newforensicsnation
 
Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)Marco Balduzzi
 
FNC Free Seminar (public)
FNC Free Seminar (public)FNC Free Seminar (public)
FNC Free Seminar (public)forensicsnation
 
Deep web & Darknet
Deep web & DarknetDeep web & Darknet
Deep web & DarknetNiloy Sikder
 
The Brazilian Cybercriminal Underground in 2015
The Brazilian Cybercriminal Underground in 2015The Brazilian Cybercriminal Underground in 2015
The Brazilian Cybercriminal Underground in 2015Felipe Prado
 
Forensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonForensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonSARON MESSEMBE OBIA
 
Internet Filtering in Iraq
Internet Filtering in IraqInternet Filtering in Iraq
Internet Filtering in Iraqnone
 

La actualidad más candente (19)

The JPMC Data Breach Column
The JPMC Data Breach ColumnThe JPMC Data Breach Column
The JPMC Data Breach Column
 
Sans Fire09 Pedro Bueno Rev1
Sans Fire09 Pedro Bueno Rev1Sans Fire09 Pedro Bueno Rev1
Sans Fire09 Pedro Bueno Rev1
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 
data of crime or crime of data?
data of crime or crime of data?data of crime or crime of data?
data of crime or crime of data?
 
Deep Web
Deep WebDeep Web
Deep Web
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
 
Dark web
Dark webDark web
Dark web
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
 
Scuba diving into The Deep Dark Web
Scuba diving into The Deep Dark WebScuba diving into The Deep Dark Web
Scuba diving into The Deep Dark Web
 
Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)
 
FNC Free Seminar (public)
FNC Free Seminar (public)FNC Free Seminar (public)
FNC Free Seminar (public)
 
Deep web & Darknet
Deep web & DarknetDeep web & Darknet
Deep web & Darknet
 
The Brazilian Cybercriminal Underground in 2015
The Brazilian Cybercriminal Underground in 2015The Brazilian Cybercriminal Underground in 2015
The Brazilian Cybercriminal Underground in 2015
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Forensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonForensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in Cameroon
 
Internet Filtering in Iraq
Internet Filtering in IraqInternet Filtering in Iraq
Internet Filtering in Iraq
 

Destacado

Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Ch 08 mobile commerce
Ch 08 mobile commerceCh 08 mobile commerce
Ch 08 mobile commercenaielofar
 
PhD thesis presentation 2012
PhD thesis presentation 2012PhD thesis presentation 2012
PhD thesis presentation 2012vsharma78
 
Lee Clark 7th June 2010
Lee Clark 7th June 2010Lee Clark 7th June 2010
Lee Clark 7th June 2010leewclark
 
아름다운+이별 김건모
아름다운+이별 김건모아름다운+이별 김건모
아름다운+이별 김건모Soo Jeong Cheong
 
Mac os installation and Hardware Report
Mac os installation and Hardware ReportMac os installation and Hardware Report
Mac os installation and Hardware ReportPratik Vyas
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...Andris Soroka
 
Linux Installation And Shamba Server
Linux Installation And Shamba ServerLinux Installation And Shamba Server
Linux Installation And Shamba ServerMayur Verma
 
Пространственно-распределенная мультикластерная вычислительная система: архит...
Пространственно-распределенная мультикластерная вычислительная система: архит...Пространственно-распределенная мультикластерная вычислительная система: архит...
Пространственно-распределенная мультикластерная вычислительная система: архит...Mikhail Kurnosov
 
Almoços Convívio Cerberus
Almoços Convívio CerberusAlmoços Convívio Cerberus
Almoços Convívio CerberusCerberus Pt
 
An Introduction To Linux Development Environment
An Introduction To Linux Development EnvironmentAn Introduction To Linux Development Environment
An Introduction To Linux Development EnvironmentS. M. Hossein Hamidi
 
Introducción a la administración f08
Introducción a la administración f08Introducción a la administración f08
Introducción a la administración f08Skepper63
 

Destacado (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Ch 08 mobile commerce
Ch 08 mobile commerceCh 08 mobile commerce
Ch 08 mobile commerce
 
PhD thesis presentation 2012
PhD thesis presentation 2012PhD thesis presentation 2012
PhD thesis presentation 2012
 
Lee Clark 7th June 2010
Lee Clark 7th June 2010Lee Clark 7th June 2010
Lee Clark 7th June 2010
 
아름다운+이별 김건모
아름다운+이별 김건모아름다운+이별 김건모
아름다운+이별 김건모
 
cIHMS
cIHMScIHMS
cIHMS
 
Mac os installation and Hardware Report
Mac os installation and Hardware ReportMac os installation and Hardware Report
Mac os installation and Hardware Report
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
 
Jaba sat explorer-710
Jaba sat explorer-710Jaba sat explorer-710
Jaba sat explorer-710
 
Linux Installation And Shamba Server
Linux Installation And Shamba ServerLinux Installation And Shamba Server
Linux Installation And Shamba Server
 
Пространственно-распределенная мультикластерная вычислительная система: архит...
Пространственно-распределенная мультикластерная вычислительная система: архит...Пространственно-распределенная мультикластерная вычислительная система: архит...
Пространственно-распределенная мультикластерная вычислительная система: архит...
 
Finding Time to Study for the CIH Exam
Finding Time to Study for the CIH ExamFinding Time to Study for the CIH Exam
Finding Time to Study for the CIH Exam
 
Almoços Convívio Cerberus
Almoços Convívio CerberusAlmoços Convívio Cerberus
Almoços Convívio Cerberus
 
Sp ws1 ulrich teichler
Sp ws1 ulrich teichlerSp ws1 ulrich teichler
Sp ws1 ulrich teichler
 
An Introduction To Linux Development Environment
An Introduction To Linux Development EnvironmentAn Introduction To Linux Development Environment
An Introduction To Linux Development Environment
 
QIP 2012
QIP 2012QIP 2012
QIP 2012
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Introducción a la administración f08
Introducción a la administración f08Introducción a la administración f08
Introducción a la administración f08
 
Desktop environment
Desktop environmentDesktop environment
Desktop environment
 

Similar a Cyber crime

2010 Melbourne Presentation On Russian Oc Gs Final
2010    Melbourne Presentation On Russian Oc Gs   Final2010    Melbourne Presentation On Russian Oc Gs   Final
2010 Melbourne Presentation On Russian Oc Gs FinalEthan Burger
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013EMC
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...Roger Hagedorn
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidPhil Agcaoili
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixPaul Joyal
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docxDesarae Veit
 
Your money or your files
Your money or your filesYour money or your files
Your money or your filesRoel Palmaers
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! newsMarioEliseo3
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! newsMarioEliseo3
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816Nicole Fields
 
External threats-to-information-system
External threats-to-information-systemExternal threats-to-information-system
External threats-to-information-systemSouman Guha
 
Evil Geniuses: How organized cybercriminals could take over the world
Evil Geniuses: How organized cybercriminals could take over the worldEvil Geniuses: How organized cybercriminals could take over the world
Evil Geniuses: How organized cybercriminals could take over the worldHillary L
 

Similar a Cyber crime (20)

2010 Melbourne Presentation On Russian Oc Gs Final
2010    Melbourne Presentation On Russian Oc Gs   Final2010    Melbourne Presentation On Russian Oc Gs   Final
2010 Melbourne Presentation On Russian Oc Gs Final
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Ransomware-as-a-Service: The business of distributing cyber attacks
Ransomware-as-a-Service: The business of distributing cyber attacksRansomware-as-a-Service: The business of distributing cyber attacks
Ransomware-as-a-Service: The business of distributing cyber attacks
 
RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
 
Godfather 2.0
Godfather 2.0Godfather 2.0
Godfather 2.0
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat Matrix
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docx
 
Your money or your files
Your money or your filesYour money or your files
Your money or your files
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! news
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! news
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816
 
External threats-to-information-system
External threats-to-information-systemExternal threats-to-information-system
External threats-to-information-system
 
Evil Geniuses: How organized cybercriminals could take over the world
Evil Geniuses: How organized cybercriminals could take over the worldEvil Geniuses: How organized cybercriminals could take over the world
Evil Geniuses: How organized cybercriminals could take over the world
 

Más de Hardik Kakadiya (20)

Break even point(BEP)
Break even point(BEP)Break even point(BEP)
Break even point(BEP)
 
Nano the people’s car
Nano the people’s carNano the people’s car
Nano the people’s car
 
Apple computer l
Apple computer lApple computer l
Apple computer l
 
Apple 11.00 section
Apple 11.00 sectionApple 11.00 section
Apple 11.00 section
 
Vaio
VaioVaio
Vaio
 
Sandip.(mba)
Sandip.(mba)Sandip.(mba)
Sandip.(mba)
 
Evolution of com
Evolution of comEvolution of com
Evolution of com
 
E business or e-buss..
E business or e-buss..E business or e-buss..
E business or e-buss..
 
E commerce
E commerceE commerce
E commerce
 
Dddd
DdddDddd
Dddd
 
Communal riots
Communal riotsCommunal riots
Communal riots
 
Childlabour
ChildlabourChildlabour
Childlabour
 
Change in apple i phone generations
Change in apple i phone generationsChange in apple i phone generations
Change in apple i phone generations
 
05 global mobile satellite
05 global mobile satellite05 global mobile satellite
05 global mobile satellite
 
Business management
Business managementBusiness management
Business management
 
Business organization
Business organizationBusiness organization
Business organization
 
Business communication
Business communicationBusiness communication
Business communication
 
Satellite phone it
Satellite phone itSatellite phone it
Satellite phone it
 
Seminar
SeminarSeminar
Seminar
 
Tobacoo
TobacooTobacoo
Tobacoo
 

Cyber crime

  • 1.
  • 3. HISTORY  “With just a few keystrokes, cybercriminals around the world can disrupt our economy.” - Ralph Basham, Director of the U.S. Secret Service at RSA 2005.  “With just a few keystrokes, I can turn those pundits off and watch porn instead.” – jrandom, NMRC, 2005
  • 5. The Players Former Soviet Military Russian Mafia Professional Hackers Spammers Traditional Mafia Basic Cybercrime Organizations
  • 6. Former Soviet Military Military industrial complex in Soviet Russia was even more corrupt than their USA counterparts With the collapse of communism, many upper military personnel in Russia had few skills that paid well Good at money laundering Good at moving goods across borders Connections with international crime
  • 7. Russian Mafia Dolgopruadnanskaya is the second-largest gang operating out of Russia. They are considered ruthless and also are believed to be behind numerous current cybercrime activities.
  • 8. Russian Mafia Cybercrime elements are considered “divisions”  The actual hackers themselves are kept compartmentalized Due to protection from a corrupt Russian government, most “big cases” do not net the big players, e.g. Operation Firewall When new hacking talent is needed, they will force hackers to work for them (or kill them and/or their families)
  • 9. Professional Hackers Paid per the job, usually flat rates State-side hackers can earn up to $200K a year The work is usually writing tools for others to use, developing/finding new exploits, and coding up malware
  • 10. Spammers They earn millions per year selling their direct mail services They are the main employer of professional hackers
  • 11. Traditional Mafia They are currently leaving most of the “work” to others Online ventures are sticking close to such things as pr0n, online gambling, etc They are taking advantage of technology, using computers heavily, and using reliable encryption
  • 12. Basic Cybercrime Organizations Fluid and change members frequently Although the most troublesome, they are considered the bottom feeders Think criminal script kiddies This is usually who the Feds get, not the big guys
  • 13. The Weapons Botnets  Average size is 5000 computers, some have been as large as 500,000 computer. Phishing  You guys *do* know what phishing is, right? The usual Internet attack tools  Metasploit, etc