SlideShare una empresa de Scribd logo
1 de 16
Computer Viruses
 and Criminal Internet Business




PAGE 1 |
Today the number of known malicious software programs
  amounts to 6,5   million.

  Over the first quarter of 2011 there have been 254   million
  web-attacks, which stands for 33 attacks per minute.

  Just in June 2011 the Kaspersky Lab solutions enabled to detect
  and neutralize 220     million of malicious software programs
  on users’ computers.




PAGE 2 |
History and Facts

           Viruses of Today

           Criminal Internet Business




PAGE 3 |
History and Facts




1 2 3
The world’s economic damage caused by the most harmful
viruses being measured in millions of dollars


Love Bug                                                            8.75

Code Red                    2.62

   SirCam            1.15

                                   The assaults which occurred after the
   Melissa           1.1           May 2000 Love Bug attack have caused
                                    less damage due to the subsequent
                                   clearing system automation
    Nimda          0,63



PAGE 5 |   1 2 3
The notorious sentenced authors of viruses
              Robert Morris
              The author of the first in history net worm Morris Worm
              and the first ever sentenced for computer fraud.
              He was sentenced to 400 hours of community labor and fined to 10 400 dollars.



              David Smith
              The author of Melissa virus.
              He was convicted for 10 years in prison (served only 1,5 years sentence)
              and fined to 5 000 dollars for causing damage that amounted to 80 million dollars.




              Swen Yashan
              The author of several computer viruses, namely Sasser and NetSky.
              Microsoft offered a reward of 250 000 dollars for the information about the hacker.
              He was sentenced for 1 year 9 months in prison.



PAGE 6 |   1 2 3
Viruses of Today




1 2 3
Russia is second in the world in terms
of the number of servers with malicious resources
                              USA

                              28%


                                                  Russia
                                           17%
            Other    20%

                                         12%
                         5%                      Netherlands
                           5%
           Great Britain      5% 8%
                    Germany             China
                              Ukraine

PAGE 8 |   1 2 3
The most safe countries
in terms of the risk of being infected

                                     The number
  Position    Country
                                     of Infected Computers
      1       Japan                            6,3 %

      2       Germany                          9,2 %

      3       Switzerland                      9,6 %

      4       Luxembourg                      10,2 %

      5       Denmark                         11,1 %



PAGE 9 |   1 2 3
In 2011 mobile phones threats
are assumed to double

                                             515


The number of new harmful programs
for mobile platforms by years
                                      291           270
              169              176
   110
                      64


  2005       2006    2007      2008   2009   2010    2011
                                                    1st Qtr

PAGE 10 |   1 2 3
Another trend – malicious software designed
for hacking industrial control systems




                                                                 3900—5200
                                                                 contaminations



< 3900                                        5200—6500
contaminations                                contaminations



                     * The Stuxnet worm, being almost harmless
                       towards common users’ computers,
                       wrecks enriched uranium centrifuges
PAGE 11 |    1 2 3
Criminal Internet Business
Nowadays botnets or Zombie-nets
are one of the major sources
of illegal earnings in the Internet




1 2 3
Botnets expose
the modern versatile criminal business

Networking:                  Big botnets comprise
  Spam delivery              millions of computers:
                               BredoLab 30 000 000
  DDoS attacks
                               Mariposa 12 000 000
  Cyber racketeering
  Data stealing                Conficker 10 500 000

  Fishing                      TDL4       4 500 000
  Selling and renting          Zeus        3 600 000
  of a botnet                  (in USA only)


PAGE 13 |   1 2 3
As soon as a hacker receives money from a client he starts
sending spam via the botnet

                                                     Zombie*
            Client



                 $$$



            Hacker                Bot




* A computer that has been compromised by a cracker, computer virus or trojan horse
  and can be used to perform malicious tasks of one sort or another under remote direction.

PAGE 14 |     1 2 3
Forecast:
cybercrime in 2020 will get split in two groups

                                Cybercrime


            Business assaults                    Control systems attacks


      Commercial espionage                   Cracks and stealing of such systems


              Data stealing                           Services usage

               Defamation                          Information warping


                                             About a person     About an activity



PAGE 15 |
Feel concern and provide
your information security!
Apply to the modern defense solutions
of the Internet Security class




PAGE 16 |

Más contenido relacionado

La actualidad más candente

Network security history
Network security historyNetwork security history
Network security historyshahab ali
 
Hackers don’t discriminate
Hackers don’t discriminateHackers don’t discriminate
Hackers don’t discriminateGFI Software
 
Mobile Apps The Essentials
Mobile Apps  The EssentialsMobile Apps  The Essentials
Mobile Apps The EssentialsGlenn McKnight
 
Cscu module 07 securing network connections
Cscu module 07 securing network connectionsCscu module 07 securing network connections
Cscu module 07 securing network connectionsAlireza Ghahrood
 

La actualidad más candente (6)

Network security history
Network security historyNetwork security history
Network security history
 
Hackers don’t discriminate
Hackers don’t discriminateHackers don’t discriminate
Hackers don’t discriminate
 
Anti virus
Anti virusAnti virus
Anti virus
 
BPS-DellWorld
BPS-DellWorldBPS-DellWorld
BPS-DellWorld
 
Mobile Apps The Essentials
Mobile Apps  The EssentialsMobile Apps  The Essentials
Mobile Apps The Essentials
 
Cscu module 07 securing network connections
Cscu module 07 securing network connectionsCscu module 07 securing network connections
Cscu module 07 securing network connections
 

Similar a Computer viruses and criminal internet business

Symantec Website Security Threat Report
Symantec Website Security Threat ReportSymantec Website Security Threat Report
Symantec Website Security Threat Reportcheinyeanlim
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityIRJET Journal
 
Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Trend Micro
 
HR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataHR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataParsons Behle & Latimer
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Kim Jensen
 
Top 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVaultTop 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVaultSOCVault
 
How_effective_are_policies_which_increas
How_effective_are_policies_which_increasHow_effective_are_policies_which_increas
How_effective_are_policies_which_increasIvan Rainovski
 
Avg community powered threat report q2 2011
Avg community powered threat report   q2 2011Avg community powered threat report   q2 2011
Avg community powered threat report q2 2011AVG Technologies
 
Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009Lumension
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats ReportMcafeeCareers
 
Case Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks TelefónicaCase Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks TelefónicaSergio Renteria Nuñez
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0varun4110
 

Similar a Computer viruses and criminal internet business (20)

Symantec Website Security Threat Report
Symantec Website Security Threat ReportSymantec Website Security Threat Report
Symantec Website Security Threat Report
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009
 
HR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataHR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company Data
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009
 
Top 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVaultTop 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVault
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
How_effective_are_policies_which_increas
How_effective_are_policies_which_increasHow_effective_are_policies_which_increas
How_effective_are_policies_which_increas
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyper crime
Cyper crimeCyper crime
Cyper crime
 
Avg community powered threat report q2 2011
Avg community powered threat report   q2 2011Avg community powered threat report   q2 2011
Avg community powered threat report q2 2011
 
Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009
 
Malware
MalwareMalware
Malware
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats Report
 
Case Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks TelefónicaCase Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks Telefónica
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Cybercrime(this)
Cybercrime(this)Cybercrime(this)
Cybercrime(this)
 
need for NS.ppt
need for NS.pptneed for NS.ppt
need for NS.ppt
 

Más de Andrei Kolesnikov

Case study на примере компании Kaspersky_lab
Case study на примере компании Kaspersky_labCase study на примере компании Kaspersky_lab
Case study на примере компании Kaspersky_labAndrei Kolesnikov
 
Презентации. Во сколько они реально обходятся компании?
Презентации. Во сколько они реально обходятся компании?Презентации. Во сколько они реально обходятся компании?
Презентации. Во сколько они реально обходятся компании?Andrei Kolesnikov
 
тренинговая V33.2
тренинговая V33.2тренинговая V33.2
тренинговая V33.2Andrei Kolesnikov
 
брэндбук касперский
брэндбук касперскийбрэндбук касперский
брэндбук касперскийAndrei Kolesnikov
 
Asset Management Business Growth in Russia
Asset Management Business Growth in RussiaAsset Management Business Growth in Russia
Asset Management Business Growth in RussiaAndrei Kolesnikov
 
Emerging Markets: Potential and Investment Opportunities
Emerging Markets: Potential and Investment OpportunitiesEmerging Markets: Potential and Investment Opportunities
Emerging Markets: Potential and Investment OpportunitiesAndrei Kolesnikov
 
Power Lexis - Corporate presentation system (RUS)
Power Lexis - Corporate presentation system (RUS)Power Lexis - Corporate presentation system (RUS)
Power Lexis - Corporate presentation system (RUS)Andrei Kolesnikov
 

Más de Andrei Kolesnikov (10)

Case study на примере компании Kaspersky_lab
Case study на примере компании Kaspersky_labCase study на примере компании Kaspersky_lab
Case study на примере компании Kaspersky_lab
 
Презентации. Во сколько они реально обходятся компании?
Презентации. Во сколько они реально обходятся компании?Презентации. Во сколько они реально обходятся компании?
Презентации. Во сколько они реально обходятся компании?
 
тренинговая V33.2
тренинговая V33.2тренинговая V33.2
тренинговая V33.2
 
Rosatom power lexis
Rosatom power lexisRosatom power lexis
Rosatom power lexis
 
брэндбук касперский
брэндбук касперскийбрэндбук касперский
брэндбук касперский
 
Shedevr
ShedevrShedevr
Shedevr
 
Asset Management Business Growth in Russia
Asset Management Business Growth in RussiaAsset Management Business Growth in Russia
Asset Management Business Growth in Russia
 
Emerging Markets: Potential and Investment Opportunities
Emerging Markets: Potential and Investment OpportunitiesEmerging Markets: Potential and Investment Opportunities
Emerging Markets: Potential and Investment Opportunities
 
Power Lexis - Corporate presentation system (RUS)
Power Lexis - Corporate presentation system (RUS)Power Lexis - Corporate presentation system (RUS)
Power Lexis - Corporate presentation system (RUS)
 
Retro slides from IBM
Retro slides from IBMRetro slides from IBM
Retro slides from IBM
 

Último

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Último (20)

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Computer viruses and criminal internet business

  • 1. Computer Viruses and Criminal Internet Business PAGE 1 |
  • 2. Today the number of known malicious software programs amounts to 6,5 million. Over the first quarter of 2011 there have been 254 million web-attacks, which stands for 33 attacks per minute. Just in June 2011 the Kaspersky Lab solutions enabled to detect and neutralize 220 million of malicious software programs on users’ computers. PAGE 2 |
  • 3. History and Facts Viruses of Today Criminal Internet Business PAGE 3 |
  • 5. The world’s economic damage caused by the most harmful viruses being measured in millions of dollars Love Bug 8.75 Code Red 2.62 SirCam 1.15 The assaults which occurred after the Melissa 1.1 May 2000 Love Bug attack have caused less damage due to the subsequent clearing system automation Nimda 0,63 PAGE 5 | 1 2 3
  • 6. The notorious sentenced authors of viruses Robert Morris The author of the first in history net worm Morris Worm and the first ever sentenced for computer fraud. He was sentenced to 400 hours of community labor and fined to 10 400 dollars. David Smith The author of Melissa virus. He was convicted for 10 years in prison (served only 1,5 years sentence) and fined to 5 000 dollars for causing damage that amounted to 80 million dollars. Swen Yashan The author of several computer viruses, namely Sasser and NetSky. Microsoft offered a reward of 250 000 dollars for the information about the hacker. He was sentenced for 1 year 9 months in prison. PAGE 6 | 1 2 3
  • 8. Russia is second in the world in terms of the number of servers with malicious resources USA 28% Russia 17% Other 20% 12% 5% Netherlands 5% Great Britain 5% 8% Germany China Ukraine PAGE 8 | 1 2 3
  • 9. The most safe countries in terms of the risk of being infected The number Position Country of Infected Computers 1 Japan 6,3 % 2 Germany 9,2 % 3 Switzerland 9,6 % 4 Luxembourg 10,2 % 5 Denmark 11,1 % PAGE 9 | 1 2 3
  • 10. In 2011 mobile phones threats are assumed to double 515 The number of new harmful programs for mobile platforms by years 291 270 169 176 110 64 2005 2006 2007 2008 2009 2010 2011 1st Qtr PAGE 10 | 1 2 3
  • 11. Another trend – malicious software designed for hacking industrial control systems 3900—5200 contaminations < 3900 5200—6500 contaminations contaminations * The Stuxnet worm, being almost harmless towards common users’ computers, wrecks enriched uranium centrifuges PAGE 11 | 1 2 3
  • 12. Criminal Internet Business Nowadays botnets or Zombie-nets are one of the major sources of illegal earnings in the Internet 1 2 3
  • 13. Botnets expose the modern versatile criminal business Networking: Big botnets comprise Spam delivery millions of computers: BredoLab 30 000 000 DDoS attacks Mariposa 12 000 000 Cyber racketeering Data stealing Conficker 10 500 000 Fishing TDL4 4 500 000 Selling and renting Zeus 3 600 000 of a botnet (in USA only) PAGE 13 | 1 2 3
  • 14. As soon as a hacker receives money from a client he starts sending spam via the botnet Zombie* Client $$$ Hacker Bot * A computer that has been compromised by a cracker, computer virus or trojan horse and can be used to perform malicious tasks of one sort or another under remote direction. PAGE 14 | 1 2 3
  • 15. Forecast: cybercrime in 2020 will get split in two groups Cybercrime Business assaults Control systems attacks Commercial espionage Cracks and stealing of such systems Data stealing Services usage Defamation Information warping About a person About an activity PAGE 15 |
  • 16. Feel concern and provide your information security! Apply to the modern defense solutions of the Internet Security class PAGE 16 |