SlideShare una empresa de Scribd logo
1 de 47
Descargar para leer sin conexión
CYBER INTELLIGENCE
PROACTIVE INTELLIGENCE AGAINST CYBER-FRAUD
Hackers don’t care who you are.
They just care how rich you can make them.
PROACTIVE VS REACTIVE SECURITY
4
Recon Footprinting Gaining Access Maintaining
Access
Erasal of Logs
REACTIVE APPROACH
Firewall
/WAF/IDS/IPS
AntiVirus / DLP
Tools Forensic ToolsCYBER INTELLIGENCE
PROACTIVE APPROACH
A successful cyber attack involves different steps including, reconnaissance, footprinting, gaining
access, maintaining access and erasal of logs. Present conventional tools of the industry have a
reactive nature; being able to respond only when the attack has already been conducted.
On the other hand, the Cyber Intelligence approach aims to respond before the attack turns
into a real threat.
RISK IN ON-LINE GAMBLING INDUSTRY
Risk = (Probability
of the accident
occurring) X
(Expected loss in
case of the
accident)
REACTIVE SECURITY APPROACH
Most of the conventional
methods / tools / instruments
that are used to fight
cybercrime are mainly
REACTIVE solutions.
When these reactive
solutions, despite being also
important, are called for
duty… it’s already too late.
WHY REACTIVE SECURITY METHODS FAIL?
 Customers want to deposit and withdraw money easily
 ID Verification should not take too much time
 Customers don’t want to share personal information
 Device authentication mostly becomes ineffective since hackers use the
corresponding compromised devices to access stolen accounts.
 Second factor authentications are hard to manage
 Online gaming scripts are complex | Complexity is the enemy of security
 Call centers and support staff need to access information but no security
metrics are defined in employment process
 The gambling services are a system involving the exchange of money
that lends itself to money laundering.
BEING PROACTIVE
Merriam-Webster defines «proactive» as such:
«…preparing for possible future problems».
ON-LINE GAMBLING:
THREATS
9
Most Important security problems of
On-line Gambling can be summarized
as follows:
Gaming Software Flaws and
Automation
Stolen Credit Cards
Web-App Vulnerabilities
Account Hijacking
Insider Threats
Social Engineering
Service Interruption
ON-LINE GAMBLING THREATS:
GAMING SOFTWARE FLAWS I
10
Due to the rapid expansion of online gaming market, online
gaming has quickly created its own black market.
Thanks to the huge amounts of stolen currencies that have
been laundred by hackers successfully, more and more hackers
have turned their heads towards online gambling.
Due to the stolen money laundering capabilities of hackers
with the use of online gambling, thousands of hackers and
cyber-fraudsters have targeted online gaming and
automation systems, for the purpose of finding a flaw that
may be exploited as a vulnerability.
ON-LINE GAMBLING THREATS:
GAMING SOFTWARE FLAWS II
11
ON-LINE GAMBLING THREATS:
GAMING SOFTWARE FLAWS III
12
ON-LINE GAMBLING THREATS:
GAMING SOFTWARE FLAWS IV
13
ONLINE GAMBLING THREATS:
GAMING SOFTWARE FLAWS V
14
ON-LINE GAMBLING THREATS:
GAMING SOFTWARE FLAWS VI
15
ON-LINE GAMBLING THREATS:
STOLEN CREDIT CARDS I
16
 Most practised form of cyber fraud
for the last 15 years: purchase, sale,
usage and laundering of stolen credit
cards.
 Result: creation of a billion dollar
black market.
 Mainly using credit cards as a
payment instrument, online gaming
and gambling sites have always
been, and will most assuredly be
targeted in the future for the
purpose of stealing credit cards.
ON-LINE GAMBLING THREATS:
STOLEN CREDIT CARDS II
17
ON-LINE GAMBLING THREATS:
WEB-APP VULNERABILITIES I
18
 Nearly each and every
online gaming and gambling
site in the world is subject to
continuous vulnerability scans
and exploit trials.
 On the other hand, what is
very little known is that these
newly found vulnerabilities
(even very simplistic ones) are
continuously shared and sold in
the underground.
ON-LINE GAMBLING THREATS:
WEB-APP VULNERABILITIES II
19
ON-LINE GAMBLING THREATS:
WEB-APP VULNERABILITIES III
20
ON-LINE GAMBLING THREATS:
ACCOUNT HIJACKING I
21
Hackers steal accounts of online
gambling users for the purpose of:
 Laundering money, as these
accounts have a higher trust rate in
the eyes of online anti-fraud
mechanisms.
 Stealing the credits that these
accounts may have.
 Distributing stolen online currencies
for the purpose of annonymization.
ON-LINE GAMBLING THREATS:
ACCOUNT HIJACKING II
22
ON-LINE GAMBLING THREATS:
INSIDER THREATS
23
Apart from the external
threats, online gambling
industry shall also be
deemed vulnerable against
insider threats.
 Due to the availability of
annonymization as well as
digitalization of monetary
assets; the sector is truly
prone to insider threats.
ON-LINE GAMBLING THREATS:
SOCIAL ENGINEERING I
24
Social engineering has proven itself to be the most simplistic, yet one of the
most powerful hacking methods than can be performed.
Call centers and helpdesks at online gambling and gaming platforms are
usually trained for helping and assisting the members.
Unfortunately, this makes these platforms the perfect environment for
attackers to deceive the operator.
Especially, following social engineering methods are continuously targeted
against online casino platforms:
 Call center attacks
 Phishing attacks
 Document Forgery
ON-LINE GAMBLING THREATS:
SOCIAL ENGINEERING II
25
SOLUTION?
26
Although problems seem to be complicated and varied: a proactive solution is possible.
And this is what we call: The Cyber Intelligence.
Cyber-Intelligence technology is based on acquiring actionable
information from the other side of the fence.
CYBER INTELLIGENCE APPROACH
Thus, large scale cyber attack campaigns,
worldwide organizations of hacktivist groups
and growing cyber war initiatives of
governments have changed the scope of cyber
security arena.
These newly evolving types of threats have
brought the requirement for a completely
different approach towards security:
Cyber Intelligence.
BANKING SECURITY INNOVATION OF THE YEAR
CSD & G-PACT (“THE TEAM”): CYBER INTELLIGENCE - I
Being an award winning technology (Retail Banker International London 2015 – Banking Security
Innovation of the Year), THE TEAM relies on a truly unique technology: deep web monitoring sensors.
Deployed in a custom manner according to credentials and specifications of each G-PACT member, these
sensors monitor the underground and notify each TEAM member about the following:
 Risky data-leaks about the Client (corporate data, user data, customer data, etc.)
 Upcoming Cyber-attack Campaigns; (latest attacking methods, current plans about latest attacks,
newly evolving attack-trends);
 Latest Malware Examples (Specific to the Client’s industry/sector and activities);
 Stolen User Credentials Intelligence
 Stolen ID and Passport Intelligence
 Stolen Payment Accounts (Paypal, Moneygram etc.)
THE TEAM: CYBER INTELLIGENCE - II
Aside from being the most innovative Cyber-
Intelligence approach of this complex domain
arena, THE TEAM is also reinforced with:
 Actionable Cyber Intelligence Notifications,
 Industrial Cyber Threat Sharing
Capabilities,
 High-end brand-protection detection/
termination/notification services.
THE TEAM: CYBER CRIME INTELLIGENCE - I
Most of the cyber crime activity is defined as a cyber crime operation when:
 The attack has been carried by a team or any other organized group
 The attack has been designed to be sustainable and continuous.
THE TEAM cybercrime response (CR) team continously monitors these advanced large-scale
threats and analyzes each element of these fraudulent attempts.
Each cybercrime operation is meticulously analyzed in terms of its:
 Suspects
 Tools
 Methods
 Motivation
These findings are reported to all relevant members of THE TEAM Platform in maximum 2
hours period following detection of the operation.
30
THE TEAM: CYBER CRIME INTELLIGENCE - II
31
THE TEAM: CYBER CRIME INTELLIGENCE - III
32
THE TEAM: MALWARE INTELLIGENCE - I
Malware Intelligence is one of the most niché areas of Cyber Intelligence.
Critical infrastructures are targeted by thousands of new malware examples every day. Yet,
only a few of these attack tools can be identified beforehand.
Unlike the common misconception; antivirus scanners have very little to do with actual
protection of your organizations. Especially when it comes to critical sectors, tools and techniques
of attackers can easily penetrate through most firewalls, antivirus software, and any other
security precaution which may or may not be implemented.
 THE TEAM provides its members with actual examples of latest malware development
affairs of attackers, directly from the underground.
 Deep Web Sensors® technology of PRODAFT-CSD, is more than able to acquire samples of
all newly-developed Botnet or similar malware.
 Before being shared with members of THE TEAM Platform, each of these malware samples
are analyzed in terms of their Capabilities and Affiliates (C2) Servers.
33
THE TEAM: MALWARE INTELLIGENCE - II
34
THE TEAM: DATA LEAKAGE INTELLIGENCE - I
35
Without your knowing, critical information about your organization, employee, clients or
affiliated partners can be leaked and spread throughout the cyber underground.
Even though some of these information may seem unimportant; they can be used
efficiently by high-end attackers to carry out advanced and complex cyber attacks and
other espionagé operations.
THE TEAM uses PRODAFT-CSD’s Deep Web Sensors® technology to automatically
monitor the underground for detecting any data leakage involving THE TEAM member
organizations.
Some of the most-commonly detected examples of data leakage are as follows:
 Stolen passport / identity scans;
 E-mail address / password pairs;
 Account credentials;
 Corporate accounts for intra-organizational online services.
 Confidential corporate documents.
THE TEAM: DATA LEAKAGE INTELLIGENCE - II
36
THE TEAM: ON-LINE CASINO CREDENTIALS INTELLIGENCE - I
37
Especially advanced attackers and cyberfraud groups target online
gambling credentials of casino clients to steal the balance on the
victims’ account by means of underground money-laundering services
and shell companies.
These online banking credentials are stolen by attackers by means of
 Phishing Sites,
 Large-scale Botnets,
Malicious Internet Banking applications on mobile stores and
markets.
THE TEAM: ON-LINE CASINO CREDENTIALS INTELLIGENCE - II
38
THE TEAM: PHISHING AND
BRAND PROTECTION INTELLIGENCE - I
39
 Despite seeming less-important and easily applicable by attackers, phishing
has become one of the most commonly used methods of cyber-fraud.
 THE TEAM relies on its specifically crafted automatized phishing systems,
which are able to detect and respond to phishing campaigns automatically.
 In the previous year, THE TEAM has eliminated a total of 12.000 phishing
sites / applications. This figure is higher than all other anti-phishing / brand
monitoring solutions in the industry, combined.
 Apart from phishing sites and campaigns, THE TEAM monitoring sensors
wander throughout the web, mobile application markets and social media
platforms for any malicious / fraudulent site/file/name/trace that may
damage the reputation of its members.
THE TEAM: PHISHING AND
BRAND PROTECTION INTELLIGENCE - II
40
THE TEAM: BOTNET INTELLIGENCE / BLACKLIST
41
PRODAFT-CSD’s botnet sinkhole systems;
automatically penetrates into large-scale
BotNets of attackers to reveal infected IP
addresses that are under control of the
attacker.
These Infected IP addresses are shared with THE
TEAM members inside the scope of “Users under
Potential Threat” blacklist.
Thanks to Botnet Blacklist Intelligence service;
THE TEAM’s member organizations are able to
detect, if any of their incoming visitors have
been infected by a BotNet; and restrict / limit
their access or implement additional measures
to prevent further losses.
THE TEAM: FRAUD METHOD INTELLIGENCE
42
Each day, cyber attackers and
fraudsters come up with news ways of
laundering / transferring money from
stolen credit cards, bank accounts and
other online payment systems.
THE TEAM Operators continuously scan
the underground, and look for newly
emerging methods of cyber-fraud and
money laundering, in order to notify
THE TEAM Members about latests
trends of cyber-fraud.
THE TEAM: STOLEN
ID/PASSPORT INTELLIGENCE
43
Currently, THE TEAM has previously deployed
working sensors which acquire stolen ID /
passport information from the underground
and provide this intelligence to major banking
companies.
These IDs and Passports are also widely used for
Online Gambling fraud.
THE TEAM can be configured to provide online
gambling organizations with specific stolen
passport/ID information involving a specific
country or on an international level.
As of 2016, THE TEAM has detected more than
2.100.000 stolen passport / ID.
THE TEAM: PENETRATION TESTING
44
 Of course penetration testing is another, yet,
very important form of proactive security
measures.
On the other hand most of the «penetration
tests» as we know it, are not more than
commercialized IT services that lack true hacker
perspective.
 Therefore, all penetration testing efforts shall be
performed by unorthodox crews consisting of
ethical hackers that have true «outside the box»
hacking knowledge…. rather than an IT guy at
the far-end of the world, that presses «Start»
button of a vulnerability scanner.
THE TEAM: CONCLUSION I
45
Truly proactive solutions are required for an efficient fight
against cyber-fraud, especially in online gambling.
When the attacker arrives at your door, its already too late.
Only a very - very - minor percentage of losses are actually
realized.
Cyber-underground is evolving and expanding more rapidly
than conventional security does..
 Attackers already know, and laught at, most of the
automatized security / fraud prevention systems that we
already have in place.
THE TEAM: CONCLUSION - II
46
IF YOU WANT “TO BE SECURE” RATHER THAN “TO FEEL SECURE”,
BE PROACTIVE!
Thank You!
2. Cyber Intelligence in online gambling final

Más contenido relacionado

La actualidad más candente

Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Michael Bunn
 
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and Research
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and ResearchUsing MITRE PRE-ATTACK and ATTACK in Cybercrime Education and Research
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and Research
MITRE - ATT&CKcon
 

La actualidad más candente (20)

Evolution of Offensive Testing - ATT&CK-based Adversary Emulation Plans
Evolution of Offensive Testing - ATT&CK-based Adversary Emulation PlansEvolution of Offensive Testing - ATT&CK-based Adversary Emulation Plans
Evolution of Offensive Testing - ATT&CK-based Adversary Emulation Plans
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of Compromise
 
Understanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdfUnderstanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdf
 
State of the ATT&CK - ATT&CKcon Power Hour
State of the ATT&CK - ATT&CKcon Power HourState of the ATT&CK - ATT&CKcon Power Hour
State of the ATT&CK - ATT&CKcon Power Hour
 
Corporate threat vector and landscape
Corporate threat vector and landscapeCorporate threat vector and landscape
Corporate threat vector and landscape
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...
 
Introduction to MITRE ATT&CK
Introduction to MITRE ATT&CKIntroduction to MITRE ATT&CK
Introduction to MITRE ATT&CK
 
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
 
A tale story of building and maturing threat hunting program
A tale story of building and maturing threat hunting programA tale story of building and maturing threat hunting program
A tale story of building and maturing threat hunting program
 
The Indicators of Compromise
The Indicators of CompromiseThe Indicators of Compromise
The Indicators of Compromise
 
IDSECCONF2018 Keynote Speaker - Agung Nugraha, S.IP., M.Si (Han)
IDSECCONF2018 Keynote Speaker - Agung Nugraha, S.IP., M.Si (Han)IDSECCONF2018 Keynote Speaker - Agung Nugraha, S.IP., M.Si (Han)
IDSECCONF2018 Keynote Speaker - Agung Nugraha, S.IP., M.Si (Han)
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep Discovery
 
Dreaming of IoCs Adding Time Context to Threat Intelligence
Dreaming of IoCs Adding Time Context to Threat IntelligenceDreaming of IoCs Adding Time Context to Threat Intelligence
Dreaming of IoCs Adding Time Context to Threat Intelligence
 
Why Organisations Need_Barac
Why Organisations Need_BaracWhy Organisations Need_Barac
Why Organisations Need_Barac
 
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and Research
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and ResearchUsing MITRE PRE-ATTACK and ATTACK in Cybercrime Education and Research
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and Research
 
Measuring And Communication Risk The Fair Way Kevin Riggins
Measuring And Communication Risk The Fair Way   Kevin RigginsMeasuring And Communication Risk The Fair Way   Kevin Riggins
Measuring And Communication Risk The Fair Way Kevin Riggins
 
Purple Teaming with ATT&CK - x33fcon 2018
Purple Teaming with ATT&CK - x33fcon 2018Purple Teaming with ATT&CK - x33fcon 2018
Purple Teaming with ATT&CK - x33fcon 2018
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
 

Destacado

Icann Presentation @OBP Milano 18 novembre2009
Icann Presentation  @OBP Milano 18 novembre2009Icann Presentation  @OBP Milano 18 novembre2009
Icann Presentation @OBP Milano 18 novembre2009
Register.it
 
Melbourne IT - iStrategy Atlanta
Melbourne IT - iStrategy AtlantaMelbourne IT - iStrategy Atlanta
Melbourne IT - iStrategy Atlanta
iStrategy
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)
mmubashirkhan
 

Destacado (16)

The convergence of interactive entertainment and online gambling in Europe
The convergence of interactive entertainment and online gambling in EuropeThe convergence of interactive entertainment and online gambling in Europe
The convergence of interactive entertainment and online gambling in Europe
 
Emerging trends in online gambling within Australia
Emerging trends in online gambling within Australia Emerging trends in online gambling within Australia
Emerging trends in online gambling within Australia
 
Crowdfunding by Podium Partners
Crowdfunding by Podium PartnersCrowdfunding by Podium Partners
Crowdfunding by Podium Partners
 
Social media: Online brand protection
Social media: Online brand protectionSocial media: Online brand protection
Social media: Online brand protection
 
Icann Presentation @OBP Milano 18 novembre2009
Icann Presentation  @OBP Milano 18 novembre2009Icann Presentation  @OBP Milano 18 novembre2009
Icann Presentation @OBP Milano 18 novembre2009
 
Melbourne IT - iStrategy Atlanta
Melbourne IT - iStrategy AtlantaMelbourne IT - iStrategy Atlanta
Melbourne IT - iStrategy Atlanta
 
BrandShield - Online Brand Protection Tool
BrandShield - Online Brand Protection ToolBrandShield - Online Brand Protection Tool
BrandShield - Online Brand Protection Tool
 
ICANN 50: New gTLD Registry Operator Engagement
ICANN 50: New gTLD Registry Operator EngagementICANN 50: New gTLD Registry Operator Engagement
ICANN 50: New gTLD Registry Operator Engagement
 
Protecting Your Company's Brand & Reputation Online
Protecting Your Company's Brand & Reputation OnlineProtecting Your Company's Brand & Reputation Online
Protecting Your Company's Brand & Reputation Online
 
Agent-cy Online Marketing Services & Digital Marketing Training Programs 2016
Agent-cy Online Marketing Services & Digital Marketing Training Programs 2016 Agent-cy Online Marketing Services & Digital Marketing Training Programs 2016
Agent-cy Online Marketing Services & Digital Marketing Training Programs 2016
 
Building an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence ProgramBuilding an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence Program
 
Dr. Tilman Lesch
Dr. Tilman LeschDr. Tilman Lesch
Dr. Tilman Lesch
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)
 

Similar a 2. Cyber Intelligence in online gambling final

Taking the offensive Security Leaders V9.1
Taking the offensive Security Leaders V9.1Taking the offensive Security Leaders V9.1
Taking the offensive Security Leaders V9.1
Fernando Romero
 
F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalF5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker Final
Shallu Behar-Sheehan FCIM
 

Similar a 2. Cyber Intelligence in online gambling final (20)

Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and Mitigation
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
 
The Most Common Enterprise Malware and how to identify them
The Most Common Enterprise Malware and how to identify themThe Most Common Enterprise Malware and how to identify them
The Most Common Enterprise Malware and how to identify them
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
Taking the offensive Security Leaders V9.1
Taking the offensive Security Leaders V9.1Taking the offensive Security Leaders V9.1
Taking the offensive Security Leaders V9.1
 
Network Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan BankersNetwork Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan Bankers
 
CyberDen 2020
CyberDen 2020CyberDen 2020
CyberDen 2020
 
Crack the Code
Crack the CodeCrack the Code
Crack the Code
 
Apresentação Allen ES
Apresentação Allen ESApresentação Allen ES
Apresentação Allen ES
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
Understanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent ThemUnderstanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent Them
 
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
 
Failed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated RansomwareFailed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated Ransomware
 
F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalF5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker Final
 

Más de MARIUS EUGEN OPRAN

A NEW STRATEGY FOR A STRONGER AND MORE COMPETITIVE EUROPEAN DEFENCE INDUSTRY
A NEW STRATEGY FOR A STRONGER AND MORE COMPETITIVE EUROPEAN DEFENCE INDUSTRYA NEW STRATEGY FOR A STRONGER AND MORE COMPETITIVE EUROPEAN DEFENCE INDUSTRY
A NEW STRATEGY FOR A STRONGER AND MORE COMPETITIVE EUROPEAN DEFENCE INDUSTRY
MARIUS EUGEN OPRAN
 
THE DIGITAL AGENDA - A PERSONAL VIEW PREPARED UNDER THE PERSONAL REQUEST OF D...
THE DIGITAL AGENDA - A PERSONAL VIEW PREPARED UNDER THE PERSONAL REQUEST OF D...THE DIGITAL AGENDA - A PERSONAL VIEW PREPARED UNDER THE PERSONAL REQUEST OF D...
THE DIGITAL AGENDA - A PERSONAL VIEW PREPARED UNDER THE PERSONAL REQUEST OF D...
MARIUS EUGEN OPRAN
 
DEFENCE STRATEGY-READY FOR PRINT
DEFENCE STRATEGY-READY FOR PRINTDEFENCE STRATEGY-READY FOR PRINT
DEFENCE STRATEGY-READY FOR PRINT
MARIUS EUGEN OPRAN
 
Comunicații mobile prin satelit pentru aplicații SCADA
Comunicații mobile prin satelit pentru aplicații SCADAComunicații mobile prin satelit pentru aplicații SCADA
Comunicații mobile prin satelit pentru aplicații SCADA
MARIUS EUGEN OPRAN
 
TURKEY-THE STRATEGIC ENERGY CONNECTOR OK
TURKEY-THE STRATEGIC ENERGY CONNECTOR OKTURKEY-THE STRATEGIC ENERGY CONNECTOR OK
TURKEY-THE STRATEGIC ENERGY CONNECTOR OK
MARIUS EUGEN OPRAN
 
MARMARA2012_CyberTerror_ElecGrid_OK
MARMARA2012_CyberTerror_ElecGrid_OKMARMARA2012_CyberTerror_ElecGrid_OK
MARMARA2012_CyberTerror_ElecGrid_OK
MARIUS EUGEN OPRAN
 
14.06.01_LEOPARD_Viena_2014_ok
14.06.01_LEOPARD_Viena_2014_ok14.06.01_LEOPARD_Viena_2014_ok
14.06.01_LEOPARD_Viena_2014_ok
MARIUS EUGEN OPRAN
 
BORDER-FEASIBILITY-IDEX 2009_Excerpt 4 slidesfrom 24
BORDER-FEASIBILITY-IDEX 2009_Excerpt 4 slidesfrom 24BORDER-FEASIBILITY-IDEX 2009_Excerpt 4 slidesfrom 24
BORDER-FEASIBILITY-IDEX 2009_Excerpt 4 slidesfrom 24
MARIUS EUGEN OPRAN
 
SPACE DEBRIS PALAT PARLAM no authors
SPACE DEBRIS PALAT PARLAM no authorsSPACE DEBRIS PALAT PARLAM no authors
SPACE DEBRIS PALAT PARLAM no authors
MARIUS EUGEN OPRAN
 
2010.08.03 Raport catre Robert Madelin ref. Digital Agenda draft
2010.08.03 Raport catre Robert Madelin ref. Digital Agenda draft2010.08.03 Raport catre Robert Madelin ref. Digital Agenda draft
2010.08.03 Raport catre Robert Madelin ref. Digital Agenda draft
MARIUS EUGEN OPRAN
 

Más de MARIUS EUGEN OPRAN (20)

ICT4SD BROCHURE
ICT4SD BROCHUREICT4SD BROCHURE
ICT4SD BROCHURE
 
ICT4SD BROCHURE
ICT4SD BROCHUREICT4SD BROCHURE
ICT4SD BROCHURE
 
A NEW STRATEGY FOR A STRONGER AND MORE COMPETITIVE EUROPEAN DEFENCE INDUSTRY
A NEW STRATEGY FOR A STRONGER AND MORE COMPETITIVE EUROPEAN DEFENCE INDUSTRYA NEW STRATEGY FOR A STRONGER AND MORE COMPETITIVE EUROPEAN DEFENCE INDUSTRY
A NEW STRATEGY FOR A STRONGER AND MORE COMPETITIVE EUROPEAN DEFENCE INDUSTRY
 
ICT4SD BROCHURE
ICT4SD BROCHUREICT4SD BROCHURE
ICT4SD BROCHURE
 
THE DIGITAL AGENDA - A PERSONAL VIEW PREPARED UNDER THE PERSONAL REQUEST OF D...
THE DIGITAL AGENDA - A PERSONAL VIEW PREPARED UNDER THE PERSONAL REQUEST OF D...THE DIGITAL AGENDA - A PERSONAL VIEW PREPARED UNDER THE PERSONAL REQUEST OF D...
THE DIGITAL AGENDA - A PERSONAL VIEW PREPARED UNDER THE PERSONAL REQUEST OF D...
 
BROCHURE-READY FOR PRINT
BROCHURE-READY FOR PRINTBROCHURE-READY FOR PRINT
BROCHURE-READY FOR PRINT
 
DEFENCE STRATEGY-READY FOR PRINT
DEFENCE STRATEGY-READY FOR PRINTDEFENCE STRATEGY-READY FOR PRINT
DEFENCE STRATEGY-READY FOR PRINT
 
SCRISOARE DESCHISA
SCRISOARE DESCHISASCRISOARE DESCHISA
SCRISOARE DESCHISA
 
RAZBOIUL METEO_published
RAZBOIUL METEO_publishedRAZBOIUL METEO_published
RAZBOIUL METEO_published
 
Comunicații mobile prin satelit pentru aplicații SCADA
Comunicații mobile prin satelit pentru aplicații SCADAComunicații mobile prin satelit pentru aplicații SCADA
Comunicații mobile prin satelit pentru aplicații SCADA
 
TURKEY-THE STRATEGIC ENERGY CONNECTOR OK
TURKEY-THE STRATEGIC ENERGY CONNECTOR OKTURKEY-THE STRATEGIC ENERGY CONNECTOR OK
TURKEY-THE STRATEGIC ENERGY CONNECTOR OK
 
MARMARA2012_CyberTerror_ElecGrid_OK
MARMARA2012_CyberTerror_ElecGrid_OKMARMARA2012_CyberTerror_ElecGrid_OK
MARMARA2012_CyberTerror_ElecGrid_OK
 
14.06.01_LEOPARD_Viena_2014_ok
14.06.01_LEOPARD_Viena_2014_ok14.06.01_LEOPARD_Viena_2014_ok
14.06.01_LEOPARD_Viena_2014_ok
 
STRATEGY DEF IND OK
STRATEGY DEF IND OKSTRATEGY DEF IND OK
STRATEGY DEF IND OK
 
Lisbon pp 7.ix
Lisbon pp 7.ixLisbon pp 7.ix
Lisbon pp 7.ix
 
BORDER-FEASIBILITY-IDEX 2009_Excerpt 4 slidesfrom 24
BORDER-FEASIBILITY-IDEX 2009_Excerpt 4 slidesfrom 24BORDER-FEASIBILITY-IDEX 2009_Excerpt 4 slidesfrom 24
BORDER-FEASIBILITY-IDEX 2009_Excerpt 4 slidesfrom 24
 
SPACE DEBRIS PALAT PARLAM no authors
SPACE DEBRIS PALAT PARLAM no authorsSPACE DEBRIS PALAT PARLAM no authors
SPACE DEBRIS PALAT PARLAM no authors
 
2010.08.03 Raport catre Robert Madelin ref. Digital Agenda draft
2010.08.03 Raport catre Robert Madelin ref. Digital Agenda draft2010.08.03 Raport catre Robert Madelin ref. Digital Agenda draft
2010.08.03 Raport catre Robert Madelin ref. Digital Agenda draft
 
LNG vs CNG_2010_Istanbul OK
LNG vs CNG_2010_Istanbul OKLNG vs CNG_2010_Istanbul OK
LNG vs CNG_2010_Istanbul OK
 
15.05.19_CLARA_EN_OK
15.05.19_CLARA_EN_OK15.05.19_CLARA_EN_OK
15.05.19_CLARA_EN_OK
 

2. Cyber Intelligence in online gambling final

  • 1.
  • 3. Hackers don’t care who you are. They just care how rich you can make them.
  • 4. PROACTIVE VS REACTIVE SECURITY 4 Recon Footprinting Gaining Access Maintaining Access Erasal of Logs REACTIVE APPROACH Firewall /WAF/IDS/IPS AntiVirus / DLP Tools Forensic ToolsCYBER INTELLIGENCE PROACTIVE APPROACH A successful cyber attack involves different steps including, reconnaissance, footprinting, gaining access, maintaining access and erasal of logs. Present conventional tools of the industry have a reactive nature; being able to respond only when the attack has already been conducted. On the other hand, the Cyber Intelligence approach aims to respond before the attack turns into a real threat.
  • 5. RISK IN ON-LINE GAMBLING INDUSTRY Risk = (Probability of the accident occurring) X (Expected loss in case of the accident)
  • 6. REACTIVE SECURITY APPROACH Most of the conventional methods / tools / instruments that are used to fight cybercrime are mainly REACTIVE solutions. When these reactive solutions, despite being also important, are called for duty… it’s already too late.
  • 7. WHY REACTIVE SECURITY METHODS FAIL?  Customers want to deposit and withdraw money easily  ID Verification should not take too much time  Customers don’t want to share personal information  Device authentication mostly becomes ineffective since hackers use the corresponding compromised devices to access stolen accounts.  Second factor authentications are hard to manage  Online gaming scripts are complex | Complexity is the enemy of security  Call centers and support staff need to access information but no security metrics are defined in employment process  The gambling services are a system involving the exchange of money that lends itself to money laundering.
  • 8. BEING PROACTIVE Merriam-Webster defines «proactive» as such: «…preparing for possible future problems».
  • 9. ON-LINE GAMBLING: THREATS 9 Most Important security problems of On-line Gambling can be summarized as follows: Gaming Software Flaws and Automation Stolen Credit Cards Web-App Vulnerabilities Account Hijacking Insider Threats Social Engineering Service Interruption
  • 10. ON-LINE GAMBLING THREATS: GAMING SOFTWARE FLAWS I 10 Due to the rapid expansion of online gaming market, online gaming has quickly created its own black market. Thanks to the huge amounts of stolen currencies that have been laundred by hackers successfully, more and more hackers have turned their heads towards online gambling. Due to the stolen money laundering capabilities of hackers with the use of online gambling, thousands of hackers and cyber-fraudsters have targeted online gaming and automation systems, for the purpose of finding a flaw that may be exploited as a vulnerability.
  • 11. ON-LINE GAMBLING THREATS: GAMING SOFTWARE FLAWS II 11
  • 12. ON-LINE GAMBLING THREATS: GAMING SOFTWARE FLAWS III 12
  • 13. ON-LINE GAMBLING THREATS: GAMING SOFTWARE FLAWS IV 13
  • 14. ONLINE GAMBLING THREATS: GAMING SOFTWARE FLAWS V 14
  • 15. ON-LINE GAMBLING THREATS: GAMING SOFTWARE FLAWS VI 15
  • 16. ON-LINE GAMBLING THREATS: STOLEN CREDIT CARDS I 16  Most practised form of cyber fraud for the last 15 years: purchase, sale, usage and laundering of stolen credit cards.  Result: creation of a billion dollar black market.  Mainly using credit cards as a payment instrument, online gaming and gambling sites have always been, and will most assuredly be targeted in the future for the purpose of stealing credit cards.
  • 17. ON-LINE GAMBLING THREATS: STOLEN CREDIT CARDS II 17
  • 18. ON-LINE GAMBLING THREATS: WEB-APP VULNERABILITIES I 18  Nearly each and every online gaming and gambling site in the world is subject to continuous vulnerability scans and exploit trials.  On the other hand, what is very little known is that these newly found vulnerabilities (even very simplistic ones) are continuously shared and sold in the underground.
  • 19. ON-LINE GAMBLING THREATS: WEB-APP VULNERABILITIES II 19
  • 20. ON-LINE GAMBLING THREATS: WEB-APP VULNERABILITIES III 20
  • 21. ON-LINE GAMBLING THREATS: ACCOUNT HIJACKING I 21 Hackers steal accounts of online gambling users for the purpose of:  Laundering money, as these accounts have a higher trust rate in the eyes of online anti-fraud mechanisms.  Stealing the credits that these accounts may have.  Distributing stolen online currencies for the purpose of annonymization.
  • 23. ON-LINE GAMBLING THREATS: INSIDER THREATS 23 Apart from the external threats, online gambling industry shall also be deemed vulnerable against insider threats.  Due to the availability of annonymization as well as digitalization of monetary assets; the sector is truly prone to insider threats.
  • 24. ON-LINE GAMBLING THREATS: SOCIAL ENGINEERING I 24 Social engineering has proven itself to be the most simplistic, yet one of the most powerful hacking methods than can be performed. Call centers and helpdesks at online gambling and gaming platforms are usually trained for helping and assisting the members. Unfortunately, this makes these platforms the perfect environment for attackers to deceive the operator. Especially, following social engineering methods are continuously targeted against online casino platforms:  Call center attacks  Phishing attacks  Document Forgery
  • 25. ON-LINE GAMBLING THREATS: SOCIAL ENGINEERING II 25
  • 26. SOLUTION? 26 Although problems seem to be complicated and varied: a proactive solution is possible. And this is what we call: The Cyber Intelligence. Cyber-Intelligence technology is based on acquiring actionable information from the other side of the fence.
  • 27. CYBER INTELLIGENCE APPROACH Thus, large scale cyber attack campaigns, worldwide organizations of hacktivist groups and growing cyber war initiatives of governments have changed the scope of cyber security arena. These newly evolving types of threats have brought the requirement for a completely different approach towards security: Cyber Intelligence. BANKING SECURITY INNOVATION OF THE YEAR
  • 28. CSD & G-PACT (“THE TEAM”): CYBER INTELLIGENCE - I Being an award winning technology (Retail Banker International London 2015 – Banking Security Innovation of the Year), THE TEAM relies on a truly unique technology: deep web monitoring sensors. Deployed in a custom manner according to credentials and specifications of each G-PACT member, these sensors monitor the underground and notify each TEAM member about the following:  Risky data-leaks about the Client (corporate data, user data, customer data, etc.)  Upcoming Cyber-attack Campaigns; (latest attacking methods, current plans about latest attacks, newly evolving attack-trends);  Latest Malware Examples (Specific to the Client’s industry/sector and activities);  Stolen User Credentials Intelligence  Stolen ID and Passport Intelligence  Stolen Payment Accounts (Paypal, Moneygram etc.)
  • 29. THE TEAM: CYBER INTELLIGENCE - II Aside from being the most innovative Cyber- Intelligence approach of this complex domain arena, THE TEAM is also reinforced with:  Actionable Cyber Intelligence Notifications,  Industrial Cyber Threat Sharing Capabilities,  High-end brand-protection detection/ termination/notification services.
  • 30. THE TEAM: CYBER CRIME INTELLIGENCE - I Most of the cyber crime activity is defined as a cyber crime operation when:  The attack has been carried by a team or any other organized group  The attack has been designed to be sustainable and continuous. THE TEAM cybercrime response (CR) team continously monitors these advanced large-scale threats and analyzes each element of these fraudulent attempts. Each cybercrime operation is meticulously analyzed in terms of its:  Suspects  Tools  Methods  Motivation These findings are reported to all relevant members of THE TEAM Platform in maximum 2 hours period following detection of the operation. 30
  • 31. THE TEAM: CYBER CRIME INTELLIGENCE - II 31
  • 32. THE TEAM: CYBER CRIME INTELLIGENCE - III 32
  • 33. THE TEAM: MALWARE INTELLIGENCE - I Malware Intelligence is one of the most niché areas of Cyber Intelligence. Critical infrastructures are targeted by thousands of new malware examples every day. Yet, only a few of these attack tools can be identified beforehand. Unlike the common misconception; antivirus scanners have very little to do with actual protection of your organizations. Especially when it comes to critical sectors, tools and techniques of attackers can easily penetrate through most firewalls, antivirus software, and any other security precaution which may or may not be implemented.  THE TEAM provides its members with actual examples of latest malware development affairs of attackers, directly from the underground.  Deep Web Sensors® technology of PRODAFT-CSD, is more than able to acquire samples of all newly-developed Botnet or similar malware.  Before being shared with members of THE TEAM Platform, each of these malware samples are analyzed in terms of their Capabilities and Affiliates (C2) Servers. 33
  • 34. THE TEAM: MALWARE INTELLIGENCE - II 34
  • 35. THE TEAM: DATA LEAKAGE INTELLIGENCE - I 35 Without your knowing, critical information about your organization, employee, clients or affiliated partners can be leaked and spread throughout the cyber underground. Even though some of these information may seem unimportant; they can be used efficiently by high-end attackers to carry out advanced and complex cyber attacks and other espionagé operations. THE TEAM uses PRODAFT-CSD’s Deep Web Sensors® technology to automatically monitor the underground for detecting any data leakage involving THE TEAM member organizations. Some of the most-commonly detected examples of data leakage are as follows:  Stolen passport / identity scans;  E-mail address / password pairs;  Account credentials;  Corporate accounts for intra-organizational online services.  Confidential corporate documents.
  • 36. THE TEAM: DATA LEAKAGE INTELLIGENCE - II 36
  • 37. THE TEAM: ON-LINE CASINO CREDENTIALS INTELLIGENCE - I 37 Especially advanced attackers and cyberfraud groups target online gambling credentials of casino clients to steal the balance on the victims’ account by means of underground money-laundering services and shell companies. These online banking credentials are stolen by attackers by means of  Phishing Sites,  Large-scale Botnets, Malicious Internet Banking applications on mobile stores and markets.
  • 38. THE TEAM: ON-LINE CASINO CREDENTIALS INTELLIGENCE - II 38
  • 39. THE TEAM: PHISHING AND BRAND PROTECTION INTELLIGENCE - I 39  Despite seeming less-important and easily applicable by attackers, phishing has become one of the most commonly used methods of cyber-fraud.  THE TEAM relies on its specifically crafted automatized phishing systems, which are able to detect and respond to phishing campaigns automatically.  In the previous year, THE TEAM has eliminated a total of 12.000 phishing sites / applications. This figure is higher than all other anti-phishing / brand monitoring solutions in the industry, combined.  Apart from phishing sites and campaigns, THE TEAM monitoring sensors wander throughout the web, mobile application markets and social media platforms for any malicious / fraudulent site/file/name/trace that may damage the reputation of its members.
  • 40. THE TEAM: PHISHING AND BRAND PROTECTION INTELLIGENCE - II 40
  • 41. THE TEAM: BOTNET INTELLIGENCE / BLACKLIST 41 PRODAFT-CSD’s botnet sinkhole systems; automatically penetrates into large-scale BotNets of attackers to reveal infected IP addresses that are under control of the attacker. These Infected IP addresses are shared with THE TEAM members inside the scope of “Users under Potential Threat” blacklist. Thanks to Botnet Blacklist Intelligence service; THE TEAM’s member organizations are able to detect, if any of their incoming visitors have been infected by a BotNet; and restrict / limit their access or implement additional measures to prevent further losses.
  • 42. THE TEAM: FRAUD METHOD INTELLIGENCE 42 Each day, cyber attackers and fraudsters come up with news ways of laundering / transferring money from stolen credit cards, bank accounts and other online payment systems. THE TEAM Operators continuously scan the underground, and look for newly emerging methods of cyber-fraud and money laundering, in order to notify THE TEAM Members about latests trends of cyber-fraud.
  • 43. THE TEAM: STOLEN ID/PASSPORT INTELLIGENCE 43 Currently, THE TEAM has previously deployed working sensors which acquire stolen ID / passport information from the underground and provide this intelligence to major banking companies. These IDs and Passports are also widely used for Online Gambling fraud. THE TEAM can be configured to provide online gambling organizations with specific stolen passport/ID information involving a specific country or on an international level. As of 2016, THE TEAM has detected more than 2.100.000 stolen passport / ID.
  • 44. THE TEAM: PENETRATION TESTING 44  Of course penetration testing is another, yet, very important form of proactive security measures. On the other hand most of the «penetration tests» as we know it, are not more than commercialized IT services that lack true hacker perspective.  Therefore, all penetration testing efforts shall be performed by unorthodox crews consisting of ethical hackers that have true «outside the box» hacking knowledge…. rather than an IT guy at the far-end of the world, that presses «Start» button of a vulnerability scanner.
  • 45. THE TEAM: CONCLUSION I 45 Truly proactive solutions are required for an efficient fight against cyber-fraud, especially in online gambling. When the attacker arrives at your door, its already too late. Only a very - very - minor percentage of losses are actually realized. Cyber-underground is evolving and expanding more rapidly than conventional security does..  Attackers already know, and laught at, most of the automatized security / fraud prevention systems that we already have in place.
  • 46. THE TEAM: CONCLUSION - II 46 IF YOU WANT “TO BE SECURE” RATHER THAN “TO FEEL SECURE”, BE PROACTIVE! Thank You!