Teodor Cimpoesu - Crimeware& Botnets - The International Criminal Law Conference

download Teodor Cimpoesu  - Crimeware& Botnets - The International Criminal Law Conference

If you can't read please download the document

  • date post

    22-Nov-2014
  • Category

    Technology

  • view

    160
  • download

    1

Embed Size (px)

description

A presentation dedicated to Romanian Law Enforcement agents (prosecutors, policemen, intelligence officers). Provides a parallel between known organised crime, the thinking of those who must combat it, and cyber crime. Moreover, it has aggravating factors as new means of money laundry and anonymity, cross-border investigations complexity and lack of technical competency. Closes with a perspective of how modern technology shapes and changes the way we live, and a call for them to acknowledge that they are called responsible to protect us. Presentation in Romanian.

Transcript of Teodor Cimpoesu - Crimeware& Botnets - The International Criminal Law Conference

  • 1. Cibercriminalitate: crimeware & botnets INTERNATIONAL CRIMINAL LAW CONFERENCE, BABES-BOLYAI UNIVERSITY, FACULTY OF LAW CRIMES, CRIMINALS AND THE NEW CRIMINAL CODES: ASSESSING THE EFFECTIVENESS OF THE LEGAL RESPONSE Teodor Cimpoesu Senior Security Consultant 28.03.2014

2. Agenda Crima organizata Cibercriminalitatea Ecosistemul Crimeware Combatere Ce urmeaza 3. Crima organizata1 4. Banda Grup Organizatie Sindicat Cartel Consortiu 5. Organised crimes infiltration in the legitimate private economy: An empirical network analysis approach, STEFANO GURCIULLO It seems that Italian mafias registered 135 billion only in 2010 (SOS Impresa, 2010) PIB-ul Romaniei in 2013 ~ 145 miliarde 6. Cibercriminalitatea2 7. Mirela 8. Mirela 9. Cate SI ati vazut? Toate! a) prin sistem informatic se nelege orice dispozitiv sau ansamblu de dispozitive interconectate sau aflate n relaie funcional, dintre care unul sau mai multe asigur prelucrarea automat a datelor, cu ajutorul unui program informatic; b) prin prelucrare automat a datelor se nelege procesul prin care datele dintr-un sistem informatic sunt prelucrate prin intermediul unui program informatic; c) prin program informatic se nelege un ansamblu de instruciuni care pot fi executate de un sistem informatic n vederea obinerii unui rezultat determinat; d) prin date informatice se nelege orice reprezentare a unor fapte, informaii sau concepte ntr-o form care poate fi prelucrat printr-un sistem informatic. n aceast categorie se include i orice program informatic care poate determina realizarea unei funcii de ctre un sistem informatic; Sistem informatic Dispozitiv / Ansamblu Program informatic Date informatice Reprezentare informatii 10. Serious Crime Baking Trojans Furt date card Botnets DDoS - santaj Furt de identitate UnSerious Crime Spam Malvertising Furt date personale Bitcoin mining 11. Very Serious Crime UnSerious Crime? Hacking Furt baza de date Fake AV Spyware Scareware Malware 12. Ecosistemul Crimeware3 13. Botnets 14. Grad de centralitate? 15. Moneda virtuala / Bitcoins Prima moneda bazata pe algoritmi criptografici P2P peer to peer = eliminarea nodurilor centrale administrative Nu au sustinere in valoare reala echivalenta (e.g. aur). Sunt create prin minare, ceea ce le da valoarea Sunt pastrate in digital wallets si tranferate prin criptografie asimetrica SilkRoad FBI confisca $28M in bitcoins MtGox site spart si fraudat, paguba de $470M Interzis in Rusia Interzis in China (stire 28.03) 2014 arestari de operatori pentru spalare de bani (US) Peste 150 de familii de malware care vizeaza furtul sau minarea de bitcoin Bitcoin peste TOR = anonimizarea tranzactii 16. Within the FBI, we are targeting high-level intrusionsthe biggest and most dangerous botnets, state-sponsored hackers, and global cyber syndicates. We want to predict and prevent attacks rather than reacting after the fact JAMES COMEY, FBI DIRECTOR The Impact of Cybercrime and Cyber Espionage McAfee, Center for Strategic and International Studies July 2013 17. Combatere4 18. Within the FBI, we are targeting high-level intrusionsthe biggest and most dangerous botnets, state-sponsored hackers, and global cyber syndicates. We want to predict and prevent attacks rather than reacting after the fact. JAMES B. COMEY, FBI DIRECTOR Cybercrime > Terorism 19. Abordare cyber-securitate Prevenire Perimetrizare Segregarea accesului Covert channels Criptare Urmarire & Combatere Offensive investigations Threat intelligence Network forensics Guerilla disruptive tactics Docrtrina militara Tactici militare Analiza Intelligence Servicii informatii Investigare crima organizata Metodologie criminalistica 20. Cunostinte vs competente Competente Investigare atacuri Analiza malware si derivare intel Internet forensics Supraveghere informatica Monitorizare grupuri infractionale Sisteme, Servicii & Unelte Evaluare stare de securitate a SI Analiza automata de malware Analiza si monitorizare botnets Actiuni ofensive/non-ofensive de atribuire Furnizare Threat Intelligence Analiza BigData de corelare Analiza comunicatii si dinamica atacuri 21. Ce urmeaza5 22. Mirela 23. Mirela 24. Cate dintre tehnologii exista deja? TOATE! 25. Multumesc! Intrebari Teodor Cimpoesu [email protected] 0722.754.319 Cold War Code War 26. Imagini/Referinte http://www.jocelynbainhogg.eu/ http://www.nature.com/nbt/journal/v30/ n5/full/nbt.2213.html Surce: http://www.ucl.ac.uk/jdi/events/int-CIA- conf/ICIAC12_slides/ICIAC12_1A_SGurciul lo Img: http://upload.wikimedia.org/wikipedia/c ommons/c/cf/Sarah_Stock.jpg http://www.theipadnews.com/wp- content/uploads/2011/10/iPad-for-kids-in- car.jpg http://www.dw.de/image/0,,17156166_30 3,00.jpg http://www.incrediblethings.com/wp- content/uploads/2012/09/weather- toaster.jpeg http://www.fbi.gov/wanted/cyber http://usa.kaspersky.com/files/imag es/InternetSecurityCenter/030Infogra phics/KasperskyLab- Inforgaphic_Botnet-10-180725.png http://www.blacklotus.net/learn/ab out-ddos-attacks http://www.securelist.com/en/analy sis?pubid=204792095 http://ronnierocket.com/2013/05/14/ visualizing-how-a-bitcoin- transaction-works/ http://www.globalinitiative.net/wpfb -file/csis-the-impact-of-cybercrime- and-cyber-espionage-july-2013-pdf/