1© copyright 2011 emc corporation. all rights reserved. crash course: how to be become a successful...
TRANSCRIPT
1© Copyright 2011 EMC Corporation. All rights reserved.
Crash Course: how to be become a successful Cyber Criminal
Uri Rivner | Head of New TechnologiesIdentify Protection | RSA, the security division of EMC
Feb 2012
PLEASE NOTE:The following slides contain censored Cybercrime Intelligencevisuals
Contact me if you need any of the original visuals for internal [email protected]
3© Copyright 2011 EMC Corporation. All rights reserved.
Fraud Forums: Build your Identity
Dozens of active forums;Thousands of members per forum;
English, Russian – leading languages
Dozens of active forums;Thousands of members per forum;
English, Russian – leading languages
12© Copyright 2011 EMC Corporation. All rights reserved.
Advanced Persistent Threats See anything in common?
Attack Targets Entry Vector
Going After
Ghostnet Ministries, Embassies, Office of Dalai Lama
Spear Phishing
Sensitive documents
Aurora 34 companies: Google, Adobe, defense, internet, financial, critical infrastructure
Spear Phishing
Intellectual property
Night Dragon Critical infrastructure Spear Phishing
Intellectual property
13© Copyright 2011 EMC Corporation. All rights reserved.
Advanced Persistent ThreatsWhat’s New here?
1980-2010
2010-2020