cybercrime & business. jak wygrać tę wojnę?
TRANSCRIPT
![Page 1: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/1.jpg)
![Page 2: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/2.jpg)
Cybercrime & Business
How do we fight this war?
Pirkka Palomäki
Chief Technology OfficerF-Secure Corporation
![Page 3: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/3.jpg)
![Page 4: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/4.jpg)
![Page 5: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/5.jpg)
facebook, myspace, twitter, linkedin?
FloppyLanEmailWeb
Operating systemBrowsersJavaAdobe FlashAdobe PDF readerQuicktime
![Page 6: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/6.jpg)
Acrobat
![Page 7: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/7.jpg)
Flash
![Page 8: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/8.jpg)
Case Darkmarket
![Page 9: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/9.jpg)
![Page 10: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/10.jpg)
![Page 11: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/11.jpg)
![Page 12: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/12.jpg)
![Page 13: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/13.jpg)
Featuring Mr. Cagatay Evyapanaka "Cha0"
FeaturingMr. Adewale Taiwo
![Page 14: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/14.jpg)
![Page 15: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/15.jpg)
Case Mebroot
![Page 16: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/16.jpg)
Case Mebroot – short introduction
The first complex MBR rootkit with malicious payload
Kernel-mode downloader and backdoor
Downloads PWS and banking Trojan components
Strengths of Mebroot:
No executable files on file system
No registry keys or standard launch points
No driver module in module list
Minimal memory footprint
Early execution during system startup
Stealth read/write disk operations
Stealth Anti-Removal protection
Totally generic, open malware platform (MAOS)
![Page 17: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/17.jpg)
![Page 18: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/18.jpg)
![Page 19: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/19.jpg)
![Page 20: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/20.jpg)
![Page 21: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/21.jpg)
How do we work?
![Page 22: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/22.jpg)
F-Secure Dashboard
![Page 23: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/23.jpg)
Myth To Forget
![Page 24: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/24.jpg)
Obsolete for Hundreds of Thousands
of samples every day
![Page 25: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/25.jpg)
Malware Samples / Acquisition
AutomaticAnalysis
DetectionEngine
TechnologyTechnology
Malware Researchers &
Analysts Researchers &
Real-time delivery
Security Research Flow; The Critical Chain
![Page 26: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/26.jpg)
![Page 27: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/27.jpg)
![Page 28: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/28.jpg)
![Page 29: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/29.jpg)
![Page 30: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/30.jpg)
![Page 31: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/31.jpg)
![Page 32: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/32.jpg)
![Page 33: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/33.jpg)
![Page 34: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/34.jpg)
![Page 35: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/35.jpg)
SMA Decisions – daily
![Page 36: Cybercrime & Business. Jak wygrać tę wojnę?](https://reader035.vdocument.in/reader035/viewer/2022062514/55a1fbf91a28ab054c8b456c/html5/thumbnails/36.jpg)
thank you