cybercrime prevention from the perspective of anti …...cybercrime prevention from the perspective...

13
Cybercrime Prevention from the Perspective of Anti-cyber-attack Technology ——the Thinking and Practice of the Enterprise Dr. Liyun HAN 360 Dipper Research, the Future Security Labs 2020.07.29 @ UN IEG Conference

Upload: others

Post on 06-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cybercrime Prevention from the Perspective of Anti …...Cybercrime Prevention from the Perspective of Anti-cyber-attack Technology ——the Thinking and Practice of the Enterprise

Cybercrime Prevention from the Perspective of

Anti-cyber-attack Technology ——the Thinking and Practice of the Enterprise

Dr. Liyun HAN360 Dipper Research, the Future Security Labs

2020.07.29 @ UN IEG Conference

Page 2: Cybercrime Prevention from the Perspective of Anti …...Cybercrime Prevention from the Perspective of Anti-cyber-attack Technology ——the Thinking and Practice of the Enterprise

02.

The Overall Scale of Cyber Underground Economy

$ 2.9 million/min

Global economic loss per minute due to cybercrime in 2018

Top companies paying for cyber security vulnerabilities per minute in 2018$25/min

Estimated global economic loss per minute due to ransomware attacks in 2019$ 222184/min

From:The Cybersecurity Law Research Center of the Third Research Institute of the Ministry of Public Security P.R.C.

Page 3: Cybercrime Prevention from the Perspective of Anti …...Cybercrime Prevention from the Perspective of Anti-cyber-attack Technology ——the Thinking and Practice of the Enterprise

03.

360 Mobile Guard Statistics: Mobile Malware

Unit:10 thousand

Page 4: Cybercrime Prevention from the Perspective of Anti …...Cybercrime Prevention from the Perspective of Anti-cyber-attack Technology ——the Thinking and Practice of the Enterprise

04.

360 Mobile Guard Statistics: Internet Fraud

Page 5: Cybercrime Prevention from the Perspective of Anti …...Cybercrime Prevention from the Perspective of Anti-cyber-attack Technology ——the Thinking and Practice of the Enterprise

05.

How to Understand Cyber crime?

① Traditional E-crime

Tech:Fake IP address, URL redirection, botnet

Crime:Telecom fraud, Internet gambling, spreading pornography via chatroom, online social suicide, copyright infringement

② Crime enabled by hacking and defense technology

Tech :exploiting Vulnerabilities, ransomware, Malicious Trojan

Crime :Illegal intrusion, control, and destruction of computer information systems, stealing data, production and spread of viruses, and paralysis of systems

Industrialization, the chain is long and tight

Grouped Form

Increasingly enhanced technical means and anti-reconnaissance capabilities

Typical Characteristic

It involves cross-department, cross-industry, cross-platform and even cross-border criminal actions, forming a close network loop

Typical Cybercrime

• The upper reaches: the hackers to provide technologies• The middle reaches: black production gangs • The lower reaches: various related organizations who support

black production gangs.

Page 6: Cybercrime Prevention from the Perspective of Anti …...Cybercrime Prevention from the Perspective of Anti-cyber-attack Technology ——the Thinking and Practice of the Enterprise

Long Chain Attack by Hacker Penetration

Criminal

Exploiting vulnerability

Smart Appliances

Get phone permissionsby Malicious Trojan

Employee’s phone

OA server

Obtain valid credentials andlegally entry

Obtain legalcredentials to entry

Industrial Control Server

Production shutdown

Send messageswith legalidentity

Target to attack

Intranet

Serious security incidents may happenthoughthe the hacker’s behavior in the intranet environment seems to be legal.

06.

Page 7: Cybercrime Prevention from the Perspective of Anti …...Cybercrime Prevention from the Perspective of Anti-cyber-attack Technology ——the Thinking and Practice of the Enterprise

07.

Black Production Chain of Malware

01

02

03① Remote control② Traffic hijacking③ Botnet④ Hacking⑤ Malicious downloading

Exploiting themalicious Trojan

① Downloading maliciously implanted viruses through APP

② Spreading malware through mobile web pages③ Spreading malware through scanning QR codes

by mobile phone users④ Spreading through communication software email

Spreading via smartphone ① DDOS attack, traffic hijacking② Illegal trading of personal

information stolen by malicious programs

③ Use malware as tools to implement fraud and extortion

Main types of cybercrime

Page 8: Cybercrime Prevention from the Perspective of Anti …...Cybercrime Prevention from the Perspective of Anti-cyber-attack Technology ——the Thinking and Practice of the Enterprise

08.

Three Key Steps for Cyber Crime Governance

Individual Protection

The judicial punishment

Governance of Public Network Environment

1 2 3

Prevention can kill crime in the cradle

The key influencing factor of prevention is the capability Network attack and defense tech

To Improve the pre-capability and the capability of identifying, detecting, responding and controlling

Page 9: Cybercrime Prevention from the Perspective of Anti …...Cybercrime Prevention from the Perspective of Anti-cyber-attack Technology ——the Thinking and Practice of the Enterprise

09.

Case:Anti-phishing Websites Protection

DetectionProtection

§ Accurately detecting phishing sites

§ Detecting the rogue base station

§ Blocking phishing websites through

threat intelligence sharing

mechanism and reporting in real

time

§ All round blocking phishing

websites

§ For PCs and mobile devices

§ Real-time query of

phishing websites

§ Malicious sample storage

§ Customized report

Investigation & Analysis

Page 10: Cybercrime Prevention from the Perspective of Anti …...Cybercrime Prevention from the Perspective of Anti-cyber-attack Technology ——the Thinking and Practice of the Enterprise

010.

Technology-driven Cybercrime Prevention

Big data analysis

Multi-dimensional detection engine

Vulnerability mining

PC & mobile endpoint protection technology

Traffic monitoring

Deception defense

Security analysis and response platform

Financial fraud prevention platform

Telecom fraud prevention

Microscope APP scanning platform

Cloud security service

Identification, detection, interception during anti-fraud,

anti-gambling, anti-pornography and others underground economy

industry combating process

Security enhancement in industrial internet and various

fields of information infrastructure, such as BFSI, server provider, Energy and

others.

Technology Platform Crime prevention scenario

Page 11: Cybercrime Prevention from the Perspective of Anti …...Cybercrime Prevention from the Perspective of Anti-cyber-attack Technology ——the Thinking and Practice of the Enterprise

011.

Cases and efforts of 360

1 Malware Blocking

2 Vulnerability Discovering

110 million times per day

Discovered more than 2,000 CVE vulnerabilities from mainstream global vendors including Apple, Google, Microsoft, Huawei, Qualcomm, VMWare, etc, and assisted them in vulnerability location and repair, which can reduces the possibility of criminals exploiting vulnerabilities to commit crimes

3 360 University of CybersecurityCommitted to cybersecurity education forusers and cyber security practitioner in China and some developing countries

Page 12: Cybercrime Prevention from the Perspective of Anti …...Cybercrime Prevention from the Perspective of Anti-cyber-attack Technology ——the Thinking and Practice of the Enterprise

Communicationwith Academia

and Industry

多方协同合作

012.

Responsibility · Cooperation · Ecosystem

Platform Responsibility

l Security technology operation and maintenancel Platform information governance

Industry Collaboration

l Security data sharingl Promote industry safety standards

Public Responsibilityl Prevent cybercrime

High-level responsibilitypromote the industrial safety ecosystem

l The Security + Internet

预防与打击结合 Combination

of Prevention Combating

Multi-participating

And collaborative ecosystem

Innovative Technology

Platform

创新型技术平台

产学界交流

Page 13: Cybercrime Prevention from the Perspective of Anti …...Cybercrime Prevention from the Perspective of Anti-cyber-attack Technology ——the Thinking and Practice of the Enterprise

We are looking forward to the further discussion and research with you.

Email: Dr. HAN [email protected]

For academic cooperation please contact via: [email protected]

FUTURE SECURITYLABS

the infinite future

THANKS