today’s threats and the evolution of the computer underground

16
AVAR 2004, Japan, Tokyo Today’s Today’s Threats Threats and the and the Evolution of Evolution of the Computer the Computer Underground Underground Eugene Kaspersky Eugene Kaspersky Head of Anti-Virus Research Head of Anti-Virus Research Kaspersky Lab Kaspersky Lab

Upload: abla

Post on 20-Jan-2016

30 views

Category:

Documents


0 download

DESCRIPTION

Today’s Threats and the Evolution of the Computer Underground. Eugene Kaspersky Head of Anti-Virus Research Kaspersky Lab. Grim statistics. Financial losses due to virus attacks: 1995 – US $0.5 bln 1998 – US $ 6 . 1 bln 2003 – US $ 13 bln - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Today’s  Threats  and the Evolution of  the Computer Underground

AVAR 2004, Japan, Tokyo

Today’s Today’s Threats Threats

and the Evolution and the Evolution of of

the Computer the Computer UndergroundUndergroundEugene KasperskyEugene Kaspersky

Head of Anti-Virus ResearchHead of Anti-Virus ResearchKaspersky LabKaspersky Lab

Page 2: Today’s  Threats  and the Evolution of  the Computer Underground

AVAR 2004, Japan, Tokyo

Grim statisticsGrim statistics

Financial losses due to virus attacks: Financial losses due to virus attacks: 1995 – 1995 – US $0.5 blnUS $0.5 bln

1998 –1998 – US $US $66..11 bln bln

2003 – 2003 – US $US $1313 bln bln

2004 – 2004 – US $US $1717,5 bln,5 bln ( (projected figureprojected figure))

* * – – Computer Economics, 2004Computer Economics, 2004

Page 3: Today’s  Threats  and the Evolution of  the Computer Underground

AVAR 2004, Japan, Tokyo

Grim realityGrim reality

Financial losses due to virus attacks in 2004:Financial losses due to virus attacks in 2004: Sasser – US $3.5 blnSasser – US $3.5 bln

NetSkyNetSky – – US $2.75 blnUS $2.75 bln

BagleBagle – – US $US $11.5 bln.5 bln

MyDoomMyDoom – – US $4.75 blnUS $4.75 bln

* * – – Computer Economics, 2004Computer Economics, 2004

Page 4: Today’s  Threats  and the Evolution of  the Computer Underground

AVAR 2004, Japan, Tokyo

Criminal activityCriminal activity

Computer Hooligans

Financial Fraud Unwanted Advertising

Blackmail, espionage

Page 5: Today’s  Threats  and the Evolution of  the Computer Underground

AVAR 2004, Japan, Tokyo

Evolution of cyber-crimeEvolution of cyber-crime

Financial FraudFinancial Fraud:: 1996 – 1996 – minor cyber fraudminor cyber fraud

1998 – 1998 – remote administration, spywareremote administration, spyware

2002 – 2002 – Internet fraud (Internet-money)Internet fraud (Internet-money)

2003 – 2003 – financial fraud (bank transactions)financial fraud (bank transactions)

20042004 – – large-scale attacks on Internet bankslarge-scale attacks on Internet banks

Page 6: Today’s  Threats  and the Evolution of  the Computer Underground

AVAR 2004, Japan, Tokyo

Evolution of cyber-crimeEvolution of cyber-crime

Unwanted AdvertisingUnwanted Advertising::

1994 – 1994 – Appearance of electronic spamAppearance of electronic spam

1999 – 1999 – Intrusive advertising of paid web sitesIntrusive advertising of paid web sites

2001 – 2001 – Trojan proxy servers (spam)Trojan proxy servers (spam)

2002 – 2002 – Trojan adwareTrojan adware

Page 7: Today’s  Threats  and the Evolution of  the Computer Underground

AVAR 2004, Japan, Tokyo

Evolution of cyber-crime Evolution of cyber-crime

Blackmail and EspionageBlackmail and Espionage 2002 – 2004: 2002 – 2004: Web-site hijackingWeb-site hijacking

Theft of confidential information Theft of confidential information

DoS-attacksDoS-attacks, , cyber-blackmailcyber-blackmail

Page 8: Today’s  Threats  and the Evolution of  the Computer Underground

AVAR 2004, Japan, Tokyo

Internet crimeInternet crime(1980 – 2005)(1980 – 2005)

0

10

20

30

40

50

60

70

80

90

100

1980-1995 1995-2000 2000-2003 2004

Hooligans Minor e-fraudsters Cyber criminals

Source: Kaspersky LabSource: Kaspersky Lab

Page 9: Today’s  Threats  and the Evolution of  the Computer Underground

AVAR 2004, Japan, Tokyo

Internet crimeInternet crime

ProfitableProfitable

IllegalIllegal

Controlled by organised crimeControlled by organised crime

Page 10: Today’s  Threats  and the Evolution of  the Computer Underground

AVAR 2004, Japan, Tokyo

Internet Crime:Internet Crime:the new mafiathe new mafia

Control the spam businessControl the spam business Cyber blackmail and racketeering Cyber blackmail and racketeering Access to bank accounts, confidential Access to bank accounts, confidential

financial and proprietary informationfinancial and proprietary information Cyber-terrorismCyber-terrorism

Page 11: Today’s  Threats  and the Evolution of  the Computer Underground

AVAR 2004, Japan, Tokyo

Internet CrimeInternet CrimeConsequencesConsequences

Viruses, hackers and spammers uniteViruses, hackers and spammers unite Becoming more difficult to fight IT threatsBecoming more difficult to fight IT threats Increased traditional crimeIncreased traditional crime Potential threats to national and global securityPotential threats to national and global security

Page 12: Today’s  Threats  and the Evolution of  the Computer Underground

AVAR 2004, Japan, Tokyo

What’s the solution? What’s the solution? A return to the Stone Age?A return to the Stone Age?

We’re only treating the symptomsWe’re only treating the symptomsLet’s fight the cause instead!Let’s fight the cause instead!

Page 13: Today’s  Threats  and the Evolution of  the Computer Underground

AVAR 2004, Japan, Tokyo

IT threat cycleIT threat cycle

ChannelsChannels

IT infrastructureIT infrastructure(networks, hardware and (networks, hardware and

software)software)

ConsequencesConsequences

Infected usersInfected users(individual, corporate)(individual, corporate)

CausesCauses

Human factorHuman factor(users, virus writers, hackers, (users, virus writers, hackers,

spammers)spammers)

Page 14: Today’s  Threats  and the Evolution of  the Computer Underground

AVAR 2004, Japan, Tokyo

SolutionsSolutions

Government Government regulationregulation

LegislationLegislation ««Net PoliceNet Police»» or or e-e-

InterpolInterpol

Secure networks Secure networks and operating and operating systemssystems

User education and User education and certificationcertification

ID requiredID required

Page 15: Today’s  Threats  and the Evolution of  the Computer Underground

AVAR 2004, Japan, Tokyo

QuestionsQuestions??

Page 16: Today’s  Threats  and the Evolution of  the Computer Underground

AVAR 2004, Japan, Tokyo

Thank you for your Thank you for your attention!attention!