Cybercrime Threat Landscape: Cyber Criminals Never Sleep
-
date post
14-Sep-2014 -
Category
Business
-
view
1.183 -
download
3
description
Transcript of Cybercrime Threat Landscape: Cyber Criminals Never Sleep
![Page 1: Cybercrime Threat Landscape: Cyber Criminals Never Sleep](https://reader033.fdocuments.in/reader033/viewer/2022051322/5415eedc8d7f72316c8b4894/html5/thumbnails/1.jpg)
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
Etay MaorSenior Fraud Prevention Strategist
![Page 2: Cybercrime Threat Landscape: Cyber Criminals Never Sleep](https://reader033.fdocuments.in/reader033/viewer/2022051322/5415eedc8d7f72316c8b4894/html5/thumbnails/2.jpg)
© IBM Trusteer, 2014
Security Silos FAIL!
![Page 3: Cybercrime Threat Landscape: Cyber Criminals Never Sleep](https://reader033.fdocuments.in/reader033/viewer/2022051322/5415eedc8d7f72316c8b4894/html5/thumbnails/3.jpg)
© IBM Trusteer, 2014 3
Holistic Approach for Cybercrime
WWW
Phishing and Malware Fraud
Advanced Threats (Employees)
Online/Mobile Banking
Money, Intellectual Property, Business Data
Account Takeover, New Account Fraud
Mobile Fraud Risk
![Page 4: Cybercrime Threat Landscape: Cyber Criminals Never Sleep](https://reader033.fdocuments.in/reader033/viewer/2022051322/5415eedc8d7f72316c8b4894/html5/thumbnails/4.jpg)
Phishing
4
![Page 5: Cybercrime Threat Landscape: Cyber Criminals Never Sleep](https://reader033.fdocuments.in/reader033/viewer/2022051322/5415eedc8d7f72316c8b4894/html5/thumbnails/5.jpg)
© IBM Trusteer, 2014 5
New C&Cs for Phishing
![Page 6: Cybercrime Threat Landscape: Cyber Criminals Never Sleep](https://reader033.fdocuments.in/reader033/viewer/2022051322/5415eedc8d7f72316c8b4894/html5/thumbnails/6.jpg)
© IBM Trusteer, 2014 6
Targeting Security Solutions:
External and Perimeter Anti virus Sandbox VMs
Login Credential protection and encryption OTP SMS Device ID
Internal Behavior anomaly detection Clickstream analysis
![Page 7: Cybercrime Threat Landscape: Cyber Criminals Never Sleep](https://reader033.fdocuments.in/reader033/viewer/2022051322/5415eedc8d7f72316c8b4894/html5/thumbnails/7.jpg)
© IBM Trusteer, 2014 7
Malware Protection
![Page 8: Cybercrime Threat Landscape: Cyber Criminals Never Sleep](https://reader033.fdocuments.in/reader033/viewer/2022051322/5415eedc8d7f72316c8b4894/html5/thumbnails/8.jpg)
Malware Protection - Outsource
![Page 9: Cybercrime Threat Landscape: Cyber Criminals Never Sleep](https://reader033.fdocuments.in/reader033/viewer/2022051322/5415eedc8d7f72316c8b4894/html5/thumbnails/9.jpg)
© IBM Trusteer, 2014
Device Forging
![Page 10: Cybercrime Threat Landscape: Cyber Criminals Never Sleep](https://reader033.fdocuments.in/reader033/viewer/2022051322/5415eedc8d7f72316c8b4894/html5/thumbnails/10.jpg)
© IBM Trusteer, 2014
Bypassing Device ID
Notification
LoginInjection
![Page 11: Cybercrime Threat Landscape: Cyber Criminals Never Sleep](https://reader033.fdocuments.in/reader033/viewer/2022051322/5415eedc8d7f72316c8b4894/html5/thumbnails/11.jpg)
© IBM Trusteer, 2014
Bypassing Device ID
RDP
Transaction
![Page 12: Cybercrime Threat Landscape: Cyber Criminals Never Sleep](https://reader033.fdocuments.in/reader033/viewer/2022051322/5415eedc8d7f72316c8b4894/html5/thumbnails/12.jpg)
© IBM Trusteer, 2014 12
Behavior and Device ID Tricks
The data source: Large European bank 3 weeks worth of data 1.5M accounts reviewed 10M login attempts
Fraudsters know behavioral profiling is in action Fraud does not happen on the first login
30% of the users come from a mobile device Confirmed fraud coming from the mobile channel. WHY?
![Page 13: Cybercrime Threat Landscape: Cyber Criminals Never Sleep](https://reader033.fdocuments.in/reader033/viewer/2022051322/5415eedc8d7f72316c8b4894/html5/thumbnails/13.jpg)
New Mobile Threats
13
![Page 14: Cybercrime Threat Landscape: Cyber Criminals Never Sleep](https://reader033.fdocuments.in/reader033/viewer/2022051322/5415eedc8d7f72316c8b4894/html5/thumbnails/14.jpg)
© IBM Trusteer, 2014
How Times Have Changed…
![Page 15: Cybercrime Threat Landscape: Cyber Criminals Never Sleep](https://reader033.fdocuments.in/reader033/viewer/2022051322/5415eedc8d7f72316c8b4894/html5/thumbnails/15.jpg)
© IBM Trusteer, 2014
Overlay Mobile Attack
![Page 16: Cybercrime Threat Landscape: Cyber Criminals Never Sleep](https://reader033.fdocuments.in/reader033/viewer/2022051322/5415eedc8d7f72316c8b4894/html5/thumbnails/16.jpg)
© IBM Trusteer, 2014
Overlay Mobile Attack
![Page 17: Cybercrime Threat Landscape: Cyber Criminals Never Sleep](https://reader033.fdocuments.in/reader033/viewer/2022051322/5415eedc8d7f72316c8b4894/html5/thumbnails/17.jpg)
© IBM Trusteer, 2014
Mobile Ransomware
![Page 18: Cybercrime Threat Landscape: Cyber Criminals Never Sleep](https://reader033.fdocuments.in/reader033/viewer/2022051322/5415eedc8d7f72316c8b4894/html5/thumbnails/18.jpg)
Cybercrime Services
18
![Page 19: Cybercrime Threat Landscape: Cyber Criminals Never Sleep](https://reader033.fdocuments.in/reader033/viewer/2022051322/5415eedc8d7f72316c8b4894/html5/thumbnails/19.jpg)
© IBM Trusteer, 2014 19
![Page 20: Cybercrime Threat Landscape: Cyber Criminals Never Sleep](https://reader033.fdocuments.in/reader033/viewer/2022051322/5415eedc8d7f72316c8b4894/html5/thumbnails/20.jpg)
© IBM Trusteer, 2014
A Page From a CT Book – Sounds Familiar?
![Page 21: Cybercrime Threat Landscape: Cyber Criminals Never Sleep](https://reader033.fdocuments.in/reader033/viewer/2022051322/5415eedc8d7f72316c8b4894/html5/thumbnails/21.jpg)
© IBM Trusteer, 2014
Building a Solution
Advanced Fraud
Prevention
Real Time Intelligence• Integrated: fully
integrated to leverage threat data across channels
• Global: identify threats any time, anywhere for all channels
Seamless Experience• Transparent: minimize
“action items” to user• Automated: minimize
“action items” to staff
Accurate Analysis• Focused: root cause• Impactful: prevent,
detect, mitigate and remediate
Adaptive Controls• Intelligent: build with
the “unknowns” • Dynamic: rapidly
updatable software
![Page 22: Cybercrime Threat Landscape: Cyber Criminals Never Sleep](https://reader033.fdocuments.in/reader033/viewer/2022051322/5415eedc8d7f72316c8b4894/html5/thumbnails/22.jpg)
© IBM Trusteer, 2014
And Always Remember – Security is in YOUR Hands
![Page 23: Cybercrime Threat Landscape: Cyber Criminals Never Sleep](https://reader033.fdocuments.in/reader033/viewer/2022051322/5415eedc8d7f72316c8b4894/html5/thumbnails/23.jpg)
© IBM Trusteer, 2014 23
And Always Remember – Security is in YOUR Hands
![Page 24: Cybercrime Threat Landscape: Cyber Criminals Never Sleep](https://reader033.fdocuments.in/reader033/viewer/2022051322/5415eedc8d7f72316c8b4894/html5/thumbnails/24.jpg)
© IBM Trusteer, 2014 24
And Always Remember – Security is in YOUR Hands
![Page 25: Cybercrime Threat Landscape: Cyber Criminals Never Sleep](https://reader033.fdocuments.in/reader033/viewer/2022051322/5415eedc8d7f72316c8b4894/html5/thumbnails/25.jpg)
Thank You