Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

44
Who is the Attacker ? 1

description

جلسه ۱۸۶ تهران لاگ By: Mohammad reza Kamalifard این ارائه در خصوص انواع حمله کنندگان آنلاین ، حملات دولت ها حریم شخصی کاربران و راه حل ها آن محصولی از DSME است http://datasec.ir ارائه شده توسط: محمد رضا کمالی فرد

Transcript of Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

Page 1: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

Who is the Attacker ?1

Page 2: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

Online criminalsMake moneyBanking trojans to steal money from bank accounts.Keyloggers to collect credit card information

Page 3: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

Vladimir Tsastsin

Page 4: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

Dimitry Golubov

Page 5: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

Albert GonzalezAmerican Computer Criminal

Page 6: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

US Secret Service found Swiss bank account of Mr. Sam Jain and that bank account had 14.9 million U.S. dollars on it when it was frozen.Mr. Jain himself is on the loose; nobody knows where he is.

Sam Jain

Page 7: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

Motivated by an opinionNot motivated by moneyThey're motivated by protests, motivated by an opinion.

Page 8: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

Anonymous Group

Page 9: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

Anonymous Group

Page 10: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

Al-Qaeda

Page 11: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy
Page 12: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

1. Online criminals Motivated by Money2. People Motivated by an opinion

Page 13: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

1. Online criminals Motivated by Money2. People Motivated by an opinion3.The Government

Page 14: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

East German Typewriter

Page 15: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

Tracking Dots

Page 16: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

Printer steganographyBrother, Canon, Dell, Epson, HP, IBM, Konica Minolta, Kyocera, Lanier, Lexmark, Ricoh, Toshiba and Xerox brand color laser printers,Tiny yellow dots are added to each page.The dots are barely visible and contain encoded printer serial numbers and timestamps.

Page 17: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy
Page 18: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

Cyber Warfare2

Page 19: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

IR Centrifuges

Page 20: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

SIMATIC S7-315

SIMATIC S7-417

Page 21: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

SIMATIC STEP 7 Running on Windows

Page 22: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

SIMATIC STEP 7

IR Centrifuges

PLC

Page 23: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

20 November 2013

Page 24: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy
Page 25: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy
Page 26: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy
Page 27: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy
Page 28: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

Power generation and distributionChemical industry and petrochemicalsOil, GasRefineriesPharmaceuticalsAirport automationWaterworks and water treatment plantsTransport technologyTraffic flow automationShipbuildingTurbine development

Page 29: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy
Page 30: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

Online Privacy 3

Page 31: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy
Page 32: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy
Page 33: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy
Page 34: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy
Page 35: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy
Page 36: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy
Page 37: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy
Page 38: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy
Page 39: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy
Page 40: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

“If there is no right to privacy, there can be no true freedom of expression and opinion, and therefore, there can be no effective democracy.”Dilma Rousseff – Brazilian President Speech at UNGA

Page 41: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy
Page 42: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

Open SourceBy building together open, free, secure systems, we can go around such surveillance, and then one country doesn't have to solve the problem by itself.

Page 43: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

روز جهانی منع خشونت علیه زنان #ViolenceAgainstWomen

مصادیق خشونت علیه زنان : مزاحمتاهای خیابانی

خشونت کلمیکتک زدن

کشیدن موتهدید با اهر نوع سل ح سرد و گرم

تجاوزسیلی زدن

ثانیه یک زن در دنیا مورد آزار و ۱۱راساس آمار سازمان جهانی بهداشت هر بخشونت قرار می گیرد و حتی بارداری نیز برای آنها مصونیت ندارد.

Page 44: Tehlug 26 Nov 2013 Hackers,Cyberwarfare and Online privacy

Copyright DSME End User Security and Privacy Research – Tehran,IranCopyright 2013 Mohammad Reza Kamalifard All rights reserved.

This work is licensed under the Creative Commons Attribution-NoDerivs 3.0 Unported License.To view a copy of this license, visithttp://creativecommons.org/licenses/by-nd/3.0/