Title: Cyber Crime:
1Cyber Crime Current Threats and Trends
A presentation by Muktesh Chander IPS BE, LLB,
MA(Cr.), DCL, DHRM, Cert. SQC
OR FIETE,MCSI Addl. Commissioner of
Police Traffic, Delhi Police
2Global Scenario
- Global cyber crime is 105 billion industry
which is more than global drug trafficking - Economic meltdown and recession
- Under employment/unemployment in IT sector
- Cut down on IT security budget likely
3Indian Scenario
- Booming software and BPO Industry
- IT Revolution ??Digital Dependence
- National E Governance program
- Very few organisations in India have CISO and IT
Security budget - No law for privacy
- No compliance laws and breach disclosure
- No law against spamming
- Limitations of IT Act 2000
- Weak and delayed criminal Justice System
4Indian Scenario
- Very few organisations in India have CISO and IT
Security budget
5Threats from
- Individuals
- Organised cyber criminals
- Rival organisations
- Non state actors
- Hostile states
- Insiders/ex employees
- Hactivists
- Terrorist
Muktesh Chander
6Cyber Crime in India
Under IT Act
Crime in India 2007
52.8 increase in 2007
7Current Threats in India
Source Cert-in
8Global
2008 CSI Computer crime survey
9Malicious activity by country
- Source Symantec Corporation
10Current threats Malware
- Virus attacks account for more than 50 of
security incidents. (CSI Survey 2008) - In the last six months of 2007, Symantec detected
499,811 new malicious codes. - 136 percent increase over the previous period,
when 212,101 new threats were detected - 1,122,311 total malicious codes identified by
Symantec as of the end of 2007. - Two thirds of all malicious code threats
currently detected were created during 2007. - Any kind of file can be infected (Flash, Adobe
Pdf are the latest)
11 Malware
- Malware toolkits, rootkits easily available
- Malware writing and outsourcing for profit
- Malware for sale
- Blended threats
- Mobile virus (cabir, commw.sis and its variants,
curse of silence) - Flash worm ?
- Scareware
12Phishing
- Phising/Pharming/Vishing/Smishing
- Every month more than 20,000 unique phishing
websites are detected affecting more than 200
brands - Spearphishing attacks emerging
13Phishing
- Phishing scams showed sharp increase of 1126
over previous year. - Symantec observes more than 7 million phishing
attempts each day.
14TOP BRANDS AFFECTED BY PHISHING ATTACKS
- E-bay
- Amazon
- Paypal
- ICICI Bank
- UTI Bank
15Electronic Fund Transfer
- Tim Berners Lee the father of WWW was a victim of
online fraud (Computer world) - In Nov 2008, 100 compromised card accounts
resulted in 9 million fraudulent withdrawals
from 130 ATMs in 49 cities across the world in
30 minutes
16Netherlands
St. Petersburg
London
Finland
New York
San Francisco
Germany
Israel
10 million
Vladimir Levin a ,Russian ,stole 10 million
from Citibank by computer fraud
16
17Online grooming ,sexual exploitation and abuse of
children
- Sec 67 B (B),(C) inserted in IT Act Amendment
18Cyber Vandalism /graffiti
Indian TLD websites defaced during 2007
SourceCert in
19Spam
- Accounts for more than ½ to 2/3 of all
e-mails or even 90 ? - Responsible for phishing, 419 scams and spread of
malware, identity theft and other cyber crimes,
choking of bandwidth ,wastage of time - India is in the top 10 spam sending countries
20Spam
21Cyber Pornography
- Cyber pornography accounts for 46 of all cyber
crimes under IT Act (Crime in India 2007) - Every second - 28,258 Internet users are viewing
pornography - The pornography industry is larger than the
revenues of the top technology companies
combined Microsoft, Google, Amazon, eBay, Yahoo
!, Apple, Netflix and EarthLink
Source http//www.internet-filter-review.toptenre
views.com/internet-pornography-statistics.html
22Cyber Pornography
- is one of the easiest way of installing malware.
23Botnets
- Collection of compromised computers
- Centralized control
24DDOS Attack using BOTS
25Botnets
- Source Symantec Corporation 5 million distinct
bots
26Botnet tracked in India
- 25915 from June 2007 to Dec 2007
27Botnet
- In Aug 2008 Dutch police apprehended Leni De with
help from FBI and Brazilian police for running a
botnet of 100,000 computers
28Use of Encryption by criminals/terrorists
- Strong encryption tools easily available many for
free - PGP
- Steganography
- Digital signatures (no key escrow in India)
- Sec 69 IT Act is of no use
29Underground market servers
Source Adapted from Symantec 2007
30Industrial Espionage
- Several countries and companies are indulging in
Industrial espionage clandestinely - Employees reveal a lot in their personal E
mails and social networking sites - s
31Theft of Mobile Devices
- 42 respondents reported case of laptop theft
(CSI Survey 2008) - Separate offence created under IT Act Amendment
32Threat to Embedded Systems
- Complex and unknown
- Becoming common
- Involve third party
33Identity Theft
- Estimated more than 9 million incidents each year
(NIJ ,US Report) - Separate offence created under IT Act Amendment
34Insider Abuse
- By disgruntled present of Ex employees
- 44 respondents reported insider abuse
- (CSI Survey 2008)
35Other cyber crimes
- Hacking
- Denial of service attacks
- Data diddling
- Cyber stalking
- Cyber squatting
- IPR Violations
- Mobile cloning (Both GSM and CDMA)
36Cyber skirmishes
37- 2000 Hackers holy war between Israel and
Palestine - 2001 There was a war between Chinese and
American hackers
38(No Transcript)
39(No Transcript)
40(No Transcript)
41Cyber terrorism
42Critical Information Infrastructure
- CII Means
- Information Communication Systems
- connected with
- National Security
- Public Safety
- Public Health
- Critical Sectors of Economy
Muktesh Chander
42
43Likely targets of cyber terrorism
- Power grids (nuclear power stations)
- Banking and Financial systems
- Stock Exchanges
- Transportation Control systems
- MRTS, ATC, Rail/Airlines reservations
- Tele-Communications
- Gas / Oil / Water Pipelines control systems
- Internet Backbones
- Health/Food
- Emergency services
- Military/Defense Installations Attack on C4 I
44Estonia Attack
- Estonia a Baltic nation with population of only
1.4 million people - One of the most wired nations
- Pioneer in E Governance
- Almost 100 citizen use online banking
- Every citizen has PKI enabled I card with
embedded chip - Online elections
45Estonia Attack
Contd..
- Govt. relocated 2nd world war Red Army memorial
(a Bronze statue) - On April 2007 computers of Estonian Parliament,
banks, ministries, newspapers and broadcasters,
political parties etc.were targets for cyber
attack using DDOs, spam botnets etc. - Attack continued for three weeks
- Cyberterrorists defenders both acted in adhoc
manner
46Estonia Attack
Contd..
- An Estonian court has convicted the first
individual in the 2007 cyber attacks against
Estonia. - "Dmitri Galushkevich an ethnic Russian used his
home PC to launch a denial-of-service attack that
knocked down the Web site for the political party
of Estonia's prime minister for several days..." - He was fined 17,500 kroons (approx. US 1,642).
47Estonia Attack
Contd..
- Konstantin Goloskokov(22), an activist with
Russia's Nashi youth group and aide to a
pro-Kremlin member of parliament has admitted
having organised the attack as an act of civil
disobedience. Sergeiei Markov, a Russian State
Duma Deputy has corroborated the facts - (Mar.12,2009,SC Magazine)
48Trends
- Prediction in a fast changing and evolving field
is difficult - Law of exponential return of technological changes
49Current Trends in cyber crime
- Following trends are clearly visible-
- The time to exploit vulnerability is decreasing.
- Cyber crimes are being committed with financial
gains in mind - The attack sophistication is increasing and more
automation can be seen in attacks. - The speed of spread of an attacks is increasing.
-
-
-
-
50Current Trends in cyber crime
5. The attacks are more targetted than before.
6. Phishing is increasing on SMS, Telephone
other platforms. 7. Coordinated automatic
attacks by remotely controlled Bots for DDoS, for
sending SPAM and other such malicious purposes
are showing increasing trend and will pose
biggest threat to Information Security.
51 Current Trends in cyber crime
8. Mobile connectivity using WiFi technology and
convegence of mobile phones with PDAs and other
wireless devices will add another dimension to
cyber crime. 9. There is growing evidence of
organized crime and cyber crime are beginning to
overlap with activities of drug mafia,
pedophiles, international money laundering people
who use Internet to coordinate their activities.
52 Current Trends in cyber crime
- 10.Industrial espionage increasing
- Political ideologists have started using
hactivism to propagate their ideas through
Internet and the electronic civil disobedience
activities are surfacing. - Terrorist organizations are increasingly using
Internet communication and cryptography to
secretly communicate and organize their
activities. - State sponsored Cyber war
53 Current Trends in cyber crime
- Cyber crime would increase on social networking
sites - Web 2.0
- Data is becoming primary focus of cyber crime
- Netbook, Ipod touch, Smart phones, 3G enabled
phones will be affected - Used and stolen hardware will be source of data
loss
54 Future
20.Stock market manipulations. Pump and dump
schemes 21.Skimming of Card information directly
from ATM 22.SPAM will transform in SPIM and SPIT
55 Current Trends in India
- Recent spate of Phishing activities
- Numbers of cases of data theft from BPO and call
center companies R - Risk from third party relationship.
56 Current Trends in India
4.Recent theft of sensitive information in
electronic form from National Security Council
Secretariat has added another dimension to
Information Security in the country. 5.Adequate
attention towards management of information
security and a very few companies have gone for
information needed
57 Current Trends in India
- The most serious gap in implementation of
information security management is threat from
insiders and ex-employees. - The widespread absence of even the most routine
security tools and policies has left many Indian
companies vulnerable to serious attack and the
inevitable financial losses that follow. - User education and awareness is of utmost
importance in Business to Customers models such
as Internet banking, online auction and shopping.
58 Current Trends in India
- Use of Digital signature still rare
59Questions?