23
La amenaza del cibercrimen: articulando una respuesta Infosecurity 2014 Hotel Fiesta Americana Reforma Jorge Vega-Iracelay Director de Asuntos Jurídicos, Corporativos y de Ciudadanía Microsoft México [email protected]

La amenaza del cibercrimen - INFOSECURITY VIP · La amenaza del cibercrimen: articulando una respuesta Infosecurity 2014 Hotel Fiesta Americana Reforma Jorge Vega-Iracelay Director

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: La amenaza del cibercrimen - INFOSECURITY VIP · La amenaza del cibercrimen: articulando una respuesta Infosecurity 2014 Hotel Fiesta Americana Reforma Jorge Vega-Iracelay Director

La amenaza del cibercrimen: articulando una respuesta Infosecurity 2014 Hotel Fiesta Americana Reforma

Jorge Vega-Iracelay Director de Asuntos Jurídicos, Corporativos y de Ciudadanía Microsoft México [email protected]

Page 2: La amenaza del cibercrimen - INFOSECURITY VIP · La amenaza del cibercrimen: articulando una respuesta Infosecurity 2014 Hotel Fiesta Americana Reforma Jorge Vega-Iracelay Director

Leading the fight

against cybercrime

The Impact of Cybercrime

Digital Crimes Unit Overview

The Threat of Malware

Confronting IP Crimes

Combatting Online Child Exploitation

Page 3: La amenaza del cibercrimen - INFOSECURITY VIP · La amenaza del cibercrimen: articulando una respuesta Infosecurity 2014 Hotel Fiesta Americana Reforma Jorge Vega-Iracelay Director

The Impact of

Cybercrime

Cybercriminals have sophisticated their

operations to create and distribute malware

Cybercrime is evolving at lightning speed

The risk to individuals and companies is

growing

Online criminals have global reach

Cybercrime has been embraced by organized

crime

Traditional responses won’t suffice – proactive,

aggressive action is required

Every second, 12 people are

victims of cybercrime – nearly

400 million every year*

1 in 5 small and medium

enterprises are targeted by

cyber criminals**

Cybercrime costs consumers

$113 billion a year*

50% of online adults have

been victims in the past year

Online Child Exploitation The NCMEC has reviewed more than 90 million

images and videos of child pornography.***

Financial Fraud 53% of the world’s securities exchanges were

targeted in 2012

* 2013 Norton Report

** National Cyber Security Alliance

*** National Center for Missing and

Exploited Children

Page 4: La amenaza del cibercrimen - INFOSECURITY VIP · La amenaza del cibercrimen: articulando una respuesta Infosecurity 2014 Hotel Fiesta Americana Reforma Jorge Vega-Iracelay Director

Leading the fight

against cybercrime

The Impact of Cybercrime

Digital Crimes Unit Overview

The Threat of Malware

Confronting IP Crimes

Combatting Online Child Exploitation

How You Can Help

Page 5: La amenaza del cibercrimen - INFOSECURITY VIP · La amenaza del cibercrimen: articulando una respuesta Infosecurity 2014 Hotel Fiesta Americana Reforma Jorge Vega-Iracelay Director

A new era in the fight against cybercrime

Industry Partners Criminal Law

Enforcement Government

Trustworthy

Computing Public Sector

Digital

Crimes Unit Government

Affairs

Microsoft

Consulting

Services Cybercrime Center

PROACTIVE DISRUPTION We work with our customers and partners to proactively target online criminals

MALICIOUS SOFTWARE CRIMES • Viruses • Trojans

IP CRIMES • Counterfeiting • End-User Piracy

CHILD EXPLOITATION • Child Abuse Images • Sex Trafficking

• Worms • Botnets

Security, Reliability,

Privacy

Solutions, Initiatives,

Innovations Policy, Legislation

Risk Assessment,

Cybersecurity Services

Microsoft

Page 6: La amenaza del cibercrimen - INFOSECURITY VIP · La amenaza del cibercrimen: articulando una respuesta Infosecurity 2014 Hotel Fiesta Americana Reforma Jorge Vega-Iracelay Director

Leading the fight

against cybercrime

The Impact of Cybercrime

Digital Crimes Unit Overview

The Threat of Malware

Confronting IP Crimes

Combatting Online Child Exploitation

How You Can Help

Page 7: La amenaza del cibercrimen - INFOSECURITY VIP · La amenaza del cibercrimen: articulando una respuesta Infosecurity 2014 Hotel Fiesta Americana Reforma Jorge Vega-Iracelay Director

Botnets are networks of infected

computers that can be remotely

controlled by an individual or

organization

Attacker

Command and

Control Server

Bots

Victim

What is a botnet?

Page 8: La amenaza del cibercrimen - INFOSECURITY VIP · La amenaza del cibercrimen: articulando una respuesta Infosecurity 2014 Hotel Fiesta Americana Reforma Jorge Vega-Iracelay Director

Robot networks – Botnets 101

Dance

Stop

Attack!

Spam!

Sleep

Page 9: La amenaza del cibercrimen - INFOSECURITY VIP · La amenaza del cibercrimen: articulando una respuesta Infosecurity 2014 Hotel Fiesta Americana Reforma Jorge Vega-Iracelay Director

Malware, Botnets and Organized

Crime

Malware evokes danger

A whole industry behind malware

Operations against prominent botnets like

Waledac, Rustock, Kelihos, Zeus, Nitol, Bamital,

Citadel and ZeroAccess

Study on “The Link between Pirated Software

and Cybersecurity Breaches”

Botnet

Organized

Crime

Spam Counterfeited

Software

Unsecure supply

chain

Page 10: La amenaza del cibercrimen - INFOSECURITY VIP · La amenaza del cibercrimen: articulando una respuesta Infosecurity 2014 Hotel Fiesta Americana Reforma Jorge Vega-Iracelay Director

Leading the fight

against cybercrime

The Impact of Cybercrime

Digital Crimes Unit Overview

The Threat of Malware

Confronting IP Crimes

Combatting Online Child Exploitation

How You Can Help

Page 11: La amenaza del cibercrimen - INFOSECURITY VIP · La amenaza del cibercrimen: articulando una respuesta Infosecurity 2014 Hotel Fiesta Americana Reforma Jorge Vega-Iracelay Director

Distribution of Counterfeit and Pirated Software

Counterfeit Ecommerce Online Marketplaces One-Click Downloads

BitTorrent P2P Downloads PC Malls

Page 12: La amenaza del cibercrimen - INFOSECURITY VIP · La amenaza del cibercrimen: articulando una respuesta Infosecurity 2014 Hotel Fiesta Americana Reforma Jorge Vega-Iracelay Director

Cyberforensics

Detecting pirated software

Suspected material obtained via test purchases, seizures and customer submissions

Conduct inspection of digital and physical elements

Infrared reader or UV light checks for security thread

Product key is checked against database of stolen keys

Evidence is stored and findings are reported

Page 13: La amenaza del cibercrimen - INFOSECURITY VIP · La amenaza del cibercrimen: articulando una respuesta Infosecurity 2014 Hotel Fiesta Americana Reforma Jorge Vega-Iracelay Director

Cyberforensics: identifying and tracking stolen keys

Stolen product keys are a significant tool for criminals

Every hour approximately 100,000 PCs attempt to active products using a key

Approximately 45% are unsuccessful due to stolen keys

invalid

Page 14: La amenaza del cibercrimen - INFOSECURITY VIP · La amenaza del cibercrimen: articulando una respuesta Infosecurity 2014 Hotel Fiesta Americana Reforma Jorge Vega-Iracelay Director

Cyberforensics: identifying and tracking stolen keys

Failed activations are mapped in real-time

Easily establish distribution patterns of stolen keys

Focus on global hotspots where fraud originates

Page 15: La amenaza del cibercrimen - INFOSECURITY VIP · La amenaza del cibercrimen: articulando una respuesta Infosecurity 2014 Hotel Fiesta Americana Reforma Jorge Vega-Iracelay Director

Leading the fight

against cybercrime

The Impact of Cybercrime

Digital Crimes Unit Overview

The Threat of Malware

Confronting IP Crimes

Combatting Online Child Exploitation

How You Can Help

Page 16: La amenaza del cibercrimen - INFOSECURITY VIP · La amenaza del cibercrimen: articulando una respuesta Infosecurity 2014 Hotel Fiesta Americana Reforma Jorge Vega-Iracelay Director

Online Child Exploitation

As technology has evolved, the spread of child

abuse content has grown.

Since 2002, experts at the National Center for

Missing & Exploited Children have reviewed more

than 90 million images and videos of suspected

child abuse.

identifying and removing millions of

illegal images across the web.

Our challenge:

Page 17: La amenaza del cibercrimen - INFOSECURITY VIP · La amenaza del cibercrimen: articulando una respuesta Infosecurity 2014 Hotel Fiesta Americana Reforma Jorge Vega-Iracelay Director

PhotoDNA

Putting a digital fingerprint on child abuse content

Original image Photo is broken down

into regions

Intensity derivative for

each pixel is calculated

Creates unique histogram

for all pixels

Page 18: La amenaza del cibercrimen - INFOSECURITY VIP · La amenaza del cibercrimen: articulando una respuesta Infosecurity 2014 Hotel Fiesta Americana Reforma Jorge Vega-Iracelay Director

PhotoDNA

Putting a digital fingerprint on child abuse content PhotoDNA in action

Creates signatures of the worst

known child abuse images

Can locate these images among

the millions online

Shared with law enforcement to

accelerate prosecution

Also used by Facebook, Google,

and Twitter and others

Page 19: La amenaza del cibercrimen - INFOSECURITY VIP · La amenaza del cibercrimen: articulando una respuesta Infosecurity 2014 Hotel Fiesta Americana Reforma Jorge Vega-Iracelay Director

To recap

Cybercrime is evolving and poses a

significant threat to consumers, businesses

and governments

Global, organized crime rings have embraced

cybercrime as a key tactic

The threats range from malware and botnets

to counterfeit software and online child

exploitation

The Digital Crimes Unit is committed to

aggressive, proactive action to stop

cybercriminals

Page 20: La amenaza del cibercrimen - INFOSECURITY VIP · La amenaza del cibercrimen: articulando una respuesta Infosecurity 2014 Hotel Fiesta Americana Reforma Jorge Vega-Iracelay Director

How you can help

Ensure a legislative landscape that deters

cybercrime

Protect economies, jobs and innovation by

prioritizing cybercrime disruption

Disrupt the demand for counterfeit software

Deploy threat intelligence technology

Demonstrate zero tolerance on child exploitation

Policy Makers

Page 21: La amenaza del cibercrimen - INFOSECURITY VIP · La amenaza del cibercrimen: articulando una respuesta Infosecurity 2014 Hotel Fiesta Americana Reforma Jorge Vega-Iracelay Director

How you can help

Dismantle counterfeit supply operations

Take down botnets tied to criminal organizations

Remove illegal online storefronts selling counterfeit

products and devices

Establish new tactics to combat child exploitation

online

Use data gathered in civil actions to accelerate

prosecution of cybercriminals

Criminal Law Enforcement

Page 22: La amenaza del cibercrimen - INFOSECURITY VIP · La amenaza del cibercrimen: articulando una respuesta Infosecurity 2014 Hotel Fiesta Americana Reforma Jorge Vega-Iracelay Director

How you can help

Deploy threat intelligence technology

Disrupt the demand for counterfeit software

Strengthen supply chains

Demonstrate zero tolerance for child

abuse content

Require other partners to adopt similar actions

Industry Partners

Page 23: La amenaza del cibercrimen - INFOSECURITY VIP · La amenaza del cibercrimen: articulando una respuesta Infosecurity 2014 Hotel Fiesta Americana Reforma Jorge Vega-Iracelay Director

Gracias

[email protected]