1 / 16

Today’s Threats and the Evolution of the Computer Underground

Today’s Threats and the Evolution of the Computer Underground. Eugene Kaspersky Head of Anti-Virus Research Kaspersky Lab. Grim statistics. Financial losses due to virus attacks: 1995 – US $0.5 bln 1998 – US $ 6 . 1 bln 2003 – US $ 13 bln

abla
Download Presentation

Today’s Threats and the Evolution of the Computer Underground

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Today’s Threats and the Evolution of the Computer Underground Eugene Kaspersky Head of Anti-Virus Research Kaspersky Lab

  2. Grim statistics • Financial losses due to virus attacks: • 1995 – US $0.5 bln • 1998 –US $6.1 bln • 2003 – US $13 bln • 2004 – US $17,5 bln (projected figure) * – Computer Economics, 2004

  3. Grim reality • Financial losses due to virus attacks in 2004: • Sasser – US $3.5 bln • NetSky – US $2.75 bln • Bagle – US $1.5 bln • MyDoom – US $4.75 bln * – Computer Economics, 2004

  4. Criminal activity Computer Hooligans Financial Fraud Unwanted Advertising Blackmail, espionage

  5. Evolution of cyber-crime • Financial Fraud: • 1996 – minor cyber fraud • 1998 – remote administration, spyware • 2002 – Internet fraud (Internet-money) • 2003 – financial fraud (bank transactions) • 2004– large-scale attacks on Internet banks

  6. Evolution of cyber-crime • Unwanted Advertising: • 1994 – Appearance of electronic spam • 1999 – Intrusive advertising of paid web sites • 2001 – Trojan proxy servers (spam) • 2002 – Trojan adware

  7. Evolution of cyber-crime • Blackmail and Espionage 2002 – 2004: • Web-site hijacking • Theft of confidential information • DoS-attacks, cyber-blackmail

  8. Internet crime(1980 – 2005) Source: Kaspersky Lab

  9. Internet crime • Profitable • Illegal • Controlled by organised crime

  10. Internet Crime:the new mafia • Control the spam business • Cyber blackmail and racketeering • Access to bank accounts, confidential financial and proprietary information • Cyber-terrorism

  11. Internet CrimeConsequences • Viruses, hackers and spammers unite • Becoming more difficult to fight IT threats • Increased traditional crime • Potential threats to national and global security

  12. What’s the solution? A return to the Stone Age? We’re only treating the symptoms Let’s fight the cause instead!

  13. IT threat cycle Consequences Infected users (individual, corporate) Causes Human factor (users, virus writers, hackers, spammers) Channels IT infrastructure (networks, hardware and software)

  14. Government regulation Legislation «Net Police» ore-Interpol Solutions • Secure networks and operating systems • User education and certification • ID required

  15. Questions?

  16. Thank you for your attention!

More Related