160 likes | 285 Views
Today’s Threats and the Evolution of the Computer Underground. Eugene Kaspersky Head of Anti-Virus Research Kaspersky Lab. Grim statistics. Financial losses due to virus attacks: 1995 – US $0.5 bln 1998 – US $ 6 . 1 bln 2003 – US $ 13 bln
E N D
Today’s Threats and the Evolution of the Computer Underground Eugene Kaspersky Head of Anti-Virus Research Kaspersky Lab
Grim statistics • Financial losses due to virus attacks: • 1995 – US $0.5 bln • 1998 –US $6.1 bln • 2003 – US $13 bln • 2004 – US $17,5 bln (projected figure) * – Computer Economics, 2004
Grim reality • Financial losses due to virus attacks in 2004: • Sasser – US $3.5 bln • NetSky – US $2.75 bln • Bagle – US $1.5 bln • MyDoom – US $4.75 bln * – Computer Economics, 2004
Criminal activity Computer Hooligans Financial Fraud Unwanted Advertising Blackmail, espionage
Evolution of cyber-crime • Financial Fraud: • 1996 – minor cyber fraud • 1998 – remote administration, spyware • 2002 – Internet fraud (Internet-money) • 2003 – financial fraud (bank transactions) • 2004– large-scale attacks on Internet banks
Evolution of cyber-crime • Unwanted Advertising: • 1994 – Appearance of electronic spam • 1999 – Intrusive advertising of paid web sites • 2001 – Trojan proxy servers (spam) • 2002 – Trojan adware
Evolution of cyber-crime • Blackmail and Espionage 2002 – 2004: • Web-site hijacking • Theft of confidential information • DoS-attacks, cyber-blackmail
Internet crime(1980 – 2005) Source: Kaspersky Lab
Internet crime • Profitable • Illegal • Controlled by organised crime
Internet Crime:the new mafia • Control the spam business • Cyber blackmail and racketeering • Access to bank accounts, confidential financial and proprietary information • Cyber-terrorism
Internet CrimeConsequences • Viruses, hackers and spammers unite • Becoming more difficult to fight IT threats • Increased traditional crime • Potential threats to national and global security
What’s the solution? A return to the Stone Age? We’re only treating the symptoms Let’s fight the cause instead!
IT threat cycle Consequences Infected users (individual, corporate) Causes Human factor (users, virus writers, hackers, spammers) Channels IT infrastructure (networks, hardware and software)
Government regulation Legislation «Net Police» ore-Interpol Solutions • Secure networks and operating systems • User education and certification • ID required