Australian High Tech Crime Centre What is cybercrime &
trends Monday 5 November 2007
Slide 2
WHAT IS CYBERCRIME? E-Crime, High Tech Crime, technology
enabled crime 1. CRIMES CREATED BY THE INTERNET 2. TRADITIONAL
CRIMES HELPED BY THE INTERNET
Slide 3
Crimes created by the internet: INTERNET BANKING FRAUD BOTNETS
COMPUTER INTRUSION - HACKING DISTRIBUTED DENIAL OF SERVICE ATTACKS
(DDOS)
Slide 4
Traditional Crimes Helped By The Internet: FRAUDS and SCAMS
MONEY LAUNDERING DRUG TRAFFICKING TERRORISM CHILD SEXUAL
EXPLOITATION
Slide 5
Internet Banking Fraud
Slide 6
PHISHING E-MAILS
Slide 7
WIRE TRANSFERS TO INTERNATIONAL DESTINATIONS NUMBER OF PHISHING
& TROJAN SITES REPORTED TO AUSCERT
Slide 8
AUSTRALIA - UK PHISHING COMPARISON
Slide 9
Position Entails: Our company has customers around all the
world, and we require people able to receive money from our
customers, and to send them to us into Russia using Western Union.
If you live in United Kingdom, Australia, United States or Germany,
if you think that you are reliable for this job, and you have bank
account, so this job is for you. We will need from you essentials
of your bank account, and also it is preferred you to have an ICQ
number to discuss all details with our manager. In 3-4 hours after
receiving money you HAVE TO give us western union payment details.
Location: Work from home, sometimes business trips. Experience:
none Salary: You receive 7% per every transaction. You have to send
93% of money amount received minus Western Union fees. We pay all
Western Union fees. We hope for our successful cooperation. Start
Date: Immediate after interview with financial manager. Mule
Recruitment
Slide 10
WIRE TRANSFERS TO INTERNATIONAL DESTINATIONS AUSTRALIA - UK
MULE RECRUITMENT INCIDENTS (2005 - 2006)
Slide 11
Transferring stolen funds out of Australia
Slide 12
WIRE TRANSFERS TO INTERNATIONAL DESTINATIONS WIRE TRANSFERS TO
INTERNATIONAL DESTINATIONS
Slide 13
Methods & Technologies used by Criminals A BOTNET: Exploits
large numbers of Internet connected computers Some of the uses of
botnets include: Sending out spam e-mails Launching distributed
denial of service attacks (DDoS) Host fraudulent web sites (such as
false bank websites)
Slide 14
Botnets Distributed Denial of Service (DDoS)
Slide 15
Slide 16
Methods and technologies used vary tremendously result of
differences in the systems attacked continual identification and
patching of exploits in software and operating systems Microsofts
Windows operating system as the most widely used, is the most
widely attacked particularly old versions Variety of free tools
available on the Internet to exploit unpatched systems MAKING A
BOTNET
Slide 17
Computer Intrusion Hacking Trojans & Malware
Slide 18
Slide 19
Source: Symantec Corporation Top Downloaded Malware
1AdclickerTrojanGenerates traffic to Web sites and banner ads
2GampassTrojanSteals online gaming account information
3ZonebacTrojanLowers Internet Explorer security settings
4KillAVTrojanDisables security applications 5LineageTrojanSteals
online gaming account information 6PeacommTrojanCreates a peer
network and downloads other threats 7Rustock.BBackdoorAllows remote
access and relays spam 8BzupTrojanSteals online banking account
information 9GraybirdBack doorAllows remote access, logs
keystrokes, and steals passwords 10HaxdoorBack doorAllows remote
access