+ All Categories
Home > Technology > Cyber Terrorism by Nitin Pandey

Cyber Terrorism by Nitin Pandey

Date post: 22-May-2020
Category:
Upload: initinpandey
View: 6 times
Download: 1 times
Share this document with a friend
Description:
Presentation at Russian IT Synergy 2017 on Cyber Terrorism
Popular Tags:
51
RUSSIAN IT SYNERGY CONFERENCE 2017 NITIN PANDEY
Transcript
Page 1: Cyber Terrorism by Nitin Pandey

RUSSIAN IT SYNERGY CONFERENCE 2017

NITIN PANDEY

Page 2: Cyber Terrorism by Nitin Pandey

Здравствуйте

Chelyabinsk

Page 3: Cyber Terrorism by Nitin Pandey

Who Am I? I am Nitin Pandey

Я Нитин Пандей

• A Cyber Security Professional

• Chairman of National Information Security Council

• Chair Member of National Cyber Safety & Security Standards

• Founder of Hackers Day

• Lead Technical Member of Digital 4n6 Journal

• Former Head of DEF CON & OWASP Lucknow

• Listed in Hall of Fames such as Google, Microsoft, Dell, Intel etc.

Page 4: Cyber Terrorism by Nitin Pandey

CYBERTERRORISM MOST DANGEROUS EMERGING THREAT

КИБЕРТЕРРОРИЗМ САМАЯ ОПАСНАЯ ВОЗНИКАЮЩАЯ УГРОЗА

Page 5: Cyber Terrorism by Nitin Pandey

Disclaimer!

The Information in this presentation is

Researched by Speaker which is based

on facts and is true & complete to best

of Speaker’s knowledge.

Page 6: Cyber Terrorism by Nitin Pandey

Let’s Watch Something First !

Давайте сначала посмотрим что-то!

Page 7: Cyber Terrorism by Nitin Pandey

What is Terrorism?

что терроризм?

Bomb Blasts, Hijacking Airplanes, Killing Innocent People, and many others are phrases &

expressions associated with Terrorism. Nowadays, Terrorism has been attached to the

Cyberspace. The potential threat is, indeed, very alarming! Never before has anybody thought

that terrorism would have a Digital form.

Hijacking Airplanes 9/11 US attack, crashing of hijacked airplanes into World Trade Center & killing around 3000 people.

Bomb Blasts 12 March 1993, Mumbai, India Bomb Blasts, 15 bombings throughout city.

Killing Innocent People 1-3 Sep 2004, Beslan, Russia School Siege involve illegal imprisonment of over 1100 people as hostages, ended with death of 385+ people including 31 terrorists. 26 Nov 2008, Mumbai terrorist attack by Lashkar-E-Taiba, a Pakistan based terrorist organization.

Page 8: Cyber Terrorism by Nitin Pandey

CYBERTERRORISM

There is often a large amount of confusion as to what cyber

terrorism is. More specifically, what cyber attacks can we actually

define as acts of terrorism? The internet has allowed for a vast

exchange of information. Thus has created a cyber space in which

both criminals and terrorists can implement attacks/communications.

When we consider what cyber terrorism actually is, we must first

understand the intentions and motivations behind cyber

attacks.

мы должны сначала понять намерения и мотивы

кибератак.

Page 9: Cyber Terrorism by Nitin Pandey

CYBERTERRORISM

Cyber Terrorism is an international phenomenon which must be

combated by the international community. Some nations are working

against cyber-crimes but it is on a limited scale. For example, Israel

became first Cyber Secured Nation.

How?

Because Israel Government is serious about Cyber Security. Its

supporting both Private & Public sectors.

Israel offers Cyber Security training to their students as well as

corporate sector.

Page 10: Cyber Terrorism by Nitin Pandey

SAUDI ARABIA SUFFERED ONE OF WORLD’S BIGGEST CYBER ATTACK IN 2012

• The Shamoon virus operates like a time bomb. It was used in the huge

cyberattack in August 2012 on Saudi Aramco, the world's biggest oil company.

•Within a matter of hours, 35,000 computers were partially wiped or totally

destroyed in that attack. It forced one of the most valuable companies on

earth back into 1970s technology, using typewriters and faxes.

• Not just once but Shamoon came back again in November 2016 as Shamoon 2.

Impact was similar. Then 3rd wave of attack happened in January 2017 of

Shamoon 2 Virus.

Page 11: Cyber Terrorism by Nitin Pandey

Nowadays, terrorists usually use Telegram and Internet

Relay Chat (IRC) to communicate with other terrorists &

groups.

Page 12: Cyber Terrorism by Nitin Pandey
Page 13: Cyber Terrorism by Nitin Pandey
Page 14: Cyber Terrorism by Nitin Pandey

What will happen if someday these Terrorist Organizations get the

access of Nuclear weapons and other sensitive data of any nation ?

AL-QAEDA ISIS

Page 15: Cyber Terrorism by Nitin Pandey
Page 16: Cyber Terrorism by Nitin Pandey

Because it’s all about just

PRESSING A BUTTON !!

Потому что это все о просто

НАЖМИТЕ КНОПКУ !!

Page 17: Cyber Terrorism by Nitin Pandey

On one side

Russia has broken the backbone of ISIS in Syria

And What’s happening on another side?

Page 18: Cyber Terrorism by Nitin Pandey

Chinese Ideal

MASOOD AZHAR Founder and leader of the UN-designated terrorist group Jaish-e-Mohammed based in Pakistan

Page 19: Cyber Terrorism by Nitin Pandey

ARE WE REALLY SAFE ?

Мы действительно в безопасности?

Page 20: Cyber Terrorism by Nitin Pandey

BIGGEST GLOBAL CHALLENGE ?

самая большая глобальная задача ?

Page 21: Cyber Terrorism by Nitin Pandey
Page 22: Cyber Terrorism by Nitin Pandey

What is Ransomware?

что такое вымогателей?

It is a type of malicious software that threatens to publish the victim's

data or block access to it unless a ransom is paid. A more advanced

malware uses a technique called cryptoviral extortion, in which it

encrypts the victim's files, making them inaccessible, and demands a

ransom payment to decrypt them.

Expose Data Threatens to publish the Sensitive Data online.

Block Access to Data Prevents the user from accessing the Data Stored.

Demand Ransom Compels the user to pay ransom to retrieve the Data.

Page 23: Cyber Terrorism by Nitin Pandey

Mode of Infection How does your system get infected?

Ransomware kits on the deep web have

allowed cybercriminals even with no

technical background to purchase

inexpensive Ransomware programs and

launch attacks with very little effort.

Attackers may use one of several

different approaches to extort digital

currency from their victims.

Self Propagation 30%

Drive by downloads 55%

Spam Mail 10%

Drive by downloads Downloading content from unknown sources.

01 Self Propagation Spreading from one computer to the next.

02 Spam Mail Content access or download from spam mail.

03

Page 24: Cyber Terrorism by Nitin Pandey

Why do they target Businesses?

Почему они нацелены на предприятия?

Page 25: Cyber Terrorism by Nitin Pandey

Money Its all about

$ Higher Complexity Higher Vulnerability Computer systems in companies are often complex and prone to vulnerabilities

₹ No report and Fear Damage Businesses would rather not report an infection for fear or legal consequences and brand damage

Because that’s where the money is Careless on Security and Face the Facts!

High Chance Chances of getting paid is high

• Because a successful infection can

cause major business disruptions,

which will increase their chances of

getting paid.

• Because small businesses are often

unprepared to deal with cyber attacks.

Page 26: Cyber Terrorism by Nitin Pandey

Cases of Ransomware Around the World

Случаи вымогателей Во всем мире

Page 27: Cyber Terrorism by Nitin Pandey

R

Ukrainian

Central Bank

Page 28: Cyber Terrorism by Nitin Pandey

WannaCry Ransomware

Page 29: Cyber Terrorism by Nitin Pandey
Page 30: Cyber Terrorism by Nitin Pandey

WHAT IS WANNACRY RANSOMWARE? ЧТО WANNACRY?

• A tool first uncovered by NSA (National Security Agency) and then released by

hackers on the internet became one of the most prolific cyber attacks ever

happened around the globe.

• WannaCry Ransomware Cryptoworm, which targeted systems by encrypting data

and demand ransom in the Bitcoin.

• More than 2.5 lac computers in 150+ countries have been affected, with victims

including hospitals, banks, telecommunications companies and warehouses

• A “Kill Switch" was found and could be used to shut down the software.

• Russia was the most affected Nation. More than 1000 computers at the Russian

Interior Ministry got affected by WannaCry. A telecom giant Megafon had also

been targeted in Russia.

Page 31: Cyber Terrorism by Nitin Pandey
Page 32: Cyber Terrorism by Nitin Pandey

KASPERSKY LAB Report

Page 33: Cyber Terrorism by Nitin Pandey

Not-Petya Ransomware

Page 34: Cyber Terrorism by Nitin Pandey
Page 35: Cyber Terrorism by Nitin Pandey

NOT-PETYA RANSOMWARE

• Many organizations in Europe and the US have been crippled by “Petya”

attack.

• It’s the second major global ransomware attack in the past six months.

• “Petya” checks for a read-only file and if it finds it, it won’t run the encryption.

• Majority of infections have occurred in Ukraine and Russia, but some big

names in the West have also suffered.

• The attack appears to have been seeded through a software update

mechanism built into an accounting program that companies working with the

Ukrainian government need to use.

Page 36: Cyber Terrorism by Nitin Pandey
Page 37: Cyber Terrorism by Nitin Pandey
Page 38: Cyber Terrorism by Nitin Pandey

Locky Ransomware

Page 39: Cyber Terrorism by Nitin Pandey

WHAT IS LOCKY RANSOMWARE?

• The Computer Emergency Response Team (CERT) has issued a warning

regarding the spread of Locky ransomware in India.

• Locky ransomware takes over a victim’s system and encrypts its files,

demanding a ransom to release the data.

• It is similar to the Petya and WannaCry Ransomwares.

• The encrypted files of a system infected with the ransomware displays file

extensions with “[.]lukitus” or “[.]diablo6”.

• The messages contain “zip” attachments with Visual Basic Scripts (VBS)

embedded in a secondary zip file.

• After encrypting the files, it demands a payment of 0.5 Bitcoins.

Page 40: Cyber Terrorism by Nitin Pandey
Page 41: Cyber Terrorism by Nitin Pandey

Bad Rabbit Ransomware

Page 42: Cyber Terrorism by Nitin Pandey

WHAT IS BAD RABBIT RANSOMWARE?

• Bad Rabbit encrypts the contents of a computer and asks for a payment - in this case

0.05 Bitcoins, or about $280.

• Bad Rabbit Ransomware Uses Leaked 'EternalRomance' NSA Exploit to Spread.

• According to Kaspersky Lab Report, most of the victims targeted by Bad Rabbit

attacks are located in Russia and fewer attacks in Ukraine, Turkey and Germany.

• Bad Rabbit Ransomware is also very similar to the Petya and WannaCry

Ransomwares.

• Bad Rabbit was reportedly distributed via drive-by download attacks via

compromised Russian media sites, using fake Adobe Flash players installer to lure

victims' into install malware unwittingly.

• After encrypting the files, it demands a payment of 0.5 Bitcoins to unlock the systems.

Page 43: Cyber Terrorism by Nitin Pandey
Page 44: Cyber Terrorism by Nitin Pandey

QUESTIONS RAISE!

Page 45: Cyber Terrorism by Nitin Pandey

1

If National Security Agency (NSA) is incapable to

secure its tools then why do they make such

dangerous tools which could make the whole world

in trouble. Their tools are getting leaked one by

one, still why they are incapable to secure them?

Page 46: Cyber Terrorism by Nitin Pandey

2

Having world’s official biggest Cyber Army,

why do China indirectly supporting terrorists &

terrorist nation such as Pakistan?

Page 47: Cyber Terrorism by Nitin Pandey

Let me show you a live demonstration of Bad

Rabbit Ransomware in Virtual Machine!

Page 48: Cyber Terrorism by Nitin Pandey

CONCLUSION!

ВЫВОД!

DEFENSE!

ЗАЩИТА!

Page 49: Cyber Terrorism by Nitin Pandey

мы любим Россию

Page 50: Cyber Terrorism by Nitin Pandey

Индия любит президента PUTIN

Page 51: Cyber Terrorism by Nitin Pandey

спасибо

RUSSIAN IT SYNERGY 2017

NITIN PANDEY


Recommended