SlideShare une entreprise Scribd logo
1  sur  24
Télécharger pour lire hors ligne
CYBER CRIME & CYBER WAR
English . Reality . Data
THIS IS
• Purely academic debate. Do not read otherwise
• No room for discussion, but for arguments.
• My opinion on a deck and your opinion as voice
• Abuse of English
• Based on evidence ?
• Fact vs Fiction
• Cyber Crime Business Models
• Budget Meeting
ME
• I am Uday
• I work as a pen tester
• Currently into Data Analysis & Machine Learning Learning
• Yawn, Steam, Argue, Debate, Learn
• Big Data can change the world or solve some problems.
• Big data for hacking ? People are really doing that.
• Alejandro Caceres http://www.hyperiongray.com/
BEFORE WE START, PLEASE BE ASSURED
• All my words are an outcome of months of research
• We are always assured
• “The president of India would be visiting Hyderabad
tomorrow” and I have this information from an impeccable
source from the president’s staff at Rastrapathi Bhavan
HOW DOES ASSURANCE WORK ?
• Authoritative speech powerful enough to make me believe
that men are from mars and aliens are from earth
• When assured, there is no question left to ask
ASSURANCE & CYBER WAR
• Are we being assured that Cyber War is in progress ?
• Audience: What is Cyber War ?
• Audience: What is Cyber Crime ?
• Espionage vs Cyber War vs Cyber Crime ?
• Your responses are invaluable!
WHO HAS DEFINED CYBER WAR
• International Laws are still WIP
• Has EU or US declared definitions ? The answer is no.
• What has been taken into account to call this as a war ?
THE ‘ULTIMATELY’ JUSTIFICATION
• Ultimately, Cyber Wars have a toll on our daily lives.
WHATEVER HAPPENS ONLINE WITH US
• Is not cyber war
• Is not Cyber Terrorism
• Could be Cyber Bullying
• Could be violation of privacy
• Could have legal implications
• Could be cumbersome
• Affects our personal lives indirectly especially longterm
ENOUGH ENGLISH
• Do We have some data as evidence to argue upon ?
• Yes we do!
• Measuring Pay-per-Install: The Commoditization of Malware Distribution
• White Paper fromJuan Caballero, Chris Grier, Christian Kreibich, Vern
Paxson, Berkley
• Is this Authentic data ?
• Please be assured that this is more genuine than pure cocaine
CRIME AS A BUSINESS MODEL
• Can I design crime ?
• Instance: CarderPlanet.com
• PPI Model – Pay Per Install
• Exploit as a service
• Malware is the new commodity
• Better off than your shares and market
• Who the bullish ? What the bearish ?
SERVICE PROVIDER
• What is this PPI Market
Business
Client
• I am the bad
guy
Service • I run the show
Service
Affiliate
•Oh yeah!
Malware
WHAT IS THIS BUSINESS MODEL ?
• This is one observed business model that generates the
underground economy
• Offerings are highly customized
ARTICLE A YEAR AGO
• http://www.reddit.com/r/IAmA/comments/sq7cy/iama_a_mal
ware_coder_and_botnet_operator_ama/
• IAmA a malware coder and botnet operator, AMA
• TOR + Dedicated Enhanced Service
• Stealthy really
MEMORY ERRORS
• Past present Future
• Corrupted Pointer, Uninitialized Pointer Access, Out of bounds
etc.
• Subversion of logic
• This is relevant even today even after 20 years
SO WHAT DEFINITION IS WRONG ?
• Cyber War vs Cyber Crime
• We have never had a Cyber War yet
• This comes from the definition of traditional war
• We can have a separate debate on this
• When a conventional war follows the strategy of “Greater the
offense, Greater the defense”, Cyber War is opposite.
CYBER TERRORISM
• Many people are using this word already & extensively
• David Rappaport has not coined this term.
• I believe that the word “Cyber Terrorism” is completely wrong.
• You can have your view.
BUDGET MEETING
• $100-180 for Unique thousand installs, This is for US/UK/Europe
• $7-8 is the lowest for the same service, least popular
geography
• Rivalry in PPI
• Often difficult to validate on the installs when using two rival
PPI Providers
• Affiliates receive credit for confirmed Installs
CRIMEWARE KITS
• To build botnet variants
• Instance zbot
• This is not an exhaustive talk on cyber crime
• We can have a dedicated session for a deep dive on cyber
crime
• Let’s quickly see what someone from NATO has to say
• (NATO – Cyber War exists Video)

Contenu connexe

Similaire à Cyber Crime & Cyber War

Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and ConcernsPINT Inc
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Steve Poole
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...Steve Poole
 
Enterprise SEO and AI - Houston IMA Interactive Strategies 17
Enterprise SEO and AI - Houston IMA Interactive Strategies 17Enterprise SEO and AI - Houston IMA Interactive Strategies 17
Enterprise SEO and AI - Houston IMA Interactive Strategies 17Keith Goode
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developerSteve Poole
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaSteve Poole
 
Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Justin Bull
 
Bright Light Web
Bright Light WebBright Light Web
Bright Light WebLiviuOlos
 
2021 11 09_mill06
2021 11 09_mill062021 11 09_mill06
2021 11 09_mill06Doc Searls
 
Innovation prezo
Innovation prezoInnovation prezo
Innovation prezoDavid Cohn
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerSteve Poole
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxBrian Pichman
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker SideCybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker SideSteve Poole
 
Ar design reality2018
Ar design reality2018Ar design reality2018
Ar design reality2018Anselm Hook
 
Publishing Today The Problem
Publishing Today The ProblemPublishing Today The Problem
Publishing Today The ProblemGraeme Bryan
 
Voting Systems - ISSA Chicago Presentation 2020
Voting Systems - ISSA Chicago Presentation 2020Voting Systems - ISSA Chicago Presentation 2020
Voting Systems - ISSA Chicago Presentation 2020Chris Roberts
 
Zemura Digital Store plan
Zemura Digital Store planZemura Digital Store plan
Zemura Digital Store planOdo Eniang
 
Jeff Katz on Lean Hardware Startups
Jeff Katz on Lean Hardware StartupsJeff Katz on Lean Hardware Startups
Jeff Katz on Lean Hardware StartupsJeff Katz
 

Similaire à Cyber Crime & Cyber War (20)

Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and Concerns
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Enterprise SEO and AI - Houston IMA Interactive Strategies 17
Enterprise SEO and AI - Houston IMA Interactive Strategies 17Enterprise SEO and AI - Houston IMA Interactive Strategies 17
Enterprise SEO and AI - Houston IMA Interactive Strategies 17
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)
 
Bright Light Web
Bright Light WebBright Light Web
Bright Light Web
 
2021 11 09_mill06
2021 11 09_mill062021 11 09_mill06
2021 11 09_mill06
 
Innovation prezo
Innovation prezoInnovation prezo
Innovation prezo
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker SideCybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker Side
 
Cyber security - Trend Micro
Cyber security  - Trend MicroCyber security  - Trend Micro
Cyber security - Trend Micro
 
Ar design reality2018
Ar design reality2018Ar design reality2018
Ar design reality2018
 
Publishing Today The Problem
Publishing Today The ProblemPublishing Today The Problem
Publishing Today The Problem
 
Voting Systems - ISSA Chicago Presentation 2020
Voting Systems - ISSA Chicago Presentation 2020Voting Systems - ISSA Chicago Presentation 2020
Voting Systems - ISSA Chicago Presentation 2020
 
Norway real-2
Norway real-2Norway real-2
Norway real-2
 
Zemura Digital Store plan
Zemura Digital Store planZemura Digital Store plan
Zemura Digital Store plan
 
Jeff Katz on Lean Hardware Startups
Jeff Katz on Lean Hardware StartupsJeff Katz on Lean Hardware Startups
Jeff Katz on Lean Hardware Startups
 

Plus de n|u - The Open Security Community

Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...n|u - The Open Security Community
 

Plus de n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Dernier

Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptxmary850239
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17Celine George
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxAnupam32727
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 

Dernier (20)

Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 

Cyber Crime & Cyber War

  • 1. CYBER CRIME & CYBER WAR English . Reality . Data
  • 2. THIS IS • Purely academic debate. Do not read otherwise • No room for discussion, but for arguments. • My opinion on a deck and your opinion as voice • Abuse of English • Based on evidence ? • Fact vs Fiction • Cyber Crime Business Models • Budget Meeting
  • 3. ME • I am Uday • I work as a pen tester • Currently into Data Analysis & Machine Learning Learning • Yawn, Steam, Argue, Debate, Learn • Big Data can change the world or solve some problems. • Big data for hacking ? People are really doing that. • Alejandro Caceres http://www.hyperiongray.com/
  • 4. BEFORE WE START, PLEASE BE ASSURED • All my words are an outcome of months of research • We are always assured • “The president of India would be visiting Hyderabad tomorrow” and I have this information from an impeccable source from the president’s staff at Rastrapathi Bhavan
  • 5. HOW DOES ASSURANCE WORK ? • Authoritative speech powerful enough to make me believe that men are from mars and aliens are from earth • When assured, there is no question left to ask
  • 6. ASSURANCE & CYBER WAR • Are we being assured that Cyber War is in progress ? • Audience: What is Cyber War ? • Audience: What is Cyber Crime ? • Espionage vs Cyber War vs Cyber Crime ? • Your responses are invaluable!
  • 7. WHO HAS DEFINED CYBER WAR • International Laws are still WIP • Has EU or US declared definitions ? The answer is no. • What has been taken into account to call this as a war ?
  • 8. THE ‘ULTIMATELY’ JUSTIFICATION • Ultimately, Cyber Wars have a toll on our daily lives.
  • 9. WHATEVER HAPPENS ONLINE WITH US • Is not cyber war • Is not Cyber Terrorism • Could be Cyber Bullying • Could be violation of privacy • Could have legal implications • Could be cumbersome • Affects our personal lives indirectly especially longterm
  • 10. ENOUGH ENGLISH • Do We have some data as evidence to argue upon ? • Yes we do! • Measuring Pay-per-Install: The Commoditization of Malware Distribution • White Paper fromJuan Caballero, Chris Grier, Christian Kreibich, Vern Paxson, Berkley • Is this Authentic data ? • Please be assured that this is more genuine than pure cocaine
  • 11. CRIME AS A BUSINESS MODEL • Can I design crime ? • Instance: CarderPlanet.com • PPI Model – Pay Per Install • Exploit as a service • Malware is the new commodity • Better off than your shares and market • Who the bullish ? What the bearish ?
  • 12. SERVICE PROVIDER • What is this PPI Market Business Client • I am the bad guy Service • I run the show Service Affiliate •Oh yeah! Malware
  • 13. WHAT IS THIS BUSINESS MODEL ? • This is one observed business model that generates the underground economy • Offerings are highly customized
  • 14.
  • 15. ARTICLE A YEAR AGO • http://www.reddit.com/r/IAmA/comments/sq7cy/iama_a_mal ware_coder_and_botnet_operator_ama/ • IAmA a malware coder and botnet operator, AMA • TOR + Dedicated Enhanced Service • Stealthy really
  • 16. MEMORY ERRORS • Past present Future • Corrupted Pointer, Uninitialized Pointer Access, Out of bounds etc. • Subversion of logic • This is relevant even today even after 20 years
  • 17.
  • 18.
  • 19.
  • 20. SO WHAT DEFINITION IS WRONG ? • Cyber War vs Cyber Crime • We have never had a Cyber War yet • This comes from the definition of traditional war • We can have a separate debate on this • When a conventional war follows the strategy of “Greater the offense, Greater the defense”, Cyber War is opposite.
  • 21. CYBER TERRORISM • Many people are using this word already & extensively • David Rappaport has not coined this term. • I believe that the word “Cyber Terrorism” is completely wrong. • You can have your view.
  • 22. BUDGET MEETING • $100-180 for Unique thousand installs, This is for US/UK/Europe • $7-8 is the lowest for the same service, least popular geography • Rivalry in PPI • Often difficult to validate on the installs when using two rival PPI Providers • Affiliates receive credit for confirmed Installs
  • 23. CRIMEWARE KITS • To build botnet variants • Instance zbot • This is not an exhaustive talk on cyber crime • We can have a dedicated session for a deep dive on cyber crime • Let’s quickly see what someone from NATO has to say
  • 24. • (NATO – Cyber War exists Video)