Click me
Transcribed

Cyber Espionage: A Digital License To Kill?

CYBER ESPIONAGE: A DIGITAL LICENSE TO KILL? BRIEFING CONFIDENTIAL SECRET AGENT TOOL Malware attacks - be it for mobile devices or on major organizations – have been occurring for over 25 years now and the latest wave has become increasingly more complicated. AGENT 0072 NO. ANDROIDOS. AGENT.A Currently, cyber enemies are commonly criminals who target individuals & businesses via the Internet for financial purposes; 'hacktivist' collectives like Anonymous or LulzSec who use the web to attack organizations in protest, or even just for the 'lulz'; and increasingly, government-borne attackers who target other countries or international groups for political or defense reasons. Requests permissions to access contact data, SMS messages, location and Internet access But now there's the emergence of a fourth cyber enemy: on affected devices Mission: Silently Terrorists. So if supervillains were real, money was no object, and secret agents, like James Bond, existed today, what types of malware are we likely to see used on a massive scale? record all incoming and outgoing calls and of course, check for specific incoming SMS messages - SUPERVILLAIN SECRET AGENT TOOL ZeuS %$4 ANDROIDOS.AGENT.A, MEET YOUR FIELD PARTNER, A Trojan that lifts banking credentials to access AGENT.BTZ. corporate accounts Stole more than $3 million Known as the most significant breach of the U.S. military's classified computer systems; Collects and reports data from dozens of U.S. accounts Mission: Steal money and have it wired to its creator back to its creator SUPERVILLAIN Mission: Find way into the Secret Shamoon: Internet Protocol Router Network, used by the DoD and State Department to transmit classified THE PEARL HARBOR OF CYBERATTACKS The most destructive information corporate attack to date; Overwrites boot sectors and SECRET AGENT TOL renders computers useless to cover its ARAN NEED A WAY IN? CASE ANY JOINT WITH THE tracks Mission: Disrupt the ANDROID 3D SPYWARE wealthiest company on the planet, Saudi Arabia's state oil company, ARAMCO Developed by the U.S. military; Activates cameras on mobile devices and accesses sensor data Mission: Reconstruct a - SUPERVILLAIN - 3D virtual model of a target location using NEVER SAY the phone's camera STUXNET By launching and orientation sensors Stuxnet, American officials opened If captured, it might be turned and go rogue to take down a power plan or destabilize an active nuclear power plant. Pandora's box. They will most likely end up regretting this SECRET AGENT TOOL decision From STUXNET, - Mikko Hyppönen, With Love - SUPERVILLAIN Chief Research Officer for F-Secure Developed by the U.S. and Israeli governments; Spreads globally causing no harm until it finds and reaches its target. CREECH USB DRONE VIRUS 30 - Infected Mission: Sabotage physical infrastructure. of America's Predator and Reaper drones - Logged pilots key- strokes during missions over Afghanistan and other warzones SECRET AGENT TOOL - SUPERVILLAIN - ТOOL FLAME IS FOREVER RANSOMCRYPT Mission: Capture The most sophisticated malware ever created; Infects computers and searches for intelligence activating audio and contained in emails, documents, and mes- Encrypts files on computers and demands payment to recover your files intelligence via screenshots or by Mission: Make money to finance evil plots video devices - all under the cover of an sages. encrypted channel TOP SECRE F-Secure. %24 PASSPORT CYBER ESPIONAGE: A DIGITAL LICENSE TO KILL? BRIEFING CONFIDENTIAL SECRET AGENT TOOL Malware attacks - be it for mobile devices or on major organizations – have been occurring for over 25 years now and the latest wave has become increasingly more complicated. AGENT 0072 NO. ANDROIDOS. AGENT.A Currently, cyber enemies are commonly criminals who target individuals & businesses via the Internet for financial purposes; 'hacktivist' collectives like Anonymous or LulzSec who use the web to attack organizations in protest, or even just for the 'lulz'; and increasingly, government-borne attackers who target other countries or international groups for political or defense reasons. Requests permissions to access contact data, SMS messages, location and Internet access But now there's the emergence of a fourth cyber enemy: on affected devices Mission: Silently Terrorists. So if supervillains were real, money was no object, and secret agents, like James Bond, existed today, what types of malware are we likely to see used on a massive scale? record all incoming and outgoing calls and of course, check for specific incoming SMS messages - SUPERVILLAIN SECRET AGENT TOOL ZeuS %$4 ANDROIDOS.AGENT.A, MEET YOUR FIELD PARTNER, A Trojan that lifts banking credentials to access AGENT.BTZ. corporate accounts Stole more than $3 million Known as the most significant breach of the U.S. military's classified computer systems; Collects and reports data from dozens of U.S. accounts Mission: Steal money and have it wired to its creator back to its creator SUPERVILLAIN Mission: Find way into the Secret Shamoon: Internet Protocol Router Network, used by the DoD and State Department to transmit classified THE PEARL HARBOR OF CYBERATTACKS The most destructive information corporate attack to date; Overwrites boot sectors and SECRET AGENT TOL renders computers useless to cover its ARAN NEED A WAY IN? CASE ANY JOINT WITH THE tracks Mission: Disrupt the ANDROID 3D SPYWARE wealthiest company on the planet, Saudi Arabia's state oil company, ARAMCO Developed by the U.S. military; Activates cameras on mobile devices and accesses sensor data Mission: Reconstruct a - SUPERVILLAIN - 3D virtual model of a target location using NEVER SAY the phone's camera STUXNET By launching and orientation sensors Stuxnet, American officials opened If captured, it might be turned and go rogue to take down a power plan or destabilize an active nuclear power plant. Pandora's box. They will most likely end up regretting this SECRET AGENT TOOL decision From STUXNET, - Mikko Hyppönen, With Love - SUPERVILLAIN Chief Research Officer for F-Secure Developed by the U.S. and Israeli governments; Spreads globally causing no harm until it finds and reaches its target. CREECH USB DRONE VIRUS 30 - Infected Mission: Sabotage physical infrastructure. of America's Predator and Reaper drones - Logged pilots key- strokes during missions over Afghanistan and other warzones SECRET AGENT TOOL - SUPERVILLAIN - ТOOL FLAME IS FOREVER RANSOMCRYPT Mission: Capture The most sophisticated malware ever created; Infects computers and searches for intelligence activating audio and contained in emails, documents, and mes- Encrypts files on computers and demands payment to recover your files intelligence via screenshots or by Mission: Make money to finance evil plots video devices - all under the cover of an sages. encrypted channel TOP SECRE F-Secure. %24 PASSPORT

Cyber Espionage: A Digital License To Kill?

shared by FSecure on Dec 10
651 views
0 shares
0 comments
Malware attacks have been occurring for over 25 years. Now they've reached the complexity and power that would even impress Bond Villains.

Publisher

F-Secure

Category

Technology
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size