Transcript

Cyber Espionage for Modern 007s

İCYBER ESPIONAGE: A DIGITAL LICENSE TO KILL? CONFIDENTIAL BRIEFING E SECRET AGENT TOOL AGENT O07? NO. Malware attacks - be it for mobile devices or on major organizations - have been occurring for over 25 years now and the latest wave has become increasingly more complicated. ANDROIDOS. Currently, cyber enemies are commonly criminals who target individuals & businesses via the Internet for financial purposes; 'hacktivist collectives like Anonymous or LulzSec who use the web to attack organizations in protest, or even just for the 'lulz'; and increasingly, government-borne attackers who target other countries or international groups for political or defense reasons. AGENT.A Requests permissions to access But now there's the emergence of a fourth cyber enemy: contact data, SMS messages, location and Internet access Terrorists. on affected devices So if supervillains were real, money was no object, and secret agents, like James Bond, existed today, what types of malware are we likely to see used on a massive scale? Mission: Silently record all incoming and outgoing calls and of course, check for specific incoming SMS messages - SUPERVILLAIN SECRET AGENT TOOL ZeuS ANDROIDOS.AGENT.A, MEET YOUR FIELD PARTNER, A Trojan that lifts banking credentials to access AGENT.BTZ. corporate accounts Stole more than $3 million Known as the most significant breach of the U.S. military's from dozens of U.S. accounts Mission: Steal money and classified computer systems; Collects and reports data have it wired to its creator back to its creator Mission: Find way - SUPERVILLAIN into the Secret Shamoon: Internet Protocol Router Network, used by the DoD and THE PEARL HARBOR OF State Department CYBERATTACKS to transmit classified The most destructive information corporate attack to date; Overwrites boot sectors and SECRET AGENT TOOL renders computers useless to cover its ARAA NEED A WAY IN? CASE ANY JOINT WITH THE tracks Mission: Disrupt the ANDROID 3D SPYWARE wealthiest company on the planet, Saudi Arabia's state oil company, ARAMCO Developed by the U.S. military; Activates cameras on mobile devices and accesses sensor data Mission: Reconstruct a - SUPERVILLAIN - 3D virtual model of a NEVER SAY target location using the phone's camera STUXNET By launching and orientation sensors Stuxnet, American officials opened If captured, it might be turned and go rogue to Pandora's box. They will most SECRET AGENT TOOL take down a power plan or destabilize an active nuclear power plant. likely end up regretting this decision From STUXNET, - Mikko Hyppönen, With Love - SUPERVILLAIN Chief Research Officer for F-Secure Developed by the U.S. and Israeli governments; Spreads globally causing no harm until it finds and reaches its target. CREECH USB DRONE VIRUS 30 - Infected Mission: Sabotage physical EX= infrastructure. of America's Predator and Reaper drones - Logged pilots key- strokes during missions over Afghanistan and other warzones SECRET AGENT TOOL 24 - SUPERVILLAIN - TOOL FLAME ISFOREVER RANSOMCRYPT The most sophisticated malware ever created; Mission: Capture Encrypts files on computers and demands intelligence via screenshots or by payment to recover your files Infects computers and searches for intelligence Mission: Make money to finance evil plots activating audio and video devices - all contained in emails, documents, and mes- under the cover of an sages. encrypted channel OP CRET Protecting the irreplaceable | www.f-secure.com F-Secure. PASSPORT

Cyber Espionage for Modern 007s

shared by indigo_daisy85 on Nov 16
1,185 views
0 shares
0 comments
Cyber Espionage is the modern threat that can't be beaten with an exploding pen and smooth one-liner. F-Secure's latest info graphic looks at the threats a modern 007 must face. With enemies from Zeus...

Publisher

F-Secure

Source

Unknown. Add a source

Category

Computers
Did you work on this visual? Claim credit!

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size