
Cyber Espionage for Modern 007s
İCYBER ESPIONAGE: A DIGITAL LICENSE TO KILL? CONFIDENTIAL BRIEFING E SECRET AGENT TOOL AGENT O07? NO. Malware attacks - be it for mobile devices or on major organizations - have been occurring for over 25 years now and the latest wave has become increasingly more complicated. ANDROIDOS. Currently, cyber enemies are commonly criminals who target individuals & businesses via the Internet for financial purposes; 'hacktivist collectives like Anonymous or LulzSec who use the web to attack organizations in protest, or even just for the 'lulz'; and increasingly, government-borne attackers who target other countries or international groups for political or defense reasons. AGENT.A Requests permissions to access But now there's the emergence of a fourth cyber enemy: contact data, SMS messages, location and Internet access Terrorists. on affected devices So if supervillains were real, money was no object, and secret agents, like James Bond, existed today, what types of malware are we likely to see used on a massive scale? Mission: Silently record all incoming and outgoing calls and of course, check for specific incoming SMS messages - SUPERVILLAIN SECRET AGENT TOOL ZeuS ANDROIDOS.AGENT.A, MEET YOUR FIELD PARTNER, A Trojan that lifts banking credentials to access AGENT.BTZ. corporate accounts Stole more than $3 million Known as the most significant breach of the U.S. military's from dozens of U.S. accounts Mission: Steal money and classified computer systems; Collects and reports data have it wired to its creator back to its creator Mission: Find way - SUPERVILLAIN into the Secret Shamoon: Internet Protocol Router Network, used by the DoD and THE PEARL HARBOR OF State Department CYBERATTACKS to transmit classified The most destructive information corporate attack to date; Overwrites boot sectors and SECRET AGENT TOOL renders computers useless to cover its ARAA NEED A WAY IN? CASE ANY JOINT WITH THE tracks Mission: Disrupt the ANDROID 3D SPYWARE wealthiest company on the planet, Saudi Arabia's state oil company, ARAMCO Developed by the U.S. military; Activates cameras on mobile devices and accesses sensor data Mission: Reconstruct a - SUPERVILLAIN - 3D virtual model of a NEVER SAY target location using the phone's camera STUXNET By launching and orientation sensors Stuxnet, American officials opened If captured, it might be turned and go rogue to Pandora's box. They will most SECRET AGENT TOOL take down a power plan or destabilize an active nuclear power plant. likely end up regretting this decision From STUXNET, - Mikko Hyppönen, With Love - SUPERVILLAIN Chief Research Officer for F-Secure Developed by the U.S. and Israeli governments; Spreads globally causing no harm until it finds and reaches its target. CREECH USB DRONE VIRUS 30 - Infected Mission: Sabotage physical EX= infrastructure. of America's Predator and Reaper drones - Logged pilots key- strokes during missions over Afghanistan and other warzones SECRET AGENT TOOL 24 - SUPERVILLAIN - TOOL FLAME ISFOREVER RANSOMCRYPT The most sophisticated malware ever created; Mission: Capture Encrypts files on computers and demands intelligence via screenshots or by payment to recover your files Infects computers and searches for intelligence Mission: Make money to finance evil plots activating audio and video devices - all contained in emails, documents, and mes- under the cover of an sages. encrypted channel OP CRET Protecting the irreplaceable | www.f-secure.com F-Secure. PASSPORT
Cyber Espionage for Modern 007s
Publisher
F-SecureSource
Unknown. Add a sourceCategory
ComputersGet a Quote