
Breaking into someone else's digital network
Description
Recently, Eward Driehuis, who specialises in online risks for financial institutions and the retail sector, spoke at the Fraud Summit Toronto about the rise of data mining practices among cybercriminals. Relatively easily obtained Trojans such as Dyre and Dridex are used to collect data that can then map the behaviour patterns of companies and their employees. Investigators and law enforcement agencies are still in the dark as to exactly what purpose the data is collected and stored for. It is possible, for example, that the data will later be used to help cybercriminals gain undetected access to networks and evade traditional malware detection. Driehuis: "To be honest, we don't know at the moment how cybercriminals are going to use big data. We see them copying and storing many terabytes of data from infected computers, but I can think of 20 different scenarios for what they are going to do with it."
This evening will focus on the evolution of organised cybercrime.
Hackers come roughly in three flavours:
- activists,
- criminals and
- governments.
The techniques they use are mostly similar, but how sophisticated they are and the purpose they have differ. For SMEs & businesses, criminals pose the biggest threat.
In this lecture, we will go through 10 years of cybercrime at breakneck speed.
From the development of banking malware, to ransomware, crimeware-as-a-service.
From finance to enterprise and SMEs, the infection vectors, the criminals responsible for it and what the impact is for SMEs and enterprise.
Finally, there are recommendations to make it as difficult as possible for the criminals.
The lecture will be delivered by Eward Driehuis of FOX-IT
Location
Organiser
Business Administration
Name and contact details for information
ir. Lon J.M. van der Zon; Tel 0650 641 845
