SlideShare uma empresa Scribd logo
1 de 9
Web2.0 Spammer @ World:
      Follow me on Twitter!!!



Alexandru Cătălin Coşoi
Senior Researcher / AntiSpam Laboratory
BitDefender
Twitter Spam
Blog Spam
Social Networks Spam
Phishing in Romania (2007-2009)


• 2007 – 7 attacks
• 2008 – 26 attacks (50% targeting the same institution)
• 2009 – 187 attacks already (98% targeting the same
  institution)
• 2009 – 1’st ½ … anyone want to make a prediction?



Don’t be fooled by randomness!
Now… why would anyone start
phishing?

   – With the current market turmoil, what's the
     easiest way to make a small fortune?
   – Start off with a large one!

• Quote of the day (from a trader): quot;This is worse than a
  divorce. I've lost half my net worth and I still have a wife
• This market stinks so bad…that even Chuck Norris can’t
  make any money.
Well… I bet not anybody can phish!
Really… it must be more than this!!!

1.    Open the yellow pages and pick someone
2.    Search his name using a social media search-engine
3.    If any SN profile found
     1.   Download images, posts, comments, friend
     2.   Create a phishing attack customized for this exact person.
     3.   Continue with his friends


4. Complicated? Too much work? Dial 1-800 BOTNET for an army
    of computers to do this for you

PS: (success comes when the victim has profiles on more than
    one social network)
Questions?

Mais conteúdo relacionado

Semelhante a Conferinta Securitate Web 2.0

Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated Communicationcmc
Ray Brannon
 
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraud
Ray Brannon
 
workers participation in management
workers participation in managementworkers participation in management
workers participation in management
lily004
 
Week 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threatsWeek 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threats
Ray Brannon
 

Semelhante a Conferinta Securitate Web 2.0 (9)

Andrew Auernheimer - Hacktivism for profit and glory
Andrew Auernheimer - Hacktivism for profit and gloryAndrew Auernheimer - Hacktivism for profit and glory
Andrew Auernheimer - Hacktivism for profit and glory
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated Communicationcmc
 
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraud
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
DevNexus 2016: Wait! Wait! Don't pwn me!
DevNexus 2016: Wait! Wait! Don't pwn me!DevNexus 2016: Wait! Wait! Don't pwn me!
DevNexus 2016: Wait! Wait! Don't pwn me!
 
workers participation in management
workers participation in managementworkers participation in management
workers participation in management
 
SEO2India - Cyber crime
SEO2India - Cyber crimeSEO2India - Cyber crime
SEO2India - Cyber crime
 
Week 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threatsWeek 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threats
 
Port 80 - it's all they need
Port 80 - it's all they needPort 80 - it's all they need
Port 80 - it's all they need
 

Mais de Bitdefender

E-Threat Landscape Report H1 2012
E-Threat Landscape Report H1 2012E-Threat Landscape Report H1 2012
E-Threat Landscape Report H1 2012
Bitdefender
 
H1 2011 E-Threat Landscape Report
H1 2011 E-Threat Landscape ReportH1 2011 E-Threat Landscape Report
H1 2011 E-Threat Landscape Report
Bitdefender
 
Suita 2010 de solutii BitDefender
Suita 2010 de solutii BitDefenderSuita 2010 de solutii BitDefender
Suita 2010 de solutii BitDefender
Bitdefender
 
H1 2009 Malware And Spam Review1
H1 2009 Malware And Spam Review1H1 2009 Malware And Spam Review1
H1 2009 Malware And Spam Review1
Bitdefender
 
Gama De Produse BitDefender 2009
Gama De Produse BitDefender 2009Gama De Produse BitDefender 2009
Gama De Produse BitDefender 2009
Bitdefender
 
Do Humans Beat Computers At Pattern Recognition
Do Humans Beat Computers At Pattern RecognitionDo Humans Beat Computers At Pattern Recognition
Do Humans Beat Computers At Pattern Recognition
Bitdefender
 

Mais de Bitdefender (7)

E-Threat Landscape Report H1 2012
E-Threat Landscape Report H1 2012E-Threat Landscape Report H1 2012
E-Threat Landscape Report H1 2012
 
H1 2011 E-Threat Landscape Report
H1 2011 E-Threat Landscape ReportH1 2011 E-Threat Landscape Report
H1 2011 E-Threat Landscape Report
 
Suita 2010 de solutii BitDefender
Suita 2010 de solutii BitDefenderSuita 2010 de solutii BitDefender
Suita 2010 de solutii BitDefender
 
H1 2009 Malware And Spam Review1
H1 2009 Malware And Spam Review1H1 2009 Malware And Spam Review1
H1 2009 Malware And Spam Review1
 
Gama De Produse BitDefender 2009
Gama De Produse BitDefender 2009Gama De Produse BitDefender 2009
Gama De Produse BitDefender 2009
 
Spam Clustering
Spam ClusteringSpam Clustering
Spam Clustering
 
Do Humans Beat Computers At Pattern Recognition
Do Humans Beat Computers At Pattern RecognitionDo Humans Beat Computers At Pattern Recognition
Do Humans Beat Computers At Pattern Recognition
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Conferinta Securitate Web 2.0

  • 1. Web2.0 Spammer @ World: Follow me on Twitter!!! Alexandru Cătălin Coşoi Senior Researcher / AntiSpam Laboratory BitDefender
  • 5. Phishing in Romania (2007-2009) • 2007 – 7 attacks • 2008 – 26 attacks (50% targeting the same institution) • 2009 – 187 attacks already (98% targeting the same institution) • 2009 – 1’st ½ … anyone want to make a prediction? Don’t be fooled by randomness!
  • 6. Now… why would anyone start phishing? – With the current market turmoil, what's the easiest way to make a small fortune? – Start off with a large one! • Quote of the day (from a trader): quot;This is worse than a divorce. I've lost half my net worth and I still have a wife • This market stinks so bad…that even Chuck Norris can’t make any money.
  • 7. Well… I bet not anybody can phish!
  • 8. Really… it must be more than this!!! 1. Open the yellow pages and pick someone 2. Search his name using a social media search-engine 3. If any SN profile found 1. Download images, posts, comments, friend 2. Create a phishing attack customized for this exact person. 3. Continue with his friends 4. Complicated? Too much work? Dial 1-800 BOTNET for an army of computers to do this for you PS: (success comes when the victim has profiles on more than one social network)

Notas do Editor

  1. Web 2.0 is all about social networks. It’s all about user interaction, simplicity and usability. Content is submitted, reviewed and downloaded by users only. For many, this can be considered the definition of freedom, but where few laws apply, many bad things can happen.<number>
  2. Twitter Spam – Still in a incipient form<number>
  3. Henry stern – no education – couldn’t get a job<number>