Where is cybercrime really coming from Caleb Barlow

Translator: Leslie Gauthier
Reviewer: Camille Martínez

Cybercrime is out of control.

It’s everywhere.

We hear about it every single day.

This year,

over two billion records lost or stolen.

And last year, 100 million of us,
mostly Americans,

lost our health insurance data
to thieves – myself included.

What’s particularly concerning about this
is that in most cases,

it was months before anyone even
reported that these records were stolen.

So if you watch the evening news,

you would think that most of this
is espionage or nation-state activity.

And, well, some of it is.

Espionage, you see, is an accepted
international practice.

But in this case,

it is only a small portion
of the problem that we’re dealing with.

How often do we hear about a breach

followed by, “… it was the result
of a sophisticated nation-state attack?”

Well, often that is companies
not being willing to own up

to their own lackluster
security practices.

There is also a widely held belief

that by blaming an attack
on a nation-state,

you are putting regulators at bay –

at least for a period of time.

So where is all of this coming from?

The United Nations estimates
that 80 percent of it

is from highly organized
and ultrasophisticated criminal gangs.

To date,

this represents one of the largest
illegal economies in the world,

topping out at, now get this,

445 billion dollars.

Let me put that in perspective
for all of you:

445 billion dollars is larger than the GDP

of 160 nations,

including Ireland, Finland,
Denmark and Portugal,

to name a few.

So how does this work?

How do these criminals operate?

Well, let me tell you a little story.

About a year ago,

our security researchers were tracking

a somewhat ordinary but sophisticated
banking Trojan called the Dyre Wolf.

The Dyre Wolf would get on your computer

via you clicking on a link
in a phishing email

that you probably shouldn’t have.

It would then sit and wait.

It would wait until you logged
into your bank account.

And when you did,
the bad guys would reach in,

steal your credentials,

and then use that to steal your money.

This sounds terrible,

but the reality is,
in the security industry,

this form of attack
is somewhat commonplace.

However, the Dyre Wolf had
two distinctly different personalities –

one for these small transactions,

but it took on an entirely
different persona

if you were in the business of moving
large-scale wire transfers.

Here’s what would happen.

You start the process
of issuing a wire transfer,

and up in your browser would pop
a screen from your bank,

indicating that there’s a problem
with your account,

and that you need to call
the bank immediately,

along with the number
to the bank’s fraud department.

So you pick up the phone and you call.

And after going through
the normal voice prompts,

you’re met with
an English-speaking operator.

“Hello, Altoro Mutual Bank.
How can I help you?”

And you go through the process
like you do every time you call your bank,

of giving them your name
and your account number,

going through the security checks
to verify you are who you said you are.

Most of us may not know this,

but in many large-scale wire transfers,

it requires two people to sign off
on the wire transfer,

so the operator then asks you
to get the second person on the line,

and goes through the same set
of verifications and checks.

Sounds normal, right?

Only one problem:

you’re not talking to the bank.

You’re talking to the criminals.

They had built
an English-speaking help desk,

fake overlays to the banking website.

And this was so flawlessly executed

that they were moving
between a half a million

and a million and a half
dollars per attempt

into their criminal coffers.

These criminal organizations operate

like highly regimented,
legitimate businesses.

Their employees work
Monday through Friday.

They take the weekends off.

How do we know this?

We know this because
our security researchers see

repeated spikes of malware
on a Friday afternoon.

The bad guys, after a long weekend
with the wife and kids,

come back in to see how well things went.

The Dark Web is where
they spend their time.

That is a term used to describe
the anonymous underbelly of the internet,

where thieves can operate with anonymity

and without detection.

Here they peddle their attack software

and share information
on new attack techniques.

You can buy everything there,

from a base-level attack
to a much more advanced version.

In fact, in many cases, you even see

gold, silver and bronze levels of service.

You can check references.

You can even buy attacks

that come with a money-back guarantee –

(Laughter)

if you’re not successful.

Now, these environments,
these marketplaces –

they look like an Amazon or an eBay.

You see products, prices,
ratings and reviews.

Of course, if you’re going
to buy an attack,

you’re going to buy from a reputable
criminal with good ratings, right?

(Laughter)

This isn’t any different

than checking on Yelp or TripAdvisor
before going to a new restaurant.

So, here is an example.

This is an actual screenshot
of a vendor selling malware.

Notice they’re a vendor level four,

they have a trust level of six.

They’ve had 400 positive reviews
in the last year,

and only two negative reviews
in the last month.

We even see things like licensing terms.

Here’s an example of a site you can go to

if you want to change your identity.

They will sell you a fake ID,

fake passports.

But note the legally binding terms
for purchasing your fake ID.

Give me a break.

What are they going to do –
sue you if you violate them?

(Laughter)

This occurred a couple of months ago.

One of our security
researchers was looking

at a new Android malware application
that we had discovered.

It was called Bilal Bot.

In a blog post,

she positioned Bilal Bot
as a new, inexpensive and beta alternative

to the much more advanced GM Bot

that was commonplace
in the criminal underground.

This review did not sit well
with the authors of Bilal Bot.

So they wrote her this very email,

pleading their case
and making the argument

that they felt she had evaluated
an older version.

They asked her to please update
her blog with more accurate information

and even offered to do an interview

to describe to her in detail

how their attack software was now
far better than the competition.

So look,

you don’t have to like what they do,

but you do have to respect
the entrepreneurial nature

of their endeavors.

(Laughter)

So how are we going to stop this?

It’s not like we’re going to be able
to identify who’s responsible –

remember, they operate with anonymity

and outside the reach of the law.

We’re certainly not going to be able
to prosecute the offenders.

I would propose that we need
a completely new approach.

And that approach needs
to be centered on the idea

that we need to change
the economics for the bad guys.

And to give you a perspective
on how this can work,

let’s think of the response we see
to a healthcare pandemic:

SARS, Ebola, bird flu, Zika.

What is the top priority?

It’s knowing who is infected
and how the disease is spreading.

Now, governments, private institutions,
hospitals, physicians –

everyone responds openly and quickly.

This is a collective and altruistic effort

to stop the spread in its tracks

and to inform anyone not infected

how to protect or inoculate themselves.

Unfortunately, this is not at all
what we see in response to a cyber attack.

Organizations are far more likely
to keep information on that attack

to themselves.

Why?

Because they’re worried
about competitive advantage,

litigation

or regulation.

We need to effectively democratize
threat intelligence data.

We need to get all of these organizations
to open up and share

what is in their private arsenal
of information.

The bad guys are moving fast;

we’ve got to move faster.

And the best way to do that is to open up

and share data on what’s happening.

Let’s think about this in the construct
of security professionals.

Remember, they’re programmed right
into their DNA to keep secrets.

We’ve got to turn
that thinking on its head.

We’ve got to get governments,
private institutions

and security companies

willing to share information at speed.

And here’s why:

because if you share the information,

it’s equivalent to inoculation.

And if you’re not sharing,

you’re actually part of the problem,

because you’re increasing the odds
that other people could be impacted

by the same attack techniques.

But there’s an even bigger benefit.

By destroying criminals' devices
closer to real time,

we break their plans.

We inform the people they aim to hurt

far sooner than they had ever anticipated.

We ruin their reputations,

we crush their ratings and reviews.

We make cybercrime not pay.

We change the economics for the bad guys.

But to do this,
a first mover was required –

someone to change the thinking
in the security industry overall.

About a year ago,

my colleagues and I had a radical idea.

What if IBM were to take our data –

we had one of the largest threat
intelligence databases in the world –

and open it up?

It had information not just
on what had happened in the past,

but what was happening in near-real time.

What if we were to publish it all
openly on the internet?

As you can imagine,
this got quite a reaction.

First came the lawyers:

What are the legal
implications of doing that?

Then came the business:

What are the business
implications of doing that?

And this was also met with a good dose

of a lot of people just asking
if we were completely crazy.

But there was one conversation
that kept floating to the surface

in every dialogue that we would have:

the realization that if we didn’t do this,

then we were part of the problem.

So we did something unheard of
in the security industry.

We started publishing.

Over 700 terabytes of actionable
threat intelligence data,

including information on real-time attacks

that can be used to stop
cybercrime in its tracks.

And to date,

over 4,000 organizations
are leveraging this data,

including half of the Fortune 100.

And our hope as a next step
is to get all of those organizations

to join us in the fight,

and do the same thing

and share their information

on when and how
they’re being attacked as well.

We all have the opportunity to stop it,

and we already all know how.

All we have to do is look
to the response that we see

in the world of health care,

and how they respond to a pandemic.

Simply put,

we need to be open and collaborative.

Thank you.

(Applause)

译者:Leslie Gauthier
审稿人:Camille Martínez

网络犯罪失控。

它无处不在。

我们每天都听到它。

今年,

超过 20 亿条记录丢失或被盗。

去年,我们中有 1 亿人,
主要是美国人,

将我们的健康保险数据丢失
给了小偷——包括我自己。

尤其令人担忧的
是,在大多数情况下,

甚至在有人
报告这些记录被盗之前几个月。

所以如果你看晚间新闻,

你会认为其中大部分
是间谍活动或民族国家活动。

而且,其中一些是。

你看,间谍活动是一种公认的
国际惯例。

但在这种情况下,


只是我们正在处理的问题的一小部分。

我们多久听到一次违规事件,

然后是“……这
是复杂的民族国家攻击的结果?”

嗯,这通常是公司
不愿意承认

自己乏善可陈的
安全实践。

还有一种普遍的看法

是,将攻击
归咎于一个民族国家,

就是在让监管机构陷入困境——

至少在一段时间内是这样。

那么这一切是从哪里来的呢?

联合国估计
,其中 80

% 来自高度组织化
和极其复杂的犯罪团伙。

迄今为止,

这代表了世界上最大的
非法经济体之一

,目前达到

4450 亿美元。

让我
为你们所有人解释一下:

4450 亿美元比

爱尔兰、芬兰、
丹麦和葡萄牙

等 160 个国家的 GDP 还多。

那么这是如何工作的呢?

这些犯罪分子是如何运作的?

好吧,让我告诉你一个小故事。

大约一年前,

我们的安全研究人员正在追踪

一种
名为 Dyre Wolf 的普通但复杂的银行木马。

Dyre Wolf 会

通过您单击
网络钓鱼电子邮件

中您可能不应该拥有的链接进入您的计算机。

然后它会坐下来等待。

它会等到您
登录您的银行帐户。

当你这样做时
,坏人会介入,

窃取你的凭据,

然后用它来窃取你的钱。

这听起来很可怕,

但现实情况是,
在安全行业,

这种形式的
攻击有些普遍。

然而,Dyre Wolf 有
两种截然不同的性格——

一种是针对这些小额交易的,

但如果你从事的是大规模电汇业务,它就会表现出完全
不同的性格

这就是会发生的事情。

您开始
发出电汇的过程

,在您的浏览器中会
从您的银行弹出一个屏幕,

表明
您的帐户有问题

,您需要
立即致电银行,

以及
银行欺诈的号码 部。

所以你拿起电话,你打电话。


通过正常的语音提示后,

您会遇到
一位说英语的接线员。

“您好,Altoro Mutual Bank。有
什么可以帮助您的吗?”

你会像每次打电话给银行一样经历这个过程

,给他们你的名字
和账号

,通过安全检查
来验证你就是你所说的那个人。

这个大家可能不知道,

但是很多大型的电汇,电汇

都是需要两个人签收
的,

所以接线员就让你
找第二个人接线

,走同一套
的验证和检查。

听起来很正常,对吧?

只有一个问题:

你不是在和银行说话。

你在和罪犯说话。

他们建立
了一个说英语的服务台,

伪造的银行网站覆盖。

而且执行得如此完美

,以至于他们每次尝试都会将
一百万

到一百万半
美元

转移到他们的刑事金库中。

这些犯罪组织

像高度管制的
合法企业一样运作。

他们的员工
周一至周五工作。

他们周末休息。

我们怎么知道呢?

我们之所以知道这一点,是因为
我们的安全研究人员在周五下午看到

恶意软件反复出现高峰

坏人在
与妻子和孩子度过了一个长周末后,

回来看看事情进展得如何。

暗网是
他们消磨时间的地方。

这是一个用来
描述互联网匿名底层的术语

,窃贼可以匿名进行操作

而不会被发现。

他们在这里兜售他们的攻击软件

并分享
有关新攻击技术的信息。

你可以在那里购买所有东西,

从基础级别的攻击
到更高级的版本。

事实上,在许多情况下,您甚至可以看到

金、银和铜的服务级别。

您可以查看参考资料。

你甚至可以购买

带有退款保证的攻击——

(笑声)

如果你没有成功的话。

现在,这些环境,
这些市场——

它们看起来像亚马逊或 eBay。

您会看到产品、价格、
评级和评论。

当然,如果你
要购买攻击,

你会从信誉
良好、收视率高的罪犯那里购买,对吗?

(笑声)

这与去新餐厅之前

查看 Yelp 或 TripAdvisor 没有任何不同

所以,这里有一个例子。

这是
销售恶意软件的供应商的实际屏幕截图。

请注意,他们是供应商级别四,

信任级别为六。 去年

他们有 400 条正面
评价,而上个月

只有两条负面
评价。

我们甚至会看到诸如许可条款之类的东西。

如果您想更改身份,可以访问以下网站示例

他们会卖给你假身份证,

假护照。

但请注意购买假身份证的具有法律约束力的条款

让我休息一下。

他们会怎么做——
如果你违反了他们就起诉你?

(笑声)

这发生在几个月前。

我们的一位安全
研究人员正在研究我们发现

的一个新的 Android 恶意软件应用
程序。

它被称为 Bilal Bot。

在一篇博文中,

她将 Bilal Bot 定位
为一种新的、廉价的和 beta 替代品,

可以替代在地下犯罪活动中司空见惯的更先进的 GM Bot

这篇评论
与 Bilal Bot 的作者并不相符。

所以他们给她写了这封电子邮件,为

他们辩护,

提出他们认为她评估
过旧版本的论点。

他们要求她更新
她的博客,提供更准确的信息

,甚至提出接受采访

,向她详细

描述他们的攻击软件现在如何
比竞争对手好得多。

所以看,

你不必喜欢他们的所作所为,

但你必须尊重

他们努力的创业本质。

(笑声)

那么我们要如何阻止这种情况呢?

这不像我们将
能够确定谁是负责任的——

请记住,他们以匿名方式运作,

并且超出了法律的范围。

我们当然
无法起诉违法者。

我建议我们需要
一种全新的方法。

这种方法
需要集中在

我们需要
为坏人改变经济的想法上。

为了让您
了解它是如何发挥作用的,

让我们想想我们
对医疗大流行的反应:

SARS、埃博拉病毒、禽流感、寨卡病毒。

什么是首要任务?

它知道谁被感染
以及疾病是如何传播的。

现在,政府、私人机构、
医院、医生——

每个人都公开迅速地做出反应。

这是一项集体和无私的努力,

旨在阻止其传播,

并告知任何未感染的人

如何保护或接种自己。

不幸的是,这根本不是
我们在应对网络攻击时看到的。

组织更有
可能将有关该攻击的信息保留

给自己。

为什么?

因为他们
担心竞争优势、

诉讼

或监管。

我们需要有效地普及
威胁情报数据。

我们需要让所有这些
组织开放并分享

他们私人信息库中
的内容。

坏人行动迅速;

我们必须加快步伐。

做到这一点的最好方法是开放

和分享正在发生的事情的数据。

让我们在安全专业人员的构建中考虑这一点

请记住,它们被直接
编入 DNA 以保守秘密。

我们必须改变
这种想法。

我们必须让愿意快速共享信息的政府、
私人机构

和安全公司

原因如下:

因为如果你分享信息,

就相当于接种疫苗。

如果你不分享,

你实际上是问题的一部分,

因为你增加
了其他人可能

受到相同攻击技术影响的几率。

但还有一个更大的好处。

通过
更接近实时地摧毁犯罪分子的设备,

我们打破了他们的计划。

我们

比他们预期的要早得多地通知人们他们打算伤害的人。

我们破坏了他们的声誉,

我们粉碎了他们的收视率和评论。

我们让网络犯罪不付钱。

我们改变了坏人的经济学。

但要做到这一点,
需要一个先行者——

有人来改变
整个安全行业的思维。

大约一年前,

我和我的同事有了一个激进的想法。

如果 IBM 获取我们的数据——

我们拥有世界上最大的威胁
情报数据库之一——

并开放它会怎样?

它不仅有
关于过去发生的事情的信息,

而且还有近乎实时的信息。

如果我们要
在互联网上公开发布它会怎样?

可以想象,
这引起了相当大的反响。

首先是律师:

这样做的法律含义是什么?

然后是业务:

这样做对业务有什么影响?

这也

遇到了很多人只是
问我们是否完全疯了。

但是

在我们将进行的每一次对话中,都有一个对话不断浮出水面

:意识到如果我们不这样做,

那么我们就是问题的一部分。

所以我们做了一些
在安全行业闻所未闻的事情。

我们开始出版。

超过 700 TB 的可操作
威胁情报数据,

包括可用于阻止
网络犯罪的实时攻击信息。

迄今为止,

超过 4,000 家组织
正在利用这些数据,

其中包括一半的财富 100 强企业。

我们希望下一步
是让所有这些组织

加入我们的战斗

,做同样的事情

并分享他们的

信息 他们何时以及如何
受到攻击。

我们都有机会阻止它,

而且我们都知道如何阻止它。

我们所要做的就是关注
我们

在医疗保健领域看到的反应,

以及他们如何应对流行病。

简而言之,

我们需要开放和协作。

谢谢你。

(掌声)