Everyday cybercrime -- and what you can do about it
-
0:01 - 0:02I'm going to be showing some of the cybercriminals'
-
0:02 - 0:05latest and nastiest creations.
-
0:05 - 0:08So basically, please don't go and download
-
0:08 - 0:10any of the viruses that I show you.
-
0:10 - 0:13Some of you might be wondering what a cybersecurity specialist looks like,
-
0:13 - 0:16and I thought I'd give you a quick insight
-
0:16 - 0:18into my career so far.
-
0:18 - 0:21It's a pretty accurate description.
-
0:21 - 0:22This is what someone that specializes
-
0:22 - 0:25in malware and hacking looks like.
-
0:25 - 0:28So today, computer viruses and trojans,
-
0:28 - 0:31designed to do everything from stealing data
-
0:31 - 0:33to watching you in your webcam
-
0:33 - 0:36to the theft of billions of dollars.
-
0:36 - 0:38Some malicious code today goes as far
-
0:38 - 0:42as targeting power, utilities and infrastructure.
-
0:42 - 0:44Let me give you a quick snapshot
-
0:44 - 0:47of what malicious code is capable of today.
-
0:47 - 0:50Right now, every second, eight new users
-
0:50 - 0:52are joining the Internet.
-
0:52 - 0:59Today, we will see 250,000 individual new computer viruses.
-
0:59 - 1:05We will see 30,000 new infected websites.
-
1:05 - 1:07And, just to kind of tear down a myth here,
-
1:07 - 1:10lots of people think that when you get infected
-
1:10 - 1:13with a computer virus, it's because you went to a porn site.
-
1:13 - 1:16Right? Well, actually, statistically speaking,
-
1:16 - 1:19if you only visit porn sites, you're safer.
-
1:19 - 1:22People normally write that down, by the way. (Laughter)
-
1:22 - 1:23Actually, about 80 percent of these
-
1:23 - 1:27are small business websites getting infected.
-
1:27 - 1:29Today's cybercriminal, what do they look like?
-
1:29 - 1:32Well, many of you have the image, don't you,
-
1:32 - 1:34of the spotty teenager sitting in a basement,
-
1:34 - 1:36hacking away for notoriety.
-
1:36 - 1:38But actually today, cybercriminals
-
1:38 - 1:41are wonderfully professional and organized.
-
1:41 - 1:44In fact, they have product adverts.
-
1:44 - 1:46You can go online and buy a hacking service
-
1:46 - 1:48to knock your business competitor offline.
-
1:48 - 1:50Check out this one I found.
-
1:50 - 1:52(Video) Man: So you're here for one reason,
-
1:52 - 1:53and that reason is
-
1:53 - 1:55because you need your business competitors,
-
1:55 - 1:59rivals, haters, or whatever the reason is, or who,
-
1:59 - 2:01they are to go down.
-
2:01 - 2:04Well you, my friend, you've came to the right place.
-
2:04 - 2:06If you want your business competitors to go down,
-
2:06 - 2:07well, they can.
-
2:07 - 2:11If you want your rivals to go offline, well, they will.
-
2:11 - 2:14Not only that, we are providing a short-term-to-long-term
-
2:14 - 2:16DDOS service or scheduled attack,
-
2:16 - 2:20starting five dollars per hour for small personal websites
-
2:20 - 2:23to 10 to 50 dollars per hour.
-
2:23 - 2:24James Lyne: Now, I did actually pay
-
2:24 - 2:27one of these cybercriminals to attack my own website.
-
2:27 - 2:30Things got a bit tricky when I tried to expense it at the company.
-
2:30 - 2:32Turns out that's not cool.
-
2:32 - 2:35But regardless, it's amazing how many products
-
2:35 - 2:38and services are available now to cybercriminals.
-
2:38 - 2:41For example, this testing platform,
-
2:41 - 2:42which enables the cybercriminals
-
2:42 - 2:45to test the quality of their viruses
-
2:45 - 2:47before they release them on the world.
-
2:47 - 2:49For a small fee, they can upload it
-
2:49 - 2:51and make sure everything is good.
-
2:51 - 2:53But it goes further.
-
2:53 - 2:55Cybercriminals now have crime packs
-
2:55 - 2:58with business intelligence reporting dashboards
-
2:58 - 3:01to manage the distribution of their malicious code.
-
3:01 - 3:05This is the market leader in malware distribution,
-
3:05 - 3:07the Black Hole Exploit Pack,
-
3:07 - 3:10responsible for nearly one third of malware distribution
-
3:10 - 3:12in the last couple of quarters.
-
3:12 - 3:15It comes with technical installation guides,
-
3:15 - 3:16video setup routines,
-
3:16 - 3:20and get this, technical support.
-
3:20 - 3:23You can email the cybercriminals and they'll tell you
-
3:23 - 3:26how to set up your illegal hacking server.
-
3:26 - 3:30So let me show you what malicious code looks like today.
-
3:30 - 3:33What I've got here is two systems,
-
3:33 - 3:36an attacker, which I've made look all Matrix-y and scary,
-
3:36 - 3:40and a victim, which you might recognize from home or work.
-
3:40 - 3:43Now normally, these would be on different sides
-
3:43 - 3:45of the planet or of the Internet,
-
3:45 - 3:46but I've put them side by side
-
3:46 - 3:49because it makes things much more interesting.
-
3:49 - 3:51Now, there are many ways you can get infected.
-
3:51 - 3:54You will have come in contact with some of them.
-
3:54 - 3:56Maybe some of you have received an email
-
3:56 - 4:00that says something like, "Hi, I'm a Nigerian banker,
-
4:00 - 4:03and I'd like to give you 53 billion dollars
-
4:03 - 4:05because I like your face."
-
4:05 - 4:09Or funnycats.exe, which rumor has it
-
4:09 - 4:12was quite successful in China's recent campaign against America.
-
4:12 - 4:15Now there are many ways you can get infected.
-
4:15 - 4:17I want to show you a couple of my favorites.
-
4:17 - 4:19This is a little USB key.
-
4:19 - 4:22Now how do you get a USB key to run in a business?
-
4:22 - 4:26Well, you could try looking really cute.
-
4:26 - 4:28Awww.
-
4:28 - 4:30Or, in my case, awkward and pathetic.
-
4:30 - 4:34So imagine this scenario: I walk into one of your businesses,
-
4:34 - 4:37looking very awkward and pathetic, with a copy of my C.V.
-
4:37 - 4:39which I've covered in coffee,
-
4:39 - 4:42and I ask the receptionist to plug in this USB key
-
4:42 - 4:44and print me a new one.
-
4:44 - 4:47So let's have a look here on my victim computer.
-
4:47 - 4:51What I'm going to do is plug in the USB key.
-
4:51 - 4:52After a couple of seconds,
-
4:52 - 4:55things start to happen on the computer on their own,
-
4:55 - 4:57usually a bad sign.
-
4:57 - 4:59This would, of course, normally happen
-
4:59 - 5:01in a couple of seconds, really, really quickly,
-
5:01 - 5:03but I've kind of slowed it down
-
5:03 - 5:06so you can actually see the attack occurring.
-
5:06 - 5:08Malware is very boring otherwise.
-
5:08 - 5:11So this is writing out the malicious code,
-
5:11 - 5:15and a few seconds later, on the left-hand side,
-
5:15 - 5:19you'll see the attacker's screen get some interesting new text.
-
5:19 - 5:21Now if I place the mouse cursor over it,
-
5:21 - 5:23this is what we call a command prompt,
-
5:23 - 5:27and using this we can navigate around the computer.
-
5:27 - 5:29We can access your documents, your data.
-
5:29 - 5:31You can turn on the webcam.
-
5:31 - 5:32That can be very embarrassing.
-
5:32 - 5:34Or just to really prove a point,
-
5:34 - 5:37we can launch programs like my personal favorite,
-
5:37 - 5:40the Windows Calculator.
-
5:40 - 5:42So isn't it amazing how much control
-
5:42 - 5:45the attackers can get with such a simple operation?
-
5:45 - 5:47Let me show you how most malware
-
5:47 - 5:49is now distributed today.
-
5:49 - 5:52What I'm going to do is open up a website
-
5:52 - 5:53that I wrote.
-
5:53 - 5:57It's a terrible website. It's got really awful graphics.
-
5:57 - 6:00And it's got a comments section here
-
6:00 - 6:03where we can submit comments to the website.
-
6:03 - 6:06Many of you will have used something a bit like this before.
-
6:06 - 6:08Unfortunately, when this was implemented,
-
6:08 - 6:11the developer was slightly inebriated
-
6:11 - 6:12and managed to forget
-
6:12 - 6:15all of the secure coding practices he had learned.
-
6:15 - 6:18So let's imagine that our attacker,
-
6:18 - 6:21called Evil Hacker just for comedy value,
-
6:21 - 6:23inserts something a little nasty.
-
6:23 - 6:25This is a script.
-
6:25 - 6:29It's code which will be interpreted on the webpage.
-
6:29 - 6:32So I'm going to submit this post,
-
6:32 - 6:34and then, on my victim computer,
-
6:34 - 6:36I'm going to open up the web browser
-
6:36 - 6:38and browse to my website,
-
6:38 - 6:42www.incrediblyhacked.com.
-
6:42 - 6:44Notice that after a couple of seconds,
-
6:44 - 6:46I get redirected.
-
6:46 - 6:48That website address at the top there,
-
6:48 - 6:51which you can just about see, microshaft.com,
-
6:51 - 6:54the browser crashes as it hits one of these exploit packs,
-
6:54 - 6:58and up pops fake antivirus.
-
6:58 - 7:03This is a virus pretending to look like antivirus software,
-
7:03 - 7:06and it will go through and it will scan the system,
-
7:06 - 7:07have a look at what its popping up here.
-
7:07 - 7:09It creates some very serious alerts.
-
7:09 - 7:11Oh look, a child porn proxy server.
-
7:11 - 7:14We really should clean that up.
-
7:14 - 7:15What's really insulting about this is
-
7:15 - 7:19not only does it provide the attackers with access to your data,
-
7:19 - 7:22but when the scan finishes, they tell you
-
7:22 - 7:25in order to clean up the fake viruses,
-
7:25 - 7:28you have to register the product.
-
7:28 - 7:31Now I liked it better when viruses were free.
-
7:31 - 7:34(Laughter)
-
7:34 - 7:37People now pay cybercriminals money
-
7:37 - 7:39to run viruses,
-
7:39 - 7:42which I find utterly bizarre.
-
7:42 - 7:45So anyway, let me change pace a little bit.
-
7:45 - 7:49Chasing 250,000 pieces of malware a day
-
7:49 - 7:50is a massive challenge,
-
7:50 - 7:52and those numbers are only growing
-
7:52 - 7:56directly in proportion to the length of my stress line, you'll note here.
-
7:56 - 7:58So I want to talk to you briefly
-
7:58 - 8:01about a group of hackers we tracked for a year
-
8:01 - 8:03and actually found --
-
8:03 - 8:06and this is a rare treat in our job.
-
8:06 - 8:08Now this was a cross-industry collaboration,
-
8:08 - 8:11people from Facebook, independent researchers,
-
8:11 - 8:13guys from Sophos.
-
8:13 - 8:15So here we have a couple of documents
-
8:15 - 8:18which our cybercriminals had uploaded
-
8:18 - 8:22to a cloud service, kind of like Dropbox or SkyDrive,
-
8:22 - 8:25like many of you might use.
-
8:25 - 8:28At the top, you'll notice a section of source code.
-
8:28 - 8:31What this would do is send the cybercriminals
-
8:31 - 8:36a text message every day telling them how much money
-
8:36 - 8:38they'd made that day,
-
8:38 - 8:41so a kind of cybercriminal billings report, if you will.
-
8:41 - 8:44If you look closely, you'll notice a series
-
8:44 - 8:47of what are Russian telephone numbers.
-
8:47 - 8:48Now that's obviously interesting,
-
8:48 - 8:52because that gives us a way of finding our cybercriminals.
-
8:52 - 8:54Down below, highlighted in red,
-
8:54 - 8:55in the other section of source code,
-
8:55 - 8:58is this bit "leded:leded."
-
8:58 - 8:59That's a username,
-
8:59 - 9:02kind of like you might have on Twitter.
-
9:02 - 9:04So let's take this a little further.
-
9:04 - 9:06There are a few other interesting pieces
-
9:06 - 9:08the cybercriminals had uploaded.
-
9:08 - 9:11Lots of you here will use smartphones
-
9:11 - 9:13to take photos and post them from the conference.
-
9:13 - 9:16An interesting feature of lots of modern smartphones
-
9:16 - 9:18is that when you take a photo,
-
9:18 - 9:22it embeds GPS data about where that photo was taken.
-
9:22 - 9:24In fact, I've been spending a lot of time
-
9:24 - 9:27on Internet dating sites recently,
-
9:27 - 9:29obviously for research purposes,
-
9:29 - 9:33and I've noticed that about 60 percent
-
9:33 - 9:35of the profile pictures on Internet dating sites
-
9:35 - 9:40contain the GPS coordinates of where the photo was taken,
-
9:40 - 9:41which is kind of scary
-
9:41 - 9:44because you wouldn't give out your home address
-
9:44 - 9:45to lots of strangers,
-
9:45 - 9:47but we're happy to give away our GPS coordinates
-
9:47 - 9:51to plus or minus 15 meters.
-
9:51 - 9:54And our cybercriminals had done the same thing.
-
9:54 - 9:57So here's a photo which resolves to St. Petersburg.
-
9:57 - 10:01We then deploy the incredibly advanced hacking tool.
-
10:01 - 10:04We used Google.
-
10:04 - 10:06Using the email address, the telephone number
-
10:06 - 10:09and the GPS data, on the left you see an advert
-
10:09 - 10:13for a BMW that one of our cybercriminals is selling,
-
10:13 - 10:18on the other side an advert for the sale of sphynx kittens.
-
10:18 - 10:21One of these was more stereotypical for me.
-
10:21 - 10:25A little more searching, and here's our cybercriminal.
-
10:25 - 10:29Imagine, these are hardened cybercriminals
-
10:29 - 10:31sharing information scarcely.
-
10:31 - 10:32Imagine what you could find
-
10:32 - 10:34about each of the people in this room.
-
10:34 - 10:35A bit more searching through the profile
-
10:35 - 10:37and there's a photo of their office.
-
10:37 - 10:39They were working on the third floor.
-
10:39 - 10:42And you can also see some photos
-
10:42 - 10:43from his business companion
-
10:43 - 10:48where he has a taste in a certain kind of image.
-
10:48 - 10:52It turns out he's a member of the Russian Adult Webmasters Federation.
-
10:52 - 10:55But this is where our investigation starts to slow down.
-
10:55 - 10:59The cybercriminals have locked down their profiles quite well.
-
10:59 - 11:01And herein is the greatest lesson
-
11:01 - 11:05of social media and mobile devices for all of us right now.
-
11:05 - 11:09Our friends, our families and our colleagues
-
11:09 - 11:14can break our security even when we do the right things.
-
11:14 - 11:16This is MobSoft, one of the companies
-
11:16 - 11:19that this cybercriminal gang owned,
-
11:19 - 11:20and an interesting thing about MobSoft
-
11:20 - 11:23is the 50-percent owner of this
-
11:23 - 11:25posted a job advert,
-
11:25 - 11:28and this job advert matched one of the telephone numbers
-
11:28 - 11:30from the code earlier.
-
11:30 - 11:33This woman was Maria,
-
11:33 - 11:35and Maria is the wife of one of our cybercriminals.
-
11:35 - 11:39And it's kind of like she went into her social media settings
-
11:39 - 11:42and clicked on every option imaginable
-
11:42 - 11:45to make herself really, really insecure.
-
11:45 - 11:47By the end of the investigation,
-
11:47 - 11:51where you can read the full 27-page report at that link,
-
11:51 - 11:53we had photos of the cybercriminals,
-
11:53 - 11:56even the office Christmas party
-
11:56 - 11:57when they were out on an outing.
-
11:57 - 12:01That's right, cybercriminals do have Christmas parties,
-
12:01 - 12:02as it turns out.
-
12:02 - 12:04Now you're probably wondering what happened to these guys.
-
12:04 - 12:07Let me come back to that in just a minute.
-
12:07 - 12:10I want to change pace to one last little demonstration,
-
12:10 - 12:14a technique that is wonderfully simple and basic,
-
12:14 - 12:17but is interesting in exposing how much information
-
12:17 - 12:19we're all giving away,
-
12:19 - 12:23and it's relevant because it applies to us as a TED audience.
-
12:23 - 12:26This is normally when people start kind of shuffling in their pockets
-
12:26 - 12:30trying to turn their phones onto airplane mode desperately.
-
12:30 - 12:32Many of you all know about the concept
-
12:32 - 12:34of scanning for wireless networks.
-
12:34 - 12:37You do it every time you take out your iPhone or your Blackberry
-
12:37 - 12:41and connect to something like TEDAttendees.
-
12:41 - 12:43But what you might not know
-
12:43 - 12:48is that you're also beaming out a list of networks
-
12:48 - 12:50you've previously connected to,
-
12:50 - 12:54even when you're not using wireless actively.
-
12:54 - 12:56So I ran a little scan.
-
12:56 - 12:59I was relatively inhibited compared to the cybercriminals,
-
12:59 - 13:02who wouldn't be so concerned by law,
-
13:02 - 13:04and here you can see my mobile device.
-
13:04 - 13:07Okay? So you can see a list of wireless networks.
-
13:07 - 13:11TEDAttendees, HyattLB. Where do you think I'm staying?
-
13:11 - 13:15My home network, PrettyFlyForAWifi,
-
13:15 - 13:17which I think is a great name.
-
13:17 - 13:20Sophos_Visitors, SANSEMEA, companies I work with.
-
13:20 - 13:23Loganwifi, that's in Boston. HiltonLondon.
-
13:23 - 13:25CIASurveillanceVan.
-
13:25 - 13:27We called it that at one of our conferences
-
13:27 - 13:29because we thought that would freak people out,
-
13:29 - 13:31which is quite fun.
-
13:31 - 13:35This is how geeks party.
-
13:35 - 13:37So let's make this a little bit more interesting.
-
13:37 - 13:40Let's talk about you.
-
13:40 - 13:42Twenty-three percent of you have been to Starbucks
-
13:42 - 13:45recently and used the wireless network.
-
13:45 - 13:46Things get more interesting.
-
13:46 - 13:49Forty-six percent of you I could link to a business,
-
13:49 - 13:52XYZ Employee network.
-
13:52 - 13:56This isn't an exact science, but it gets pretty accurate.
-
13:56 - 14:00Seven hundred and sixty-one of you I could identify a hotel you'd been to recently,
-
14:00 - 14:04absolutely with pinpoint precision somewhere on the globe.
-
14:04 - 14:08Two hundred and thirty-four of you, well, I know where you live.
-
14:08 - 14:10Your wireless network name is so unique
-
14:10 - 14:12that I was able to pinpoint it
-
14:12 - 14:15using data available openly on the Internet
-
14:15 - 14:19with no hacking or clever, clever tricks.
-
14:19 - 14:21And I should mention as well that
-
14:21 - 14:22some of you do use your names,
-
14:22 - 14:25"James Lyne's iPhone," for example.
-
14:25 - 14:29And two percent of you have a tendency to extreme profanity.
-
14:29 - 14:31So something for you to think about:
-
14:31 - 14:35As we adopt these new applications and mobile devices,
-
14:35 - 14:37as we play with these shiny new toys,
-
14:37 - 14:41how much are we trading off convenience
-
14:41 - 14:44for privacy and security?
-
14:44 - 14:46Next time you install something,
-
14:46 - 14:49look at the settings and ask yourself,
-
14:49 - 14:52"Is this information that I want to share?
-
14:52 - 14:55Would someone be able to abuse it?"
-
14:55 - 14:57We also need to think very carefully
-
14:57 - 15:01about how we develop our future talent pool.
-
15:01 - 15:04You see, technology's changing at a staggering rate,
-
15:04 - 15:07and that 250,000 pieces of malware
-
15:07 - 15:10won't stay the same for long.
-
15:10 - 15:12There's a very concerning trend
-
15:12 - 15:16that whilst many people coming out of schools now
-
15:16 - 15:20are much more technology-savvy, they know how to use technology,
-
15:20 - 15:24fewer and fewer people are following the feeder subjects
-
15:24 - 15:28to know how that technology works under the covers.
-
15:28 - 15:32In the U.K., a 60 percent reduction since 2003,
-
15:32 - 15:36and there are similar statistics all over the world.
-
15:36 - 15:40We also need to think about the legal issues in this area.
-
15:40 - 15:42The cybercriminals I talked about,
-
15:42 - 15:44despite theft of millions of dollars,
-
15:44 - 15:46actually still haven't been arrested,
-
15:46 - 15:50and at this point possibly never will.
-
15:50 - 15:53Most laws are national in their implementation,
-
15:53 - 15:57despite cybercrime conventions, where the Internet
-
15:57 - 16:00is borderless and international by definition.
-
16:00 - 16:03Countries do not agree, which makes this area
-
16:03 - 16:07exceptionally challenging from a legal perspective.
-
16:07 - 16:11But my biggest ask is this:
-
16:11 - 16:13You see, you're going to leave here
-
16:13 - 16:16and you're going to see some astonishing stories in the news.
-
16:16 - 16:18You're going to read about malware doing incredible
-
16:18 - 16:22and terrifying, scary things.
-
16:22 - 16:26However, 99 percent of it works
-
16:26 - 16:30because people fail to do the basics.
-
16:30 - 16:33So my ask is this: Go online,
-
16:33 - 16:36find these simple best practices,
-
16:36 - 16:38find out how to update and patch your computer.
-
16:38 - 16:40Get a secure password.
-
16:40 - 16:41Make sure you use a different password
-
16:41 - 16:45on each of your sites and services online.
-
16:45 - 16:48Find these resources. Apply them.
-
16:48 - 16:50The Internet is a fantastic resource
-
16:50 - 16:52for business, for political expression,
-
16:52 - 16:55for art and for learning.
-
16:55 - 16:58Help me and the security community
-
16:58 - 17:01make life much, much more difficult
-
17:01 - 17:03for cybercriminals.
-
17:03 - 17:05Thank you.
-
17:05 - 17:09(Applause)
- Title:
- Everyday cybercrime -- and what you can do about it
- Speaker:
- James Lyne
- Description:
-
How do you pick up a malicious online virus, the kind of malware that snoops on your data and taps your bank account? Often, it's through simple things you do each day without thinking twice. James Lyne reminds us that it's not only the NSA that's watching us, but ever-more-sophisticated cybercriminals, who exploit both weak code and trusting human nature.
- Video Language:
- English
- Team:
closed TED
- Project:
- TEDTalks
- Duration:
- 17:26
![]() |
Thu-Huong Ha approved English subtitles for Everyday cybercrime -- and what you can do about it | |
![]() |
Thu-Huong Ha edited English subtitles for Everyday cybercrime -- and what you can do about it | |
![]() |
Thu-Huong Ha edited English subtitles for Everyday cybercrime -- and what you can do about it | |
![]() |
Morton Bast accepted English subtitles for Everyday cybercrime -- and what you can do about it | |
![]() |
Morton Bast edited English subtitles for Everyday cybercrime -- and what you can do about it | |
![]() |
Joseph Geni edited English subtitles for Everyday cybercrime -- and what you can do about it | |
![]() |
Amara Bot edited English subtitles for Everyday cybercrime -- and what you can do about it |