Vous êtes sur la page 1sur 21

CYBER ESPIONAGE

Cyber Espionage
of, relating to, or involving the practice of spying or of
computers or computer using spies, typically by
networks (such as the governments to obtain
Internet). political and military
information.
Want big
impact?
Use big
image.
WHAT IS CYBER ESPIONAGE?

It is the act of engaging in an


attack or series of attacks
that let an unauthorized user
or users view classified
material.
WHAT IS CYBER ESPIONAGE?

These attacks are often subtle,


amounting to nothing more
than an unnoticed bit of code
or process running in the
background of a mainframe
WHAT IS CYBER ESPIONAGE?

or personal workstation, and


the target is usually a
corporate or government
entity.
FORMS OF CYBER ATTACKS

Brute force attack


Distributed Denial of Service Attack
Phishing attacks
Malware, spyware, or ransomware
FORMS OF CYBER ATTACKS

Brute force attack

A sophisticated software or algorithm which is written to do whatever it


can to attack your system — by searching for vulnerabilities — and in
many cases, attacks a password-protection mechanism.
The brute force attack will use a specially designed software to go
through hundreds of thousands of different words, combinations of
words and numbers to try to crack your password, said Caracciolo of
CBIZ. He added: “They will even go through every word in the dictionary
to see if they can access something like a password.”
5 FORMS OF CYBER ATTACKS

Distributed Denial of Service Attack

This happens when a server is overloaded with connections, with a goal


of ultimately shutting down the target’s website or network system.
“This is just where [hackers] are overloading your system, hoping it will
shut down your network and you will not be able to operate your
business.
FORMS OF CYBER ATTACKS

Phishing attacks
There are various types of phishing attacks and the type that is
used usually depends on the industry. “Hackers send out hundreds of
thousands of emails [with an attachment or link] hoping that
someone will click on them,” he added. “That’s the hacker’s means to
access your system.” Once you open it, you’re giving them access to
your computer system and the information on it.
“Once they’re in, then they’re able to really attack the software’s
vulnerabilities, whether it’s personal passwords, firewall or lack
thereof, or unpatched status security software.”
FORMS OF CYBER ATTACKS

Malware, spyware, or ransomware

Malware – a malicious software with the intent to gain


unauthorized access.

Spyware – hackers introduce a software into your system


that looks for the simplest form to track keystrokes to get
passwords or electronically spy on your network, whether
to gain access to confidential information or spying in order
to gain access to unidentifiable information.
FORMS OF CYBER ATTACKS

Malware, spyware, or ransomware

Worms - A “worm” is similar to a virus but it spreads differently. In


order to affect your files, a worm eats into your system and runs on its
own. If a worm is introduced into your system, it could replicate by
resending itself from your system to everyone in your contacts list; so
one person lets it in and then it just compounds itself; depending on how
it’s written, it could get back to every contact on your list.
SOME TOOLS USED IN CYBER ESPIONAGE
Archimedes – a man-in-the-middle (MITM) attack tools allegedly
created by the CIA to computers inside a LAN.

Scribbles – a piece of software allegedly designed to embed 'web


beacons' into confidential documents, allowing the spying agency to
track insiders and whistleblowers.

Grasshopper – reveal a framework which allowed the agency to


easily create custom malware for breaking into Microsoft’s Windows
and bypassing antivirus protection.
WORLD’S MOST NOTORIOUS CYBERSPIES
TARGETING PHL GOV’T

Cybersecurity experts have identified at least two international


hacker groups that are involved in a concerted effort to steal secrets
from Philippine government institutions and private companies.
APT32, hacking group based on Vietnam and China-based
Conference Crew are associated with the attacks mainly because of the
country’s recent diplomatic moves towards China.
Cyber Espionage Group Targets Asian Countries
With Bitcoin Mining Malware

Security researchers have discovered a custom-built piece of malware


that’s wreaking havoc in Asia for past several months and is capable of
performing nasty tasks, like password stealing, bitcoin mining, and
providing hackers complete remote access to compromised system.

Dubbed Operation PZChao, the attack campaign discovered by the


security researchers at Bitdefender have been targeting organizations
in the government, technology, education, and telecommunications
sectors in Asia and the United States.
Cyber Espionage Group Targets Asian Countries
With Bitcoin Mining Malware

Researchers believe nature, infrastructure, and payloads, including


variants of the GhostRAT trojan, used in the PZChao attacks are
reminiscent of the notorious Chinese hacker group – Iron Tiger.
However, this campaign has evolved its payloads to drop trojan,
conduct cyber espionage and mine bitcoin cryptocurrency.

Republic Act No. 10175
Cybercrime Prevention Act of
2012
CYBERCRIME PREVENTION ACT OF 2012

Section 4. Cybercrime Offenses

A. Offenses against the confidentiality, integrity and availability of


computer data and systems.
1. Illegal Access
2. Illegal Interception
3. Data Interference
4. System Interference
5. Misuse of devices
SlidesCarnival icons are editable shapes.

This means that you can:


● Resize them without losing quality.
● Change fill color and opacity.

Isn’t that nice? :)

Examples:
😉
Now you can use any emoji as an icon!
And of course it resizes without losing quality and you can change the color.

How? Follow Google instructions


https://twitter.com/googledocs/status/730087240156643328

✋👆👉👍👤👦👧👨👩👪💃🏃💑❤😂
😉😋😒😭👶😸🐟🍒🍔💣📌📖🔨🎃🎈
🎨🏈🏰🌏🔌🔑 and many more...
Extra graphics

Vous aimerez peut-être aussi