The impact of cybercrime High level conference on EU ISS – Brussels 2014 Ilias Chantzos, Senior Director Government Affairs EMEA What is cybercrime? • Most people think of cybercrime in terms of consumers being defrauded • Perception is that targeted attacks happen to large organisations • Cybercrime affects consumers and enterpises • Cybercrime is not just a technology problem • There is no such thing as a victims’ personal and professional life for cybercriminals • We all need to work together to deal with it • I will not cover the other “cyber issues” THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME 1 BN RUSSIA 13 BN EUROPE 38 BN 3 BN USA 37 BN CHINA 4 BN MEXICO INDIA 8 BN 1 BN JAPAN BRAZIL 1 BN AUSTRALIA SOUTH AFRICA 0.3 BN ALL AMOUNTS IN USD ROUNDED TO THE NEAREST BILLION CANADA 3 BN; SINGAPORE 1 BN; NEW ZEALAND 0.1 BN; TURKEY 2 BN; SAUDI ARABIA 0.5 BN; UAE 0.3 BN; COLOMBIA 0.5 BN THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME $113 BN ENOUGH TO HOST THE 2012 LONDON OLYMPICS NEARLY 10 TIMES OVER 83% OF DIRECT FINANCIAL COSTS ARE A RESULT OF FRAUD, REPAIRS, THEFT AND LOSS OTHER 17% FRAUD 38% REPAIRS 24% USD $298 AVERAGE COST PER VICTIM THEFT OR LOSS 21% REPRESENTS A 50 PERCENT INCREASE OVER 2012 ALL AMOUNTS IN USD SEE EXTRAPOLATION CALCULATIONS * THE SCALE OF CONSUMER CYBERCRIME 378 MILLION VICTIMS PER YEAR NEARLY 2.8 TIMES AS MANY BABIES BORN EACH YEAR 1 MILLION + VICTIMS PER DAY ENOUGH TO FILL WEMBLEY STADIUM (ENGLAND) MORE THAN 10 TIMES 12 VICTIMS PER SECOND SEE EXTRAPOLATION CALCULATIONS * Targeted Internet Security Threat Report 2014 :: Volume 19 6 Targeted Internet Security Threat Report 2014 :: Volume 19 7 Mega Breaches • 8 of the top 10 breaches were of more than 10 million identities • Average Identities exposed were 4 times greater than 2012 Internet Security Threat Report 2014 :: Volume 19 8 Breaches • The average number of identities exposed per data breach for Hacking incidents was approximately 4.7 million. • Theft or loss of a device was ranked third, and accounted for 27% of data breach incidents. Internet Security Threat Report 2014 :: Volume 19 9 Targeted Internet Security Threat Report 2014 :: Volume 19 10 C SUMERS’ SECURITY IQ – HIGH ON PC, LOW ON MOBILE DELETE SUSPICIOUS EMAILS FROM PEOPLE THEY DON’T KNOW HAVE AT LEAST A BASIC FREE ANTIVIRUS SOLUTION AVOID STORING SENSITIVE FILES ONLINE 90% 72% 78% VS. VS. VS. 60% 42% 53% VS. VS. VS. 56% 33% 48% GOOD JOB! NEEDS WORK! NEEDS WORK! CONSUMERS PICK CONVENIENCE OVER SAFETY 1/3 62% ADMIT THE CONVENIENCE OF CONSTANTLY CONNECTED OUTWEIGHED ANY POTENTIAL SECURITY RISKS AGREE THERE IS NO SUCH THI G AS ‘ LI E PRI ACY’ I T DAY’S W RLD EVEN THOUGH… 46% 7/10 WISH THEY COULD PERMANENTLY DELETE SOME OF THEIR PERSONAL ONLINE CONTENT COMPLETELY D ’T PUT A YTHI G SOCIAL NETWORKS THAT THEY W ULD ’T WA T THEIR PARENTS / KIDS TO SEE Ransomware • • • 1 Ransomware exploded globally in 2013 3 With only on line payment options limiting its reach With 1.5 million internet connected computers even the Palestine Territories is a big enough target for criminals 13 Ransomware 500% increase in Ransomware attack in 2013 Internet Security Threat Report 2014 :: Volume 19 14 RISKY BEHAVIOR ON SOCIAL MEDIA ? LOG OUT **** ? ? 39% 1/4 31% OF SOCIAL MEDIA USERS DON’T LOG OUT AFTER EACH SESSION OF SOCIAL MEDIA USERS SHARE THEIR SOCIAL MEDIA PASSWORDS WITH OTHERS OF SOCIAL MEDIA USERS CONNECT WITH PEOPLE THEY DO NOT KNOW 12% OF SOCIAL MEDIA USERS SAY SOMEONE HAS HACKED INTO THEIR SOCIAL NETWORK ACCOUNT AND PRETENDED TO BE THEM Internet of Things at Home • New reports confirmed real world attacks against security cameras and baby monitors • Attacks against televisions, cars and and medical equipment have been demonstrated • Reports of refrigerators sending SPAM have been greatly exaggerated Internet Security Threat Report 2014 :: Volume 19 16 Internet of Things at Home • Even routers are at risk today • Linux.Darlloz infect Linux PCs and IoT devices running Linux • Linux.Aidra targets cable and DSL modems • Infected systems can be used for: NAT Router – DDoS attacks – Browser redirection – Even cryptocurriences mining • Unpatched vulnerabilities and unchanged default passwords make this possible Internet Security Threat Report 2014 :: Volume 19 17 Internet of Things – The Future Wearable Devices will soon be measuring • • • • • • • • Pulse Weight Time Slept Glucose Levels Blood Pressure Exposure to sunlight Teeth Brushing And more… As more of our personal information travels the Internet what will become of it? Internet Security Threat Report 2014 :: Volume 19 TOP TIPS DEFEND YOUR DATA A COMPREHENSIVE SECURITY SUITE PROVIDES A STRONG DEFENSE AGAINST ONLINE THREATS. NORTON 360 MULTI-DEVICE OFFERS PROTECTION FOR PCS, SMARTPHONES AND TABLETS, IN A SINGLE SOLUTION THINK OF MOBILE DEVICES AS MINI-COMPUTERS MOBILE IS THE FASTEST-GROWING TARGET FOR CYBERCRIMINALS. MAKE SURE YOUR MOBILE DEVICE REQUIRES A PASSWORD, AND TAKE PRECAUTIONS TO ENSURE YOUR DEVICE IS PROTECTED AGAINST THEFT, LOSS AND CYBERCRIME BE CAUTIOUS IN THE CLOUD WHILE CLOUD STORAGE SOLUTIONS MAKE IT EASY TO SAVE AND SHARE FILES, THEY ALSO OPEN OTHER AVENUES FOR ATTACK. BE CAREFUL ABOUT WHO HAS ACCESS TO YOUR FILES, AND USE A SOLUTION WITH BUILT-IN SECURITY IF POSSIBLE SAVE SENSITIVE TRANSACTIONS FOR SECURE CONNECTIONS FREE OR UNSECURED WI-FI NETWORKS CAN MAKE IT EASY FOR THIEVES TO EAVESDROP ON YOUR ACTIVITY. AVOID DOING ANY SENSITIVE TRANSACTIONS LIKE BANKING OR SHOPPING WHILE CONNECTED TO THESE NETWORKS, OR USE A PERSONAL VPN CLIENT AFTER YOU CONNECT, DOUBLE CHECK CHECK CREDIT CARD AND BANK STATEMENTS REGULARLY FOR FRAUDULENT TRANSACTIONS, AND REPORT ANY SUSPICIOUS ACTIVITY TO YOUR PROVIDER AND/OR LAW ENFORCEMENT THANK YOU