Zitmo 報告者:劉旭哲. What is Zitmo ? – Zeus in the Mobile What is Zeus ? – a Trojan horse that steals banking information by keystroke logging.

Slides:



Advertisements
Similar presentations
WYSI WYG Peter Stancik Security Evangelist
Advertisements

A Software Keylogger Attack By Daniel Shapiro. Social Engineering Users follow “spoofed” s to counterfeit sites Users “give up” personal financial.
Parameter Tampering. Attacking the Ecommerce Shopping Cart In the above image we see that a user who wants to purchase a Television visits an online Store.
7 Effective Habits when using the Internet Philip O’Kane 1.
Protecting the World from Cybercrime Neil Daswani August 27, 2008.
Identity Theft: How Safe Are You? Steven Stone. What is Identity Theft Identity consists of: – Social Security Number – Credit Card Number and Credit.
WikiLeaks Mirror Sites Lose Web Hosting Services 報告者:劉旭哲.
Phishing – Read Behind The Lines Veljko Pejović
ZeuS MitMo Mikel Gastesi S21sec e-crime analyst
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Quiz Review.
Threats to I.T Internet security By Cameron Mundy.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
THREATS TO MOBILE NETWORK SECURITY
Malware and Spyware Attacking Cell Phones Chris Gooch, Jessica Russell, Destiny Logan.
1 Monitoring mobile communication network, how does it work? How to prevent such thing about that? 潘維亞 (P ) 周明哲 (P ) 劉子揚 (N )
IT security By Tilly Gerlack.
Researchers turn USB cable into attack tool 報告人:劉旭哲.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
The online Member Admin area: appointment process [Event – Date] [Presenter]
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
Question # 1 For $100 15$1,000,000 14$500,000 13$250,000 12$125,000 11$64,000 10$32,000 9$16,000 8$8,000 7$4,000 6$2,000 5$1,000 4$500 3$300 2$200 1$100.
HDSB Security Awareness Training. Introduction Good security standards follow the 90/10 rule: 10% of security safeguards are technical. 90% of security.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEAD October 15, 2010 Dennis Fisher.
Ch9QQ T F 1.Hacking is an example of unauthorized access. T F 2.A Trojan horse is a type of malware that masquerades as another type of program. T F 3.A.

Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Android WebKit browser exploit 報告者:劉旭哲. Nov, Alert Logic Researcher M.J.Keith show a exploit in the Webkit in the Android. This exploit could lead to.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
Online Parking System.
PandaLab Quarterly Report (January-March 2011) 報告者:劉旭哲.
指導教授 : 劉如生 老師 報告者 : 楊凱翔、張云臙.  Introduction  Related Works  System Architectures  System Implementations  Conclusions.
Facebook fixes bug, but 'Nicole Santos' hoax lives on 報告者:劉旭哲.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Information Systems Design and Development Security Risks Computing Science.
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
Mobile Security Tom Taylor. Roadmap Security Risks Security Risks Examples of Attacks Examples of Attacks Personal Protection Personal Protection Business.
Mobile Device Security Threats Christina Blakley Host Computer Security.
By: Arjun Vachhani.  What is Cybercrime  What is Cybercrime Law  Cybercrime in Our Lives  Case 1: Albert Gonzalez  Case 2:Phishers  Statistics 
Managing Money Workshop The National Autistic Society AGM
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Android and IOS Permissions Why are they here and what do they want from me?
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
3.6 Fundamentals of cyber security
Level 2 Diploma Unit 11 IT Security
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Authentication 2.0: User Generated Security
Network security threats
Phishing is a form of social engineering that attempts to steal sensitive information.
Level 2 Diploma Unit 11 IT Security
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Stealing Credentials.
– Communication Technology in a Changing World
ISNE101 Dr. Ken Cosh Week 13.
Get Rid of a Trojan Horse? Even with a competent anti-virus installed, PCs could still be susceptible to malicious programs such.
Prepared By : Binay Tiwari
How to keep the bad guys out and your data safe
Record your QUESTIONS as your read.
Week 7 - Wednesday CS363.
Presentation transcript:

Zitmo 報告者:劉旭哲

What is Zitmo ? – Zeus in the Mobile What is Zeus ? – a Trojan horse that steals banking information by keystroke logging

August, a bank lost one million dollars in UK because of Zeus Less than two months, Fortinet found Zitmo

How to Phishing Web Victim input mobile number and brand SMS with malicious package – a Symbian package 、 a BlackBerry Jar Create NumberDB.db – tbl_contact : index, name, descr, pb_contact_id. – tbl_phone_number : contact_id, phone_number – tbl_history : event_id, pn_id, date, description, contact_info, contact_id – Could use some SQL query

After installing, send a SMS to someone… Therefore, your SMS will be recorded… The malware seems to be able to answer ’set admin’ – anyone may be able to take control of it.

So what Bank Authentication – Two Factor Authentication will be broken. Is investigating

reference _detail.aspx?tv=11&aid= _detail.aspx?tv=11&aid= online-bankings-two-factor-authentication-defeated../ online-bankings-two-factor-authentication-defeated../ zeus-attack-targets-mobile-banking-authentication/ zeus-attack-targets-mobile-banking-authentication/