Cybercrimes_A Global Threat Presentation.pptx

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

UNCLASSIFIED

Cybercrimes: A Global Threat


FBI Cyber Squad

The overall classification of this briefing is UNCLASSIFIED

UNCLASSIFIED
UNCLASSIFIED

Topics to cover:

• The Global Cyber Threat


• What is a Computer Intrusion?
• What is being Targeted?
• Cyber Threats Landscape
• Who is behind the Intrusion?
• How to Combat the Threat?
• Unique Authorities
• Enduring Partnerships

UNCLASSIFIED
UNCLASSIFIED

The Global Cyber Threat

Threat actors operate across the globe exploiting legal limits of law enforcement
authority, gaps between intergovernmental cooperation, and technology to obfuscate
their activity as they target U.S. victims.

Our Mission:
Impose risk and consequences on
cyber adversaries through unique
authorities, world-class capabilities,
and enduring partnerships, building
upon a century of innovation.

UNCLASSIFIED
UNCLASSIFIED

What is a Computer Intrusion?

A computer intrusion is generally


defined as the act of intruding or
gaining unauthorized access to a
computer system.

UNCLASSIFIED
UNCLASSIFIED

Threats Landscape:

Malware Botnets Supply Chain


Phishing
Types: Types: Types:
Types:
Ransomware Defacement Trust Exploitation
Spam Campaigns
Spyware DoS Backdoor
Spear Phishing (Targeted)
Worm DDoS Malicious Code
Spoofing
Rootkit
Smishing (Via SMS)
Adware Common Vectors:
Vishing (Via a Call)
Key logger Common Vectors:
Others
Virus Compromise Devices
Trojan Horse Compromise Infrastructure Software
Common Vectors:
Others Hardware
Updates
Email
Common Vectors:
Text Message
Phone Call
Email
Social Media
Compromised Sites

UNCLASSIFIED
Cyber Operation and Progression:

Business Email Criminal Market


Malware
Compromise Ransomware (Darknet /
Services
(BEC) Forums)

Criminal
Data Breach / Infrastructure
Insider Threat (Bulletproof Hosting
/ VPN / VPS)
UNCLASSIFIED

What is Being Targeted?

UNCLASSIFIED
UNCLASSIFIED

Who is behind the Intrusion?

Cybersecurity threats can emanate from several types of adversaries who utilize
cyber activity to support terrorism, engage in counterintelligence operations,
and conduct sophisticated financial crimes.

UNCLASSIFIED
UNCLASSIFIED

How to Combat the Threat?

Since cyber has no borders, the


FBI strives to have global reach.
This is achieved by our Legal
Attachés stationed in embassies
around the world who help build
coalitions of like-minded
FBI
countries to stand with the U.S.
against our adversaries.

UNCLASSIFIED
UNCLASSIFIED

Enduring Partnerships

To combat cyber threats, we need a


whole-of-society defense. No one
entity can address the range of cyber
threats we face alone. Given how
interconnected we are and how much
we depend upon each other, if our
allies’ networks are vulnerable, those
vulnerabilities pose a security threat
to the United States as well.

UNCLASSIFIED
UNCLASSIFIED

Internet Crime Complaint Center (IC3) – IC3.GOV

UNCLASSIFIED
• FBI San Juan Infragard Coordinator
• SA Stephanie Audette
• Email: smaudette@fbi.gov
• Phone: 787-987-6238
UNCLASSIFIED

Questions and Answers

UNCLASSIFIED

You might also like