Computer Crime Research Center

hack/x_cyber.gif

Notes from AusCERT 2008

Date: June 04, 2008
Source: arnnet.com.au
By: Roger A. Grimes (InfoWorld)

I've had the pleasure of speaking and attending this year's AusCERT 2008 security conference held in Gold Coast, Australia. If you've never been to Australia, you're missing some of the best that life has to offer, and I feel the same way about the conference. Although a bit smaller than most US security conferences, it's intentionally kept small (around 1,000 participants) and makes up in quality speaker presentations and vendor participation what it lacks in headcount. One of the great attributes of the typical Aussie is their aversion to marketing hype, along with their ability to "cut the fat off a chicken" (as my grandmother used to say) and pull out the salient points. If a vendor tries to push marketing fluff about their product too much, they are likely to get verbally assailed rugby-style. Here are some of my favorite notes and quotes from selected speakers:

Kimberly Zenz, of iDefense, discussed cybercrime within the Russian federation of countries. Longtime readers of mine already know about the power and scale of the Russian Business Network, but Zenz showed that I was being quite myopic by considering RBN the only Russian threat. Essentially, cybercrime against foreigners is widespread, as are services (money laundering, bulletproof hosting services, and so on) supporting cybercrime. For example, hundreds of legitimate companies exist in Russia to launder ill-gotten gains. Many have public, physical points of presence and advertise, "Three convenient offices located next to the metro."

Zenz shared that cybercrime against foreigners is not seen as a completely bad thing in most Russian circles. She revealed that when speaking to a Russian minister who was supposed to be preventing cybercrime, he bragged about the quality of their malicious hackers -- so much for getting global cooperation against the threat. But my favorite quote from her talk addressed what she felt needed to happen before Russia started to better fight cybercrime: "I can only hope that Russian-against-Russian cybercrime continues to grow." While most Russians don't see anything wrong with Russian-against-foreigner cybercrime, when directed internally, it causes locally felt pain. Zenz thinks that rising domestic cybercrime could, if only incidentally, cause foreign crime to be taken more seriously.

Ziv Mador, senior program manager with Microsoft US Research and Response (and my coworker), shared some interesting data points collected by Microsoft's anti-malware tools (such as Windows Defender) and their reach into hundreds of millions of computers. Although I think I know malware fairly well, many things he said startled me. For instance, Microsoft's most recent Microsoft Security Intelligence Report (see Figure 43), revealed that large percentages of people, when told that they are trying to install malware or other potentially unwanted software, tell Microsoft's products to get out of the way and to allow it. For instance, between 25 and 53 per cent of people, when told of a Trojan downloader, choose to install it. Why? Great social engineering, I guess. Many end-users will ignore any warning to see the latest viral (ironic use in this case) public video or cool game or add-on program. It reveals how difficult it is to pull off anti-malware defense, when people knowingly install malware. It goes to show that after two decades of trying, end-user education has its limits.

Dr. Charles Miller, of hacking Apple products fame, gave a presentation on the backroom world of researchers being paid for zero-day exploits. He said that although there are many legitimate companies paying for zero-day exploits, the market remains fragmented and undisciplined. He said while prices for some zero-days ranged from US$500 to more than $80,000, many remain unsold. In perhaps one of the boldest admissions, Dr. Miller discussed how much he was paid for two vulnerabilities he sold a few years ago. He was able to sell a SAMBA exploit for US$80,000, and while negotiating a friend's PowerPoint exploit for US$8,000 to $20,000, saw the market collapse when Microsoft released a patch that fixed the exploit. He also shared that selling zero-days to anyone apart from the vendor didn't feel quite right, but that vulnerabilities researchers need to make a living.
Original article



Add comment  Email to a Friend

Copyright © 2001-2013 Computer Crime Research Center
CCRC logo