Translate

четвъртък, 21 януари 2016 г.

Дистанционно обучение - курсове и цени


ДИСТАНЦИОННО ОБУЧЕНИЕ ПО:


1. ИНФОРМАЦИОННА СИГУРНОСТ ЗА МЕНИДЖЪРИ - ИЗГРАЖДАНЕ, ВНЕДРЯВАНЕ, ПОДДРЪЖКА И РАЗВИТИЕ НА ПРОГРАМА ЗА ИНФОРМАЦИОННА СИГУРНОСТ В БИЗНЕС ОРГАНИЗАЦИИТЕ

Цена на курса:
- за персонално обучение – 150 Евро
за корпоративно обучение – по договаряне, в зависимост от броя обучаеми, но не повече от  500 Евро 

2. ИНФОРМАЦИОННА СИГУРНОСТ - ISO 27001:2013 - ИНФОРМАЦИОННИ ТЕХНОЛОГИИ – СИСТЕМА ЗА УПРАВЛЕНИЕ НА ИНФОРМАЦИОННАТА СИГУРНОСТ (СУИС) – ИЗИСКВАНИЯ

Цена на курса:
- за персонално обучение – 150 Евро
- за корпоративно обучение – по договаряне, в зависимост от броя обучаеми, но не повече от  500 Евро 

3. УПРАВЛЕНИЕ НА ИТ УСЛУГИТЕ - ISO 20000-1:2011 - ИНФОРМАЦИОННИ ТЕХНОЛОГИИ — УПРАВЛЕНИЕ НА УСЛУГИ —ЧАСТ 1: ИЗИСКВАНИЯ КЪМ СИСТЕМИТЕ ЗА УПРАВЛЕНИЕ НА УСЛУГИ (СУУ)

Цена на курса:
- за персонално обучение – 150 Евро
- за корпоративно обучение – по договаряне, в зависимост от броя обучаеми, но не повече от  500 Евро 

4. МЕРКИ ЗА ПРОТИВОДЕЙСТВИЕ НА ЗАПЛАХИТЕ   КЪМ ИНФОРМАЦИОННАТА СИГУРНОСТ, ПРЕДИЗВИКАНИ ОТ ЗЛОНАМЕРЕНИ „ВЪТРЕШНИ ХОРА” (ЗЛОНАМЕРЕН „ВЪТРЕШЕН ЧОВЕК”)

Цена на курса:
- за персонално обучение – 125 Евро
- за корпоративно обучение – по договаряне, в зависимост от броя обучаеми, но не повече от  400 Евро 

5. УПРАВЛЕНИЕ НА КАЧЕСТВОТО - ISO 9001:2015 – СИСТЕМА ЗА УПРАВЛЕНИЕ ТА КАЧЕСТВОТО (СУК) - ИЗИСКВАНИЯ

Цена на курса:
- за персонално обучение – 100 Евро
- за корпоративно обучение – по договаряне, в зависимост от броя обучаеми, но не повече от  300 Евро 

Забележки:
1. Програмите за дистанционно обучение по горепосочените курсове са публикувани в този  блог -  http://infosecservicebg.blogspot.com/ 

2. За допълнителна информация:
- 0886 655 315Пламен Каменов

вторник, 19 януари 2016 г.

Хакерството, като бизнес модел



НОВИЯ СВЯТ НА КИБЕР ПРЕСТЪПЛЕНИЯТА – КОГАТО ХАКЕРСТВОТО СТАВА ГОЛЯМ БИЗНЕС

В ранните си години  хакерството наподобяваше Дивия запад. В тези времена, отделни хакери предизвикваха  хаос, където, когато и както могат – напр. чрез „открадване” на номерата на кредитни карти  или информация / данни за банковите сметки на нищо неподозиращите жертви.

В днешно време хакерството е доста по сложно и усъвършенствано. В последно време се наблюдава  значително разнообразяване в подходите за постигане на печалби чрез хакерство – тази нова тенденция на практика съпровожда изцяло кибер престъпленията в последните години.

НАЙ-ГОЛЕМИЯ СЛУЧАЙ НА КИБЕР ХАКЕРСТВО ВЪВ ФИНАНСОВИЯ СЕКТОР НА САЩ

През  м. ноември, 2015, Министерството на правосъдието на САЩ публикува съобщение, относно предявяването на обвинение към трима души, в което се съобщава за най-големия случай на кибер хакерство във финансовия сектор на САЩ.  (Обвинението представено по-долу)
В съответсвие с предявеното обвинение, в периода 2012 до 2015, тримата предполагаеми престъпни конспиратори Гери Шалон, Зив Оренщейн и Джошуа Самуел Аарон (на свобода, към момента на публикуване на съобщението на Министерството на правосъдието на САЩ) са приложили хакерска  схема, насочена към финансовия сектор – като най-голямата им цел е била JP Morgan. За тях се предполага, че са откраднали персонална информация за повече от 100 милиона потребители, чрез пробиви с системите за данни, като впоследствие са използвали  тази информация в интерес на различни престъпни организации.
В допълнение към хакерските действия към различни големи банки, тримата нападатели също са „прали” пари, организирали са нелегални търговски операции с Bitcoin, а също са пуснали в действие нелегални online игрални домове (казина). Те са използвали  откраднатите имената и e-mail адресите им, придобити от финансови институции, за да се свържат с неволни жертви и да ги убедят да купуват акции (с  изкуствено надути стойности)  по класическата измамна схема "помпай и зарязвай".

НОВИТЕ КИБЕР ПРЕСТЪПНИЦИ

В много случаи, съвременните кибер престъпници  не са хакери с високо технологични познания. Вместо това, те използват своите  бизнес знания, с цел усъвършенстване на хакерските схеми. На практика те предпочитат да прехвърлят „чисто” хакерските действия от себе си на други, неизвестни изпълнители. По този начин хакерството се превръща от просто, бързо печелене на пари в действие за поддръжка на различни престъпни групировки.

Едно от доказателствата  за новия свят на кибер престъпленията е повдигнатото обвинение от Министъра на правосъдието на САЩ и Областния прокурор на Манхатън за проникване в мрежите на финансови институции на САЩ и др. компании (публикувано по-долу)


Department of Justice
Office of Public Affairs

FOR IMMEDIATE RELEASE
Tuesday, November 10, 2015
Attorney General and Manhattan U.S. Attorney Announce Charges Stemming from Massive Network Intrusions at U.S. Financial Institutions, U.S. Brokerage Firms, Major News Publications and Other Companies
Breaches Included the Largest Theft of Customer Data from a U.S. Financial Institution in History
Defendants Hacked in Furtherance of Securities Market Manipulation Schemes, and Vast Gambling and Payment Processing Schemes
Attorney General Loretta E. Lynch, U.S. Attorney Preet Bharara of the Southern District of New York, Assistant Director in Charge Diego Rodriguez of the FBI’s New York Field Office and Special Agent in Charge Robert J. Sica of the U.S. Secret Service (USSS) New York Field Office announced today the unsealing of a superseding indictment charging Gery Shalon, aka “Garri Shalelashvili,” “Gabriel,” “Gabi,” “Phillipe Mousset” and “Christopher Engeham,” with orchestrating massive computer hacking crimes against U.S. financial institutions, brokerage firms and financial news publishers, including the largest theft of customer data from a U.S. financial institution in history (the U.S. Financial Sector Hacks).  Shalon is charged with committing these crimes with Joshua Samuel Aaron, aka “Mike Shields,” in furtherance of securities market manipulation schemes that Shalon and Aaron perpetrated with defendant Ziv Orenstein, aka “Aviv Stein” and “John Avery” in the United States. 
As alleged, Shalon also orchestrated computer network hacks and cyberattacks in furtherance of other major criminal schemes, including unlawful internet casinos and illicit payment processors which Shalon operated with Orenstein.  Shalon also owned and controlled an illegal U.S.-based Bitcoin exchange known as Coin.mx.  Shalon and Orenstein were arrested in July 2015 by the Israel Police on an indictment that charged the underlying securities fraud, and they remain in custody in Israel pending extradition on those charges.  The U.S. Attorney’s Office will seek their extradition to stand trial in the United States on the additional charges announced today.  Aaron remains at large.  Also announced today is the unsealing of a separate indictment charging Anthony R. Murgio with operating Coin.mx in the United States, and related crimes.  Murgio, who was arrested on a complaint in July 2015, will be arraigned before the Honorable Alison J. Nathan.
 “As set forth in the indictment, these three defendants perpetrated one of the largest thefts of financial-related data in history – making off with the sensitive information of literally thousands of hard-working Americans,” said Attorney General Lynch.  “These charges were made possible in large part because those victims came forward and worked with the Department of Justice to hold the perpetrators accountable.  In an age when enormous quantities of vital information are stored in digital format on potentially vulnerable Internet-connected devices, public-private partnerships and information-sharing are more critical than ever.  The Department of Justice is committed to protecting the financial data of all our citizens and the financial integrity of our institutions.  I’d like to thank the prosecutors and law enforcement professionals who worked tirelessly on this case, and the victims who offered their full cooperation with law enforcement to make these criminal charges possible.”
“Today, we have exposed a cybercriminal enterprise that for years successfully and secretly hacked into the networks of a dozen companies, allegedly stealing personal information of over 100 million people, including over 80 million customers from one financial institution alone,” said U.S. Attorney Bharara.  “The charged crimes showcase a brave new world of hacking for profit.  It is no longer hacking merely for a quick payout, but hacking to support a diversified criminal conglomerate.  This was hacking as a business model.  The alleged conduct also signals the next frontier in securities fraud – sophisticated hacking to steal nonpublic information, something the defendants discussed for the next stage of their sprawling enterprise.  Fueled by their hacking, the defendants’ criminal schemes allegedly generated hundreds of millions of dollars in illicit proceeds.  Even the most sophisticated companies – like those victimized by the hacks in this case – have to appreciate the limits of their ability to uncover the full scope of any cyber-intrusion and to stop the perpetrators before they strike again.  If they have been hacked, most likely others have been as well, and even more will be.  The best bet to identify, stop and punish cybercriminals is to work closely, and early, with law enforcement.  That happened here, and today’s charges are proof of that.”
“Shalon, Aaron and their co-conspirators allegedly robbed victim companies, often for months at a time, stealing the contact information of tens of millions of customers,” said Assistant Director in Charge Rodriguez.  “They cloaked themselves in secrecy, but their methods rivaled those of the traditional masked robber.  Today’s indictment sheds light on an increasingly complex threat.  But just as criminals continue to develop relationships with one another in order to advance their objectives, the law enforcement community has developed a collaborative approach to fighting these types of crimes.”
“This investigation is indicative of the sophistication and complexity of cybercrime and the transnational criminal organizations that are responsible for it,” said Special Agent in Charge Sica.  “Transnational cybercriminal organizations operate with impunity regardless of national borders as these criminal organizations seek to profit from information stolen through the unauthorized access to victims’ networks.  Through the U.S. Secret Service global network of Electronic Crimes Task Forces, our field offices located overseas and the close cooperation of our foreign law enforcement partners, no cybercriminal is beyond our reach.  We will remain relentless in pursuing these criminals wherever they may reside.”
According to the allegations contained in the superseding indictment[1]:
From approximately 2012 to mid-2015, Shalon, working with Aaron and others, orchestrated the U.S. Financial Sector Hacks, stealing personal information of over 100 million customers of the victim companies.  Among these, their network intrusion at one bank (Victim-1) resulted in the theft of personal information of over 80 million Victim-1 customers, making it the largest theft of customer data from a U.S. financial institution in history.  Shalon, Aaron and their co-conspirators engaged in these crimes in furtherance of other criminal schemes.  In particular, in an effort to artificially manipulate the price of certain stocks publicly traded in the United States, Shalon and his co-conspirators sought to market the stocks, in a deceptive and misleading manner, to customers of the victim companies whose contact information they had stolen in the intrusions. 
In addition to directing the U.S. Financial Sector Hacks, Shalon directed computer network hacks and cyberattacks against numerous companies outside of the financial sector.  Shalon and his co-conspirators engaged in these crimes in furtherance of large-scale criminal businesses that Shalon and Orenstein operated in the United States and other countries.  In particular, between approximately 2007 and July 2015, Shalon owned and operated unlawful internet gambling businesses in the United States and abroad; owned and operated multinational payment processors for illegal pharmaceutical suppliers, counterfeit and malicious software (malware) distributors, and unlawful internet casinos; and owned and controlled Coin.mx, an illegal U.S.-based Bitcoin exchange that operated in violation of federal anti-money laundering laws.  Nearly all of these schemes, like Shalon’s securities market manipulation schemes, relied for their success on computer hacking and other cybercrimes committed by Shalon and his co-conspirators.
Through their criminal schemes, between in or about 2007 and in or about July 2015, Shalon and his co-conspirators earned hundreds of millions of dollars in illicit proceeds, of which Shalon concealed at least $100 million in Swiss and other bank accounts.
Shalon, Aaron, Orenstein and their co-conspirators operated their criminal schemes, and laundered their criminal proceeds, through at least 75 shell companies and bank and brokerage accounts around the world.  The defendants controlled these companies and accounts using aliases, and by fraudulently using approximately 200 purported identification documents, including over 30 false passports that purported to be issued by the United States and at least 16 other countries.
The U.S. Financial Sector Hacks
Between approximately 2012 and August 2014, Shalon and a co-conspirator (CC-1), working at times with Aaron, executed the hacks of the computer networks of Victims 1 through 9.  Among other things, in foreign-language electronic communications, during these hacks, Shalon bragged about the size and scope of his securities market manipulation schemes and described to CC-1 his use of the stolen data in furtherance of those schemes.  Shalon and CC-1 also discussed expanding their network intrusions to encompass thefts of material non-public information from the financial institutions and other firms they were hacking. 
The Securities Market Manipulation Schemes
Since 2011, Shalon, Aaron, Orenstein and their co-conspirators orchestrated multimillion-dollar stock manipulation – or “pump and dump” – schemes to manipulate the price and trading volume of dozens of publicly traded microcap stocks (penny stocks) in order to enable members of the conspiracy to sell their holdings in those stocks at artificially inflated prices.  In some instances, Shalon and Aaron caused the companies to become publicly traded in furtherance of the scheme.  To do so, Shalon caused privately held companies to engage in “reverse mergers” with publicly traded shell corporations Shalon controlled.  Orenstein managed bank and brokerage accounts used in furtherance of the schemes under aliases that he supported with false passports and other false personal identification information. 
To artificially manipulate the trading volume and prices of dozens of stocks, among other things, at pre-arranged times, Shalon and Aaron disseminated materially misleading, unsolicited messages by various means – including by email (spam) to up to millions of recipients per day – that falsely touted the stock in order to trick others into buying it.  Shalon and Aaron engaged in the U.S. Financial Sector Hacks in part to acquire email and mailing addresses, phone numbers and other contact information for potential victims to whom they could send such deceptive communications.  Shalon and his co-conspirators generated tens of millions of dollars in unlawful proceeds from the securities market manipulation schemes. 
The Unlawful Internet Gambling Schemes, Hacks and Cyberattacks
From at least in or about 2007 up to and including in or about July 2015, Shalon, Orenstein and their co-conspirators operated unlawful internet casinos in the United States and elsewhere through hundreds of employees in multiple countries.  In the United States, the defendants knowingly operated at least 12 unlawful internet casinos (the Casino Companies) which, through their websites, offered real-money casino gambling in violation of federal law and the laws of numerous states, including New York state.  Through the Casino Companies, Shalon, Orenstein and their co-conspirators generated hundreds of millions of dollars in unlawful income.
In furtherance of his unlawful internet gambling schemes, Shalon and his co-conspirators engaged in massive hacks and cyberattacks against other internet gambling businesses to steal customer information, secretly review executives’ emails and cripple rival businesses.  For example, Shalon orchestrated network intrusions of Victims-10 and -11, companies that provided operating software to Shalon’s internet casinos.  In doing so, Shalon sought to, and did, secretly obtain access to the email accounts of senior executives at both companies to ensure that the companies’ work with Shalon’s competitors did not compromise the success of Shalon’s unlawful internet gambling businesses.
The Illicit Payment Processing Scheme and Hack
From at least in or about 2011 until in or about July 2015, Shalon, Orenstein and their co-conspirators operated IDPay and Todur, multinational payment processors for criminals who sought to receive payments by credit and debit card in furtherance of their unlawful schemes.  Through these payment processors, Shalon, Orenstein and their co-conspirators knowingly processed credit and debit card payments for, at a minimum, unlawful pharmaceutical distributors, purveyors of counterfeit and malicious purported “anti-virus” computer software, their own unlawful internet casinos and Coin.mx, an illegal U.S.-based Bitcoin exchange owned by Shalon.  In doing so, Shalon, Orenstein, and their co-conspirators knowingly processed hundreds of millions of dollars in transactions for criminal schemes, for which they earned a percentage of every transaction.  
Beginning in or about 2012, Shalon and his co-conspirators hacked into the computer networks of Victim-12, a U.S. company which assessed merchant risk and compliance for credit card issuers and others, including by detecting merchants that accepted credit card payments for unlawful goods or services.  Thereafter, on an ongoing basis, Shalon and his co-conspirators monitored Victim-12’s detection efforts, including by reading emails of Victim-12 employees, so they could take steps to evade detection by Victim-12 of their unlawful payment processing scheme. 
The Unlawful Bitcoin Exchange
From in or about 2013 to in or about July 2015, Shalon knowingly owned Coin.mx, which was operated by Murgio in the United States at Shalon’s direction in violation of federal anti-money laundering (AML) registration and reporting laws and regulations.  Through Coin.mx, Shalon, Murgio and their co-conspirators enabled their customers to exchange cash for Bitcoins, charging a fee for their service.  In total, between approximately October 2013 and July 2015, Coin.mx exchanged millions of dollars for Bitcoins on behalf of its customers.
*                *                *
Shalon, 31, of Savyon, Israel; Aaron, 31, a U.S. citizen who resides in Moscow; and Tel Aviv; and Orenstein, 40, of Bat Hefer, Israel, are charged with the following offenses, which carry the maximum prison terms listed below:
Count
Defendants
Charge
Maximum Prison Term
One
Shalon and Aaron
Conspiracy to Commit Computer Hacking

five years
Two
Shalon and Aaron
Computer Hacking
five years
Three
Shalon and Aaron
Computer Hacking

five years
Four
Shalon, Aaron and Orenstein
Conspiracy to Commit Securities Fraud
20 years
Five
Shalon, Aaron and Orenstein
Conspiracy to Commit Wire Fraud: Securities Market Manipulation Scheme
20 years
Six to 12
Shalon, Aaron and Orenstein
Securities Fraud
20 years
13
Shalon, Aaron and Orenstein
Wire Fraud
20 years
14
Shalon, Aaron and Orenstein
Identification Document Fraud Conspiracy
20 years
15
Shalon, Aaron and Orenstein
Aggravated Identity Theft
Mandatory two years
16
Shalon and Orenstein
Unlawful Internet Gambling Enforcement Act Conspiracy
five years
17
Shalon and Orenstein
Unlawful Internet Gambling Enforcement Act
five years
18
Shalon and Orenstein
Operation of Illegal Gambling Business
five years
19
Shalon and Orenstein
Conspiracy to Commit Wire Fraud: Unlawful Payment Processing
20 years
20
Shalon
Conspiracy to Operate an Unlicensed Money Transmitting Business
five years
21
Shalon
Operation of an Unlicensed Money Transmitting Business
five years
22
Shalon, Aaron and Orenstein
Money Laundering Conspiracy: Securities Market Manipulation Scheme

20 years
23
Shalon, Aaron and Orenstein
Money Laundering Conspiracy: Internet Gambling and Payment Processing Schemes

20 years

For his alleged conduct, Murgio, 31, of Tampa, Florida, is charged with the following offenses: conspiracy to operate an unlicensed money transmitting business, which carries a maximum prison term of five years; operation of an unlicensed money transmitting business, which carries a maximum prison term of five years; conspiracy to make corrupt payments with intent to influence an officer of a financial institution, which carries a maximum prison term of five years; making corrupt payments with intent to influence an officer of a financial institution, which carries a maximum prison term of 30 years; conspiracy to commit wire fraud, which carries a maximum prison term of 20 years; wire fraud, which carries a maximum prison term of 20 years; and money laundering, which carries a maximum prison term of 20 years.
The maximum potential sentences in this case are prescribed by Congress and are provided here for informational purposes only, as any sentencing of the defendants will be determined by the judge.

U.S. Attorney Bharara praised the investigative work of the FBI and the USSS, and expressed his sincere gratitude to the Office of the State Attorney of the Israel Ministry of Justice’s Department of International Affairs and the Israel National Police, Cyber Unit - Lahav 433, for their support and assistance with the investigation and the ongoing extradition proceedings.  He also thanked the U.S. Securities and Exchange Commission, U.S. Immigration and Customs Enforcement-Homeland Security Investigations, the Financial Industry Regulatory Authority, the National Credit Union Administration, the Justice Department’s Office of International Affairs and the Financial Services Information Sharing and Analysis Center, which significantly aided the investigation by facilitating information-sharing among the victim institutions.
The prosecution of this case is being overseen by the U.S. Attorney’s Office of the Southern District of New York’s Complex Frauds and Cybercrime Unit.  Assistant U.S. Attorneys Nicole Friedlander, Eun Young Choi and Sarah Lai of the Southern District of New York are in charge of the prosecution.  Assistant U.S. Attorney Edward Diskant of the Southern District of New York’s Money Laundering and Asset Forfeiture Unit is in charge of the forfeiture aspects of the case.
The charges contained in the indictment are merely accusations, and the defendants are presumed innocent unless and until proven guilty.

[1] As the introductory phrase signifies, the entirety of the text of the superseding indictment and the description of the indictment set forth herein constitute only allegations, and every fact described should be treated as an allegation.