Cyber Crime and Hunting Cyber Criminals
The modern Sherlock Holmes is a digital investigator, tracking down cyber crime across the internet. The most challenging part of fighting cyber crime is the elusive nature of threat actors operating anonymously from behind a computer. Not everyone’s sitting around watching though, since cyber investigators are always lurking in the background, piecing together the clues.
In his book, ‘Hunting Cyber Criminals: A Hacker’s Guide to Online Intelligence Gathering Tools and Techniques’ author Vinny Troia shares his tradecraft for fighting cyber crime. The book covers everything from OSINT automation, criminal psychology to advanced investigative techniques.
Vinny uses personal experiences from investigations, such as the 2-year process of unmasking an infamous cyber crime group, The Dark Overlord. TDO was the hacking group responsible for leaking episodes from Netflix, targeting schools with death threats, and extorting dozens of small businesses during their reign of terror. Vinny’s efforts resulted in the unmasking of TDO’s core members, one who was eventually extradited to the United States to face charges.
Three main takeaways / three key themes for a cyber crime investigation:
1. Vanity trumps OPSEC - For many criminal hackers, notoriety is just as important as financial gain. The desire for attention can create OPSEC flaws for these actors.
2. Have deep access to historical data - Data and the Internet is ever-changing. Having insights into how things have changed is critical for tracing the origins of an incident.
3. Never rely on a single technique - No matter how rudimentary or outdated a tool may be, it never hurts to throw everything you’ve got when it comes to researching an identifier such as a username, number, or picture.
00:00 Intro
00:17 Tracking The Dark Overload
00:56 Vinny Troia’s Methods in Digital Investigation
01:44 Hacker’s Mindset
02:36 Tracing Cryptocurrency in investigations.
03:09 What Digital Investigations Are Like?
04:32 3 Tips for Cyber Investigations
06:42 Why Cyber Crime Is Hard
07:11 Closing Thoughts
Hunting Cyber Criminals: https://www.amazon.com/Hunting-Cyber-Criminals-Intelligence-Techniques-ebook/dp/B083VZTL52
The Dark Overlord Investigation Report:
https://www.dataviper.io/blog/2020/the-dark-overlord-cyber-terrorist-investigation/
Abraham Maslow:
https://en.wikipedia.org/wiki/Abraham_Maslow#Hierarchy_of_needs
Follow @vinnytroia
https://twitter.com/vinnytroia
ICYMI: We released our very own Discord server! Join the cybersecurity conversation at https://discord.gg/ZKwR9CV
FOLLOW and SUBSCRIBE!
👉 YouTube: https://youtube.com/c/cyberspatial
👉 Twitter: https://twitter.com/Cyberspatial_HQ
👉 Facebook: https://facebook.com/Cyberspatial
👉 Instagram: https://instagram.com/cyberspatial
👉 LinkedIn: https://linkedin.com/company/cyberspatial
#CyberCrime #DigitalInvestigations #Cyberspatial
Видео Cyber Crime and Hunting Cyber Criminals канала Cyberspatial
In his book, ‘Hunting Cyber Criminals: A Hacker’s Guide to Online Intelligence Gathering Tools and Techniques’ author Vinny Troia shares his tradecraft for fighting cyber crime. The book covers everything from OSINT automation, criminal psychology to advanced investigative techniques.
Vinny uses personal experiences from investigations, such as the 2-year process of unmasking an infamous cyber crime group, The Dark Overlord. TDO was the hacking group responsible for leaking episodes from Netflix, targeting schools with death threats, and extorting dozens of small businesses during their reign of terror. Vinny’s efforts resulted in the unmasking of TDO’s core members, one who was eventually extradited to the United States to face charges.
Three main takeaways / three key themes for a cyber crime investigation:
1. Vanity trumps OPSEC - For many criminal hackers, notoriety is just as important as financial gain. The desire for attention can create OPSEC flaws for these actors.
2. Have deep access to historical data - Data and the Internet is ever-changing. Having insights into how things have changed is critical for tracing the origins of an incident.
3. Never rely on a single technique - No matter how rudimentary or outdated a tool may be, it never hurts to throw everything you’ve got when it comes to researching an identifier such as a username, number, or picture.
00:00 Intro
00:17 Tracking The Dark Overload
00:56 Vinny Troia’s Methods in Digital Investigation
01:44 Hacker’s Mindset
02:36 Tracing Cryptocurrency in investigations.
03:09 What Digital Investigations Are Like?
04:32 3 Tips for Cyber Investigations
06:42 Why Cyber Crime Is Hard
07:11 Closing Thoughts
Hunting Cyber Criminals: https://www.amazon.com/Hunting-Cyber-Criminals-Intelligence-Techniques-ebook/dp/B083VZTL52
The Dark Overlord Investigation Report:
https://www.dataviper.io/blog/2020/the-dark-overlord-cyber-terrorist-investigation/
Abraham Maslow:
https://en.wikipedia.org/wiki/Abraham_Maslow#Hierarchy_of_needs
Follow @vinnytroia
https://twitter.com/vinnytroia
ICYMI: We released our very own Discord server! Join the cybersecurity conversation at https://discord.gg/ZKwR9CV
FOLLOW and SUBSCRIBE!
👉 YouTube: https://youtube.com/c/cyberspatial
👉 Twitter: https://twitter.com/Cyberspatial_HQ
👉 Facebook: https://facebook.com/Cyberspatial
👉 Instagram: https://instagram.com/cyberspatial
👉 LinkedIn: https://linkedin.com/company/cyberspatial
#CyberCrime #DigitalInvestigations #Cyberspatial
Видео Cyber Crime and Hunting Cyber Criminals канала Cyberspatial
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
OSINT: Sharpen Your Cyber Skills With Open-source Intelligencehacker:HUNTER - Wannacry: The Marcus Hutchins Story - All 3 ChaptersThe secret world of cybercrime | Craig Gibson | TEDxMississaugaWhy Diceware is Best for Strong PasswordsCyber Crime Investigation, Cyber War, Cyber Documentary, CyberCrimeProfiling Hackers - The Psychology of Cybercrime | Mark T. Hoffmann | TEDxHHLLife of a SOC Lead (w/ Alberto Rodriguez)What's It Like As A Red Team Operator? (w/ Chris M.)James Lyne: Everyday cybercrime -- and what you can do about itHow North Korea Conducts Cyber OperationsAn Almost Perfect Murder (True Crime Documentary) | Real StoriesThe Cyber Crimes You Never Hear AboutEx-Cyber Criminal Answers Burning Questions About The Dark WebDFS101: 4.1 Basics of Cybercrime Investigation4 Best Ways to Send Files to YourselfCyber Crime Isn't About Computers: It's About Behavior | Adam Anderson | TEDxGreenvilleThe invisible enemy: Cyber terrorists wreaking havoc and costing billions | 60 Minutes AustraliaGetting Into Cyber Security: 5 Skills You NEED to LearnThe World's First Cyber Crime: The Morris Worm [KERNEL PANIC]When Cybercriminals with Good OpSec Attack