Online How cybercriminals exploit the platform

Let’s begin by stating the obvious…

This is ONLY possible if people continue to have trust in the medium!

…the is important for marketing! How online advertising works

Advertisers

Ad Exchange

click! click! click! click! click! click!

Ad Publishers Robot networks – 101 Malicious Code Click Fraud Cyber Piracy

Credential Thief Bot-herder

Malware Nikee. Nikee. com com

Nike pays for clicks Consumer buys Identity on typosquatting competitive brand Theft Automated site advertised Clicks Ad-based

malicious code Bot-herder Credential Thief

Malware distributor Malware Ads infected distributor with malware Ads infected with malware

User clicks on ad and is infected with malware

User clicks on ad and is infected with malware The computer is now part of the bot-herder’s army and can be used for a number of online crimes

Identity Theft Automated Clicks/click fraud Click Fraud

Bot-herder

Automated Clicks

Without good oversight, advertisers could be wind up paying the ad exchange and publisher for illegitimate clicks www.nikee.com www.nyke.com Cyber Piracy www.nik.com

Domain Parking

Nikee. com Nikee. User sees sees ad ad com User clicks on for competitor’s Nike ad productcompetitor’s and buysproduct it and buys it Disrupting

OPERATION OPERATION OPERATION OPERATION OPERATION OPERATION OPERATION OPERATION b49 b107 b79 b71 b70 b58 b54 b68 Waledac Rustock Kelihos Zeus Nitol Bamital Citadel ZeroAccess

Disrupting Criminal Business

Cost of Business Value of Infection ZeroAccess For more info: Microsoft.com/DCU

Follow us on Facebook and Twitter! facebook.com/MicrosoftDCU twitter.com/MicrosoftDCU