Placeholder Image

字幕列表 影片播放

  • Translator: Leslie Gauthier Reviewer: Camille Martínez

    譯者: Kuan-Yi Li 審譯者: 庭芝 梁

  • Cybercrime is out of control.

    網路犯罪已經失控了。

  • It's everywhere.

    它無所不在。

  • We hear about it every single day.

    我們每天都會耳聞這樣的事件。

  • This year,

    在今年,超過 20 億筆紀錄 遺失或遭竊。

  • over two billion records lost or stolen.

    而在去年,有一億人, 其中大部分是美國人,

  • And last year, 100 million of us, mostly Americans,

    健保資料落入竊賊手中, 我也身受其害。

  • lost our health insurance data to thieves -- myself included.

    更令人擔憂的是:

  • What's particularly concerning about this is that in most cases,

    在大多數事件中,

  • it was months before anyone even reported that these records were stolen.

    就算有人回報資料被偷, 往往也是幾個月之後的事了。

  • So if you watch the evening news,

    所以你看到晚間新聞報導時,

  • you would think that most of this is espionage or nation-state activity.

    你可能會認為這些大部分是 諜報或國家層級的行動。

  • And, well, some of it is.

    嗯,有些的確是。

  • Espionage, you see, is an accepted international practice.

    如你所見,諜報活動 已經是一種「國際慣例」,

  • But in this case,

    但在這個案例當中,

  • it is only a small portion of the problem that we're dealing with.

    它只是我們所面對難題 其中的一小部分。

  • How often do we hear about a breach

    我們是否經常聽到這些入侵事件,

  • followed by, "... it was the result of a sophisticated nation-state attack?"

    被描述成: 「這是件精心策劃的國家攻擊行動」

  • Well, often that is companies not being willing to own up

    通常,這是公司不願意承認

  • to their own lackluster security practices.

    自身安全措施失靈的推托之詞。

  • There is also a widely held belief

    而且這些公司普遍相信,

  • that by blaming an attack on a nation-state,

    只要將攻擊歸咎於某個國家,

  • you are putting regulators at bay --

    就可以逃避主管機關的監督──

  • at least for a period of time.

    或是至少拖延一段時間。

  • So where is all of this coming from?

    那麼實際上網路犯罪從何而來?

  • The United Nations estimates that 80 percent of it

    聯合國估計 80% 的網路犯罪,

  • is from highly organized and ultrasophisticated criminal gangs.

    來自具有高度組織 且分工精細的犯罪集團。

  • To date,

    時至今日,

  • this represents one of the largest illegal economies in the world,

    網路犯罪已是世界上 最大的非法經濟體之一。

  • topping out at, now get this,

    而在這之上 ──大家聽好了──

  • 445 billion dollars.

    是 4,450 億美金的獲利。

  • Let me put that in perspective for all of you:

    我來給大家更具體的概念:

  • 445 billion dollars is larger than the GDP

    4,450 億美金已經超過了

  • of 160 nations,

    160 個國家的國內生產總值,

  • including Ireland, Finland, Denmark and Portugal,

    其中包括愛爾蘭、芬蘭、 丹麥和葡萄牙......

  • to name a few.

    等等國家。

  • So how does this work?

    這個體系是如何運作的?

  • How do these criminals operate?

    這些罪犯又如何進行作業?

  • Well, let me tell you a little story.

    讓我說個小故事給你們聽。

  • About a year ago,

    大約一年前,

  • our security researchers were tracking

    我們的資安研究員正在追蹤一個

  • a somewhat ordinary but sophisticated banking Trojan called the Dyre Wolf.

    看似尋常卻很精密的 銀行木馬程式── Dyre Wolf。

  • The Dyre Wolf would get on your computer

    這隻程式會進入你的電腦,

  • via you clicking on a link in a phishing email

    是因為你點擊了 釣魚信件中的網址──

  • that you probably shouldn't have.

    你不應該點擊的。

  • It would then sit and wait.

    接著它會守株待兔,

  • It would wait until you logged into your bank account.

    等待你登入銀行帳戶。

  • And when you did, the bad guys would reach in,

    到時候,歹徒就大手一伸,

  • steal your credentials,

    盜用你的身份,

  • and then use that to steal your money.

    然後偷走你的錢。

  • This sounds terrible,

    這聽起來很嚇人,

  • but the reality is, in the security industry,

    但事實上,在資訊安全領域,

  • this form of attack is somewhat commonplace.

    這種形式的攻擊還算常見。

  • However, the Dyre Wolf had two distinctly different personalities --

    然而,Dyre Wolf 程式 具有雙重人格──

  • one for these small transactions,

    其中一個是針對剛提到的小額交易,

  • but it took on an entirely different persona

    但如果你的工作 會接觸到大筆金錢往來,

  • if you were in the business of moving large-scale wire transfers.

    它就會展現出截然不同的另一面。

  • Here's what would happen.

    過程會是這樣的。

  • You start the process of issuing a wire transfer,

    當你啟動匯款流程,

  • and up in your browser would pop a screen from your bank,

    在瀏覽器上, 你的網路銀行會跳出一個畫面,

  • indicating that there's a problem with your account,

    顯示你的帳戶出現問題,

  • and that you need to call the bank immediately,

    你必須馬上打電話給銀行,

  • along with the number to the bank's fraud department.

    並附上銀行防詐騙部門的專線號碼。

  • So you pick up the phone and you call.

    於是你拿起電話撥過去。

  • And after going through the normal voice prompts,

    經過一連串看似正常的語音指示後,

  • you're met with an English-speaking operator.

    你被轉接給一位英語客服。

  • "Hello, Altoro Mutual Bank. How can I help you?"

    「哈囉!奧多羅互助銀行。 很高興為您服務。」

  • And you go through the process like you do every time you call your bank,

    接著你一如往常進行整個流程:

  • of giving them your name and your account number,

    給出你的名字、帳戶、

  • going through the security checks to verify you are who you said you are.

    回答安全問題以確認你的身份。

  • Most of us may not know this,

    大部分的人可能不知道,

  • but in many large-scale wire transfers,

    在許多的鉅額轉帳中,

  • it requires two people to sign off on the wire transfer,

    規定要經過兩個人的確認,

  • so the operator then asks you to get the second person on the line,

    接著客服請第二個人聽電話,

  • and goes through the same set of verifications and checks.

    然後進行同樣的確認流程。

  • Sounds normal, right?

    聽起來很正常吧?

  • Only one problem:

    只有一個問題:

  • you're not talking to the bank.

    在電話另一端的不是銀行。

  • You're talking to the criminals.

    和你通電話的是歹徒。

  • They had built an English-speaking help desk,

    他們還設置了英語客服中心,

  • fake overlays to the banking website.

    並製作了假的銀行網站。

  • And this was so flawlessly executed

    在這天衣無縫的過程中,

  • that they were moving between a half a million

    每一次作案,就會有 50 萬 至 150 萬美金的不法所得

  • and a million and a half dollars per attempt

    落入歹徒的口袋。

  • into their criminal coffers.

    這些犯罪組織的運作

  • These criminal organizations operate

    就像紀律嚴明的合法企業。

  • like highly regimented, legitimate businesses.

    他們的員工從週一工作到週五,

  • Their employees work Monday through Friday.

    週末則是放假休息。

  • They take the weekends off.

    我們為什麼知道?

  • How do we know this?

    這是因為我們的資安研究人員發現

  • We know this because our security researchers see

    每當週五下午, 惡意程式都會大量出現。

  • repeated spikes of malware on a Friday afternoon.

    這些壞蛋們陪老婆小孩度過週末,

  • The bad guys, after a long weekend with the wife and kids,

    之後就可以回來驗收成果。

  • come back in to see how well things went.

    「暗網」是他們棲息的地方。

  • The Dark Web is where they spend their time.

    這個詞是用來描述 隱藏在網際網路中的匿名空間。

  • That is a term used to describe the anonymous underbelly of the internet,

    竊賊們在此得以匿名行事,

  • where thieves can operate with anonymity

    而不會被人發現。

  • and without detection.

    他們在此兜售攻擊軟體,

  • Here they peddle their attack software

    並且分享各種新的攻擊技術。

  • and share information on new attack techniques.

    在那裡,你能買到任何東西,

  • You can buy everything there,

    從基本等級的攻擊服務

  • from a base-level attack to a much more advanced version.

    到更進階的版本都有。

  • In fact, in many cases, you even see

    在很多地方,你甚至會看到

  • gold, silver and bronze levels of service.

    被區分為金、銀、銅等級 的各種攻擊服務。

  • You can check references.

    你可以查詢他人的推薦心得。

  • You can even buy attacks

    你所購買的攻擊服務

  • that come with a money-back guarantee --

    甚至還能有退款保證──

  • (Laughter)

    (笑聲)

  • if you're not successful.

    如果你的攻擊沒有成功。

  • Now, these environments, these marketplaces --

    這樣的環境、這樣的交易市集,

  • they look like an Amazon or an eBay.

    看起來跟亞馬遜或 eBay 一模一樣。

  • You see products, prices, ratings and reviews.

    你看得到產品、價格、評分跟評論。

  • Of course, if you're going to buy an attack,

    如果你要買攻擊服務,

  • you're going to buy from a reputable criminal with good ratings, right?

    你當然會向評分高、 名聲好的罪犯購買,對吧?

  • (Laughter)

    (笑聲)

  • This isn't any different

    這就像你要到一間新的餐廳之前,

  • than checking on Yelp or TripAdvisor before going to a new restaurant.

    會先到 Yelp 或 TripAdvisor 網站 查詢評價一樣。

  • So, here is an example.

    我舉個例子。

  • This is an actual screenshot of a vendor selling malware.

    這是從惡意軟體販賣者的網頁 所擷取的真實畫面。

  • Notice they're a vendor level four,

    他是屬於第四級的販賣商,

  • they have a trust level of six.

    他的信賴度則是第六級。

  • They've had 400 positive reviews in the last year,

    他在去年得到 400 個正面評價,

  • and only two negative reviews in the last month.

    而在上個月的負面評價只有兩個。

  • We even see things like licensing terms.

    我們甚至在上面看到授權條款。

  • Here's an example of a site you can go to

    另外這個網站,

  • if you want to change your identity.

    如果你想要改變個人身分, 可以上去看看。

  • They will sell you a fake ID,

    他們販賣假身分證、

  • fake passports.

    假護照。

  • But note the legally binding terms for purchasing your fake ID.

    特別注意有關購買假證件的法律條款。

  • Give me a break.

    饒了我吧!

  • What are they going to do -- sue you if you violate them?

    就算你違反了這些條款, 他們能怎樣?控告你嗎?

  • (Laughter)

    (笑聲)

  • This occurred a couple of months ago.

    就在幾個月前,

  • One of our security researchers was looking

    我們的一位資安研究員

  • at a new Android malware application that we had discovered.

    正在分析新發現的一個 Android 惡意程式。

  • It was called Bilal Bot.

    這個程式叫 Bilal Bot。

  • In a blog post,

    在一篇部落格文章中,

  • she positioned Bilal Bot as a new, inexpensive and beta alternative

    她(部落格作者) 將 Bilal Bot 定位為

  • to the much more advanced GM Bot

    新穎、便宜、待測試修正的、 另一個 GM Bot 程式的替代品,

  • that was commonplace in the criminal underground.

    而 GM Bot 更為先進, 在地下黑市非常普及。

  • This review did not sit well with the authors of Bilal Bot.

    Bilal Bot 作者對此評論感到不滿。

  • So they wrote her this very email,

    所以他們寫了這封信給她,

  • pleading their case and making the argument

    除了為產品辯護,

  • that they felt she had evaluated an older version.

    並認為她所評測的是舊版程式。

  • They asked her to please update her blog with more accurate information

    他們要求她更新部落格 以提供更正確的資訊,

  • and even offered to do an interview

    甚至要求當面對談,

  • to describe to her in detail

    好向她詳細解釋

  • how their attack software was now far better than the competition.

    他們的攻擊程式如何比競爭對手更好。

  • So look,

    所以你瞧,

  • you don't have to like what they do,

    你不需認同他們的行為,

  • but you do have to respect the entrepreneurial nature

    但你得敬佩他們

  • of their endeavors.

    在努力的過程中 所流露出的創業家特質。

  • (Laughter)

    (笑聲)

  • So how are we going to stop this?

    所以,我們要如何阻止這一切?

  • It's not like we're going to be able to identify who's responsible --

    並不是說我們要找出某個人 來追究責任──

  • remember, they operate with anonymity

    記住,他們都匿名行事,

  • and outside the reach of the law.

    置身法律之外。

  • We're certainly not going to be able to prosecute the offenders.

    我們確實無法起訴這些犯罪份子。

  • I would propose that we need a completely new approach.

    我提議,採用完全不同的作法。

  • And that approach needs to be centered on the idea

    這個作法的核心觀念是:

  • that we need to change the economics for the bad guys.

    我們要顛覆那些壞蛋的經濟體系。

  • And to give you a perspective on how this can work,

    為了讓你們了解這個方法為何有效,

  • let's think of the response we see to a healthcare pandemic:

    先回想我們如何面對以下這些傳染病:

  • SARS, Ebola, bird flu, Zika.

    SARS、伊波拉、禽流感、茲卡病毒。

  • What is the top priority?

    第一要務是什麼?

  • It's knowing who is infected and how the disease is spreading.

    是知道誰受到感染 以及疾病如何傳播。

  • Now, governments, private institutions, hospitals, physicians --

    現在,包括政府、私人機構、 醫院、醫師──

  • everyone responds openly and quickly.

    所有人都能開放、迅速地 做好應對工作。

  • This is a collective and altruistic effort

    這樣的集體利他行為,

  • to stop the spread in its tracks

    遏止了疾病的傳播,

  • and to inform anyone not infected

    並告知尚未被感染者

  • how to protect or inoculate themselves.

    如何自保或接種疫苗。

  • Unfortunately, this is not at all what we see in response to a cyber attack.

    不幸地,在面對網路攻擊時, 我們看到的完全不是這樣。

  • Organizations are far more likely to keep information on that attack

    組織更傾向於 將受到攻擊的相關資訊

  • to themselves.

    採取保密。

  • Why?

    為什麼?

  • Because they're worried about competitive advantage,

    因為他們擔心失去競爭優勢、

  • litigation

    面對法律訴訟、

  • or regulation.

    或是接受監督管理。

  • We need to effectively democratize threat intelligence data.

    我們必須有效率地 將網路威脅情資公開。

  • We need to get all of these organizations to open up and share

    我們必須讓這些組織

  • what is in their private arsenal of information.

    開放並分享他們的情報資料庫。

  • The bad guys are moving fast;

    犯罪份子的手法一日千里,

  • we've got to move faster.

    我們必須走在他們之前。

  • And the best way to do that is to open up

    最好的方式便是開放

  • and share data on what's happening.

    並且共享即時資訊。

  • Let's think about this in the construct of security professionals.

    讓我們從資訊安全人員的角度 來反思一下。

  • Remember, they're programmed right into their DNA to keep secrets.

    要知道,這群人 保密的天性深入骨子裡。

  • We've got to turn that thinking on its head.

    我們得扭轉這樣的習性。

  • We've got to get governments, private institutions

    我們得想辦法讓政府、私人機構,

  • and security companies

    還有資安服務業者,

  • willing to share information at speed.

    願意迅速地分享資訊。

  • And here's why:

    原因如下:

  • because if you share the information,

    若是共享訊息,

  • it's equivalent to inoculation.

    就像是接種了疫苗。

  • And if you're not sharing,

    若是拒絕共享,

  • you're actually part of the problem,

    我們就等於是共犯,

  • because you're increasing the odds that other people could be impacted

    因為你可能助長了他人

  • by the same attack techniques.

    被相同手法攻擊的機會。

  • But there's an even bigger benefit.

    這麼做還有更大的好處。

  • By destroying criminals' devices closer to real time,

    用近乎即時的速度消滅犯罪工具,

  • we break their plans.

    我們也破壞了歹徒的計畫。

  • We inform the people they aim to hurt

    我們能用罪犯措手不及的速度,

  • far sooner than they had ever anticipated.

    預先告知民眾, 他們已經成為攻擊目標。

  • We ruin their reputations,

    我們能破壞他們的聲譽,

  • we crush their ratings and reviews.

    毀掉他們的評分及評論。

  • We make cybercrime not pay.

    我們讓網路犯罪無利可圖。

  • We change the economics for the bad guys.

    我們顛覆犯罪份子的經濟體系。

  • But to do this, a first mover was required --

    但要達成這個目標的第一步,

  • someone to change the thinking in the security industry overall.

    是要有人來改變 整個資安產業的思維。

  • About a year ago,

    大約一年前,

  • my colleagues and I had a radical idea.

    我同事和我有個大膽的想法。

  • What if IBM were to take our data --

    如果把全球最大的 網路威脅情報資料庫──

  • we had one of the largest threat intelligence databases in the world --

    也就是 IBM 擁有的資料庫──

  • and open it up?

    把它開放出來如何?

  • It had information not just on what had happened in the past,

    這裡面不只有過去事件的歷史紀錄,

  • but what was happening in near-real time.

    還有近乎即時的資安動態資訊。

  • What if we were to publish it all openly on the internet?

    把這些資料都公開會變成怎樣呢?

  • As you can imagine, this got quite a reaction.

    可想而知,這構想招來激烈反應。

  • First came the lawyers:

    首先是律師問:

  • What are the legal implications of doing that?

    「在法律上會有什麼瓜葛?」

  • Then came the business:

    接著是商業人士:

  • What are the business implications of doing that?

    「在商業上會有什麼含義?」

  • And this was also met with a good dose

    我們還遇到許多聲音

  • of a lot of people just asking if we were completely crazy.

    質疑我們是不是徹底瘋了?

  • But there was one conversation that kept floating to the surface

    但是在我們參與的每場對話當中,

  • in every dialogue that we would have:

    有一個論點持續、逐漸地浮出檯面,

  • the realization that if we didn't do this,

    就是我們瞭解到:

  • then we were part of the problem.

    如果不開放資訊,

  • So we did something unheard of in the security industry.

    我們就成為網路犯罪的共犯。

  • We started publishing.

    所以我們做了 在資安產業中前所未有的事。

  • Over 700 terabytes of actionable threat intelligence data,

    我們開始將資料公開。

  • including information on real-time attacks

    超過 700 兆位元組的資安威脅情報,

  • that can be used to stop cybercrime in its tracks.

    其中包含即時的攻擊資訊,

  • And to date,

    可以協助我們阻斷網路犯罪。

  • over 4,000 organizations are leveraging this data,

    時至今日,

  • including half of the Fortune 100.

    超過四千個組織正在利用這些資料,

  • And our hope as a next step is to get all of those organizations

    包含全球百大企業的一半以上。

  • to join us in the fight,

    下一步,我們希望所有的組織

  • and do the same thing

    都能夠加入這場戰役,

  • and share their information

    跟我們一樣,

  • on when and how they're being attacked as well.

    公開分享他們的資訊──

  • We all have the opportunity to stop it,

    關於他們何時、如何遭受攻擊。

  • and we already all know how.

    我們都有機會阻止這一切,

  • All we have to do is look to the response that we see

    也已經知道該怎麼做了。

  • in the world of health care,

    我們要做的只不過是:

  • and how they respond to a pandemic.

    借鑑全球公共衛生體系 作為他山之石,

  • Simply put,

    以及應對傳染病的做法。

  • we need to be open and collaborative.

    簡而言之,

  • Thank you.

    我們必須開放,並且彼此合作。

  • (Applause)

    謝謝。

Translator: Leslie Gauthier Reviewer: Camille Martínez

譯者: Kuan-Yi Li 審譯者: 庭芝 梁

字幕與單字

單字即點即查 點擊單字可以查詢單字解釋

B1 中級 中文 美國腔 TED 攻擊 程式 網路 銀行 歹徒

【TED】Caleb Barlow:網絡犯罪到底從何而來?(網絡犯罪到底從哪裡來?|Caleb Barlow) (【TED】Caleb Barlow: Where is cybercrime really coming from? (Where is cybercrime really coming from? | Caleb Barlow))

  • 56 5
    Zenn 發佈於 2021 年 01 月 14 日
影片單字