SlideShare a Scribd company logo
Indonesia Anti Malware
Communities
APCERT AGM 2016
www.cert.or.id/
Introduction
Setia Juli Irzal Ismail
- Jul
Malware Analyst: ID-CERT
Lecture: Telkom University
www.cert.or.id/
We often hear sad news about
Security and Malware in Indonesia
Indonesia are the most dangerous places in
Internet?
www.cert.or.id/
Indonesia are no 1
source of attack in Internet
www.cert.or.id/
State Of Internet Report Q2-2013 Akamai
Ranked No 2 in Asia Pacific Malware
infection index 2016 - Microsoft
www.cert.or.id/
Kaspersky
52,03 % computer in Indonesia are infected
with Malware
www.cert.or.id/
Is It True ?
www.cert.or.id/
To Find the answer ...
ID-CERT gather the Anti Malware Communities
www.cert.or.id/
Indonesia Malware summit
l Security community
l Researcher
l Government
l Industry
l Local AV
www.cert.or.id/
After Long Discussion ...
www.cert.or.id/
Possibly reason
1. Pirated Software
84% Computer in Indonesia use pirated
Software (BSA Global Survey 2014)
2. Lack of security awareness
www.cert.or.id/
Take Away
Local Malware numbers are reducing
l Denzuko (89) à removes Brain virus
l Die Hard (94)
l Serbu (95)
l Indonesia Emas (95)
l Brontok (2006)
l Kspoold (2007)
www.cert.or.id/
Local Antivirus
l PCMAV
l SMADAV
l Spensav, Infaltech, Indosky
www.cert.or.id/
Research
l Honeynet chapter Indonesia
l CERTs
l Campus
www.cert.or.id/
Honeynet chapter
17 honeynet sensor
http://public.honeynet.id/
• Deception Technology
• Data Mining
• Cybercrime
• Cyber physical
http:://ihpcon.id
www.cert.or.id/
CERT
l ID-CERT: Androscanner
l ID-SIRTII: AMOS (Android Malware OS)
l ACAD-CSIRT
l Gov-CSIRT
l BPPT-CSIRT
l usw
www.cert.or.id/
Campus
l ITB
l Telkom University
l SGU
l ITS
l UGM
www.cert.or.id/
Government
l KOMINFO (Ministry of Communication and
Informatics)
l KEMENDAG (Ministry of Trade)
l POLRI (Indonesian Police)
www.cert.or.id/
Industry
l Vaksin.com
l Banking
www.cert.or.id/
Community
l Echo
l Virusindonesia
l RNDC
l Bandung, Jakarta, Jogjakarta, Malang
Surabaya
www.cert.or.id/
Challenge
l Pirated Software
l Lack of Security Awareness
l Lack of Human resources
l Limited resource
l Local Malware Scanner service
www.cert.or.id/
Terima Kasih
jul [at] cert.or.id ;
julismail [at] telkomuniversity.ac.id
Tw: jul_ismail
Blog: julismail.staff.telkomuniversity.ac.id
www.cert.or.id/
References
Akamai State of the Internet Q2-2013
Microsoft Malware Infection Index 2016
Kaspersky IT Threat Evolution 2014
BSA Global Survey 2014
Cert.or.id
Ihpcon.id
Julismail.staff.telkomuniversity.ac.id
www.cert.or.id/

More Related Content

PPTX
Introduction to Malware Detection and Reverse Engineering
PPTX
Malware Analysis
PPTX
Detection and Analysis of 0-Day Threats
PPTX
Detecting Evasive Malware in Sandbox
PPT
The Future of Automated Malware Generation
PDF
Malware Evasion Techniques
PPTX
Chasing the Adder. A tale from the APT world...
PPTX
Evading & Bypassing Anti-Malware applications using metasploit
Introduction to Malware Detection and Reverse Engineering
Malware Analysis
Detection and Analysis of 0-Day Threats
Detecting Evasive Malware in Sandbox
The Future of Automated Malware Generation
Malware Evasion Techniques
Chasing the Adder. A tale from the APT world...
Evading & Bypassing Anti-Malware applications using metasploit

What's hot (20)

PDF
Anti evasion and evader - klaus majewski
PDF
42 - Malware - Understand the Threat and How to Respond
PPTX
How to assign a CVE to yourself?
PPTX
Common Techniques To Identify Advanced Persistent Threat (APT)
PDF
Malware detection-using-machine-learning
PPTX
Malware Classification and Analysis
PPTX
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
 
PPTX
Android malware analysis
PPTX
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detection
PPTX
Automating malware analysis
PDF
01_Metasploit - The Elixir of Network Security
PPTX
Basic Malware Analysis
PDF
Malware Detection in Android Applications
PPTX
Reversing malware analysis training part10 exploit development basics
PPTX
Advanced malware analysis training session6 malware sandbox analysis
PPTX
Java application security the hard way - a workshop for the serious developer
PDF
Research Paper on Rootkit.
PDF
Android malware overview, status and dilemmas
ODP
Malware analysis
Anti evasion and evader - klaus majewski
42 - Malware - Understand the Threat and How to Respond
How to assign a CVE to yourself?
Common Techniques To Identify Advanced Persistent Threat (APT)
Malware detection-using-machine-learning
Malware Classification and Analysis
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
 
Android malware analysis
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Automating malware analysis
01_Metasploit - The Elixir of Network Security
Basic Malware Analysis
Malware Detection in Android Applications
Reversing malware analysis training part10 exploit development basics
Advanced malware analysis training session6 malware sandbox analysis
Java application security the hard way - a workshop for the serious developer
Research Paper on Rootkit.
Android malware overview, status and dilemmas
Malware analysis
Ad

More from Setia Juli Irzal Ismail (20)

PDF
Petunjuk assessmen Kajian 3 - Attack defense
PDF
Minggu 2-2 Praktikum Instalasi RouterOS pada Virtualisasi-2.pdf
PDF
Introduction to self-Supervised learning - kuliah machine learning STEI ITB
PDF
Materi lanjutan Deep Learning S1 Telekomunikasi - STEI ITB
PDF
Slide materi pengantar kuliah Deep Learning STEI ITB
PDF
slide-share.pdf
PDF
slide-lp3i-final.pdf
PDF
society50-jul-share.pdf
PDF
57 slide presentation
PDF
Panduan Proyek Akhir D3 Teknologi Komputer Telkom University
PDF
Sosialisasi kurikulum2020
PDF
Welcoming maba 2020
PDF
Tugas besar MK Keamanan Jaringan
PDF
PDF
PDF
03 keamanan password
PDF
02 teknik penyerangan
PDF
01a pengenalan keamanan jaringan upload
PDF
Kajian3 upload
PDF
1.pendahuluan sistem operasi
Petunjuk assessmen Kajian 3 - Attack defense
Minggu 2-2 Praktikum Instalasi RouterOS pada Virtualisasi-2.pdf
Introduction to self-Supervised learning - kuliah machine learning STEI ITB
Materi lanjutan Deep Learning S1 Telekomunikasi - STEI ITB
Slide materi pengantar kuliah Deep Learning STEI ITB
slide-share.pdf
slide-lp3i-final.pdf
society50-jul-share.pdf
57 slide presentation
Panduan Proyek Akhir D3 Teknologi Komputer Telkom University
Sosialisasi kurikulum2020
Welcoming maba 2020
Tugas besar MK Keamanan Jaringan
03 keamanan password
02 teknik penyerangan
01a pengenalan keamanan jaringan upload
Kajian3 upload
1.pendahuluan sistem operasi
Ad

Recently uploaded (20)

PDF
Indian roads congress 037 - 2012 Flexible pavement
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
RMMM.pdf make it easy to upload and study
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
Classroom Observation Tools for Teachers
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
advance database management system book.pdf
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
Hazard Identification & Risk Assessment .pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
Computing-Curriculum for Schools in Ghana
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Indian roads congress 037 - 2012 Flexible pavement
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
Paper A Mock Exam 9_ Attempt review.pdf.
RMMM.pdf make it easy to upload and study
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Orientation - ARALprogram of Deped to the Parents.pptx
Classroom Observation Tools for Teachers
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
LDMMIA Reiki Yoga Finals Review Spring Summer
advance database management system book.pdf
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Hazard Identification & Risk Assessment .pdf
Final Presentation General Medicine 03-08-2024.pptx
Chinmaya Tiranga quiz Grand Finale.pdf
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Computing-Curriculum for Schools in Ghana
Supply Chain Operations Speaking Notes -ICLT Program
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf

Slide jul apcert agm 2016