Tencent security dialogue Yong: What are the new security challenges brought by the Internet industry

[TechWeb] June 12 message on the International Security Technology Summit 2019 Tencent, Tencent, head of security platform, Tencent Yang Yong, vice president of security, told TechWeb, etc., the development of the Internet industry to bring a lot of new security issues challenges, specifically in three areas.

QQ picture 20190612150224

Tencent security platform, Head, Yang Yong, vice president of Tencent security

First, the attack surface to expand, such as automotive safety issues Tencent latest research lab safety Cohen, in fact, the Internet has brought industry, the automotive industry in conjunction with the Internet travel security.

Second, cross-border, if you want to solve the security problem, now we need to combine more different areas of knowledge.

Third, the emergence of the industrial scene of the attack, and now more and more industrialization attack scenario, for example, before the attack is that you have a piece of code, the operating system has a loophole, then I put a good vulnerability research I went black, and then you the stolen data came out, which is the main form of expression.

Industry attack scenario is different, such as the electricity supplier industry, "Maybe I am also using this loophole, but my goal is to pull out of wool, put your red, marketing costs all to steal. Before I might be more numerous Trojans, it is through a variety of ways to break something such as Internet banking through loopholes, risk control deficiencies to attack. after the attack finished, I passed your financial identity theft, and put out a loan to cheat you, then I steal, then take the line out money for consumption. "

Yong further explained that the attack scenes can be divided into two categories, one is the hackers do not care you know, the other is very concerned about whether the hackers you know. The "cross-border" black production often belong to the latter, "For example, a hacker can control the car, but we can not wait for the car crash and then defense."

Yong said that the current black production may even "pull out" a bank loan. "There are a lot of black with a high-quality production team and cross-border technology, for example, we found that the attack against the financial sector can make black production operations plus credit and bank them through software analysis, found that some financial firms validation logic are on the local. Since then a lot of them directly out of the amount of the loan and false account by changing the local data. "

Attack Surface expand the harm is different, for example, before the introduction of no travel, more of a blue screen computer or mobile phone machine data loss, but when you introduce the Internet industry, the travel industry is likely to cause personal safety issues.

But conversely, the biggest risk is not these security issues, the biggest risk is not development. "Security is not just for everyone to clarify what are the risks and secure the greatest value is to tell us can feel at ease development." Yong said.

The following excerpt is part of the QA:

Q: With the development of the Internet industry, is there some new security problems, do you think there are safety trends and new areas of what?

Yong: Problems and all things Internet industry brought by the Internet include: first, expanding the attack surface; second, cross-border. When addressing security issues, now we need to combine more different areas of knowledge; third, the emergence of the industrial scene of the attack.

Increasing industrialization of the attack scene, for example, what the previous attacks? Before the attacks is that you have a piece of code, the operating system has a loophole, then I put a good vulnerability research I went black, and then put out to steal your data, which is the main form of expression.

What industry attack scene? For example, you do the electricity business, I may also use this loophole, but my goal is to pull out of wool, put your red, marketing costs all to steal. Before I might be more numerous Trojans, now it is through a variety of ways to break something such as Internet banking through loopholes, risk control deficiencies to attack. After the attack finished, I passed your financial identity theft, and then lend you lie out, and then I steal, then take the line out money for consumption.

What this situation is? Many industrial attack scene, the car is, the building also. Because of what? Because after all this is now the Internet, in fact, no longer a simple attack scene stealing data acquisition rights and simple operating system. But what? But more and more diverse, such as car can actually threaten the safety of others, some bad people, because the car just like what you carry, you can steal a lot of privacy. It is a building. So, I think we should change from industry to re-examine the safety of the Internet.

Q: After the attack was extended past the hacker has now become a hacker army, black production have been involved in the safety of things, such as camera theft, eavesdropping, perhaps even intelligent door locks, there are no cases to scale ?

Yong: The question on occasion we can analyze the origin of the problem. What attack scenario? Starting the actual attack scenario can be divided into two categories from your problems: first, hackers do not care do not know you know. The second category, hackers really care about you know not to know, such as eavesdropping, theft, attack, he is going to do self hidden.

So, if we do defense in this regard, such as the safety car, in fact, we can not expect the attack scene and really in our midst, we go on defense. And so that if it fell off the aircraft, and other anti-car crash and then we actually too late. For example WannaCry that problem out later, I do not know if you have not thought about, when many airports grounded. If we do not fall this time as a wake-up call and other aircraft, then probably hundreds of aircraft together fell down, the risk points here. This kind of problem, I think we have more to think on the scene.

There is a pull out wool it. This sort of thing is our business through our scene, as well as help our customers on the cloud can be found. This category often not know the future, we actually through big data, algorithms, the ability to find these things out and then attack. As an example, we found that the financial sector has recently been a lot of wool party, we all know that the party will actually wool brush coupons, rebate coupons, discount coupons, and even to you can even buy these things on some of the electricity supplier website, these are obvious brush from.

But you do not know it, these people still doing it? Such as mineral water bottles which have winning labels, many people to recover the waste receiving station, after receiving the finished caps together, and then through a mechanized assembly line, and there is a camera AI above identification code, if any, the code is extracted and then concentrated Duijiang. IoT of hackers have not yet, he is the obvious cross-border, from the acquisition of industrial waste artificial intelligence to identify and gather wool to wool party, people industry chain has a very high-quality team.

We have also seen a case, this may be a lot of people do not know is that we have found an attack on the financial sector, they now do a lot of the financial sector will give the user the actual conduct open account credit behavior, we found a number of cases, we found that some teams do these things, there is some wool that is before the pull out and began walking toward the financial sector.

What they do is? They have a professional team to reverse the traditional technical analysis of vulnerabilities, software tracking technology used in the software to analyze the bank, we analyze the mobile phone industry's financial software. Then they found some of the loopholes, some of the cases we found is that they have some financial firms are on the local validation logic. Others through reverse his cell phone, he found his check on the business logic is not cloud, but on the local. Then you can open a lot of direct loans by changing the amount of local data, out of a lot of false accounts, false identity, this is not a cross-border, not to expand the attack surface?

But the risk of this industry is very big, because in the past, then I might just open a few 10 $ 20 membership card to see the film. But this might be thousands or even hundreds of thousands of loan, which is a change in the industry.

So, I think whether it is our field trip or risk control, security and the whole thing is not just our several departments, even companies do. Is actually a national or even global thing, it will open an international technical exchanges summit, because once this thing is to get through the challenges we face together.

Q: before the security industry are pure investment, Cohen laboratory now there is no profit? In addition to the car and then this one, is there some other aspects of the experience?

Tencent Security Labs director Cohen Lvyi Ping: To mention this, then we should mention the 930 changes, Tencent last year made an adjustment, consumer Internet by the Internet industry transformation. At that time adjustment is the big CSIG, and wisdom is the cloud industry business group, as we have with them Yong division of labor there are some differences, they are defending their own applications Tencent as the main task, but they are now also expanding cloud capabilities include cloud computing Wait. They now also have a lot of dry goods to all aspects of output. For us, since we CSIG, then we need to do some work for the escort of some key industries.

Of course one thing, we do not want this cooperation is free, because only charge customers will carefully consider if I would use this ability to Cohen. This is a two-way is a more rigorous thinking and choice, so as to really coordinate the process of cooperation, the other party will take this matter more seriously, step by step, then we do this thing. Indeed, we now are commercial and industry cooperation mode of cooperation, should be charged to do.

The second issue, now in addition to the car we are exploring some new scenes. Just because Yang Yong also mention, the car is only a small scene, a scene all too many things together. For example, this year we will have project robot, the robot will be divided into two categories, service robots, consumers will face. A class of industrial robots, to do a bit of wisdom like manufacturing, intelligent manufacturing piece.

For example, service robots are now at the airport, plaza, supermarket saw some robots, robot police patrol either with, or is seen supermarket shopping guide robot. That robot weight 80 kg, a top speed of 60. So if it is malicious manipulation, and if run around here, is a small tank, it will actually lead to some public safety issues. That's why this will affect the physical world.

We are still looking smart elevators, there are many sensors on the elevator, it has a communication module, you can also remotely control the elevator. This is because the elevator industry, the demand for it is the original elevator inspection run by people, a man ran 100 a week elevator, inspection work, the high cost. Now after the sensor, the remote control center will be able to monitor, such as the elevator components has aged, I want to exchange, the local elevator may be some glitches need to be repaired, or even send some repair instructions do repair remote. In this case, its operating costs can be reduced by 90% in terms of elevator operators is a great advantage.

However, precisely because of the introduction of a lot of remote control, remote delivery function, if a malicious application, it can also cause non-stop up and down the elevator control of the elevator and even frightened of security are greatly affected. We also did a including in the elevator, the elevator and now in addition to the people control the media as well as a screen or projector is packed elevator doors, which put some of this video. We have proven through actual case, I can replace the video inside, if there are some sensitive, I put some things should not be put, this impact will be very large in terms of elevator operators, there may be some political not true that there would be some problems.

There are cameras, security cameras are now so common, our studies have proved what we can do on the camera it? We see the effect of the movie. A person walking past the camera shown above, people walk past. Last night non-stop playback and no one in the picture, just yesterday I went home turn on the TV is "Speed", "Speed", there are some bad guys on the scene of the bus monitor with a camera, he recorded a video, that video continue to play the bad guy deception, in fact, what we do is similar scene. But in the security scenario, which itself is something security attributes, this problem is difficult to accept that such security failures.

There are smart locks, we actually did a study, a remote region can open a door to thousands, this can be done. We now also include a look at the industrial controller, and such as power, energy, chemical industry and other important industries, such as chemical chemical reaction control, control of power substations, including smart meters.

You will see all things together Yong just mentioned is just beginning, just opened a prelude, can do very, very much, there are many areas of concern. The key question is, in fact, safe Cohen alone or Tencent are not enough, we may also need to work together to strive to do this, it can really protect the security of our new era of technology. (White week)

Guess you like

Origin blog.csdn.net/rx3oyuyi/article/details/91531397