Category Archives: Cyber Criminals

How much do you know about impostor email scams?

Business Email Compromise or impostor email scams are attractive to cyber-criminals who want a simple strategy that gives them high returns – what types should you be aware of?

Business Email Compromise scams are growing more prevalent as cybercrime incidents increase across the board. With cyber-criminals eyeing up even more businesses than ever before, it’s wise to be aware of the different varieties of impostor email threats you might encounter in work.

Security firm Proofpoint put together this useful infographic with some vital knowledge that everyone should be arming themselves with to avoid falling victim to cybercrime.

According to Proofpoint, impostor email threats have hit more than 70,000 companies since the FBI’s Internet Crime Complaint Centre began tracking this variety of scam in late 2013. Although many messages can be easily detected as phishing scams, the ones that slip through the cracks could cost millions in fraudulent transfers.

Four main types

Read more at: https://www.siliconrepublic.com/enterprise/impostor-email-fraud-types

Roles and Responsibilities for Defending the Nation from Cyber Attack

Chairman McCain, Ranking Member Reed, and members of the committee, thank you for the invitation to provide remarks on the FBI’s role in defending the nation against cyber threats.

As the committee is well aware, the frequency and impact of cyber attacks on our nation’s private sector and government networks have increased dramatically in the past decade and are expected to continue to grow. We continue to see an increase in the scale and scope of reporting on malicious cyber activity that can be measured by the amount of corporate data stolen or deleted, personally identifiable information compromised, or remediation costs incurred by U.S. victims. Within the FBI, we are focused on the most dangerous malicious cyber activity: high-level intrusions by state-sponsored hackers and global organized crime syndicates, as well as other technically sophisticated attacks.

Cyber threats are not only increasing in scope and scale, they are also becoming increasingly difficult to

Read more at: https://www.fbi.gov/news/testimony/cyber-roles-and-responsibilities

5 Things You Need to Know About the New (and Scary) Wave of ‘File-less’ Cyber Attacks

In the wake of the Equifax breach and the global WannaCry ransomware outbreak earlier this year, tensions around cybersecurity are at an all-time high. Companies are feeling more pressure to invest in new policies and products that can keep their sensitive data safe.

Yet even as they increase their security budgets, many organizations harbor real concerns as to whether any existing technology can help them keep up with the rapidly evolving nature of today’s threats.

Related: Got Effective Cybersecurity Practices? Be Aware: The FTC Is Watching You.

In particular, they’re worried about the steadily growing number of attacks designed to gain access to their systems and silently infect them silently, without ever downloading malicious programs or leaving behind any obvious trace.

These attacks can go by several names. “Fileless attacks” is a common one, but “non-malware attacks and” “living-off-the-land attacks” are also

Read more at: https://www.entrepreneur.com/article/303399

How mobile phones have become the fingerprints of the future for cyber cops

They are the everyday essential most of us will not leave the house without.

But mobile phones can also provide police with all the evidence they need to snare even the craftiest of crooks .

As thieves, paedophiles and fraudsters move from the streets to the web to commit their crimes, police are also harnessing high-tech crime fighting methods in a bid to keep up with a new breed of cyber criminal.

Today in part three of our Cyber Crime series the Chronicle goes behind the scenes at Northumbria Police’s Digital Forensics Unit as staff and officers reveal how offenders’ phones, computers and tablets are providing the clues they need to bring them to book.

And the former cop who runs the facility, in Byker, Newcastle, said there was little criminals could hide from his tech-savvy team.

Jerry Hewitt, Digital Forensic Unit Manager at Northumbria Police

Read more at: http://www.chroniclelive.co.uk/news/north-east-news/how-mobile-phones-become-fingerprints-13791561

October is Cyber Security Awareness Month | 91.5 KIOS-FM – 91.5 KIOS

October is National Cyber Security Awareness Month, which the Department of Homeland Security (dhs.gov) says is “a yearly campaign to raise awareness about the importance of cyber security.”

Dr. Matthew Hale, Assistant Professor of Cybersecurity at UNO, says long before the huge Equifax breach there was plenty of reason to be concerned about identity theft.  He describes identity theft and credit card fraud  as “active areas of cyber crime” and “a massive industry” 

“It’s surprising how cheap you can actually get people’s information on the black market.  It turns out there’s roughly about 16 billion dollars in identify theft and fraud; this was just last year. And it typically affects about 15.4 million Americans – I think that was the

Read more at: http://kios.org/post/october-cyber-security-awareness-month

October is Cyber Security Awareness Month – 91.5 KIOS

October is National Cyber Security Awareness Month, which the Department of Homeland Security (dhs.gov) says is “a yearly campaign to raise awareness about the importance of cyber security.”

Dr. Matthew Hale, Assistant Professor of Cybersecurity at UNO, says long before the huge Equifax breach there was plenty of reason to be concerned about identity theft.  He describes identity theft and credit card fraud  as “active areas of cyber crime” and “a massive industry” 

“It’s surprising how cheap you can actually get people’s information on the black market.  It turns out there’s roughly about 16 billion dollars in identify theft and fraud; this was just last year. And it typically affects about 15.4 million Americans – I think that was the

Read more at: http://kios.org/post/october-cyber-security-awareness-month

IRS: Tax refund fraudsters already had much of that Equifax stolen data

x

Embed

x

Share

CLOSE

While IRS reports progress on cracking down on tax-related ID fraud, consumers and businesses warned to watch out for con artists who want more of your data.
Susan Tompor, Detroit Free Press

So among other cyber security worries, now we’re all wondering how the stolen Equifax data — which includes Social Security numbers — might drive up tax refund fraud. 

But IRS Commissioner John Koskinen said Tuesday that he’s doubtful that the Equifax breach will make a noticeable difference in tax-related ID scams. That’s because a significant amount of that data was stolen through earlier breaches in recent years at major employers, cyber attacks on the

Read more at: http://www.freep.com/story/money/personal-finance/susan-tompor/2017/10/18/koskinen-tax-scams-insurance-schemes/767460001/

IRS: Equifax breach includes much data crooks already had stolen

x

Embed

x

Share

CLOSE

While IRS reports progress on cracking down on tax-related ID fraud, consumers and businesses warned to watch out for con artists who want more of your data.
Susan Tompor, Detroit Free Press

So among other cyber security worries, now we’re all wondering how the stolen Equifax data — which includes Social Security numbers — might drive up tax refund fraud. 

But IRS Commissioner John Koskinen said Tuesday that he’s doubtful that the Equifax breach will make a noticeable difference in tax-related ID scams. That’s because a significant amount of that data was stolen through earlier breaches in recent years at major employers, cyber attacks on the

Read more at: http://www.freep.com/story/money/personal-finance/susan-tompor/2017/10/18/koskinen-tax-scams-insurance-schemes/767460001/

GTA V PC mod responsible for spreading Monero mining malware

Rockstar’s Grand Theft Auto V is a modders dream on the PC, allowing gamers to drastically alter the base game; but it also means hackers can cause havoc.

One Russian-speaking mod maker is busy spreading malware into GTA 5 mods to secretly hijack a victim’s computer power to mine the Monero cryptocurrency.

The ‘Arbuz’ GTA V mod was identified by researchers at cyber security company Minerva Labs as the source of the malware spread. They discovered that mod-maker ‘Anton’ was using malware dubbed WaterMiner which uses and altered version of the legitimate open-source XMRig miner to craftily harvest Monero coins without a mod user knowing it.

WaterMiner, which gets its name from Arbuz meaning watermelon in Russian, also evades monitoring tools and can hide from the Windows Task Manager and other services that monitor the use of a computer’s resources. If it detects that a PC monitoring tool is searching for it

Read more at: http://www.trustedreviews.com/news/gta-v-pc-mod-malware-3311243