In recent conferences Europol has been teaming up with other organisations to ensure a joint law enforcement approach with Interpol to the darkweb and ransomware especially, and with ENISA to the challenge of the internet of things.
This month’s joint Europol-ENISA conference, its first on the Internet of Things, gathered 250 industry practitioners from the private sector, security community, law enforcement, the European Computer Security Incident Response Teams (CSIRT) community and academia. A specific focus was on the role of law enforcement in responding to criminal abuse of the IoT.
The conference noted how the risk of criminals ‘weaponising’ insecure IoT devices was already identified in the 2014 and 2015 editions of Europol’s Internet Organised Crime Threat Assessments and in ENISA’s 2016 Threat Landscape Report, becoming a reality with the Mirai botnet. So it is assumed that
A proliferation of mining malware here has started to make its presence known, leading to long-term, low-velocity crypto-mining operations becoming a go-to approach for cyber-criminals. In addition, according to threat intel company Recorded Future, North Korea seems to be getting in on the action.
The firm found in an analysis that cyber-criminals are utilizing cryptocurrency mining as a way to maintain a steady income and avoid the inherent risks involved in running a large-scale ransomware campaign. This year, starting in May 2017, Recorded Future observed a rapid spike of mining malware alerts across a spectrum of analyzed sources. In all, it identified 62 different types of mining malware offered for sale across the criminal underground.
Although some variants are sold for as high as $850, the majority of available mining malware today is offered for less than $50.
Mining malware is readily available, affordable, and easy for a novice to deploy;
What does it take to stay safe on internet in the age of mass malware and ransomware attacks? If you think it’s knowledge of how internet works, you should think again. Awareness counts as much as knowledge because it has come to light that a very informed demographic emerged as an easy target for cyber criminals.
Millennials—those who were born between 1980 and 2000—are considered digital natives since they were weaned away, as it were, on internet. That’s why they are more tech-savvy than previous generations. Yet, surprisingly, they are easy targets for cyber criminals.
According to 2016 Norton Cyber Security Insights report, millennials are the most commonly affected victims globally, with 40 per cent experiencing it in the previous year. More than 55 per cent of millennials in India experienced cyber crime.
The number of cyber attacks targeting mum and dads as well as businesses is booming, with Australians falling for online scams, email phishing, identity theft and credit card fraud in growing numbers.
And the federal Minister Assisting the Prime Minister for Cyber Security, Dan Tehan, has a simple message for Australians during Stay Safe Online week: “Password1 does not cut it”, with 81 per cent of hack attacks a result of stolen or weak passwords.
In less than a year, Indian businesses have seen a spate of ransomware attacks—WannaCry, GoldenEye, Petya and the latest, Locky. Ransomware is a malware that hijacks computers, encrypts important files, denies access to them, and then asks the victim to pay ransoms to have the files decrypted. Though very few businesses disclose cyber attacks due to fear of loss of reputation, experts believe Indian businesses have been hit hard by ransomeware since they are ill-prepared to ward of cyber threats. India was the third worst-hit country by WannaCry, according to a Kaspersky Labs report. The number of users attacked by ransomware in India has nearly doubled from 2015-16 to 2016-17, the report says.
If big companies are ill-prepared to face the cyber threat, small and medium enterprises (SMEs) are sitting ducks because most of them are not prepared at all. They have no processes or
NEW DELHI: In the first week of September, executives of a well-known publishing house met with a sudden crisis which had them seeking help from Delhi Police. The company had inter-connected computers through a common server across their offices in many big cities in India. All files—on more than those 150 computers across their offices—were overnight encrypted by a malware which demanded a high ransom to decrypt the data.
The company had fallen prey to the Locky ransomware, which is believed to have affected millions of computer systems in over 70 countries, including India, in the past month.
Ransomware is a malware that hijacks computers, encrypts important files, denies access to them, and then asks the victim to pay ransoms to have the files decrypted. Ransomware spreads through downloading of malicious email attachments or visiting malicious websites.