2016 Trends in Cyber Crime

The volume, scope and cost of Cybercrime have reached very high levels, and are set to get even higher, according to a report from Europol, the European Union's (EU) law enforcement agency.

In a report identifying eight trends in the underworld of Cybercrime, Europol warned that Cybercrime offences were becoming the norm and overtaking the reporting of "traditional" crimes in some EU countries.

Europol's Director Rob Wainwright warned in the report released recently that "the relentless growth of Cybercrime remains a real and significant threat to our collective security in Europe."

"Europol is concerned about how an expanding Cybercriminal community has been able to further exploit our increasing dependence on technology and the Internet." He added that the agency had seen "a marked shift" in cyber-facilitated activities relating to trafficking in human beings, terrorism and other threats.

Europol's "Internet Organised Crime Threat Assessment" for 2016 identified eight Cybercrime trends that everyone should beware of:

1: Crime-as-a-Service

The digital underground is underpinned by a growing Crime-as-a-Service model that interconnects specialist providers of Cybercrime tools and services with an increasing number of organized crime groups. Terrorist actors clearly have the potential to access this sector in the future.

2: Ransomware

Ransomware and banking Trojans (a malicious program used to obtain confidential information about customers and clients using online banking and payment systems) remain the top malware threats, a trend unlikely to change for the foreseeable future.

3: The criminal use of data

Data remains a key commodity for Cyber-criminals. It is procured for financial gain in many cases but it is increasingly being used to commit more complex fraud, encrypted for ransom, or used directly for extortion.

4: Payment fraud

EMV (chip and PIN), geo-blocking and other industry measures continue to erode card-related fraud within the EU, but malware attacks directly against ATMs continue to evolve and proliferate. Organised crime groups are starting to manipulate or compromise payments involving contactless (NFC) cards.

5: Online child sexual abuse

The use of end-to-end encrypted platforms for sharing media, coupled with the use of largely anonymous payment systems, has facilitated an escalation in the live streaming of child abuse.

6: Abuse of the Darknet

The Darknet continues to enable criminals involved in a range of illicit activities, such as the exchange of child sexual exploitation material. The extent to which extremist groups currently use Cyber techniques to conduct attacks are limited, but the availability of Cybercrime tools and services, and illicit commodities such as firearms on the Darknet, provides opportunity for this to change.

7: Social engineering

An increase of phishing aimed at high value targets has been registered by enforcement private sector authorities. CEO fraud, a refined variant of spear phishing, has become a key threat.

8: Virtual currencies

Bitcoin remains the currency of choice for the payment for criminal products and services in the digital underground economy and the Darknet. Bitcoin has also become the standard payment solution for extortion payments.

Europe's law enforcement authorities had responded to the changing threat by increasing their skill-sets, Wainwright said, "but the growing misuse of legitimate anonymity and encryption services for illegal purposes remain a serious impediment to the detection, investigation and prosecution of criminals."

Yet Steve Wilson, the head of the European Cybercrime Centre, noted that there were reasons to be positive about progress in tackling cybercriminals. Partnerships between industry and law enforcement have improved significantly, leading to the disruption or arrest of many major Cybercriminal syndicates and high-profile individuals associated with child abuse, cyber intrusions and payment card fraud, and to innovative new prevention programs such as the no more ransom campaign."

CNBC:          Europol Warning: Ransomeware Threat
 

« Work Traveling - You’re a Prime Hacker Target
Future Of Security: Connect Cyber With Physical Defence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Serena

Serena

Serena Software helps increase speed of the software development lifecycle while enhancing security, compliance, and performance.

National Cyber Security Centre Finland (NCSC-FI)

National Cyber Security Centre Finland (NCSC-FI)

The NCSC-FI develops and monitors the operational reliability and security of communications networks and services in Finland.

Competence Center for Applied Security Technology (CAST)

Competence Center for Applied Security Technology (CAST)

CAST offers a range of services in the field of secure modern information technology and a contact point for all questions regarding IT security.

Watchcom Security Group

Watchcom Security Group

Watchcom is one of Norway's foremost suppliers of information security consultancy services.

Hacker House

Hacker House

Hacker House teaches you what hackers can learn about your business and systems so that preventative solutions to protect your assets can be applied through active measures.

CSO GmbH

CSO GmbH

CSO GmbH provide specialist consultancy services in the area of IT security.

SBD Automotive

SBD Automotive

SBD Automotive are specialists in automotive technology providing independent research and consultancy to help create smarter, more secure, better connected, and increasingly autonomous cars.

CyCognito

CyCognito

CyCognito empowers companies to take full control over their attack surface by uncovering and eliminating the critical security risks they didn't even know existed.

CoursesOnline

CoursesOnline

CoursesOnline.co.uk is a database listing IT security courses from providers across the UK.

Aegis Security

Aegis Security

Aegis Security helps clients to secure their systems against potential threats through pre-emptive measures, such as security assessments, and cutting-edge solutions to security challenges.

Arelion

Arelion

Arelion is a leading light in global connectivity and we've been keeping the world connected for nearly three decades.

Gomboc.ai

Gomboc.ai

Gomboc solve cloud infrastructure security policy deviations by providing tailored remediations to the IaC (Infrastructure as Code).

coc00n

coc00n

coc00n secures the devices of high-value and high-interest individuals against cyber attacks.

nodeQ

nodeQ

At nodeQ, we are pioneering the future of computer networks, leveraging our deep expertise in quantum communication, artificial intelligence, and software-defined networking.

Q-Bird

Q-Bird

Q*Bird's mission is to provide equipment for the current, and future European quantum internet.

Adili Group

Adili Group

Adili Group is a leading pan-African corporate advisory firm. We deliver tailored solutions in regulation and compliance, risk management, and improving business efficiency.