Europol Warning: Crypto-Ransomware Threat

Crypto-ransomware is now the biggest malware threat facing law enforcers, according to the latest annual Europol Report on the threat landscape.

The 2016 Internet Organised Crime Threat Assessment (IOCTA) claimed that the risks’ associated with ransomware which encrypts the victim’s data are greater than even data stealing malware or banking Trojans.

The findings seem to be in line with FBI appraisals of the threat, given the Bureau’s frequent public service announcements on the topic. Most recently it asked businesses and consumers to report any incidents of infection so it can get a better idea of the scale of the problem facing the authorities. Also, in recent research from the UK, Trend Micro claimed that 44% of businesses in the country had suffered a ransomware infection over the past 24 months.

"Ransomware is a threat that is clearly becoming more pervasive, and as we have seen from numerous successful attacks in 2016, attackers are continuing to walk away with large sums of money and wreak havoc on organizations by holding their valuable assets hostage,” explained TrapX Security CEO, Greg Enriquez.

“The challenge now is that Cyber-criminals are evolving their cryptographic ransomware techniques as they realize just how lucrative this attack method is.”

The Europol Report also highlighted a worrying development in the fraudulent use of NFC tap-and-pay mobile phones and contactless cards. The Report explains:\

“Several vendors in the Darknet offer software that uploads compromised card data onto Android phones in order to make payments at any stores accepting NFC payments. Moreover, at least one Member State reports instances of OCGs using contactless cards purchased from individuals who then report the card as lost. The OCGs were able to reset the cards once they had reached the purchase limit thereby allowing continued spending.”

Elsewhere, CEO fraud was highlighted as a “key threat” facing businesses.

The Darknet was blamed for helping fuel the growth of child exploitation online and end-to-end encrypted platforms as helping to facilitate the live streaming of child abuse.

Europol argued that collaboration and intelligence sharing and a “harmonised approach to undercover investigations” is required across the EU to combat illegality on the dark web.

Infosecurity:
 

« How To Win The Cyberwar Against Russia
Yes, US Voting Machines Are Vulnerable To Hacking »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Wizard Computing

Wizard Computing

Wizard Computer Services is a full service IT solutions provider that offers managed services, consultation, installation, and support to small and large businesses in New England.

Covenco

Covenco

Covenco is a data management and IT infrastructure specialist. Working with customers to transform their IT environments, with data protection and security at the forefront of everything we do.

Korea Internet & Security Agency (KISA)

Korea Internet & Security Agency (KISA)

KISA is committed to improving the competitiveness, reliability and security of Internet information and knowledge in Korea.

LRQA Nettitude

LRQA Nettitude

LRQA Nettitude is an award-winning global provider of cybersecurity services, bringing innovative thought leadership to the ever-evolving cybersecurity marketplace.

Igloo Security

Igloo Security

Igloo Security is a leader and pioneer in SIEM (Security Information & Event Management), PSIM (Physical Security Information Management) and MSS (Managed Security Services).

Computing Technology Industry Association (CompTIA)

Computing Technology Industry Association (CompTIA)

CompTIA is dedicated to advancing industry growth through its educational programs, market research, networking events, professional certifications, and public policy advocacy.

Cyversity

Cyversity

Cyversity's mission (formerly ICMCP) is the consistent representation of women and underrepresented minorities in the cybersecurity industry.

Wizlynx PTE LTD

Wizlynx PTE LTD

Wizlynx PTE LTD is the Singapore branch of Wizlynx Group located in Singapore, offering Information and Cyber Security Services throughout the entire Asia Pacific (APAC) region.

Infinite Ranges

Infinite Ranges

Infinite Ranges delivers secure, comprehensive digital solutions by connecting experts with the best products and services for the digital age.

Akito

Akito

Akito was set up to become a point of reference in the ICT market for issues related to Security and in particular Cyber Security.

ECS Ethiopia

ECS Ethiopia

ECS Ethiopia provides Ethiopia’s leading institutions with top cyber-security expertise and technology to enable them to overcome risks and market barriers enabling them to grow their business.

CySecK

CySecK

CySecK is a Centre of Excellence in Cybersecurity formed in 2017 by the Government of Karnataka, as part of the Technology Innovation Strategy.

Dropzone AI

Dropzone AI

Dropzone AI are creating a generational leap in SecOps by using AI to automate cyber expertise and tooling.

Bleach Cyber

Bleach Cyber

Bleach Cyber helps small businesses with an affordable and user-friendly solution for managing cloud security.

Secure Cyber Management

Secure Cyber Management

Secure Cyber Management provides industry-leading cloud security advice, guidance and services.

Transcendental Technologies

Transcendental Technologies

Transcendental is a consulting organization which specializes in customized assurance services in the fields of Localization, Mobile Software Solutions, Web Design, Cyber Security & Cyber Forensics.