Europol Warning: Crypto-Ransomware Threat

Crypto-ransomware is now the biggest malware threat facing law enforcers, according to the latest annual Europol Report on the threat landscape.

The 2016 Internet Organised Crime Threat Assessment (IOCTA) claimed that the risks’ associated with ransomware which encrypts the victim’s data are greater than even data stealing malware or banking Trojans.

The findings seem to be in line with FBI appraisals of the threat, given the Bureau’s frequent public service announcements on the topic. Most recently it asked businesses and consumers to report any incidents of infection so it can get a better idea of the scale of the problem facing the authorities. Also, in recent research from the UK, Trend Micro claimed that 44% of businesses in the country had suffered a ransomware infection over the past 24 months.

"Ransomware is a threat that is clearly becoming more pervasive, and as we have seen from numerous successful attacks in 2016, attackers are continuing to walk away with large sums of money and wreak havoc on organizations by holding their valuable assets hostage,” explained TrapX Security CEO, Greg Enriquez.

“The challenge now is that Cyber-criminals are evolving their cryptographic ransomware techniques as they realize just how lucrative this attack method is.”

The Europol Report also highlighted a worrying development in the fraudulent use of NFC tap-and-pay mobile phones and contactless cards. The Report explains:\

“Several vendors in the Darknet offer software that uploads compromised card data onto Android phones in order to make payments at any stores accepting NFC payments. Moreover, at least one Member State reports instances of OCGs using contactless cards purchased from individuals who then report the card as lost. The OCGs were able to reset the cards once they had reached the purchase limit thereby allowing continued spending.”

Elsewhere, CEO fraud was highlighted as a “key threat” facing businesses.

The Darknet was blamed for helping fuel the growth of child exploitation online and end-to-end encrypted platforms as helping to facilitate the live streaming of child abuse.

Europol argued that collaboration and intelligence sharing and a “harmonised approach to undercover investigations” is required across the EU to combat illegality on the dark web.

Infosecurity:
 

« How To Win The Cyberwar Against Russia
Yes, US Voting Machines Are Vulnerable To Hacking »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Webroot

Webroot

Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individuals around the globe.

TitanFile

TitanFile

TitanFile is an award-winning, easy and secure way for professionals to communicate without having to worry about security and privacy.

Disklabs

Disklabs

Disklabs are industry leaders in data recovery, digital forensics and data erasure.

Netresec

Netresec

Netresec is an independent software vendor with focus on the network security field. We specialize in software for network forensics and analysis of network traffic.

SEPPmail

SEPPmail

SEPPmail is a patented e-mail encryption solution to secure your electronic communication.

Panorays

Panorays

Panorays automates third-party security lifecycle management. It is a SaaS-based platform, with no installation needed.

EvoNexus

EvoNexus

EvoNexus is a technology startup incubator with locations in San Diego, Orange County, and Silicon Valley.

Nexor

Nexor

Nexor are a UK-based cyber security company with 30 years' experience in secure information exchange.

RhodeCode

RhodeCode

RhodeCode is an open source repository management platform. It provides unified security and team collaboration across Git, Subversion, and Mercurial.

Quantum Security Solutions (QSec)

Quantum Security Solutions (QSec)

QSec is an innovative information security consultancy based in Ghana. We can provide your organisation with information security products and services that assure against information risk.

Sparrow

Sparrow

Sparrow specializes in application security testing solutions to cope with new technology trends such as cloud, mobile, and DevSecOps.

Cybertronium

Cybertronium

Cybertronium is a leader in managing cyber risk. We bring you the latest from the complex, ever-evolving online threat environment with the insights to inspire and the expertise to act.

Flexxon

Flexxon

Flexxon is the industry leader to develop NAND flash storage devices. Our key focus is to innovate memory devices ensuring data security and reliability.

Aberrant

Aberrant

A radically new approach to managing information security. Aberrant is the single pane of glass through which a security program can be viewed.

Security4Media

Security4Media

Security4Media is a non-profit association set up to reduce risks and support trust in media, in the face of increasing cybersecurity threat levels.

Yondu

Yondu

Yondu empowers businesses across various industries through a wide array of innovative technology solutions to help them scale in the new digital economy.