2016 Trends in Cyber Crime

The volume, scope and cost of Cybercrime have reached very high levels, and are set to get even higher, according to a report from Europol, the European Union's (EU) law enforcement agency.

In a report identifying eight trends in the underworld of Cybercrime, Europol warned that Cybercrime offences were becoming the norm and overtaking the reporting of "traditional" crimes in some EU countries.

Europol's Director Rob Wainwright warned in the report released recently that "the relentless growth of Cybercrime remains a real and significant threat to our collective security in Europe."

"Europol is concerned about how an expanding Cybercriminal community has been able to further exploit our increasing dependence on technology and the Internet." He added that the agency had seen "a marked shift" in cyber-facilitated activities relating to trafficking in human beings, terrorism and other threats.

Europol's "Internet Organised Crime Threat Assessment" for 2016 identified eight Cybercrime trends that everyone should beware of:

1: Crime-as-a-Service

The digital underground is underpinned by a growing Crime-as-a-Service model that interconnects specialist providers of Cybercrime tools and services with an increasing number of organized crime groups. Terrorist actors clearly have the potential to access this sector in the future.

2: Ransomware

Ransomware and banking Trojans (a malicious program used to obtain confidential information about customers and clients using online banking and payment systems) remain the top malware threats, a trend unlikely to change for the foreseeable future.

3: The criminal use of data

Data remains a key commodity for Cyber-criminals. It is procured for financial gain in many cases but it is increasingly being used to commit more complex fraud, encrypted for ransom, or used directly for extortion.

4: Payment fraud

EMV (chip and PIN), geo-blocking and other industry measures continue to erode card-related fraud within the EU, but malware attacks directly against ATMs continue to evolve and proliferate. Organised crime groups are starting to manipulate or compromise payments involving contactless (NFC) cards.

5: Online child sexual abuse

The use of end-to-end encrypted platforms for sharing media, coupled with the use of largely anonymous payment systems, has facilitated an escalation in the live streaming of child abuse.

6: Abuse of the Darknet

The Darknet continues to enable criminals involved in a range of illicit activities, such as the exchange of child sexual exploitation material. The extent to which extremist groups currently use Cyber techniques to conduct attacks are limited, but the availability of Cybercrime tools and services, and illicit commodities such as firearms on the Darknet, provides opportunity for this to change.

7: Social engineering

An increase of phishing aimed at high value targets has been registered by enforcement private sector authorities. CEO fraud, a refined variant of spear phishing, has become a key threat.

8: Virtual currencies

Bitcoin remains the currency of choice for the payment for criminal products and services in the digital underground economy and the Darknet. Bitcoin has also become the standard payment solution for extortion payments.

Europe's law enforcement authorities had responded to the changing threat by increasing their skill-sets, Wainwright said, "but the growing misuse of legitimate anonymity and encryption services for illegal purposes remain a serious impediment to the detection, investigation and prosecution of criminals."

Yet Steve Wilson, the head of the European Cybercrime Centre, noted that there were reasons to be positive about progress in tackling cybercriminals. Partnerships between industry and law enforcement have improved significantly, leading to the disruption or arrest of many major Cybercriminal syndicates and high-profile individuals associated with child abuse, cyber intrusions and payment card fraud, and to innovative new prevention programs such as the no more ransom campaign."

CNBC:          Europol Warning: Ransomeware Threat
 

« Work Traveling - You’re a Prime Hacker Target
Future Of Security: Connect Cyber With Physical Defence »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Usenix

Usenix

Usenix brings together the community of engineers, system administrators, scientists, and technicians working on the cutting edge of computing.

Telia Cygate

Telia Cygate

Cygate are specialists in information security, data networks, and data centre and cloud technologies.

CSIS Security Group

CSIS Security Group

CSIS provide actionable threat intelligence, prevention, incident response and 24/7 managed security services.

Canadian Security Intelligence Service (CSIS)

Canadian Security Intelligence Service (CSIS)

CSIS collects and analyzes threat-related information concerning the security of Canada in areas including terrorism, espionage, WMD, cybersecurity and critical infrastructure protection.

DomainTools

DomainTools

DomainTools is the global leader for internet intelligence and the first place security practitioners go when they need to know.

Synack

Synack

Synack provides a hacker-powered intelligence platform that uncovers security vulnerabilities that often remain undetected by traditional pen testers and scanners.

DefCamp

DefCamp

DefCamp is the most important annual conference on Hacking & Information Security in Central Eastern Europe.

Uppsala Security

Uppsala Security

Uppsala Security built the first crowdsourced Threat Intelligence platform known as the Sentinel Protocol, which is powered by blockchain technology.

6point6

6point6

6point6 is a technology consultancy with strong expertise in digital transformation, emerging technology and cyber security.

CleanCloud by SEK

CleanCloud by SEK

CleanCloud by SEK is a CSPM product focused on public cloud data protection and security regulations, with over 400 compliance checks for the market's leading frameworks and regulations.

AdaCore

AdaCore

AdaCore is focused on helping developers build safe, secure and reliable software.

US Digital Corps

US Digital Corps

The U.S. Digital Corps is a new two-year fellowship for early-career technologists where you will work every day to make a difference in critical impact areas including cybersecurity.

Riskonnect

Riskonnect

Riskonnect technology empowers organizations with the ability to anticipate, manage, and respond in real-time to strategic, operational, and digital risks across the extended enterprise.

CodeLock

CodeLock

Codelock is a patent-pending solution that continuously provides software security at the code level, while providing advanced management insights with performance metrics and data analytics.

Allstate Identity Protection

Allstate Identity Protection

Allstate make it easy to provide complete identity protection, so everyone can live more confidently online.

Staley Technologies

Staley Technologies

Staley Technologies is a US nationwide structured cabling, technology integrator, and Managed IT & Cyber Security provider.