AI Can Help Fight Coronavirus Cyber Crime

Interpol has produced a new report on Covid-19 related cyber crime which indicates that over sixty percent of EU member countries had witnessed a massive increase in malicious domains registered with the keywords’ COVID or ‘Corona.’  These sites are aiming to take advantage of the growing number of people searching for information about COVID-19 online. 
 
During COVID-19, cyber criminals have exploited the Internet in the disguise of providing help and information.  In the fight against these challenging problems, both Artificial intelligence (AI) and machine learning (ML) have a role to play and can help to solve a wide range of cyber security problems in different industries. 
 
AI is extremely good at attempting to mimic human intelligence. While it is still far beyond replacing humans’ cognitive thinking, it is proficient at finding anomalies and irregularities and reducing errors and faults in the operational tasks. ML can analyse the data from the past and evaluate the use cases for the future and these processes that can help identify possible cyber-crimes and take proactive preventive measures. 
 
  • AI establishes a baseline of behavior and it can flag it and take action, whether that’s sending a notification to a technician or even reverting to a safe state after a ransomware attack. 
  • ML algorithms can also help detect and remove outliers from training data sets to address the data poisoning attacks. AI-based risk management systems can be used to identify changes in those methods and to determine password patterns of explicit customer behavior. 
Unfortunately, there is a high probability that criminal attackers can weaponise AI and ML tools and automate them  to boost the effectiveness of their attacks
 
There are many ways AI and ML can be leveraged to fight cybersecurity issues. However, it is always better to define what kind of threats one wants to address using these technologies. 
 
The key findings by the Interpol concerning the cyber-crime landscape in relation to the Covid-19 crisi include:- 

Online Scams and Phishing - Threat actors have revised their usual online scams and phishing schemes. By deploying COVID-19 themed phishing emails, often impersonating government and health authorities, cyber criminals entice victims into providing their personal data and downloading malicious content. 

Around two-thirds of member countries which responded to the global cyber crime survey reported a significant use of COVID-19 themes for phishing and online fraud since the outbreak.
 
Disruptive Malware (Ransomware and DDoS) – Cyber criminals are increasingly using disruptive malware against critical infrastructure and healthcare institutions, due to the potential for high impact and financial benefit. 
In the first two weeks of April 2020, there was a spike in ransomware attacks by multiple threat groups which had been relatively dormant for the past few months. 
 
Law enforcement investigations show the majority of attackers estimated quite accurately the maximum amount of ransom they could demand from targeted organisations.
 
Data Harvesting Malware - The deployment of data harvesting malware such as Remote Access Trojan, info stealers, spyware and banking Trojans by cyber criminals is on the rise. Using Covid-19 related information as a lure, threat actors infiltrate systems to compromise networks, steal data, divert money and build botnets.
 
Malicious Domains - Taking advantage of the increased demand for medical supplies and information on Covid-19, there has been a significant increase of cyber criminals registering domain names containing keywords, such as “coronavirus” or “Covid”. 
 
These fraudulent websites underpin a wide variety of malicious activities including C2 servers, malware deployment and phishing. From February to March 2020, a 569 per cent growth in malicious registrations, including malware and phishing and a 788 per cent growth in high-risk registrations were detected and reported to Interpol by a private sector partner.
 
Misinformation - An increasing amount of misinformation and fake news is spreading rapidly among the public. Unverified information, inadequately understood threats, and conspiracy theories have contributed to anxiety in communities and in some cases facilitated the execution of cyber-attacks.
 
Nearly 30 per cent of countries which responded to the global cyber crime survey confirmed the circulation of false information related to Covid-19. Within a one-month period, one country reported 290 postings with the majority containing concealed malware. There are also reports of mis-information being linked to the illegal trade of fraudulent medical commodities.
 
Other cases of misinformation involved scams via mobile text-messages containing 'too good to be true' offers such as free food, special benefits, or large discounts in supermarkets.
 
Interpol:      Cap Gemini:          Analytics Insight:   
 
You Might Also Read: 
 
The Impact Of Artificial Intelligence On Cyber Security:
 
 
« Lockdown: Half Of Organisations Are Having Cyber Security Problems
Is Big Tech 'Fixing' The US Election? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IONU Security

IONU Security

IONU offer a security platform focused specifically on providing Data-centric Security.

Reed Smith LLP

Reed Smith LLP

Reed Smith LLP is an international law firm with offices in the USA, Europe, Middle East and Asia. Practice areas include Information Technology, Privacy & Data Security.

QATestLab

QATestLab

QATestLab is a leading International software testing company offering a full range of software testing services including security testing.

Ammune.ai

Ammune.ai

Ammune.ai (formerly L7 Defense) helps organizations to protect their infrastructure, applications, customers, employees, and partners against the growing risk of API-borne attacks.

Sentia

Sentia

Sentia is an IT and infrastructure firm, with focus on Outsourcing, IT operation and management, Hosting, Co-location, Network, and IT security.

Securitybulls

Securitybulls

Securitybulls is an information security firm offering an encyclopedic penetration testing & IT security assessment service for your organization.

CSIRT-CY

CSIRT-CY

CSIRT-CY is the National Computer Security Incident Response Team for Cyprus.

Syber Technology

Syber Technology

Syber Technology is an IT project implementer empowering IT systems of Small to Medium Enterprises in the Middle East.

AuthLite

AuthLite

With AuthLite, you can keep using all your existing software, with added two-factor authentication security placed exactly where you need it.

Siemens

Siemens

Siemens Industrial Security Services provide solutions for cybersecurity in automation environments based on the recommendations of the international standard IEC 62443.

Robo Shadow

Robo Shadow

Robo Shadow are trying to bridge the gap between the top tier organisations that can afford everything and everyone else who has to “Make it up as they go along” when it comes to Cyber.

Bitdefender

Bitdefender

Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide.

NASK

NASK

NASK is a National Research Institute under the supervision of the Chancellery of the Prime Minister of Poland. Our key activities involve ensuring security online.

Schellman

Schellman

Schellman is a leading provider of attestation and compliance services.

Threat Con

Threat Con

Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences.

Transatlantic Cyber Security Business Network

Transatlantic Cyber Security Business Network

The Transatlantic Cyber Security Business Network is a coalition of UK and US cyber security companies which facilitates collaboration to help address critical cyber security challenges.