Cryptocurrency Cybercrime Surging In The UK

Cybercrime involving cryptocurrencies is on the rise.The UK’s national reporting center for fraud and cybercrime, Action Fraud, has receently issued warnings about a new phishing campaign using the infamous WannaCry ransomware.

Increase in Ransomware
Action Fraud recently claimed that it had already received 300 reports over recent days about the scam emails, which attempt to trick readers into believing they have an infected computer. 

The emails claim that users’ devices are hacked and that files will be deleted unless a fine is paid in Bitcoin. In reality, the emails are just a phishing exercise used to extort money from unknowing victims.

“The WannaCry emails are designed to cause panic and trick you into believing that your computer is infected with WannaCry ransomware,” Action Fraud said in an alert. 

“In reality the emails are just a phishing exercise to try and extort money. The emails claim that all of your devices were hacked and your files will be deleted unless you pay a fine to the fraudsters in Bitcoin.”

It was last May when reports surrounding WannaCry’s ransomware attacks first appeared. The attacks infected more than 250,000 computers in 150 countries. In the UK, the attacks were widely publicized, having disrupted over 1/3 of National Health Service (NHS) Trusts as well as 600 independent practitioners, causing the cancellation of an estimated 19,000 appointments and operations.

Action Fraud has been called upon several times already to warn UK citizens of scams using WannaCry as bait, although most happened in the weeks following the initial outbreak.  Other examples of attacks saw BT Group-branded phishing emails that urged users to click to confirm a security update apparently carried out by the communications giant to protect them following the initial attacks. Unfortunately, users were tricked.

“One victim fell for the scam after calling a ‘help’ number advertised on a pop-up window. The window which wouldn’t close said the victim had been affected by WannaCry Ransomware,” Action Fraud said. 

“The victim granted the fraudsters remote access to their PC after being convinced there wasn’t sufficient anti-virus protection. The fraudsters then installed Windows Malicious Software Removal Tool, which is actually free and took £320 as payment.”
Action Fraud offers several tips on how to protect oneself from attacks from WannaCry and similar ransomware:

“If you receive one of these emails, delete it and report it to us. Do not email the fraudsters or make the payment in Bitcoin. Additionally, you should always update your Anti-Virus software and operating systems regularly and follow our advice on how to deal with ransomware.”

Crypto and Cybercrime
The largest category of cybercrime involving cryptocurrency so far in 2018 have been exchange-related which have accounted for up to 27% of attacks. The second largest group of victims of cybercrime were regular people and businesses. According to the cybersecurity firm Carbon Black, these made up 21% of the total crimes involving crypto-currency. 

The most common method used is ransomware like WannaCry, although there are others, like crypto-jacking (illegal coin mining).

According to Helge Husemann, product manager for internet security firm Malwarebytes, crypto-jacking as a form of cybercrime has been on the rise. Just last year YouTube experienced a threefold increase in illegal coin mining via malware-embedded ads. 

He also noted that Showtime, Browsealoud, as well as UK government websites, and more, fell victim to illegal mining scams. Some of these went undetected for several months, netting the hackers behind the attacks hefty profits. 

Husemann said that on average, Malwarebytes has been blocking eight million malicious mining attempts per day, equating to an astonishing 248 million per month.

“The illicit gains from illegal crypto-mining contribute to financing the criminal ecosystem, costing billions of dollars in losses and disruption of business services from compromised assets.”

NewsBTC

You Might Also Read: 

Bitcoin Exchanges Under Siege:

Cryptocurrency Malware Theft Is Worth Millions:
 

 

« Is GDPR Good For SME Data?
A Brief History Of Cyber-Deterrence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Logically Secure

Logically Secure

Logically Secure provide penetration testing and security assessment services.

Payload Security

Payload Security

Payload Security's VxStream Sandbox is a fully automated malware analysis system.

CyberDef

CyberDef

CyberDef is a consulting company specialising in cyber defence services for small and medium enterprises.

CalCom

CalCom

CalCom Hardening Solution (CHS) for Microsoft OMS is a security baseline-hardening solution designed to address the needs of IT operations and security teams.

RedLock

RedLock

The RedLock Cloud 360TM platform correlates disparate security data sets to provide a unified view of risks across fragmented cloud environments.

SafeBreach

SafeBreach

SafeBreach's platform simulates hacker breach methods across the entire kill chain to identify breach scenarios in your environment before an attacker does.

Industrial Networking Solutions (INS)

Industrial Networking Solutions (INS)

INS Services specializes in designing, deploying and providing on-going support for critical OT (Operational Technology) and IIoT (Industrial Internet of Things) networks.

Khipu Networks

Khipu Networks

Khipu Networks is an award winning Cyber Security Company delivering a wide range of network, wireless and security solutions, technologies and services across multiple sectors.

Cask Government Services

Cask Government Services

Cask Government Services focuses on program management, cybersecurity, logistics, business analysis and engineering services for Federal, State and Local Government.

Vesta

Vesta

Vesta Corporation is a global provider of a scalable suite of fraud and payment solutions for online commerce.

IXDen

IXDen

IXDen provides a novel software-based approach to OT systems protection, covering Industrial IoT cybersecurity and sensor data integrity.

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau is the national accreditation body for Lithuania. The directory of members provides details of organisations offering certification services for ISO 27001.

Dutch Innovation Park

Dutch Innovation Park

Dutch Innovation Park in Zoetermeer is a breeding ground for applied IT solutions in the field of cyber security, e-health, smart mobility and big data.

DarkOwl

DarkOwl

DarkOwl provides the world’s largest index of darknet content and the tools to efficiently find leaked or otherwise compromised sensitive data.

SyncDog

SyncDog

SyncDog is a leader in enterprise security and the preeminent vendor for containerized mobile application security across cloud & on-premise computing environments.

VIRTIS

VIRTIS

VIRTIS' mission is to provide today's leading organizations peace of mind that their entire digital network perimeter is safe from hackers and data breach.