Cybercriminals Use Fake Websites

Cyber criminals have been following a global agenda by using hot topics such as FIFA 2018 and Bitcoin to fool users and steal their money or personal information in the last 12 months, according to Kaspersky Lab’s Spam and Phishing in 2017 report.

Spammers have shown themselves to be thoughtful actors, the study said, instantly monitoring global issues and major events worldwide with the purpose of capitalising on their victim’s attention.

Kaspersky Lab’s ongoing research on spam and phishing activities confirms the methods used by spammers are effective, due to users’ decreased attention and increased unconditional trust. These factors combined mean that people are more likely to follow false instructions.

Cyber criminals have been using tricks such as websites disguised as crypto-currency exchanges or fake services offering cloud mining. But in all cases, users became victims, losing money instead of earning any profit.

In more traditional fraud schemes, such as fake lottery winnings, criminals have also started to use Bitcoin as bait. In addition to targeted address databases advertised through spam, databases with emails for cryptocurrency users have also been offered for purchase, promising great opportunities.

Overall, the average amount of spam in 2017 decreased to 57 percent, which is 1.7 percent less than in 2016. At the same time, the number of phishing attacks increased. The Kaspersky Lab anti-phishing system was triggered 246,231,645 times on the computers of Kaspersky Lab users, which is 59 percent higher than in 2016.

The most popular source of spam was the US (13 percent of the total), followed by China (11 percent) and Vietnam (10 percent). Others in the top 10 include India, Germany, Russia, Brazil, France and Italy.

Information-Management:    Image: Ben Clay

You Might Also Read: 

Cybercime Against UK Business Is Up 63%:

FBI's Ability To Disrupt Cybercrime Has  Deteriorated:

« Does Fake News Affect Threat Intelligence?
Artificial Intelligence Is Cyber Defence »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BruCERT

BruCERT

BruCERT is the referral agency for dealing with computer-related and internet-related security incidents in Brunei Darussalam.

Comarch

Comarch

Comarch is a provider of IT business solutions to optimize operational and business processes. Cyber security solutions are focused on Identity Management and Security Assessment services.

Ericom Software

Ericom Software

Ericom is a global leader in securing and connecting the digital workspace, offering solutions that secure browsing, and optimize desktop and application delivery to any device, anywhere.

redGuardian

redGuardian

redGuardian is a DDoS mitigation solution available both as a BGP-based service and as an on-premise platform.

SGBox

SGBox

SGBox is a highly flexible and scalable solution for IT security. Choose the modules which your company needs and implement it without any modification to your network infrastructure.

Inceptus

Inceptus

Inceptus is a next generation Managed Security Service Provider (MSSP). We are dedicated to keeping our customers safe, secure and protected while doing business on the Internet.

Tetrad Digital Integrity (TDI)

Tetrad Digital Integrity (TDI)

TDI is a world-class consulting firm offering cybersecurity services to government agencies and commercial clients around the world.

Wayra

Wayra

Wayra connects Telefónica and technological disruptors around the world. As their preferred strategic partner, we scale them up to accelerate their business and ours.

Action1

Action1

Action1 is a Cloud-based lightweight endpoint security platform that discovers all of your endpoints in seconds and allows you to retrieve live security information from the entire network.

Bloc Ventures

Bloc Ventures

Bloc Ventures is an investment company providing long-term, ‘patient’ equity capital to early stage unquoted deep technology companies.

SEMNet

SEMNet

SEMNet is an IT solutions provider and an infrastructure and security consulting firm.

Input Output (IOHK)

Input Output (IOHK)

IOHK is one of the world's pre-eminent blockchain infrastructure research and engineering companies.

McAfee

McAfee

McAfee is a worldwide leader in online protection. We’re focused on protecting people, not devices. Our solutions adapt to our customers’ needs and empower them to confidently experience life online.

Beacon Technology

Beacon Technology

Beacon Technology offers a comprehensive platform consisting of XDR, VMDR, and Breach and Attack simulation tools.

Digital Encode

Digital Encode

Digital Encode is a leading consulting and integration firm that specializes in the design, management, and security of business-critical networks, telecommunications, and IT infrastructures.

OpenZiti

OpenZiti

OpenZiti is the world’s most used and widely integrated open source secure networking platform. OpenZiti provides both zero trust security and overlay networking as pure open source software.