Europol Warning: Crypto-Ransomware Threat

Crypto-ransomware is now the biggest malware threat facing law enforcers, according to the latest annual Europol Report on the threat landscape.

The 2016 Internet Organised Crime Threat Assessment (IOCTA) claimed that the risks’ associated with ransomware which encrypts the victim’s data are greater than even data stealing malware or banking Trojans.

The findings seem to be in line with FBI appraisals of the threat, given the Bureau’s frequent public service announcements on the topic. Most recently it asked businesses and consumers to report any incidents of infection so it can get a better idea of the scale of the problem facing the authorities. Also, in recent research from the UK, Trend Micro claimed that 44% of businesses in the country had suffered a ransomware infection over the past 24 months.

"Ransomware is a threat that is clearly becoming more pervasive, and as we have seen from numerous successful attacks in 2016, attackers are continuing to walk away with large sums of money and wreak havoc on organizations by holding their valuable assets hostage,” explained TrapX Security CEO, Greg Enriquez.

“The challenge now is that Cyber-criminals are evolving their cryptographic ransomware techniques as they realize just how lucrative this attack method is.”

The Europol Report also highlighted a worrying development in the fraudulent use of NFC tap-and-pay mobile phones and contactless cards. The Report explains:\

“Several vendors in the Darknet offer software that uploads compromised card data onto Android phones in order to make payments at any stores accepting NFC payments. Moreover, at least one Member State reports instances of OCGs using contactless cards purchased from individuals who then report the card as lost. The OCGs were able to reset the cards once they had reached the purchase limit thereby allowing continued spending.”

Elsewhere, CEO fraud was highlighted as a “key threat” facing businesses.

The Darknet was blamed for helping fuel the growth of child exploitation online and end-to-end encrypted platforms as helping to facilitate the live streaming of child abuse.

Europol argued that collaboration and intelligence sharing and a “harmonised approach to undercover investigations” is required across the EU to combat illegality on the dark web.

Infosecurity:
 

« How To Win The Cyberwar Against Russia
Yes, US Voting Machines Are Vulnerable To Hacking »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Ascentor

Ascentor

Ascentor specialises in independent information and cyber security consultancy. We’re experienced industry experts, providing cyber security services since 2004.

Sogeti

Sogeti

Sogeti deliver solutions that enable digital transformation and offer cutting-edge expertise in Cloud, Cybersecurity, Digital Manufacturing, Quality Assurance, Testing, and emerging technologies.

Kount

Kount

Kount's “decision engine” platform is ideal for managing fraud in online/telephone channels that process payments and onboard new customers.

United Security Providers

United Security Providers

United Security Providers is a leading specialist in information security, protecting IT infrastructures and applications for companies with high demands on security.

KOVRR

KOVRR

Kovrr financially quantifies cyber risk on demand. Our technology enables decision makers to seamlessly drive actionable cyber risk management decisions.

Sum&Substance (Sumsub)

Sum&Substance (Sumsub)

Sum&Substance is a developer of remote verification solutions. Our technology allows online services around the world to meet regulatory requirements, prevent fraud and enhance customer confidence.

Nova Leah

Nova Leah

Nova Leah helps connected medical device manufacturers meet cybersecurity compliance requirements throughout the entire product lifecycle.

QGroup

QGroup

QGroup has been re-designing the consultancy industry since 2012. We're a rapidly expanding group of consulting companies that deliver bespoke IT services including cybersecurity.

PKF Infuse

PKF Infuse

PKF Infuse provide the highest level of cybersecurity support, implementing practical solutions to protect against cyber-attacks, from simple phishing scams to complex data security breaches.

Herzing College

Herzing College

Herzing College Ottawa offers an accelerated 12-month Cybersecurity Specialist training program. This program is developed by industry experts and based on leading IT security certifications.

IriusRisk

IriusRisk

IriusRisk is an open Threat Modeling platform that automates and supports creating threat models at design time.

Advent One

Advent One

Advent One are recognised for solving intricate dilemmas, not only making technology work but building foundations that customers can grow upon in an effective and secure way.

CDS

CDS

CDS is a strategic change agency enabling organisations and businesses to create and build better services to meet the evolving needs of customers, employees and citizens.

Resemble AI

Resemble AI

Resemble AI is an innovator in Generative Voice AI technology and tools to combat AI fraud including audio watermarking and deepfake detection.

Realm.Security

Realm.Security

Realm.Security is pioneering the creation of an easy-to-implement, simple-to-use security fabric solution that is purpose-built for cybersecurity.

LeakSignal

LeakSignal

At LeakSignal, we transform the way you monitor and protect your data. We provide unparalleled visibility and control over your sensitive data flows.