Tuesday, February 24, 2015

Ten keys to new international cybercrime – Yahoo Finance Spain

Madrid, Feb 23 (EFE) .- High professional, sophisticated and hierarchical organizational structures with large financial and human resources are some of the keys to the new international cybercrime ., according to experts at the 2015 SAS cybersecurity summit recently held in Cancún (Mexico)

Here are ten new cybercrime trends:

1. High professionalism. Attackers are real experts of crime and crime on the Internet, with an absolute mastery of computer tools and extensive technical knowledge. It is well prepared to handle malware people, trained exclusively for it.

2. Organization. Perfectly coordinated cybercriminals act even when the members participating in the campaigns are in different countries and remote areas of the world.

3. Hierarchical structures. There echelons of command between cybercriminals, so few leaders are the ones who set the tone and control the actions of lower rank, who are much more numerous; in the case of theft Carbanak hundreds of banks, total attackers could amount to thousands, according to Kaspersky, the company that has discovered.

4. New actors on stage. The Arabs have already become cybercriminals profile “manufacturers” of “malware”, as has unveiled the Desert Falcon campaign. So far only replicated but not created. English, Russian, Spanish or Portuguese have so far been the classical languages ​​in the design world of malicious code and start having competitors.

5. Social engineering. Cybercriminals are becoming real professionals persuading victims to encourage them without arousing suspicion to open infected emails. For a long time even months studying behavioral habits of the alleged “prey” tastes, social networking activity. Sometimes even manage to be friends on Facebook. The strategy is to send them messages whose subject you may be familiar to click on them without even stopping to think that may be infected.

6. Attacks on very specific goals. Cyber ​​threats directed against very specific devices, from which high performance can take, and not as formerly mass. So, are proliferating eg cyber attacks against computers of employees who may be linked to the directors of the company or individuals associated with significant positions in political or religious scene, as in the case of the Falcon campaign.

7. The figure of cibermercenario gains strength. It is a criminal profile punctually paid by people who contract their services because they want to trace or lack expertise or infrastructure to attack on the Internet.

8. Convergence between cybercrime and physical crime. Criminals are increasingly turning to computer manipulation of physical infrastructure services as a bridge to theft or sabotage in real life. For example remotely modify the parameters of the price or volume of fuel into a gas station to steal gasoline without suspicion or manipulate the computer network of storing large containers at ports to hide or empty drug calmly.

9. Goals beyond money. Although economic motivations remain the priority, are not the only among cybercriminals, who are also seeking access to confidential information of political, religious, etc character.

10. The risks of the internet of things. According to experts, connecting everything with everything as is occurring will open a new world of opportunity for cybercriminals to multiply their gateways to the Internet. Any object can be connected to the network with a nanosensor, and also people with even digestible and subcutaneous chips. One of the next threat will be “smart” television, the big screen lets you watch all kinds of personal data of the victim if the cybercriminal manages to infiltrate it

.

LikeTweet

No comments:

Post a Comment