Latest questions:
Trending questions:
Hot questions:
Cybercrime
Cybercrime is a growing challenge both for governments and private companies, data breaches are increasing fast. Which ones have the biggest experience based on your experience and on this area? Spyware, ransomware, trojan, worm, botnet, rootkit? Please feel free to point out other ones.
17 answers
A hospital paid that because they don't have a good virtual environment in place to do a hot restore in Veeam or even a regular restore in a quick way. Imagine a virus that propagates to all PCs and servers in different ways that many AVs cannot adapt to and it locks out admin accounts. MUCH more of a threat than knowing your enemy.
Ransomeware has the largest potential impact within my field. Not only can it disrupt business by causing downtime but it can also potentially have external costs paying off the cyber criminal. Ransomware has also become a big news topic which increases visibality to our staff and management.
You rightly mentioned quite a few. However, I would like to take your attention towards phone call thing. There are bots identifying phone numbers and calling to the victims. The dangerous part is VoIP and Bots kind of services are being used in this.
I am curious, when there will be more cases that hackers are able to "kidnap" Siri, Alexa or Cortana. Maybe they could spy on us or via "key words" start to order at Amazon...
my personal opinion about cyber crime might be different from other people on this forum,i think that us gov. need to step up and in case on foreign attacks on companies in US and our infrastructure should not be penalized individual companies on branches and impose heavy fines and class action lawsuits but offer gov infrastructure like military/security response to prevent other govt or individuals or group of individuals from foreign countries to continue there harmful activities
I would like to add on a few potential cybercrime.
- Fake job offer emails
- Phone calls offering job
- Winning lottery text messages or emails
- US visa offer emails and phone calls
- Fake Profit sharing, Fund transfer, Business deals, etc. emails
- Selling of duplicate branded products like watches, clothes, jewelleries, etc.
Worms and botnets are your biggest issue as you don't know what you are dealing with compared to ransomware which just wants money and they will give you access back (besides the fact a virtual rollback is common place and easy nowadays).
I work in Healthcare Information Technology as well as Education. Healthcare is the area I'm referring to with regards to Ransomware being a large issue. Just recently a Hospital paid over $50,000 to unlock computers impacted by ransomware.
Correct. In the case of the recent hospital that paid they even had backups of the critical data, but it was faster to pay the ransom than it was to restore backups, and so they decided it was worth the cost.
The more high-tech a company, including its IT-firewall, the more common hackers may try "low tech"-strategies. For example spread-out prepared USB sticks on the company's parking place or bribe / threaten an internal employee.
11 arrested in Icelandic bitcoin heist March 5, 2018
Police in Iceland say they have cracked the case of the largest series of thefts ever in the country — and it's over bitcoin. Nearly 600 computers used to mine cryptocurrencies have been stolen from data centers in Iceland in four burglaries, the AP reported. A security guard and 10 others were arrested, although the stolen computers worth almost $2 million have not been found. Police are monitoring electric consumption with the hopes of finding unusually high energy usage, a clue that could lead to an illegal bitcoin mine.
As technology advances and our societies rely more and more on computers across the Earth, there is a corresponding increase in cybercrimes. These crimes can be more sophisticated, become harder to detent and even harder to stop.
Last September, the Department of Homeland Security ordered all federal agencies to cease using Kaspersky products because of the threat that Kaspersky’s products could “provide access to files.”
A month later, The New York Times reported that the Homeland Security directive was based, in large part, on intelligence shared by Israeli intelligence officials who successfully hacked Kaspersky Lab in 2014. They looked on for months as Russian government hackers scanned computers belonging to Kaspersky customers around the world for top secret American government classified programs.
In at least one case, United States officials claimed Russian intelligence officials were successful in using Kaspersky’s software to pull classified documents off a home computer belonging to Nghia H. Pho, an N.S.A. developer who had installed Kaspersky’s antivirus software on his home computer. Mr. Pho pleaded guilty last year to bringing home classified documents and writings, and has said he brought the files home only in an attempt to expand his résumé.
Recently one of my friend came across a fake job offer from DBZ Pharmaceuticals, USA. The job offer and email looked so genuine and professional as it was from an official email id <careers@dbzpharmaceuticals.com>. My friend was ready for the processing but I was in a doubt and asked him to forward the emails to me. The address and phone numbers of the company was matching exactly as per the company's website. My friend was selected just on the basis of his CV and he was asked to fill the application form with written interview questions. The was offered a job as a Manager with high salary and other benefits. He was asked to contact a US visa consular in India whose mobile number was provided in the email and he was asked to pay some amount for his visa processing. I called directly to US visa center in India and inquired about the name of Visa consular and they informed me that nobody by that name works there. I informed the same to my friend who was ready to pay money.
Cyber Attack patterns evolves when they become public. This is a war in a new ground of cyber space. When there is information technologies, sophistication or innovation likewise cybercrime will evolve. We can only empower individuals , businesses and government and document it once we uncover such event .