Loading...

Cyber Crime(October 2017)

Published October 2017

Jean-Pierre Murray-Kline - Internet & Social Media Specialist

This subject is so relevant. This week on News24.com it was reported that hundreds of thousands of South Africans, most without knowing, had their personal information leaked in what is the biggest POPI breach. The week prior, one of my own staff members was done out of a month’s salary through an email scam. I have had a friend’s father lose thousands of rands on cybercrime. Once, at a presentation I did, someone who attended wrote to me afterwards, informing me that they had worked out my Google Adwords log-in information by monitoring me during the presentation, which was about PPC. It was someone called the White Rabbit.

Scary stuff!

What is it about this sort of crime that people can’t seem to fathom? I encourage everyone to share this article with their colleagues, friends and family, because there is a difference between being a victim of a crime and being a sitting duck, naive to the threat.

Let me get you up to speed on the status of cybercrime and give a general overview of what it’s all about. In a nutshell, cybercrime is defined as theft through a computer or electronic device.

The types of crimes are as follows:

  • Attacks on Computer Systems. (The victim’s device suffers from malicious software such as viruses, Trojans and spyware, which monitors your activity to obtain data)
  • Posting of Illegal or Prohibited Content. (The victim might suffer having their private information or media shared on public platforms)
  • Hacking. (Modifying or altering the victim’s computer software with the objective to change the creator's original intentions)
  • Online Scams. (The victim engages on a website, which suggests a certain outcome, but the designer’s intentions are sinister)
  • Identity theft. (A criminal assumes the victim’s identity online and acts on their behalf)

The objective of cybercrime is basically for financial gain or for the hacker to brag about it.

Either way, the victim suffers financially, loses time, has to replace equipment or, in some cases, has to try and recover from reputational damage.

Some terms you might want to hear and remember:

Ransomware

This type of attack is when the perpetrator takes control of your device or information and demands money for its release.

Drive-by Attacks:

This type of attack implants malicious code. These attacks take advantage of browser vulnerabilities and automatically download malicious code and/or viruses, which results in a compromised site or even browser; pop-ups and such.

Malvertisement:

This type of attack is when attackers use malicious advertisement on the Internet with the intent of infecting the viewer with malware.

Spyware:

Perpetrators install malware on your device via different methods and then have access to everything you do on your device, essentially monitoring your every movement.

Wi-Fi Hackers:

Perpetrators set-up a fake Wi-Fi hotspot with the same name as the one you use and once you connect, they can monitor what you are doing online. If need be, they can gain access to your login information.

3rd Party Device Attacks:

Perpetrators develop apps that users unwittingly download and while using the app, have sensitive information, such as passwords and pin codes, stolen.

Premium SMS Costs:

Through phishing or compromised third-party apps, perpetrators use your phone to send premium rate SMS’s without your knowledge, thus draining you of credit. Very nasty.

Botnets:

Perpetrators can infect your device with software and make your device part of their robot network. Your own hardware then becomes part of their crime network, which the perpetrators can use to attack others or make money for them online.

Okay, so you know some of the lingo for cybercrime, but honestly, how bad is it?

From research:

  • Damage costs to hit $6 trillion annually by 2021.
  • Cybercrime will result in triple the number of unfilled cyber-security jobs.
  • Human attack to reach 4 billion people by 2020.
  • Global ransomware damage costs are predicted to exceed $5 billion in 2017.
  • In Q3 2016 alone, 18 million new malware samples were captured. That would equate to 51 000 a day on average!
  • It hits home! South Africa is ranked the world’s third highest cybercrime victim.
  • Hackers take around 140 days to track down!
  • IT departments ignore their own protocols - 45% of IT personnel have knowingly circumvented their own policies.
  • Inside-jobs are responsible for over half the crimes. 59% of employees steal proprietary corporate data when they quit or are fired.
  • The average number of attacks per company per year is now at two successful attacks per week.
  • The number of South Africans hit by cybercrime stands at 8.8 million.
  • FedEx has cut its annual profit forecast, citing the $300m cost of a June cyber-attack on its TNT Express unit.
  • Hackers stole £650 million from global banks in 2015 alone.
  • Crypto currency: reportedly now there’s a one-in-10 chance you’ll end up a victim of theft.
  • Ransomware emerges as a top cyber threat to businesses.
  • Standard Bank’s South Africa computer system was hacked in a R300m ATM fraud hit in Japan.
  • In South Africa, cybercrime has an economic impact equal to 0.14% of the national GDP – about R5.8 billion a year. Mixture of already detailed crimes types, but also online child sexual abuse (child porn) and cyber-bullying.

Some interesting cases – there really are a lot …

Friends for everyone:

In the biggest data breach of the year, user details of more than 412 million accounts were exposed in a data breach at FriendFinder Networks.

Yahoo, no need to search, info is out there already:

A 2014 breach at Yahoo exposed a record 500 million accounts. 2016, staying with the same company, Yahoo then acquired by Verizon Communications that a security breach exposed all 3 billion of its users at the time.

Clients of banks, no need to rob the branches anymore:

2016, November - Tesco Bank was forced to halt online banking. Hackers managed to gain £2.5million.

Health care not even safe.

WannaCry virus hit the NHS in 2017. Hackers caused chaos among the UK’s medical system. It was only stopped when a 22-year-old security researcher from Devon managed to find the kill switch, after the NHS had been down for a number of days.

Russian Hackers:

Between 2014 and 2016 a group of Russian-based hackers managed to gain access to secure information from more than 100 institutions around the world. The cyber criminals used malware to infiltrate bank-computer-systems and gathered personal data. It was estimated that around £650 million were stolen from the financial institutions in total.

Drama at Sony Pictures:

Known to be furious about the upcoming release of communism-mocking film, The Interview, North Korea (who technically denied involvement but called it a “righteous deed”) wreaked havoc on the network of developers, Sony Pictures. Syphoning a glut of sensitive data, leaks of upcoming films such as Annie and Still Alice bled onto the web.

Mafia Boy:

Some people just want to watch the world burn. “Mafia Boy”, a 15-year old Canadian, was responsible for bringing some of the world’s biggest sites to their knees; using an often ridiculed form of cyber-attack, distributed denial-of-service (DDoS). Mafia Boy was able to disrupt online powerhouses like CNN, Amazon, eBay and Yahoo.

PlayStation is not a game for their passwords:

A breach with no less than 77 million accounts, filled with passwords, names and addresses were compromised. It occurred between 17 and 18 April and forced Sony to switch off their PlayStation Network and music service, Qriocity. The outage prevented any PS3 or PSP owner from accessing online content and lasted for a total of 23 days. Shortly afterwards, Sony announced that damages tallied up to $171 million (£115 million).

eBay:

EBay confirmed that their corporate network was the victim of a cyber-attack, which compromised the passwords and financial information of their 145 million active users.

TalkTalk… of the town:

A major telecommunication company, TalkTalk, announced that around 157,000 of its customers’ personal details were accessed and over 15,000 bank account numbers and sort codes were stolen.

Jean-Pierre Murray-Kline - Internet & Social Media Specialist

Back to South Africa:

What’s popular back home? Bear in mind, it’s reported that only half of victims ever manage to recover funds in SA.

Inheritance mail:

The victim gets advised that they are to inherit funds and need to place a fee to recover it.

Banking, but not with your bank:

I personally get about three of these mails a week. The email asks me to check some sort of banking issue online. It asks me to log in but directs me to a fake site, which obtains my log in information.

The deposit scam:

A criminal orders goods or services from a business and makes a payment into the victim’s account, mostly by means of a fraudulent cheque.

The refund scam:

This scam is characterised by perpetrators requesting a quotation for a specific service or goods. ‘Payment” is then allegedly made and proof of payment is then provided for an amount that far exceeds the quotation.

What’s being done about cybercrime and what to do when you encounter it?

In February 2017, South Africa made changes to our cybercrime bill, which is highly debated, but I am not even going to get into the pros and cons so as to avoid boring my readers.

If you wish to read up on it, here are some good links:

http://www.justice.gov.za/legislation/bills/CyberCrimesBill2017.pdf
http://www.labourguide.co.za/most-recent/2178-cybercrime-law-in-south-africa

My summary of the bill is that any changes that give state power should be avoided and that access to reporting channels, which are independent, needs to be priority.

I will reserve an article for the bill once it is finally passed, and I have monitored how it is implemented. Some penalties for offences range from 1-10 years in prison or up to a R10-million fine…. So this will be interesting to observe.

How do we protect ourselves?

My tips and advice:

  • For Social Media, see this link: LockingDownSocialMedia.pdf – see steps.
  • Keep your computer current with the latest patches and updates.
  • Make sure your computer is configured securely. If you don’t know what this means, normally just go with default settings and call a friend.
  • Choose strong passwords and keep them safe. Nothing with your name and birth year.
  • Make sure your social network profiles (e.g. Facebook, Twitter, YouTube, MSN, etc.) are set to private. Don’t know how to do this? Google!
  • Never login to any site that uses HTTP instead of HTTPS when using public Wi-Fi; in fact, even when not using public Wi-Fi.
  • For an added layer of security, you should always use 2FA (2 factor authentication) for all your online accounts that support it. (Gmail, Facebook, etc.)
  • Turn off Wi-Fi when not in use.
  • For companies, please protect your data. Use encryption for your most sensitive files, make regular back-ups of all important data and store it in a different location.
  • Protect your computer with security software. I personally love AVG.
  • Be social media savvy… don’t go posting pictures of your platinum credit card and BMW car key as a brag…. You might lose both because of it.
  • Secure mobile devices. More often than not, we leave our mobile devices unattended. Never store passwords, pin numbers and even your own address on any mobile device.
  • Help others and report odd people… suspicious characters! It’s a mind-set we have to adopt. Cybercriminals are no longer just nerd looking.
  • If in doubt, block!
  • You have enough friends … probably. So say no to social media invitations (such as Facebook-friend or LinkedIn connection requests) from people you don't know.
  • Have more than one e-mail account. Remember, a hacker who has cracked your main email password has the keys to your [virtual] kingdom.
  • Ignore pop-ups.
  • I am so happy to give this advice: Macs are as vulnerable as PCs. That glitter PC can be attacked too.
  • Two-step verification is a must! If your email or cloud service offers it - Gmail, Dropbox, Apple and Facebook do – go through the trouble to set this up.
  • Only shop online on secure sites. Do a reference-check if you are not sure. Just Google.
  • Basic rule: didn't expect, don't click… goes for emails, pop-ups, you name it.
  • Do not pay a ransom! There is no guarantee you will get your data back.
  • Different sites, different passwords.
  • Never do online banking on public Wi-Fi.
  • Turn on Your Firewall.
  • Sharing connection – DON’T! (Turn it off)
  • Here are some helpful secure downloads :
    http://toolbar.netcraft.com/
    https://adblockplus.org/
    https://www.bitdefender.com/solutions/trafficlight.html

Okay, so you have done all the above and you were still attacked?

Who do you report the issue to?

I found this link very helpful:

https://alertafrica.com/awareness/who-to-report-to/

Published October 2017

Disclaimer:

  • While I attempt to ensure information is accurate and up-to-date at time of publication, I will not accept liability should information be used, and found to be incorrect. If you do see an error, please let me know.
  • The links, images, videos and/ or text from this article are not necessarily under my direct management, ownership or care. Should you be the owner or manager of any content herein, and wish for the content to be removed, please let me know and it will be done.