News & Trends
2019-04-15  

Title: Facebook 'hosts' cyber-crime marketplaces

Author: BBC NEWS

Date: 04.05.2019

Abstract: Facebook has been host to "dozens" of busy marketplaces and exchanges used by cyber-thieves to buy and sell stolen goods, suggests a security firm. Researchers at Cisco found 74 groups on Facebook that openly traded stolen credit card numbers and bank account details. The groups had a regular membership of about 385,000 people, they found. Facebook said it had shut down the groups for breaking the social network's policies on financial fraud. 

Source: https://www.bbc.com/news/technology-47831216

2019-04-03  
Title: Cyber crimes against children in Dubai up 80 percent

 

Author: GULF NEWS UAE

 

Date: 04.02.2019

 

Abstract: The number of cybercrimes committed against children increased from 29 complaints in 2017 to 52 complaints last year, according to Dubai Police. Major-General Khalil Ebrahim Al Mansouri, Assistant Chief for Criminal Investigation Affairs at Dubai Police, said that cybercrimes had become a global threat requiring a greater collective effort and more innovative solutions. He added that Dubai Police was constantly developing ways to fight online crime and facilitating methods to report it. Online crimes targeting children jumped from 34 in 2016 and 29 in 2017 to 52 last year, according to Dubai Police. The most common age for young victims as per recorded crimes was between 13 and 18.

 

Source: https://gulfnews.com/uae/cyber-crimes-against-children-in-dubai-up-80-per-cent-1.62411357

2019-04-03  

Title: Social media-enabled cybercrime is generating $3.25 billion a year 


Author: Help Net Security 


Date: 02.27.2019


Abstract:


- One in five organizations have been infected with malware distributed via social media

- Reports of cybercrime involving social media grew by more than 300-fold between 2015 and 2017 in the US, and social media-enabled crime quadrupled between 2013 and 2018 in the UK

- Over 1.3 billion social media users have had their data compromised within the last five years and between 45-50 percent of the illicit trading of data from 2017 to 2018 could be associated with breaches of social media platforms

- Four of the top five global websites hosting cryptomining code are social media platforms

- The number of enterprises infected by cryptomining malware doubled from 2017 to 2018

- Social media platforms contain up to 20 percent more methods by which malware can be delivered to users – e.g. through adverts, shares, plug-ins – than comparable sources, such as ecommerce, digital media or corporate websites

- Social media has fueled a 36 percent increase in the recruitment of ‘millennial money mules’ since 2016 and has increased fraud revenues by 60 percent since 2017.


Source: https://www.helpnetsecurity.com/2019/02/27/social-media-enabled-cybercrime/


2019-04-03  
Title: Hackers Charged With Making Threats to Schools        

Author: Associated Press 

Date: 13.02.2019

Abstract:  Two computer hackers were charged with sending false shooting and bomb threats to hundreds of schools and other institutions in the U.S. and Britain, federal prosecutors said Tuesday. The men are members of Apophis Squad, a worldwide collective of hackers intent on using the internet to “sow chaos,” the Department of Justice said in Los Angeles. Timothy Vaughn of Winston-Salem, North Carolina, was arrested this week by the FBI. The 20-year-old used the online handles “WantedbyFeds” and “Hacker_R_US,” according to the indictment. George Duke-Cohan, 19, of Hertfordshire, United Kingdom, is currently serving a prison sentence in Britain for a hoax threat targeting an airliner. His internet usernames included “DigitalCrimes,” court papers show. It wasn’t immediately known if the defendants have attorneys who could comment on the felony charges that include making threats to injure in interstate commerce and making interstate threats involving explosives. The indictment alleges the Apophis Squad made false threats and engaged in “swatting,” in which a phony report is made to trigger deployment of emergency response teams. The hackers made false threats of shootings and bombings last year that were intended “to cause fear of imminent danger and did cause the closure of hundreds of schools on two continents on multiple occasions,” the indictment said. One phony threat targeted Los Angeles International Airport. Members of Apophis Squad used “spoofed” email addresses to make it appear some threats had been sent by innocent parties, including the mayor of London, according to court papers.

Source: https://www.securityweek.com/indictment-hackers-charged-making-threats-schools
more
VFAC Review
no image
2017-01-24
 
The VFAC Review is a bimonthly multi-disciplinary review of the issues and trends in cybercrime.

Issue 12 contains information on:

  • Conferences and Events
  • News & Trends
  • Recent Publications


Articles on:

  • A Geneva Convention or Declaration for Cyberspace
  • Cyber Conflict and Retribution: Uncertainties in the Dark


more
Book Review
no image
2019-04-19

Title: Handbook of Big Data and IoT Security


Authors: Ali Dehghantanha, Kim-Kwang Raymond Choo


Date: 2019


Abstract:

This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices. An IoT access control scheme and an IoT forensic framework is also presented in this book, and it  explains how the IoT forensic framework can be used to guide investigation of a popular cloud storage service.

A distributed file system forensic approach is also presented, which is used to guide the investigation of Ceph. Minecraft, a Massively Multiplayer Online Game, and the Hadoop distributed file system environment are also forensically studied and their findings reported in this book. A forensic IoT source camera identification algorithm is introduced, which uses the camera's sensor pattern noise from the captured image.

In addition to the IoT access control and forensic frameworks, this handbook covers a cyber defense triage process for nine advanced persistent threat (APT) groups targeting IoT infrastructure, namely: APT1, Molerats, Silent Chollima, Shell Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe.

The characteristics of remote-controlled real-world Trojans using the Cyber Kill Chain are also examined.  It introduces a method to leverage different crashes discovered from two fuzzing approaches, which can be used to enhance the effectiveness of fuzzers. Cloud computing is also often associated with IoT and big data (e.g., cloud-enabled IoT systems), and hence a survey of the cloud security literature and a survey of botnet detection approaches are presented in the book. Finally, game security solutions are studied and explained how one may circumvent such solutions.

This handbook targets the security, privacy and forensics research community, and big data research community, including policy makers and government agencies, public and private organizations policy makers. Undergraduate and postgraduate students enrolled in cyber security and forensic programs will also find this handbook useful as a reference.


DOI: https://doi.org/10.1007/978-3-030-10543-3

more