News & Trends

Title: Russian hacking: Up to 400 Australian companies caught up in cyber attacks blamed on Moscow


Author: ABC News


Date: 17 April 2018


Abstract: The United States, Britain and Australia allege Russian Government-backed hackers infected computer routers around the world in a cyber-espionage campaign targeting government agencies, businesses and critical infrastructure operators. In Australia, hundreds of businesses were affected in 2017, but Cyber Security Minister Angus Taylor said there was no indication their information had been compromised.





Title: Nearly 50,000 ‘Minecraft’ Accounts Infected With Malware Thanks to Modified ‘Skins’


Author: Stefanie Fogel


Date: 18 April 2018


Abstract: Thousands of “Minecraft” accounts were recently infected with malware that can potentially reformat hard drives and delete backup data and system programs, according to cybersecurity company Avast. The malicious software is apparently distributed via “Minecraft” character skins created in the PNG file format and uploaded to the game’s official website by fans. Skins modify a player’s avatar and they’re quite popular. Avast estimates nearly 50,000 “Minecraft” accounts have been infected.





Title: This malware targets Facebook log-in details, infects over 45,000 in just days


Author: ZDNet


Date: 19 April 2018


Abstract: Users who download a painting software advertised as a tool for stress relief might soon find themselves stressed out because the program is actually a front for malware which steals their Facebook credentials and payment information. 'StressPaint' first appeared a few days ago and at the time of writing has infected over 45,000 Facebook users. The attacks appear to specifically target users who operate Facebook pages and have configured a payment method into the account.





Title: Advanced Hackers Infect X-Ray Machines In Healthcare Espionage


Author: Thomas Fox-Brewster, Forbes


Date: 23 April 2018


Abstract: Yet another hacker crew has been battering the healthcare industry in recent months. But rather than just aim for the PCs, its also gotten footholds on the computers controlling X-Ray, MRI and other medical machines, according to a report from Symantec on Thursday. The hacker group, dubbed Orangeworm, is mainly targeting American healthcare organizations, though there are a number of victims worldwide, including in Asia and Europe. But rather than do anything destructive, Orangeworm is likely using leverage on those medical devices - designed to process and view images from X-Ray and MRI machines - to learn more about them as part of an ongoing corporate espionage operation, Symantec said.




VFAC Review
no image
The VFAC Review is a bimonthly multi-disciplinary review of the issues and trends in cybercrime.

Issue 12 contains information on:

  • Conferences and Events
  • News & Trends
  • Recent Publications

Articles on:

  • A Geneva Convention or Declaration for Cyberspace
  • Cyber Conflict and Retribution: Uncertainties in the Dark

Book Review
no image

Title: Cyberattacks, Cybercrime & Cyberterrorism (Book Chapter of: Handbook of Research on Network Forensics and Analysis Techniques)


Authors: Shrivastava, S. & Dube S.


Date: 12 January 2018


Abstract: This chapter describes how with growing reliance of modern society over internet and web-based services in every nook and corner of our daily lives, the threats of disruption and damage to these services has also evolved at a parallel rate. One of these threats having a potential of severe and life-threatening devastations is ‘Cyberterrorism’. Contrasting to non-lethal terms such as ‘internet vandalism’ and ‘hacktivism’, cyberterrorism encompasses a daunting reach to destruction to the fabric of our modern society. Because of its nature, despite its rapid growth, contrary to conventional terror attacks, cyberterrorism still seems distant from creating a direct threat to civilian life and society. Due to this distance, there is a lack of attention and focus on counter mechanisms against cyberterrorism. By applying effective techniques and keeping out eyes open, establishments can go a long way to avert cyberterrorism attacks and also recover quickly in the occurrence of an attack. The conclusion of this chapter is that additional research is needed to identify the areas in which personal and professional functions on the internet are still vulnerable.