INSIGHTS INTO OUR WORLD

Get free advice on all things IT

READ THE SILVERBUG BLOG

These New Types Of Internet Crimes Will (Hard) Drive You Mad

SHARE THIS STORY | |

While there are companies out there working tirelessly to improve security and combat these attacks, the criminals are working just as hard to find the vulnerabilities and commit crimes to make our lives much more difficult. It doesn’t matter if you’re doing online shopping in your bedroom or you’re in the office of a massive business, anybody can become a victim of internet crime at any moment. 

These New Types Of Internet Crimes Will (Hard) Drive You Mad

The new types of internet crimes that you and your business need to be aware of include the following (click the title to jump straight to the explanation):

 

  1. 1. Point Of Sale Attacks

  2. 2. Banking Malware

  3. 3. Eavesdropping and Surveillance

  4. 4. Logic Bombs

  5. 5. Ransomware

  6. 6. And How To Protect Yourself And Your Business From Ransomware

1. Point Of Sale Attacks

One of the new types of internet crimes you need to be made aware of immediately is a point of sale attack. Here, the intruder remotely attacks the environment where retail transactions and card purchases are conducted.

PoS malware is growing increasingly popular worldwide, as attackers use this method to gain customer’s personal details, such as card numbers, phone numbers, addresses, and other confidential details. While you might be heading into a store to make a purchase for yourself or your business, it’s the criminals online who are using the internet to gain access to your sensitive data, and you might not even know it.

By utilising this method, thieves have all the information they need, where they can clone your credit or debit cards to sell on the black market, or might choose to keep them and rack up your expenses. In a store, when a cashier swipes your card, the PoS system reads the magnetic strip and forwards the account data to your bank for authorisation. For cybercriminals, the goal is to infect PoS devices with malware that can steal your lucrative data.

2. Banking Malware

Banking malware is another crime that can affect you personally, as well as your business. This insidious method has grown increasingly popular on Android devices, as the malware steals data by exploiting smartphone accessibility services. The notorious Svpeng malware takes advantage of an Android function which is designed to help people with disabilities use their phone.

The software is constantly upgraded and can steal any text entered on the phone by abusing the accessibility. Svpeng can open URLs and read text messages, make calls, read contacts and more - and it can prevent itself from being uninstalled. While most banking apps don’t allow users to take screenshots when they’re in use, this banking malware gets around it by using the accessibility services to identify which banking app is in use.

A phishing link is then presented, and numerous fake login pages for banks are shown. If a user enters their details into one of the overlays, their banking credentials will fall into the hands of the hackers. Putting them at risk of fraud, identity theft, and major financial losses. So, just imagine how much you and your business could lose if you fall into this trap.

A banking trojan card data stealer in actionImage Credit

3. Eavesdropping and Surveillance

As new technologies are introduced, computers and laptops can now be hacked for eavesdropping and surveillance, just like over the phone. The most common method to eavesdrop is via wiretap. This is the practice of connecting a listening device - usually to a telephone line - and it allows the criminal to monitor the conversation secretly.

More and more people are trying simple tips and tricks to stop potential voyeurs, and if somebody like Facebook’s Mark Zuckerberg is going to painfully simple lengths to combat this (he's taped over his webcam and the microphone port), you and your business might want to follow suit to be on the safe side. Being watched through your webcam by a stranger? How creepy.

Mark Zuckerbeg

Mark Zuckerberg - a closer lookImage Credit

4. Logic Bombs

Logic Bombs act in a similar manner to viruses, but they are smaller programmes or sections of a programme which are triggered by a particular event. The event could be a certain date or time the attacker has decided, it could be when you remove or open a certain file, or even when you fill a percentage of disk space on your computer - your fate is in the attacker's hands.

Once it’s been triggered, the programme could end up deleting critical sections of code and make your software implode, as it would be useless without the coding. It could happen when you’re about to finish that 10,000-word college assignment that’s due in tomorrow, or if you’re in the middle of an important business meeting. You can get mad at those hackers all you want, it won’t change anything.

5. Ransomware

Ransomware is another new type of internet crime that is taking the cyber world by storm. It’s a malicious type of malware you’d usually find disguised as an email, where the malware is encrypted by a company’s data file before a ransom note is displayed on-screen. The attackers demand that you pay a sum (typically in Bitcoins) in exchange for the release of your data and files.

There have been a couple of massive cases of ransomware in 2017, with the WannaCry attack on the NHS the most popular as they were crippled in what many are calling the biggest ransomware attack in history.

wcry.pngImage Credit

Being blackmailed can be pretty frustrating, even more so if it’s a complete stranger on the other side of the world laughing at your expense, expecting you to pay up. Annoying, right? It can be a frightening prospect, especially if you are a business and have sensitive data that can be leaked or even deleted permanently. There’s no guarantee you’d get your data back even if you pay up either; why would they be nice enough to do that? The attackers steal your data in the first place, and then have the audacity to blackmail you?! How noble of them.

It’s clear to see that cybercrime is becoming more financially-motivated. Attackers are able to spread malware as frequently as they want and also make a profit while doing it, and they won’t be stopping as we head towards 2018, but it can be prevented.

A Quick Word On What Has Changed?

We’ve moved well past your ordinary types of viruses. The graph below perfectly illustrates just how much cybercrime has advanced and at such a rapid rate.

The rapid rise of cybercrimeImage Credit

Back in 1997, types of attacks we were dealing with included trojans and malicious codes, and in the space of ten years, they changed to DoS attacks and the rise of Botnets.

Fast forward another ten years, and we’re dealing with ransomware, identity theft, and even cyber warfare on a global scale. So you can begin to understand how advanced these attacks are becoming, and what could be in store as technology continues to advance.

And How To Protect Yourself And Your Business From Ransomware

Being a victim of ransomware can be a pretty daunting prospect, as you don’t expect to sit opposite a screen demanding a payment for data you own. Sadly, it doesn’t look like attackers are going to stop trying to use the ransomware method, so it’s important you stay protected.

If you want to learn more about ransomware, and how to prevent it from happening, check out our free eBook:

button to get a guide

SHARE THIS STORY | |
FREE Case Consultation

Recent Posts