{"id":16584,"date":"2019-10-14T09:10:05","date_gmt":"2019-10-14T17:10:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/10\/14\/news-10323\/"},"modified":"2019-10-14T09:10:05","modified_gmt":"2019-10-14T17:10:05","slug":"news-10323","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/10\/14\/news-10323\/","title":{"rendered":"Europol: Ransomware remains top threat in IOCTA report"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 14 Oct 2019 16:00:00 +0000<\/strong><\/p>\n<p>The European Union Agency for Law Enforcement Cooperation, or Europol, just released its annual Internet Organized Crime Threat Assessment (IOCTA) report for the year. And we weren\u2019t surprised to find that ransomware, despite its palpable decline in volume these past few months\u2014a trend we\u2019ve also <a href=\"https:\/\/blog.malwarebytes.com\/reports\/2019\/08\/labs-quarterly-report-finds-ransomwares-gone-rampant-against-businesses\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">seen and documented<\/a>\u2014remains the most prominent threat in terms of prevalence and financial damage.<\/p>\n<h3>It&#8217;s not <em>just<\/em> data<\/h3>\n<p>While the IOCTA report talks about online threats that both consumers and businesses face on a daily basis, it also puts data at the center of it all. We rely on it\u2014often, all too much\u2014and criminals know this. And yet, most threat actors behind attack campaigns rely on our data to make their attacks more successful, compelling us to take action. After all, nowadays an attack that doesn\u2019t use data against its owners wouldn\u2019t be much of a money-earning scheme.<\/p>\n<p>Threat actors can deprive organizations and individuals\u2019 access to their own files by encrypting and holding them for ransom, such is the case for ransomware. And they can also deny the average user access to an organization\u2019s data (and services) through <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/03\/ddos-attacks-are-growing-what-can-businesses-do\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Distributed Denial of Service (DDoS) attacks<\/a>. According to Europol, such attacks with an <a rel=\"noreferrer noopener\" aria-label=\"extortion element (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/scams\/2019\/08\/the-lucrative-business-of-bitcoin-sextortion-scams\/\" target=\"_blank\">extortion element<\/a> in them are the most prevalent.<\/p>\n<p>Data also enables other forms of online crime like fraud. Criminals are primarily after financial data, such as credit card information, online banking credentials, and cryptocurrency wallet data. They are also after <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/glossary\/pii\/\" target=\"_blank\">personally identifiable information (PII)<\/a> and other login credentials. Such data fuels other profitable, targeted attacks like <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/business-email-compromise-bec\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">business email compromise (BEC)<\/a> scams, spear phishing, and account takeovers.<\/p>\n<p>There is also the challenge of data overload, particularly in the realm of child sexual exploitation (CSE) crimes. The staggering amount of material online detected by law enforcement and private companies continues to increase to the point that it\u2019s putting a strain on law enforcement resources to investigate these crimes. One contributing factor to the increase of availability of CSE material online is that more underage users are accessing and using social media, thus, criminals reach and communicate with them via these platforms.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"40770\" data-permalink=\"https:\/\/blog.malwarebytes.com\/awareness\/2019\/10\/europol-ransomware-remains-top-threat-in-iocta-report\/attachment\/sid2019\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/10\/sid2019.png\" data-orig-size=\"1151,602\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"sid2019\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/10\/sid2019-300x157.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/10\/sid2019-600x314.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/10\/sid2019-600x314.png\" alt=\"\" class=\"wp-image-40770\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/10\/sid2019-600x314.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/10\/sid2019-300x157.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/10\/sid2019-630x330.png 630w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/10\/sid2019.png 1151w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><figcaption>Courtesy of Europol<\/figcaption><\/figure>\n<\/div>\n<h3><strong>Other IOCTA findings<\/strong><\/h3>\n<ul>\n<li>The IOCTA report also noted that key infection vectors are [1] phishing and [2] remote desktop protocol (RDP) vulnerabilities. Simple patching can address vulnerabilities. As for phishing, did you know that you can be targeted on your <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/06\/somethings-phishy-how-to-detect-phishing-attempts\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">desktop<\/a> and <a rel=\"noreferrer noopener\" aria-label=\"smartphone (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/12\/something-else-phishy-detect-phishing-attempts-mobile\/\" target=\"_blank\">smart phone<\/a>? <\/li>\n<li>Organizations are growing more concerned about sabotage performed by malicious insiders. Learn about insider threats <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/08\/the-enemy-is-us-a-look-at-insider-threats\/\" target=\"_blank\">here<\/a>.<\/li>\n<li>Ransomware tactics have shifted, from a scattergun approach of infecting systems to a more focused and refined targeting of profitable victims. This means that ransomware proponents target those with a greater ability to pay a ransom than the average, normal user. Here are some tips on <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/03\/how-to-beat-ransomware-prevent-dont-react\/\" target=\"_blank\">how to beat ransomware<\/a>.<\/li>\n<li>BEC is evolving. There have been campaigns wherein threat actors used malware and network intrusion. Get to know more about \u201cthe scam that gets better with age\u201d and take note of the <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/11\/business-email-compromise-scam-costs-pathe-21-5-million\/\" target=\"_blank\">ways businesses can combat BEC scams<\/a>.<\/li>\n<li>Self-generated explicit material (SGEM) is on the uptick. Young children now have access to high-quality smart phones, which enables them to produce and share SGEM, either voluntarily or under coercion. The rising number of SGEM victims will likely to continue. Parents and guardians: Please talk to your kids about this, and <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/05\/parenting-in-the-digital-world-a-review\/\" target=\"_blank\">other online risks<\/a>.<\/li>\n<li>Jackpotting, also known as black-box attacks, against ATMs are becoming more widespread and accessible due to tools like Cutlet Maker being more available on the dark web. Check out our mini-series\u2014<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/101\/2019\/05\/everything-you-need-to-know-about-atm-attacks-and-fraud-part-1\/\" target=\"_blank\">part 1<\/a>, <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/101\/2019\/08\/atm-attacks-and-fraud-part-2\/\" target=\"_blank\">part 2<\/a>\u2014on ATM attacks and fraud.<\/li>\n<li>Card-not-present (CNP) fraud and skimming continue to plague financial institutions. <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/101\/2014\/08\/atm-skimming-a-refresher\/\" target=\"_blank\">Don\u2019t be a victim of skimming<\/a>.<\/li>\n<li>Due to law enforcement activity and extensive DDoS attacks against hidden services, many have grown distrustful of the onion router (Tor) environment. While underground market administrators are currently exploring alternatives, a migration to a new platform will not likely happen yet.<\/li>\n<\/ul>\n<p>Stay safe!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/awareness\/2019\/10\/europol-ransomware-remains-top-threat-in-iocta-report\/\">Europol: Ransomware remains top threat in IOCTA report<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/awareness\/2019\/10\/europol-ransomware-remains-top-threat-in-iocta-report\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 14 Oct 2019 16:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/awareness\/2019\/10\/europol-ransomware-remains-top-threat-in-iocta-report\/' title='Europol: Ransomware remains top threat in IOCTA report'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/10\/shutterstock_1160595706.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>The European Union Agency for Law Enforcement Cooperation, or Europol, just released its annual Internet Organized Crime Threat Assessment (IOCTA) report. We highlight their key findings and remind readers how to better protect themselves.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/awareness\/\" rel=\"category tag\">Awareness<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/bec\/\" rel=\"tag\">bec<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/business-email-compromise\/\" rel=\"tag\">Business Email Compromise<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/child-sexual-exploitation\/\" rel=\"tag\">child sexual exploitation<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cse\/\" rel=\"tag\">cse<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ddos\/\" rel=\"tag\">ddos<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/europol\/\" rel=\"tag\">europol<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/fraud\/\" rel=\"tag\">fraud<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/internet-organized-crime-threat-assessment\/\" rel=\"tag\">internet organized crime threat assessment<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/iocta\/\" rel=\"tag\">iocta<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spear-phishing\/\" rel=\"tag\">spear phishing<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/awareness\/2019\/10\/europol-ransomware-remains-top-threat-in-iocta-report\/' title='Europol: Ransomware remains top threat in IOCTA report'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/awareness\/2019\/10\/europol-ransomware-remains-top-threat-in-iocta-report\/\">Europol: Ransomware remains top threat in IOCTA report<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[15496,14347,11140,23198,23199,10514,13114,9751,23200,23201,3924,3765,11727],"class_list":["post-16584","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-awareness","tag-bec","tag-business-email-compromise","tag-child-sexual-exploitation","tag-cse","tag-ddos","tag-europol","tag-fraud","tag-internet-organized-crime-threat-assessment","tag-iocta","tag-phishing","tag-ransomware","tag-spear-phishing"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16584","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16584"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16584\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16584"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16584"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16584"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}