It is not if they already hacked you, but when: the dangers in cybersecurity and the business behind the scene

"There are two types of companies, which have been hacked and those that still do not".This raw is the vision of cybersecurity experts about the risk to which companies are exposed on the network.Pandemia has accelerated the silent climbing that had been registering crimes on the Internet for a five years, until they become a great threat even for large multinationals.

Because if the COVID-19 have served the hackers, it has been to put great fortunes and business groups in their spotlight.Thus it is explained that the main cybercrequence organizations will enter about 15.000 million euros only in 2020, according to EMSISOFT, a firm specialized in network security.For each data theft, the loot raised by the pirates was 120.000 euros on average.

The forecasts of the Cybersecurity Ventures firm contemplate that 2021 will close with an attack of a malicious program every five seconds, which will cause total costs at 16 damage.000 million.This would multiply by 57 the figure six years ago.

Professionalization

This success is not understood without a refinement of the methods used by computer pirates to deceive managers and employees.Jeff Bezos's own mobile, founder of Amazon, was the victim of a pirate in 2018 with which he tried, without finally, the well -known 'CEO scam', which consists of the impersonation of identity of a high responsible for the business.Between 2016 and 2020, this deception cost companies in the United States about 26.000 million de dólares, según el FBI.

The scams reach the point that, to gain the victim's trust, hackers spy on their correspondence and allude to family or personal situations of the affected in the steps prior to the closing of a transaction.

This perfectionism does not remain at the bottom, but also in forms.Darkside, organization responsible for recent cyber attacks to the Colonial Pipeline Net.In addition, it has an internal norm that excludes universities, schools and municipalities of being a possible objective.In this way, they also try to generate trust among their victims, which will show greater predisposition to pay the money required to recover their data.

Los ciberdelincuentes están cada día más profesionalizados, y ya no actúan individualmente sino como parte de una empresa organizada

However, the FBI and expert signatures in negotiation recommend not paying the money required by cybercriminals, since the unlocking of the data is never guaranteed.In addition, colonial payment to recover normality in its infrastructure can end up causing an effect called for other criminal organizations.Faced with this assignment from the United States, Ireland has refused this week to pay a group of hackers after their health system has been the victim of a computer virus that has affected the provision of services in ambulators and sessions of sessions of X-rays.

In the background, in this cybercrime escalation is the debate around the role that some states play when promoting attacks on the network.Analysts point to a crude confrontation between the US, China and Russia, with the world's first power being the los losing.Although from the Kremlin they demolish any link with these incidents, the government of Joe Biden imposed this month of April sanctions to the country chaired by Vladimir Putin by a cyber attack that fully affected several federal agencies.

Infrastructure attack

Last Friday, May 7, Colonial, the largest pipeline network in the United States, suffered a ransomware attack.This kidnapping of information led to the stoppage of all the operations of the company, in charge of the transport of 2.5 million barrels per day and 8.850 kilometers of managed pipelines, mainly to supply the large population centers of the east and the south of the country.

No es si ya te hackearon, sino cuándo: los peligros en ciberseguridad y el negocio detrás de escena

The situation came to such an extent that President Joe Biden had to declare the state of national emergency to eliminate the fuel limit that can be transported by road.The measure was insufficient to avoid supply shortage in cities and several airports, in addition to alterations in the interior flights of the country.Colonial, meanwhile, tried unsuccessfully to restore the service, so last Thursday, May 13, the company agreed to pay the rescue requested by Darkside, the author organization of the operation.This demanded 75 bitcoins, which during those days were equivalent to about four million euros.

This case is the reflection of the increasing pressure to which the critical infrastructure security systems are subjected.In fact, the latter is the most important ever suffered by facilities of such importance in the US.This, in addition, questions the reliability of security systems, since a failure in these systems is usually the main reason why hackers manage to infiltrate the networks of large companies or state services.

Wannacry's case

"Ooops, your files have been encrypted!".On the afternoon of May 12, 2017, this message appeared on the screen of thousands of computers spread throughout the planet.Next to him, a brief tutorial was attached about what had happened to the team and how the affected data could be recovered.

It did not take more than a few hours to discover the global impact of this apparent setback.Its origin, a malicious program baptized as Wannacry that affected more than 200.000 computers from 150 countries.

Los ataques que implican malware de ransomware han crecido exponencialmente durante los últimos años

The key for this virus to spread so easily was in its capacity to access large companies systems.Fedex, Honda, Petrobras, Renault or Telefónica were some of the affected multinationals.

Wannacry's goal was none other than getting money from his victims.Once he entered a computer, an accountant appeared that measured the time to pay money, which allowed, in theory, to recover the stolen data.If the victim agreed to pay within three days, the price was $ 300 in Bitcoins.If I did in seven, it amounted to $ 600.If he refused, he lost the data.

The experts advised at the time not to pay the cybercounts, since the users who accessed their demands faster did not recover their data.Thus, despite the thousands of affected, only 327 payments were recorded, for a total collection of 130.$ 634.

They discovered a Android Trojan who attacked more than 60 banks

The Cleafy cybersecurity company has discovered a new 'malware' called Teabot, a bank trly that affects mobile phones with Android operating system that has attacked more than 60 European banks this year 2021.

Teabot is a 'malware' that has the main objective.

This threat was initially discovered in January, and on March 29 the first injection against Italian banks was detected, while in early May it has begun to expand and also affected Belgium entities and the Netherlands.

The 'malware' has come to extract information from users from more than 60 European banks, and in fact includes text in different languages, among which is Spanish and also Italian and German.

Teabot, which does not belong to any family of 'malware' known so far, abuses the accessibility services of the Android operating system, a technique usually used by bank troyans.

When accessing this function, the Trojan.

Teabot is also able to intercept, send and hide the SMS messages of the mobile phone, and thus steal information from the device such as the authentication codes sent by Google to confirm the user's identity.

Complaints for bank scams grew almost 3.000 percent in 2020

Fraud and fraud in bank accounts, such as the theft of access keys to homebanking or credit card data, was one of the crimes that grew the most last year after 22 cases denounced in 2019 to 641 in 2020, inArgentina.

Una de las vías de ataque que crece es tener como objetivo infraestructura de todo tipo, sea pública o privada

This figure represents an increase of almost 3.000 percent after the massive overturning of users to digital channels during the pandemic, according to data from the Fiscal Unit Specialized in Cybercrime (IFECI).

Scams can have more or less elaborate ways but, in all cases, these are strategies with which criminals attract the attention of digital money users to make personal data and, then, steal money, make consumptionWith your cards or ask for rapid loans.

"Until before the pandemic this type of crime had been giving more to droplets.While it was something that was present, it had never occurred with as much virulence as when the quarantine began, "Horacio Azzorin, a prosecutor of the Ufeci, told Télam.

Since then, cases of people with bank accounts or credit cards contacted by criminals through social networks, email or even telephone calls to offer supposed exclusive promotions, the solution to an operational inconvenience or even gifts or special benefits or benefits.

"It's the digital uncle's story," said Azzorin, ".The criminals contact for private messages and ask for the data of an account to transfer that money to a third party that, generally, has nothing to do but who created a false account with a photo of ID and stolen data from the Internet ".

JPMorgan and an operation against bank

JPMorgan, the largest United States bank, has also fallen into the networks of computer pirates.In fact, in 2014 he suffered a hacking in which 76 million private clients and seven million small companies were affected.The first security gap was detected in July of that year, but the total reach of it was not completely quantified until September.The attackers did not obtain numbers of accounts, but accessed addresses of homes, emails and telephone numbers that they feared for possible cases of scams and threats.At that time, JPMorgan allocated $ 200 million to the protection of his computer systems.

The computer piracy was aimed at at least 13 financial entities, among which were Citigroup, HSBC and the Morgan Stanley E*Trade subsidiary.However, beyond the group chaired by Jamie Dimon, Fidelity was the only bank that was affected.It is true that in the case of the latter, the archives accessed by criminals did not contain compromising information.The authorities ended up capturing the two greatest responsible for the crime: Andrei Tyurin, a Russian computer pirate, and Gery Shalon, leader of the criminal organization responsible for cyber attack.This January, a judge condemned Tyurin 12 years in prison and paying 19 million dollars, the amount he allegedly obtained for his participation in the plot.

Source: Expansion

Temas relacionados
internetcleafyciberdelincuenciajoe bidencovid