Top 3 ways to get a Ferrari: Unusual cyber crime tactics

  1. Get a well-paid job
  2. Win the lottery
  3. Come up with the best cyber scam to win over your boss

Believe it or not, a global organised crime gang has offered its associates a Ferrari for whoever comes up with the best cyber scam to lure in vulnerable victims.  This unusual competition shows the lengths cyber crime gangs will go to recruit and retain young technological talent, and how much money is involved in this dark market.

The European Cybercrime Centre (EC3), which is the focal point of the EU’s fight against cyber crime, has said that it was seeing 85% of cyber crime activity emanating from Russian-speaking territories. These areas have traditionally made it difficult for law enforcements agencies to prosecute cyber criminals who are targeting Western countries.

There has been a sharp increase in card fraud, affecting many countries throughout Europe and the rest of the world. Troels Oerting, Head of EC3, cited one case involving a cyber criminal gang who hacked into computers to convert just five debit cards to credit cards with no upper withdrawal limit. Within a few hours they were then able to use the cards to steal $45m.

Troels Oerting said that:

“In real cyber crime, [we’re going after] the people who develop and distribute the malware. We are trying to find them and identify them. It’s like cutting the snake’s head off. But there are a lot of heads, and they grow back very quickly.

“Organised crime has not just embraced this but integrated cybercrime into its business.”

Out this week, CyberWar, CyberTerror, CyberCrime and CyberActivism, Second Edition demonstrates how organisations need to adopt a culture of cyber security awareness that complements their technology-based defences to rebuff the ever-increasing threat of cyber attack. While technology and the technical response to cyber threats are important, the human aspect of cyber security is often overlooked. This book discusses how to utilise international standards and best practices to establish a culture within the organisation to handle cyber threats. Find out more >>

Source: The Independent