An Interpol headline on November 25, 2020 announces "Three arrested as INTERPOL, Group-IB and the Nigeria Police Force disrupt prolific cybercrime group" however the article does not name the suspects. The Interpol article says the three are "believed to be members of a wider organized crime group responsible for distributing malware, carrying out phishing campaigns and extensive Business Email Compromise scams." Interpol's Craig Jones says the year-long investigation was known as "Operation Falcon."
Thursday, November 26, 2020
Major Nigerian Phishing and BEC Actors, SSGToolz and CeeCeeBossTMT, Arrested by Nigerian Police and Interpol
Sunday, November 15, 2020
ENISA: Top 15 Threats: Spam, Phishing, and Malware!
ENISA's Top 15 Threats report starts with this summary document:
A full report from ENISA is available for each of the topics below. Click to access each one. I'll only comment on a few in this blog post! |
#1 Cyber Threat - Malware
#2 Cyber Threat - Web-Based Attacks
#3 Cyber Threat - Phishing
#5 Cyber Threat - Spam
The ENISA Cybersecurity Threat Landscape
ENISA, the European Union Agency for CyberSecurity, met on October 6, 2020 to review their current recommendations and get any last minute changes. On October 20, 2020, they released a huge batch of reports that many folks seem to have not seen. We wanted to take a moment to give you the guided tour and strongly recommend the consumption of these report. Each publication is available "flip book" style on the ENISA website, and also as a downloadable PDF.
Let's get started!
https://www.enisa.europa.eu/publications/year-in-review |
This is the 8th Year In Review for ENISA and their reporting just keeps getting better! This year the main components of the report break down into topics like this:
- The Year In Review
- Cyber Threat Intelligence Overview
- Sectoral and Thematic Threat Analysis
- Main Incidents in the EU and WorldWide
- Research Topics
- Emerging Trends
- List of Top 15 Threats
The Year In Review
- Attack surface in cybersecurity continues to expand as we are entering a new phase of the digital transformation
- There will be a new social and economic norm after the COVID-19 pandemic even more dependent on a secure and reliable cyberspace.
- The use of social media platforms in targeted attacks is a serious trend and reaches different domains and types of threats.
- Finely targeted and persistent attacks on high-value data (e.g. intellectual property and state secrets) are being meticulously planned and executed by state-sponsored actors
- Massively distributed attacks with a short duration and wide impact are used with multiple objectives such as credential theft
- The motivation behind the majority of cyberattacks is still financial
- Ransomware remains widespread with costly consequences to many organisations
- Still many cybersecurity incidents go unnoticed or take a long time to be detected
- With more security automation, organizations will invest more in preparedness using Cyber Threat Intelligence as its main capability
- The number of phishing victims continues to grow since it exploits the human dimension being the weakest link.
Cyber Threat Intelligence Overview
- CTI is still primarily a MANUAL PROCESS in most organizations.
- Much CTI data is still primarily being passed through spreadsheets and email.
- CTI Requirements are becoming more defined and beginning to take significant guidance from business needs and executive input.
- CTI from Public Sources combined with observations from internal network and system monitoring is a popular model
- Open-source information, enriched by threat feeds from CTI vendors is a "clear upwards trend" indicating more focus on internal CTI production.
- Threat Detection is described as the main use for CTI, with IOCs being a base, but more interest in TTPs in the area of threat behavior and adversary tactics.
- Only 4% of respondents felt they could measure the effectiveness of their CTI programs! OUCH! Machine learning was ranked especially low, with most saying the skill of the analysts was the best predictor of success!
Sectoral and Thematic Threat Analysis
Main Incidents in the EU and WorldWide
- TURLA - attacking Microsoft Exchange serveres
- APT27 - mentions attacks against government SharePoint servers in the Middle East
- Vicious Panda - targeting Mongolian government entities
- Gamaredon - spear-phished the Ministry of Defence in Ukraine in December 2019
- Industrial property and Trade secrets
- State/Military classified information
- Server infrastructure
- Authentication Data
- Financial Data
Research Topics
- Better understanding of the human dimension of security - (I know so many great researchers in this space, from UAB's own Nitesh Saxena, to UAB's Ragib Hasan and his current survey on "User Preferences in Authentication" to Carnegie Mellon's Lorrie Cranor and the IIIT Delhi PreCog lab run by Ponnurangam "PK" Kumaraguru.)
- Cybersecurity research and innovation - with a special focus on building "test labs and cyber ranges" that better reflect real world deployments.
- 5G Security
- EU Research and Innovation Projects on Cybersecurity
- Rapid dissemination of CTI methods and content
Emerging Trends
- Attacks will be massively distributed with a short duration and a wider impact
- Finely targeted and persistent attacks will be meticulously planned with well-defined and long-term objectives
- Malicious actors will use digital platforms in targeted attacks
- The exploitation of business processes will increase
- The attack surface will continue expanding
- Teleworking will be exploited through home devices
- Attackers will come better prepared
- Obfuscation techniques will sophisticate
- The automated exploitation of unpatched systems and discontinued applications will increase
- Cyber threats are moving to the edge
List of Top 15 Threats
Saturday, November 07, 2020
US Victims of Indian Call Center Scams Send Cash to Money Mules Across the Country
On November 6, 2020, the US Attorney in the Eastern District of Virginia announced the sentence for a husband and wife, Chirag Choksi and Shachi Majmudar, both 36 years old. This pair had involved themselves in the money laundering side of an international scam ring that preys on the elderly via call centers located in India. Chirag will serve 78 months in prison while his wife Shachi will serve 14 months in prison.
I've had the pleasure of presenting my research on Indian Call Centers at a meeting the Federal Trade Commission hosted in Washington DC last year. The scope of these networks and the absolute impunity with which they operate should be a cause of national shame in India. In 2019, according to the Consumer Sentinel Network Data Book 2019, assembled by the Federal Trade Commission, reported 647,472 "Imposter Scams" with total losses of $667 Million, primarily to the elders who are most deserving of our protection. (These scams are increasing rapidly. In 2017 there were 461,476 Imposter Scam complaints, in 2018 there 549,732 complaints.)
The Scam: Law Enforcement Impersonation
The Money Mules: Choksi and Shachi
The Mule Recruiter: Shehzadkan Pathan
Shehzadkhan Khan Pathan |
- Pradipsinh Dharmendrasinh Parmar
- Sumer Kantilal Patel
- Jayeshkumar Prabhudas Deliwala
More Mules: Parmar, Patel
Pradispsinh Parmar |