Left Menu
Development News Edition

Beware! Maximum cyber criminals eye your personal data

A report of the World Economic Forum revealed that cyber security is increasingly becoming an issue of public security as the majority of cyber criminals are increasingly targetting individual internet users. This requires preventive measures both at organizational as well as individual levels to ensure the security of personal data. 


Beware! Maximum cyber criminals eye your personal data
Image Credit: IANS

HIGHLIGHT

  • Social engineering fraud is the biggest threat to cyber security.
  • Globally, 33 percent of data breaches in 2018 were related to social attacks.
  • Globally, 32 per cent of data breaches involved phishing emails.
  • 32 per cent of breaches involve phishing, 48 per cent of malicious email attachments are office files and 78 per cent of cyber espionage incidents had phishing involved.
  • Globally, 65 per cent of targeted attack groups used spear phishing as the primary infection vector which primarily involves using email ids of the topmost authority of organization such CEO asking sub-ordinates for immediate fund transfer.

The news of cyber attacks on big organizations often come into the limelight of media. However, it does not mean that only big organizations are the target of cyber criminals. The truth is just reverse, a recent report of the World Economic Forum (WEF) reveals that individual users are the largest victims of cyber crime, both, in terms of the aggregate amount of money stolen and the number of affected users. As the trend to target individual internet users in increasing alarmingly, the report predicts the individual users would collectively lose US$6 trillion in 2021. The strategies used by the cyber criminals to trap individual users could be classified as under:

Social Engineering Frauds

This is a clever application of communication skills and communication technology to manipulate user behavior and make him disclose confidential information. The extracted information may be directly used to access the password of bank accounts and related information to transfer the funds from your account or it could be sold to any agency or beneficiary person. In some of the investigations, the security agencies have also revealed that men or boys use the picture of beautiful girls or pictures of somebody else to chat the targeted user and ultimately extract the information. This is also a popular modus operandi of spy agencies to trap the security and defense officials responsible to protect sensitive and confidential information. Besides, this strategy is also used by honey traps to extract money or information from individual users.

Business email compromise (BSE) is the most popular tool of social engineering frauds that involves both indiscriminate phishing emails and targeted spear phishing emails in which cyber criminals sent individualized emails impersonating as your boss, friend or close relative. "The FBI estimated a loss of over US$1billion as a result of Business Email Compromise (BEC) fraud by US businesses and individuals in 2018," said the WEF Report. According to the 2019 Verizon Data Breach Report, 33 per cent of data breaches in 2018 included social attacks and 32 per cent involved phishing. The report also concluded that about 85 per cent of organizations experience social engineering and phishing attacks. User-friendly information technology is being misused popularity by cyber criminals to steal data and money.

Social Media Platforms and Mobile Apps

You need to cautious about the data you put on social media. Besides, the Mobile Apps promising to provide various free services also demand access to your contact list, SMS, pics, videos, etc. stored in your mobile and to be stored in the future. These Mobile App companies have all the right to use your personal data which they may misuse in the future. Therefore, you need to be cautious enough in giving access and your selection of mobile apps. Individual awareness about various kinds of cyber crimes is the only preventive measure at the level of individual users.

Botnet and Malware Attacks

It is basically a kind of loop within the network of an organization used to deny access to the services of the organization and steal data, distributed denial of service attack (DDoS attack), send spam, and allow the attacker to access the device and its connection. The cyber criminals create a loop or circuit within a circuit of the devices connected through the internet to steal data and deny the services. Here data protection is the main responsibility of the concerned organization. However, awareness among individual users makes their data more secure. Besides using strong passwords, non-sharing of individual confidential data such as password and pin could save you from such cyber criminals. According to the WEF report, almost 85 per cent of botnet infrastructure is in consumer ISP networks, with the remaining 15 per cent being placed in hosting centers.

Malware is a kind of software designed by cyber criminals to damage computers, network, server, client, and steal data. "Accenture analysis of nearly1000 cyberattacks highlighted malware as the most frequent attack overall land, in many countries, the most expensive to resolve," said the report. One banking botnet was used to steal more than USD 39.68 million from 30,000 customers over a 90-day period, it added. "BT is blocking over100 million attempted malware communications every month in order to keep their customers safe," said the report. The service providing agencies deploy Bonnet Cleaning and Malware Analysis services at their end to ensure uninterrupted service and protect the data of individuals users.

Denial of Service Attacks (DoS)

The denial of service attack (DoS) software is generally used by cyber criminals to damage the client base of targeted organisations by adversely affecting the routing protocols and directing the traffic towards another web portal. According to the WEF report, such attacks can adversely affect up 25 per cent of a country's total internet traffic when they are active. The average cost of downtime in 2018 has been estimated to about the US $221,836.80per attack. In addition to spoiling the credibility and reliability of the organizations, cyber criminals may also steal the data of the individual user by creating a fake website and sending phishing emails from similar email accounts.

Hardware

The low quality and cheaper devices are prone to cyber-attacks and data stealing. WEF researchers highlighted that such devices are often seen as an easy target because the firmware and passwords in such devices have well-known default administrative passwords and user IDs, are easily compromised and may also not be easily updated.

(Disclaimer: The opinions expressed are the personal views of the author. The facts and opinions appearing in the article do not reflect the views of Devdiscourse and Devdiscourse does not claim any responsibility for the same.)

Download The Devdiscourse News App for Latest News.


  • FIRST PUBLISHED IN:
  • Devdiscourse

TRENDING

OPINION/BLOG/INTERVIEW

Future of Food: Technology fostering the road to global food security

Technological innovation can help address most of the pressing issues facing the world today including food security by enhancing productivity, improving financial services, managing resources, addressing environmental concerns, etc....

Conspiracy theories on COVID 19: Legislators, Scientists, and Journalists all joined the Caravan

Conspiracy theories are not new for virus epidemics. There have been conspiracy theories on HIV-AIDS, Polio Vaccines, Ebola Virus, and several other diseases as well. However, what makes the 2019 Novel Coronavirus different from others is ...

Now it’s a war, Uganda deploys army to combat locust swarms

Its for the first time after 1986, the locust swarms have attacked Uganda twice in a season. With the increasing number of countries of Africa under attack by locust swarms, the problem seems to have taken a regional paradigm. Its very diff...

Top 10 Fake News, Myths and Realities on 2019 Novel Coronavirus COVID 19

With nearly 1500 deaths by January 14 and around 65,000 infections in China, the Novel Coronavirus 2019 has become one of the worst health epidemics of the 21st Century. However, 8,573 people have been cured but the rumor mongers are a...

Videos

Latest News

Israel claims air strikes on Damascus airport area

Israel said Sunday it struck bases of the Islamic Jihad militant group near Damascus, while Syria claimed that its air defences shot down enemy missiles. The Israeli army said in a statement that fighter jets struck Islamic Jihad terror tar...

Seguin sends streaking Stars past Blackhawks

Tyler Seguin scored the go-ahead goal late in the second period as the Dallas Stars skated to a 2-1 victory over the visiting Chicago Blackhawks on Sunday afternoon. Joe Pavelski also tallied and Anton Khudobin made 31 saves for Dallas, whi...

UK venue owners must plan for militant attacks - government

British venue owners will have to come up with plans to try to prevent militant attacks and deal with them better if they do happen, the government said on Monday, responding to a series of incidents in recent years.The interior ministry sa...

UPDATE 1-No global digital tax by end-2020 would mean chaos-France

Failure to reach a global deal on where and how much to tax digital giants such as Google , Amazon or Facebook would result in many digital tax regimes emerging all over the world, Frances Finance Minister said on Sunday. It would also like...

Give Feedback