Left Menu
Development News Edition

Beware! Maximum cyber criminals eye your personal data

A report of the World Economic Forum revealed that cyber security is increasingly becoming an issue of public security as the majority of cyber criminals are increasingly targetting individual internet users. This requires preventive measures both at organizational as well as individual levels to ensure the security of personal data. 


Beware! Maximum cyber criminals eye your personal data
Image Credit: IANS

HIGHLIGHT

  • Social engineering fraud is the biggest threat to cyber security.
  • Globally, 33 percent of data breaches in 2018 were related to social attacks.
  • Globally, 32 per cent of data breaches involved phishing emails.
  • 32 per cent of breaches involve phishing, 48 per cent of malicious email attachments are office files and 78 per cent of cyber espionage incidents had phishing involved.
  • Globally, 65 per cent of targeted attack groups used spear phishing as the primary infection vector which primarily involves using email ids of the topmost authority of organization such CEO asking sub-ordinates for immediate fund transfer.

The news of cyber attacks on big organizations often come into the limelight of media. However, it does not mean that only big organizations are the target of cyber criminals. The truth is just reverse, a recent report of the World Economic Forum (WEF) reveals that individual users are the largest victims of cyber crime, both, in terms of the aggregate amount of money stolen and the number of affected users. As the trend to target individual internet users in increasing alarmingly, the report predicts the individual users would collectively lose US$6 trillion in 2021. The strategies used by the cyber criminals to trap individual users could be classified as under:

Social Engineering Frauds

This is a clever application of communication skills and communication technology to manipulate user behavior and make him disclose confidential information. The extracted information may be directly used to access the password of bank accounts and related information to transfer the funds from your account or it could be sold to any agency or beneficiary person. In some of the investigations, the security agencies have also revealed that men or boys use the picture of beautiful girls or pictures of somebody else to chat the targeted user and ultimately extract the information. This is also a popular modus operandi of spy agencies to trap the security and defense officials responsible to protect sensitive and confidential information. Besides, this strategy is also used by honey traps to extract money or information from individual users.

Business email compromise (BSE) is the most popular tool of social engineering frauds that involves both indiscriminate phishing emails and targeted spear phishing emails in which cyber criminals sent individualized emails impersonating as your boss, friend or close relative. "The FBI estimated a loss of over US$1billion as a result of Business Email Compromise (BEC) fraud by US businesses and individuals in 2018," said the WEF Report. According to the 2019 Verizon Data Breach Report, 33 per cent of data breaches in 2018 included social attacks and 32 per cent involved phishing. The report also concluded that about 85 per cent of organizations experience social engineering and phishing attacks. User-friendly information technology is being misused popularity by cyber criminals to steal data and money.

Social Media Platforms and Mobile Apps

You need to cautious about the data you put on social media. Besides, the Mobile Apps promising to provide various free services also demand access to your contact list, SMS, pics, videos, etc. stored in your mobile and to be stored in the future. These Mobile App companies have all the right to use your personal data which they may misuse in the future. Therefore, you need to be cautious enough in giving access and your selection of mobile apps. Individual awareness about various kinds of cyber crimes is the only preventive measure at the level of individual users.

Botnet and Malware Attacks

It is basically a kind of loop within the network of an organization used to deny access to the services of the organization and steal data, distributed denial of service attack (DDoS attack), send spam, and allow the attacker to access the device and its connection. The cyber criminals create a loop or circuit within a circuit of the devices connected through the internet to steal data and deny the services. Here data protection is the main responsibility of the concerned organization. However, awareness among individual users makes their data more secure. Besides using strong passwords, non-sharing of individual confidential data such as password and pin could save you from such cyber criminals. According to the WEF report, almost 85 per cent of botnet infrastructure is in consumer ISP networks, with the remaining 15 per cent being placed in hosting centers.

Malware is a kind of software designed by cyber criminals to damage computers, network, server, client, and steal data. "Accenture analysis of nearly1000 cyberattacks highlighted malware as the most frequent attack overall land, in many countries, the most expensive to resolve," said the report. One banking botnet was used to steal more than USD 39.68 million from 30,000 customers over a 90-day period, it added. "BT is blocking over100 million attempted malware communications every month in order to keep their customers safe," said the report. The service providing agencies deploy Bonnet Cleaning and Malware Analysis services at their end to ensure uninterrupted service and protect the data of individuals users.

Denial of Service Attacks (DoS)

The denial of service attack (DoS) software is generally used by cyber criminals to damage the client base of targeted organisations by adversely affecting the routing protocols and directing the traffic towards another web portal. According to the WEF report, such attacks can adversely affect up 25 per cent of a country's total internet traffic when they are active. The average cost of downtime in 2018 has been estimated to about the US $221,836.80per attack. In addition to spoiling the credibility and reliability of the organizations, cyber criminals may also steal the data of the individual user by creating a fake website and sending phishing emails from similar email accounts.

Hardware

The low quality and cheaper devices are prone to cyber-attacks and data stealing. WEF researchers highlighted that such devices are often seen as an easy target because the firmware and passwords in such devices have well-known default administrative passwords and user IDs, are easily compromised and may also not be easily updated.

(Disclaimer: The opinions expressed are the personal views of the author. The facts and opinions appearing in the article do not reflect the views of Devdiscourse and Devdiscourse does not claim any responsibility for the same.)

Download The Devdiscourse News App for Latest News.


  • FIRST PUBLISHED IN:
  • Devdiscourse

TRENDING

OPINION/BLOG/INTERVIEW

Conspiracy theories on COVID 19: Legislators, Scientists, and Journalists all joined the Caravan

Conspiracy theories are not new for virus epidemics. There have been conspiracy theories on HIV-AIDS, Polio Vaccines, Ebola Virus, and several other diseases as well. However, what makes the 2019 Novel Coronavirus different from others is ...

Top 10 Fake News, Myths and Realities on 2019 Novel Coronavirus COVID 19

With nearly 1500 deaths by January 14 and around 65,000 infections in China, the Novel Coronavirus 2019 has become one of the worst health epidemics of the 21st Century. However, 8,573 people have been cured but the rumor mongers are a...

Handling fake news Infodemic in time of Coronavirus epidemic

Social media has provided a platform where everybody can disseminate his her views without any supervision. Its excellent if the message is genuine but misinformation is equally disastrous. Health is such a topic where every Tom and Harry c...

Sentiment Analysis on Budget 2020: Long shot for solution to economic worries?

Industries and individuals alike had high expectations from the government to take tangible steps but the budget 2020 seems to have failed expectations....

Videos

Latest News

Lahiri, Atwal at tied-33rd at Puerto Rico Open

Indian golfer Anirban Lahiri recovered from an early double bogey with an impressive show in the closing stage of the second round of the Puerto Rico Open here. On another windy day at Coco Beach, Lahiri carded another two-under 70 to get t...

After slow start, Bruins rally past Flames

Patrice Bergeron scored twice and Brad Marchand got the game-winner as the Boston Bruins rallied to beat the Calgary Flames 4-3 Friday for their sixth consecutive victory. Calgary jumped to a 3-1 lead through the first 323, but the Bruins b...

Spurgeon's hat trick lifts Wild to sweep of Oilers

Defenseman Jared Spurgeon scored his first career hat trick as the Minnesota Wild defeated the host Edmonton Oilers 5-3 Friday night. Kevin Fiala and Carson Soucy also scored for the Wild, who improved to 2-1-0 under interim coach Dean Evas...

MGM Resorts sued over data breach that possibly involved 10.6 million guests

U.S. casino operator MGM Resorts International has been sued over a data breach last year, which the company confirmed earlier this week and which reportedly involved details of over 10.6 million hotel guests.The lawsuit was filed by law fi...

Give Feedback