Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Eastern European Cyber Criminals gain international reach

Sourcefire : 18 February, 2013  (Technical Article)
Sourcefire comments on the increased reach of cyber criminals from Ukraine and Russia for commiting fraud with the use of ransomware viruses
Eastern European Cyber Criminals gain international reach

The international reach and sophistication of the criminal gangs operating cybercrime around the world was perfectly illustrated by the news that Spanish police have broken up a gang using a ransomware virus to defraud thousands of Europeans.

Allegedly led by Russian criminals, some based in Dubai in the United Arab Emirates and others in Spain, the gang included Ukrainians, Georgians and other nationalities.

This incident clearly illustrates how much of the cybercriminal activity around the world today is international in nature, run on professional footings by criminal gangs targeting people and institutions for financial gain.

Gangs looking to make money out of their operations dominate today’s cybercriminal activities. It is not about notoriety or fame anymore.

Using sophisticated and highly targeted techniques to get through and around security, these gangs look to get their hands on information or other valuable data that they can make money out of.

Today it is not about if cyber attackers will get into your network, but when. Perimeter defences are fine to stop the scattergun approach employed by older security threats, but for the more advanced persistent threats we increasingly see today, the rules have changed. It is no longer a question of simply stopping them getting into your organisations, but now it about how quickly you are aware you have been compromised and how quickly you can track and stop that compromise spreading.

Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo