[New trend report] Cyberextortion, a growing industry

Friday, February 26, 2016

Download the new report that discover there is an increasing tendency towards aggression in numerous cyber-attacks, notably those using some method of extortion in particular. ElevenPaths' Analyst team discover how to protect from this growing industry.

Computer-related crime is becoming increasingly hostile. There is an increasing tendency towards aggression in many cyber-attacks, notably those using some sort of extortion method in particular. These attacks have some psychological impact with the aim of inducing fear and uncertainty in their victims. This aggressive environment is closer to organised crime than it is to a computer-related offence.

In this regard, Security Authorities and Bodies face certain challenges in the investigation stage when it comes to law enforcement. Many operations often end up thwarted because criminals resort to tools used for the anonymity and encryption of communications. The knowledge of security in operations is high and the easy access cyber-criminals have to products and services easily accessible online, both to anonymise their activity as well as their identity, tends to complicate forensic analyses.

The main findings of the report "Cyberextortion, a growing industry" are the following:
  • Extortion via DDoS attacks is being firmly established. The modus operandi of the DD4BC group could give rise to more attackers impersonating them without the need for a great infrastructure and extensive technical knowledge. On the other hand, possible money outflows with the aim of laundering returned to the source of the extortion are the online gaming and trading platforms.
  • Security breaches are assuming a way of extortion based on the sensitivity of filtered information. Currently, two ways are being opted to monetise the attacks, either to sell the database or to extort it directly to users. The payment method required is usually Bitcoin.
  • A growing trend is sexual extortion, also known as sextortion. The sharing of files using peer-to-peer networks remains the main platform for access to child abuse material and for its distribution in a non-commercial manner. In the same way, other anonymous networks and platforms such as Tor are considered as a threat in this area. However, what worries Security Authorities and Bodies the most is the live streaming of child abuse due to the difficulty to detect and investigate it since criminals tend not to store a copy of the material.
  • Since 2015, the threat of ransomware has increased by 165%. The most reported infection vector is e-mail with malicious attachments. However, a growth is expected, driven by an increased use of the cloud, POS and the Internet of Things.

» Download the full report "Cyberextortion, a growing industry"

*You may also be interested on:

Further information

Mobile Connect winner of the 'Connected Life Awards'

Thursday, February 25, 2016

Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick access to web sites and applications, without having to remember passwords and usernames. It is safe and does not share information without the user’s permission.

Did you know it yet?
Discover it at mobileconnect.elevenpaths.com

About the prizes
Mobile Connect Award for Authentication & Identity.The Global Mobile Awards GSMA offers organisations from across the mobile ecosystem the opportunity to showcase the latest mobile products, applications, devices, services and initiatives being launched in the marketplace.

The awards recognise the most innovative, efficient or interesting developments, applications, solutions, projects and products in categories such as applications, technology, ‘digital life’, economic and social development & devices.

GSMA’S Mobile Connect available to 2 billion consumers globally

Tuesday, February 23, 2016

Mobile Connect Launched with 34 Operators in 21 Countries Around the World

Barcelona: The GSMA today announced that the GSMA Mobile Connect mobile-based authentication solution is now available to 2 billion consumers globally. Since the solution was introduced at Mobile World Congress 2014, 34 mobile network operators (MNOs) have launched the service in 21 countries, with plans for additional launches and trials to follow in 2016 and beyond. Operators offering services based on Mobile Connect include América Móvil, Axiata Group (Bangladesh, Indonesia, Sri Lanka), China Mobile, China Mobile Pakistan (Zong), China Telecom, China Unicom, DNA, Elisa, Globe Telecom, Indosat Ooredoo, Mobilink, Mobitel, Orange (Egypt, France, Morocco, Spain), Sunrise, Swisscom (Switzerland), Telefónica Group (Argentina, Mexico, Peru, Spain), Telenor Group (Bangladesh, Malaysia, Myanmar, Pakistan, Thailand), TeliaSonera (Finland), Telkomsel, Telstra, TIM and Turkcell (Turkey).

“Over the past two years, the industry has come together to simplify consumers’ lives by offering a single, trusted, mobile phone-based authentication solution that respects online privacy and helps to mitigate the vulnerability of online passwords,” said Mats Granryd, Director General, GSMA. “As Mobile Connect is rolled out globally, mobile operators are fulfilling an important role in the digital identity space, giving users control over their own data and enabling consumers, businesses and governments alike to interact and access online services in a convenient, private, and trusted environment.”

The GSMA’s Mobile Connect solution enables customers to create and manage a digital universal identity via a single log-in solution. The service securely authenticates users, enabling them to digitally confirm their identity and their credentials and grant safe online access to mobile and digital services such as e-commerce, banking, health and digital entertainment, and e-government, via their mobile phones. It works by employing the user’s unique mobile number, combined with a unique PIN for more secure use cases, to verify and grant online access anywhere they see the Mobile Connect logo. All operators and online service providers using Mobile Connect have signed up to the GSMA Mobile Connect privacy principles, which is a core pillar of Mobile Connect.

Additional Deployments and Evolution of Mobile Connect
The GSMA is working closely with operators globally to further extend the adoption of Mobile Connect; operators committed to deliver the service this year include Aircel, AIS Thailand, Bharti Airtel (India), Etisalat (Pakistan, United Arab Emirates), Idea Cellular Ltd, MTN, Ooredoo (Algeria, Myanmar), Orange (Jordan, Poland), SMART Axiata – Cambodia, Smart Communications, Inc., Tata Teleservices, Telefónica Group (Brazil, Colombia, Ecuador, Uruguay), Telenor (India), T-Mobile Poland and Vodafone (India, Spain). Mobile Connect has also been trialled in two EU Member States, Finland and Spain, to establish proof-of-concept for cross-border authentication of e-government services and online interactions between businesses, citizens and public authorities.

While initially focused on secure and convenient log-in to digital services, Mobile Connect is evolving to deliver secure authorisation of digital transactions and to add context and attributes about the user and the transaction to increase convenience, trust and security for users and online service providers, while respecting users’ privacy. This is currently being trialled in the UK by O2 and Vodafone.

Expanding Mobile Connect Services
Mobile Connect is now in commercial use by a wide range of digital service providers in the launch markets including BDTickets, Bloodlink, Cipika Play, CriticaLink, Dhaka Pixel Ltd., GoGhoom, Homeshopping.pk, LangitMusik, migme, Mudah, Rozee.pk, TakeMeTour.com (Thailand), Wavoo, WOW and Wunn Zin Bookstore. These companies comprise a range of vertical services such as commerce, finance and banking, government service access, health services, and media and entertainment.

Technology suppliers such as Apigee, Ericsson, Gemalto, Giesecke & Devrient, GMO GlobalSign Oy, MePIN/Meontrust, Morpho (Safran), Movenda, Nok Nok Labs Inc., Orange Business Services, Ping Identity and WSO2.Telco deliver the technology necessary to support Mobile Connect and to enable easy integration with the operators' mobile networks so that users of any mobile network offering Mobile Connect can log in and authorised for any application.

» Download press release

*You may also be interested on:

For further information:

Telefónica and ElevenPaths extends its cybersecurity offering to the IoT environment

Monday, February 15, 2016

Telefónica and ElevenPaths present at MWC the first technology for detecting and analysing threats

Telefónica and ElevenPaths will present at Mobile World Congress, that begins on 22nd February in Barcelona , the first technology available on the market designed to counteract cyberattacks on the Internet of Things (IoT). Known as Faast, a renowned technology developed by the company, it specialises in detecting and analysing security threats to organisations based on persistent pentesting which now includes the detection of vulnerabilities in IoT.

Faast is not only the first technology solution of this type, but also provides companies and organisations with an integral cybersecurity solution that protects them from threats to traditional devices connected to their systems and also others pertaining to IoT such as web cams, printers, routers, video- conference systems or televisions also connected to the corporate network.

With the new features incorporated by Faast, companies can continually scan IoT devices connected to the organisation, thanks to the use of real attack techniques, making their networks more robust and in this way counteract future attacks. Once the devices have been identified, the technology detects the current vulnerabilities. Failures include insufficiencies in authentication or authorisation processes, insecure network services or lack of encryption when transmitting information. The user can manage these and other vulnerabilities pertaining to all IoT devices through Vamps, an online site.

“Traditional periodic security checks don’t make sense anymore because the changes in the infrastructure, the emergence of new vulnerabilities and different bugs are continuing”, says Chema Alonso, CEO of ElevenPaths. “The evolution of Vamps & Faast towards IoT will allow companies to rely on a persistent pentesting and vulnerability management system that will facilitate the quick discovery of new connected devices and possible bugs, thereby reducing the exposure time of these devices to these threats”.

The sheer size of the IoT phenomenon in a hyper-connected society is exposing companies to dangers unknown up to now, hence the importance of early detection of security attacks that threaten IoT devices. This is one of the conclusions of the report "Scope, scale and risk like never before: Securing the Internet of Things” recently published by ElevenPaths and the area of IoT of Telefónica to which other organisations and companies working in this arena have contributed such as SIGFOX, the IOT Foundation and Kaspersky Lab.

This new analysis capacity by Faast of IoT, completes the portfolio of different security solutions for IoT currently on offer by Telefónica, such as Trusted Public Key Infrastructure that facilitates the identification and authentication of IoT devices connected to the network; Security Monitoring, which detects unusual behaviour of IoT devices based on its network traffic; and CyberThreats, capable of detecting and identifying the modus vivandi of the cybercriminals, and the methods used in attacks against IoT infrastructures.

» Download press release

*You may also be interested on:

For further information: