- The Strategist - https://www.aspistrategist.org.au -

Cyber wrap

Posted By on October 8, 2014 @ 14:30

Bitcoin Logo - Bitcoin Accepted Here Neon Sign [1]As allied forces begin the air campaign against Islamic State forces in Iraq and Syria, there are concerns in the US that IS could turn to cryptocurrencies [2] to bolster their already substantial funding base. Reports have stated that ISIS already generates upward of US$3 million per day [3] from oil revenues, kidnap for ransom, taxation, theft, and pillaging, and these funds could be added to through the use of cryptocurrencies such as bitcoin. The US military is studying these types of currencies to determine if they can be traced and to see how they could be used by groups such as ISIS [4]. A US Defense official stated [5] that ‘We’re trying to do our best to understand the true scope of the threat that we are dealing with. …We have to fully understand all of the components and functions of the adversary across the globe—not just in Syria and Iraq—and the manner in which those adversaries raise, hide and move money.’

But if ISIS are using bitcoins, they’ll find themselves in a difficult financial position as the value of the cryptocurrency has fallen to its lowest level for almost a year [6], having lost 18% of its face value over the weekend. Since December 2013, when it reached the highest value of US$1,100 per unit, it has decreased to US$290 per unit, illustrating how volatile an investment it can be.

Sticking with finance, it’s been reported that the banking sector is facing a rising threat [7] from cyber crime. With millions of attacks every year some have gone as far as saying the sector is engaged in ‘an arms race’ against cyber crime. British losses from Internet and telephone banking fraud rose 59% to £35.9 million in the first six months of 2014. Apparently the fastest growing area of attack is ‘vishing’, whereby fraudsters posing as a bank or credit card security team call to report a problem with your account and ask you to phone the emergency number on your bank card. The clever part is when you hang up, they stay on the line and generate a fake dial tone and instead of calling the bank you connect to the criminals.

Australians have this week been targeted by a phishing campaign [8] that’s seen crypto-ransomware installed on their computers. Once downloaded, the software encrypts the files on the computer and directs the user to purchase decryption software—using bitcoin—in order to restore access. The malicious software was embedded in email attachments said to be from Australia Post or Telstra and was reported to have knocked ABCNews24’s broadcast off air for 30 minutes on Tuesday morning.

Ready to assist with any companies suffering at the hands of cyber crime is ex-US Homeland Security Secretary Tom Ridge, who has launched a new cyber crime insurance product [9]. Citing data from ICPC’s International Fellow Jim Lewis [10] at the launch, Ridge stated that 3,000 US companies were hacked in 2013 alone and that the cost to the global economy from cyber crime totals more than US$445 billion annually.

The list of threats to be aware of and protect against grew exponentially after a computer code that can turn almost any device that connects via a USB into a cyber-attack platform [11] was shared extensively online. Details of the BadUSB flaw were released at the Black Hat computer security conference in August by Karsten Nohl and Jakob Lell. Their work revealed how to exploit flaws in the software that helps devices connect to computers via USB. The biggest problem they discovered lurks in the onboard software, known as firmware, found on these devices. Think carefully next time you’re plugging in your phone, external hard drive,USB disco ball, USB hamster wheel, and duck-shaped vacuum cleaner [12]; it could contain all sorts of nasties!

Tobias Feakin [13] is a senior analyst at ASPI and director of ASPI’s International Cyber Policy Centre [14]. Image courtesy of Flickr user Duncan Rawlinson [15].



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/cyber-wrap-45/

URLs in this post:

[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2014/10/12350379324_c337c90dc3_z.jpg

[2] turn to cryptocurrencies: http://www.nbcnews.com/storyline/isis-terror/u-s-military-probing-digital-currencies-terror-fight-n212371

[3] generates upward of US$3 million per day: http://www.huffingtonpost.com/2014/09/22/isis-funding_n_5850286.html

[4] they could be used by groups such as ISIS: http://www.businessinsider.com.au/isis-supporter-outlines-how-to-support-terror-group-with-bitcoin-2014-7

[5] stated: http://www.cnbc.com/id/102033875

[6] fallen to its lowest level for almost a year: http://www.bbc.com/news/technology-29507443

[7] banking sector is facing a rising threat: http://www.ft.com/intl/cms/s/0/5fd20f60-4d67-11e4-8f75-00144feab7de.html#axzz3FQycRipy

[8] targeted by a phishing campaign: http://www.abc.net.au/news/2014-10-07/fake-auspost-emails-used-in-crypto-ransomware-attack/5795734

[9] ex-US Homeland Security Secretary Tom Ridge, who has launched a new cyber crime insurance product: http://www.reuters.com/article/2014/10/06/us-cybersecurity-insurance-idUSKCN0HV14Q20141006

[10] International Fellow Jim Lewis: https://www.aspi.org.au/icpc/staff/james-lewis/james-lewis

[11] USB into a cyber-attack platform: http://www.bbc.com/news/technology-29475566

[12] USB disco ball, USB hamster wheel, and duck-shaped vacuum cleaner: http://www.pcmag.com/slideshow_viewer/0,3253,l=192425&a=192425&po=1,00.asp

[13] Tobias Feakin: https://www.aspi.org.au/about-aspi/aspi-staff/senior-analysts/tobias-feakin

[14] International Cyber Policy Centre: http://cyberpolicy.aspi.org.au/

[15] Duncan Rawlinson: https://www.flickr.com/photos/thelastminute/12350379324

Copyright © 2020 The Strategist. All rights reserved.