123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Finnish Counter Crime Authorities Bust Cybercrime Ring

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Recently, counter crime agencies in Finland busted a cybercrime ring, which attempted to steal funds from accounts of legitimate banking customers. Attackers purportedly used a financial Trojan to extract login credentials of around 89 customers of Nordea Bank early last year. Cybercriminals were successful in stealing around 1.2 million Euros. However, information security professionals of the bank were able to detect the fraudulent transactions and were successful in recovering substantial portion of the funds. The cybercrime ring consisted of 17 offenders, of which counter crime agencies are likely to charge one for aggravated fraud and one another for aiding aggravated fraud. The two main accused are Estonian citizens. The remaining 15 offenders acted as money mules hired for transferring extracted funds to foreign bank accounts. Usually, cyber criminals hire local people as money mules for laundering stolen money through legitimate channels to avoid detection by law enforcement authorities.

Malware attacks are one of the common techniques used to extract financial information and siphon off funds from online ...
... banking accounts of legitimate customers. Attackers inject malware into user's computers through malicious files attached with cleverly crafted e-mails. The e-mails appear from a legitimate source and entice users to download attached file. Once unwary Internet users download the file, they inadvertently install malware on their computers. Cybercriminals may also lure Internet users to download malicious programs through search engine poisoning attacks. Recently, security researchers at Microsoft identified that on an average, one of every 14 programs downloaded involves malware.

Internet users must regularly update their web browsers in accordance with the security advisories issued by vendors. Using genuine software products and enabling automatic updates may help Internet users to safeguard their computers and sensitive data from malware attacks. Internet users must avoid clicking on suspicious links in e-mails, links on fake security alerts in pop-ups, and third-party advertisements on legitimate websites. They must avoid responding to e-mails, which seek assistance in transferring money and offer a percentage of the funds as commission or fee in return. Internet users must confirm the authenticity of the e-mails seeking authentication information by directly contacting the legitimate bank. Counter crime agencies face the challenge of dealing with wide variety of cyber c rime cases. Growing instances of cybercrime have resulted in increased demand for cyber security experts qualified in online IT degree, computer forensics and information security.

Banks must create awareness among customers on malware attacks, phishing and social engineering threats through advertisements and e-flyers. Professionals qualified in information security and IT degree programs may help in implementing appropriate fraud detection mechanisms.

Counter crime agencies may coordinate with banks, regulatory authorities and other stake holders to improve awareness among Internet users. Online IT courses may help IT professionals to update themselves on latest developments in IT security and implement necessary security mechanisms.

Total Views: 330Word Count: 474See All articles From Author

Add Comment

Computers Articles

1. Spark Matrix™: Multi-carrier Parcel Management Solutions
Author: Umangp

2. Best Odoo Erp Software Company In Dubai For Business Growth
Author: Mayur Meheshwari

3. Top Challenges Faced By Equipment Rental Companies In The Uae — And How Erp Solves Them
Author: Al murooj solutions

4. Spark Matrix™: Intelligent Virtual Assistants (iva)
Author: Umangp

5. Pos Software Designed For Retail Operations
Author: EPOS Direct

6. Erp System That Reduces Stress And Improves Productivity
Author: Shalijah

7. Spark Matrix™: Global Service Parts Planning Application
Author: Umangp

8. Spark Matrix™: Enterprise Information Archiving
Author: Umangp

9. Textideo: Transforming Text Into Engaging Ai-powered Videos For Modern Creators
Author: Ethan Walker

10. Spark Matrix™: Enterprise Ai Search
Author: Umangp

11. What Identity Governance Really Means In Modern Enterprises
Author: Mansoor Alam

12. Strategies For Successful Site Selection In Clinical Trials
Author: Giselle Bates

13. Simplifying Business Purchases With Smart, Reliable Procurement Solutions
Author: suma

14. How Businesses In Dubai Are Scaling Faster With Modern Erp Software
Author: Al murooj solutions

15. How To Choose The Right Weapon Tracking System: 7 Must-have Features
Author: 3PL Insights

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: