ALL >> Computers >> View Article
Finnish Counter Crime Authorities Bust Cybercrime Ring
Recently, counter crime agencies in Finland busted a cybercrime ring, which attempted to steal funds from accounts of legitimate banking customers. Attackers purportedly used a financial Trojan to extract login credentials of around 89 customers of Nordea Bank early last year. Cybercriminals were successful in stealing around 1.2 million Euros. However, information security professionals of the bank were able to detect the fraudulent transactions and were successful in recovering substantial portion of the funds. The cybercrime ring consisted of 17 offenders, of which counter crime agencies are likely to charge one for aggravated fraud and one another for aiding aggravated fraud. The two main accused are Estonian citizens. The remaining 15 offenders acted as money mules hired for transferring extracted funds to foreign bank accounts. Usually, cyber criminals hire local people as money mules for laundering stolen money through legitimate channels to avoid detection by law enforcement authorities.
Malware attacks are one of the common techniques used to extract financial information and siphon off funds from online ...
... banking accounts of legitimate customers. Attackers inject malware into user's computers through malicious files attached with cleverly crafted e-mails. The e-mails appear from a legitimate source and entice users to download attached file. Once unwary Internet users download the file, they inadvertently install malware on their computers. Cybercriminals may also lure Internet users to download malicious programs through search engine poisoning attacks. Recently, security researchers at Microsoft identified that on an average, one of every 14 programs downloaded involves malware.
Internet users must regularly update their web browsers in accordance with the security advisories issued by vendors. Using genuine software products and enabling automatic updates may help Internet users to safeguard their computers and sensitive data from malware attacks. Internet users must avoid clicking on suspicious links in e-mails, links on fake security alerts in pop-ups, and third-party advertisements on legitimate websites. They must avoid responding to e-mails, which seek assistance in transferring money and offer a percentage of the funds as commission or fee in return. Internet users must confirm the authenticity of the e-mails seeking authentication information by directly contacting the legitimate bank. Counter crime agencies face the challenge of dealing with wide variety of cyber c rime cases. Growing instances of cybercrime have resulted in increased demand for cyber security experts qualified in online IT degree, computer forensics and information security.
Banks must create awareness among customers on malware attacks, phishing and social engineering threats through advertisements and e-flyers. Professionals qualified in information security and IT degree programs may help in implementing appropriate fraud detection mechanisms.
Counter crime agencies may coordinate with banks, regulatory authorities and other stake holders to improve awareness among Internet users. Online IT courses may help IT professionals to update themselves on latest developments in IT security and implement necessary security mechanisms.
Add Comment
Computers Articles
1. Exploring How Ai In The Cloud Can Transform Your BusinessAuthor: TechDogs
2. The Power Of Cloud And Ai: A New Era Of Collaboration
Author: TechDogs
3. Get Business Insights Using Expedia & Booking. Com Review Data Scraping
Author: DataZivot
4. Top 10 Reasons A Strong Communication Strategy Drives Prm Program Success
Author: Archi
5. Achieve Scalable Web Scraping With Aws Lambda
Author: Devil Brown
6. Overcoming Common Challenges In Iso 27001 Implementation
Author: Jenna Miller
7. Basic Computer Course: Your Gateway To Skill Development | The Institute Of Professional Accountants
Author: Tipa Institute
8. Top 7 Advantages Of React Js
Author: Bella Stone
9. Top 7 App Marketing Tools For Mobile Success
Author: Bella Stone
10. Revolutionizing Education Management With Samphire It Solution Pvt Ltd’s Erp Software
Author: CONTENT EDITOR FOR SAMPHIRE IT SOLUTIONS PVT LTD
11. Top 10 Healthcare Technology Trends
Author: goodcoders
12. "building Tomorrow’s Factories: The Role Of Automation & Robotics In Modern Manufacturing"
Author: andrew smith
13. The Ultimate Guide To The Best Ecommerce Plugin For Wordpress
Author: Rocket Press
14. Xsosys Erp: A Scalable Solution For Businesses In Any Industry
Author: Xsosys Technology(S) Pte. Ltd.
15. Rental Management Software: A Complete Solution For Car, Property, And Coworking Space
Author: RentAAA