The Internet Organised Crime Threat Assessment (iOCTA): 2014
This report highlights important developments in several areas of online crime. The changes in the production of malware are increasing rapidly in scale and sophistication. These are producing cybercrime capabilities ranging from simple key logging and theft of sensitive data, to ransomware and soph...
Corporate Authors: | ; |
---|---|
Format: | Electronic Book |
Language: | English |
Published: |
Den Haag
Europol
2014
|
In: | Year: 2014 |
Online Access: |
Volltext (kostenfrei) Volltext (kostenfrei) |
Check availability: | HBZ Gateway |
Keywords: |
Summary: | This report highlights important developments in several areas of online crime. The changes in the production of malware are increasing rapidly in scale and sophistication. These are producing cybercrime capabilities ranging from simple key logging and theft of sensitive data, to ransomware and sophisticated and complex banking Trojans. Malware is also essential in creating and controlling botnets. Recent developments in the use of peer-to-peer networks to host command and control infrastructure create additional difficulties for law enforcement to disrupt or takedown botnets. In the area of payment fraud the size of financial losses due to online fraud has surpassed the damage due to payment fraud with physical cards. This causes huge losses, not only for the payment card issuers, but also for airlines, hotels and online retailers. Child sexual exploitation online continues to be a major concern with offences ranging from sexual extortion and grooming, to self-produced child abuse material (CAM) and live streaming, which pose particular investigative challenges. Offenders are facilitated by many of the same services and products as typical cybercriminals including anonymisation tools, secure e-mail, bulletproof hosting and virtual currencies. Current and future developments such as Big and Fast Data, the Internet of Everything, wearable devices, augmented reality, cloud computing, artificial intelligence and the transition to IPv6 will provide additional attack vectors and an increased attack surface for criminals. This will be exacerbated by how emerging and new technologies will be used and how they will influence people's online behaviour. |
---|---|
Physical Description: | 91 Seiten, Illustrationen |
ISBN: | 9789295078963 |
DOI: | 10.2813/16 |
Access: | Open Access |