Story image

IoT bank attacks on show at INTERPOL's Digital Security Challenge

23 Feb 18

Cybercrime experts from 23 countries including regions in Asia , Africa, Europe, the Middle East and South America converged in Vienna, Austria this week as part of INTERPOL’s Digital Security Challenge event.

This is the first year the event has been held in Vienna, as the last two challenges were previously held in Singapore.

The event presented a simulated cyber attack on a bank, which was launched through an IoT device. The criminals attempted to steal large sums of money.

Investigators analysed the bank’s computers to identify the date, time and files that were compromised by the criminals.

They discovered that a hacked webcam was the source of the attack. The webcam sent an email attachment that contained the malware.

Teams then had to identify the command and control center that was used to remotely control the webcam and conduct the attack. They also found a second command and control center, as well as bank server vulnerabilities.

According to Interpol’s executive director of the Global Complex for Innovation, Noboru Nakatani, the entire simulation was a learning experience for how to conduct real-world investigations more effectively.

“The ever-changing world of cybercrime is constantly presenting new challenges for law enforcement, but we cannot successfully counter them by working in isolation,” Nakatani states.

Interpol believes that cyber attacks that leverage IoT devices have increased ‘significantly’ in the last two years, according to reports from the private cybersecurity industry.

The Mirai botnet from 2016 was one of the most prevalent cases of IoT device infection, which hits tens of thousands of devices.

“A multi-stakeholder approach which engages the expertise of the private sector is essential for anticipating new threats and ensuring police have access to the technology and knowledge necessary to detect and investigate cyberattacks,” Nakatani continues.

Kozo Matsuo, vice president of cyber security from technology firm NEC, says the company supported the event by delivering a lecture on IoT botnets. He says the company was proud to help strengthen international security measures.

“NEC has contributed as a strategic partner to INTERPOL’s commitment to improve the cybersecurity skills of investigators throughout the world. For the third year, NEC is honored to have helped develop the Digital Security Challenge by providing our expertise at this cutting-edge event,” Matsuo says.

NEC has been working with Interpol to support cybercrime investigations since 2012. The Cyber Defense Institute also supported the Digital Security Challenge.

Interpol also offers the following tips for safeguarding IoT devices:

  • Change the factory default passwords – these can be the same for hundreds or thousands of devices, making it easy for criminals to hack;
  • Regularly update all software;
  • Disable features which allow the device to be accessed remotely;
  • Take extra care when buying used devices – you don’t know what the previous owner installed on the device.
Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.
What disaster recovery will look like in 2019
“With nearly half of all businesses experiencing an unrecoverable data event in the last three years, current backup solutions are no longer fit for purpose."
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”
McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.
Symantec and Fortinet partner for integration
The partnership will deliver essential security controls across endpoint, network, and cloud environments.
Is Supermicro innocent? 3rd party test finds no malicious hardware
One of the larger scandals within IT circles took place this year with Bloomberg firing shots at Supermicro - now Supermicro is firing back.
25% of malicious emails still make it through to recipients
Popular email security programmes may fail to detect as much as 25% of all emails with malicious or dangerous attachments, a study from Mimecast says.