sb-as logo
Story image

IoT bank attacks on show at INTERPOL's Digital Security Challenge

23 Feb 2018

Cybercrime experts from 23 countries including regions in Asia , Africa, Europe, the Middle East and South America converged in Vienna, Austria this week as part of INTERPOL’s Digital Security Challenge event.

This is the first year the event has been held in Vienna, as the last two challenges were previously held in Singapore.

The event presented a simulated cyber attack on a bank, which was launched through an IoT device. The criminals attempted to steal large sums of money.

Investigators analysed the bank’s computers to identify the date, time and files that were compromised by the criminals.

They discovered that a hacked webcam was the source of the attack. The webcam sent an email attachment that contained the malware.

Teams then had to identify the command and control center that was used to remotely control the webcam and conduct the attack. They also found a second command and control center, as well as bank server vulnerabilities.

According to Interpol’s executive director of the Global Complex for Innovation, Noboru Nakatani, the entire simulation was a learning experience for how to conduct real-world investigations more effectively.

“The ever-changing world of cybercrime is constantly presenting new challenges for law enforcement, but we cannot successfully counter them by working in isolation,” Nakatani states.

Interpol believes that cyber attacks that leverage IoT devices have increased ‘significantly’ in the last two years, according to reports from the private cybersecurity industry.

The Mirai botnet from 2016 was one of the most prevalent cases of IoT device infection, which hits tens of thousands of devices.

“A multi-stakeholder approach which engages the expertise of the private sector is essential for anticipating new threats and ensuring police have access to the technology and knowledge necessary to detect and investigate cyberattacks,” Nakatani continues.

Kozo Matsuo, vice president of cyber security from technology firm NEC, says the company supported the event by delivering a lecture on IoT botnets. He says the company was proud to help strengthen international security measures.

“NEC has contributed as a strategic partner to INTERPOL’s commitment to improve the cybersecurity skills of investigators throughout the world. For the third year, NEC is honored to have helped develop the Digital Security Challenge by providing our expertise at this cutting-edge event,” Matsuo says.

NEC has been working with Interpol to support cybercrime investigations since 2012. The Cyber Defense Institute also supported the Digital Security Challenge.

Interpol also offers the following tips for safeguarding IoT devices:

  • Change the factory default passwords – these can be the same for hundreds or thousands of devices, making it easy for criminals to hack;
  • Regularly update all software;
  • Disable features which allow the device to be accessed remotely;
  • Take extra care when buying used devices – you don’t know what the previous owner installed on the device.
Download image
Why there's a huge push for NFV in today's enterprises
To help networking and IT professionals better understand the opportunities and challenges associated with deploying NFV technology, new research based on responses from more than 1,300 IT and networking professionals from around the world is now available. More
Link image
Common challenges when dealing with data overload
Siloed data, fragmented data, and an incoherent approach to privacy are a few challenges - so how do you solve them?More
Story image
Tanium and Google Cloud bring greater security to distributed IT
“This joint solution with Chronicle gives Tanium customers access to massively scalable analytics and investigation capabilities far beyond that of other endpoint detection and response point tools."More
Story image
Forescout and ServiceNow advance tech partnership to protect critical infrastructure
Forescout and ServiceNow have announced they are advancing their partnership for enhanced operational technology (OT) and industrial IoT capabilities, with an aim of helping organisations to protect critical infrastructure from cyber threats.More
Story image
Interview: ThreatQuotient champions threat intelligence through virtual 'situation rooms'
To understand what it involves and some of the collaboration challenges that come with distributing threat intelligence amongst specialised security teams, we spoke to ThreatQuotient APJC regional director Anthony Stitt.More
Story image
42% more plaintext HTTP servers than HTTPS counterparts - report
Rapid7 has released a report detailing the changing internet risk landscapes of 2020, and other issues facing cybersecurity teams.More