I am honored to have been invited to the webinar for professionals from the Investigation, Criminal Police, Cyberpolice, and Prosecution of the Zaporizhya region. Half of the participants joined in person in Dnipro, while the other half connected remotely from the shelter in Zaporizhya. The webinar delved into current challenges and strategies in investigating payment fraud. During the webinar part I conducted, I provided a comprehensive overview of current online fraud technologies, schemes, tools, and infrastructure. I'm grateful for the opportunity to contribute to enhancing Ukrainian collective efforts in combating cybercrime.
Raisa Fedorovska’s Post
More Relevant Posts
-
❗ Europol have just released their Internet Organised Crime Assessment (IOCTA) for 2023. The report provides a brief and straightforward insight into current trends and will be followed by three spotlight reports with more in-depth views on specific topics. 💬 “Cybercrime, in its various forms, represents an increasing threat to the EU. Cyber-attacks, online child sexual exploitation, and online frauds are highly complex crimes and manifest in diverse typologies. Meanwhile the perpetrators behind these crimes are becoming increasingly agile, exploiting new situations created by geopolitical and technological changes. The Internet Organised Crime Assessment (IOCTA) is Europol’s assessment of the cybercrime landscape and how it has changed over the last 24 months.”
To view or add a comment, sign in
-
#cyberattacks are becoming increasingly sophisticated and professional. To understand better the cause of this situation, it's worth looking at this year's report 'The Internet Organised Crime Threat Assessment (IOCTA)' published by #europol. First and foremost, we can learn from the report what crime-as-a-service is and how cybercriminals currently operate. The indexed Internet is the one that the majority of society use every day. The non-indexed #internet, or the #deepweb, operates on a quite similar principles – there are also shops with goods and services for sale. It allows one criminal to supply another as part of crime-as-a-service activities. This is how organized cybercriminals act, based on specific to them principles and behaviors, much like any other social group. The report created by EUROPOL provides numerous examples and explains the mechanisms observed this year among cybercriminals. As indicated, a whole range of #socialengineering activities still dominates, becoming increasingly sophisticated. Criminals have services at their disposal, such as access brokers (IABs) and dropper services, counter antivirus (CAV) services, criminal VPN providers, crypters, bulletproof hosting, spoofing-as-a-service, romance scam and investment fraud ready to use schemas and many, many more. It may sound distant and unreal, but it is actually within reach, as we enter the Internet every day. I recommend the entire report, available on the EUROPOL’s website for better understanding of evolving landscape of #cybercrime: https://lnkd.in/dtgtPeNr Side note: A similar report on the adoption of AI solutions by cybercriminals would certainly be interesting. #humanfactorincybersec #infosec #internetsafety #cybercrimeawareness #threatassessment
Internet Organised Crime Threat Assessment (IOCTA) | Europol
europol.europa.eu
To view or add a comment, sign in
-
Europol Cybercrime Training Competency Framework Key Insights: - Essential skills for key actors involved in combatting cybercrime. - Guidance for competencies needed to tackle cybercrime. - Assessing training needs in cybercrime and digital investigations. Who benefits? - Law enforcement authorities. - Judiciary institutions. - Universities. Stay informed and help fight cybercrime by sharing this post with your network. #cybercrime #digitalinvestigations #lawenforcement #EUROPOL
To view or add a comment, sign in
-
Did you know iProov is recognized by the U.S. Federal Reserve Board as a synthetic identity fraud (SIF) mitigation service provider? As threat actors continue to launch sophisticated synthetic identities via highly scalable digitally injected attacks, we share what makes a resilient identity verification when combating SIF. Discover here: https://lnkd.in/enpUdgVX #syntheticidentities #identityfraud #fraudprevention
To view or add a comment, sign in
-
-
Implementing identity verification could help to prevent online scams like the recent case where a gang used fraudulent text messages to scam victims. According to BBC, the scammers targeted younger people who grew up with the internet, and tricked them into making payments online. With the help of LabHost, the criminals were able to send messages and direct victims to fake websites. It’s a good reminder to always be cautious of suspicious messages and to verify the authenticity of online payment or shopping services. Let’s work together to protect ourselves and our communities from cybercrime. https://lnkd.in/dzG3DPxK #cybersecurity #onlinescams #phishingscams #digitalidentity #biometrics #idv #identityverification
Police bust global cyber gang accused of industrial-scale fraud
bbc.com
To view or add a comment, sign in
-
Cobalt Cybercrime Gang - Transnational Organized Criminal Enterprise Profile - How Scammers Operate – A SCARS Insight The Russian Cobalt Cybercrime Gang – A Global Hacker Group Attacking The Financial Industry https://lnkd.in/e5BZu6R8 #SCARS #CyberCriminals #HowScammersOperate #OrganizedCrime #CobaltCybercrimeGang #Russia #Transnational #TransnationalOrganizedCriminalEnterprise #GangProfile
Cobalt Cybercrime Gang – Organized Criminal Enterprise Profile
https://romancescamsnow.com
To view or add a comment, sign in
-
Why Criminals Like AI for Synthetic Identity Fraud Read now! #dfir #investigation #digitalforensics #infosec #osint #cybersecurity #digitalinvestigations #incidentresponse #ai
Why Criminals Like AI for Synthetic Identity Fraud - Cyber Social Hub
shha.re
To view or add a comment, sign in
-
HOW DOES CYBER CRIMES BECOME INTERNATIONAL ORGANIZED CRIME. ❗❗❗❗❗❗❗❗❗❗❗❗❗ International organized cybercrime typically operates through a network of individuals or groups located in different countries, collaborating to carry out illegal activities. They may use tactics like phishing, malware distribution, ransomware attacks, or online fraud schemes to target individuals, businesses, or governments worldwide. These groups leverage the anonymity and reach of the internet to coordinate their efforts, share resources, and evade law enforcement across multiple jurisdictions. Additionally, they may exploit weaknesses in international legal frameworks and cooperation among law enforcement agencies to avoid detection and prosecution. #stoporganizedcrimes #unodc
To view or add a comment, sign in
-
-
In 2023, the #FBI continued to combat an evolving cybercriminal threat. FBI-led operations disrupted 285 criminal cyber operations in the fiscal year that ended September 30. More than $200 million in assets were seized or forfeited in operations that netted 202 arrests and 139 convictions. The figures don't fully illustrate the breadth of the cyber takedowns, which occurred nearly every month of the past year and revealed tens of thousands of victims worldwide. Some of the biggest cases were: • Hive Network: The Hive ransomware group targeted more than 1,500 victims in over 80 countries around the world, including hospitals, school districts, financial firms, and critical infrastructure. The FBI penetrated Hive’s computer networks, captured its decryption keys, and offered them to victims worldwide, preventing victims from having to pay $130 million in ransom. • Qakbot: In one of the largest ever actions against a botnet (a network of compromised computers), the FBI gained lawful access to Qakbot’s infrastructure and identified over 700,000 infected computers worldwide—including more than 200,000 in the U.S. "The FBI neutralized this far-reaching criminal supply chain, cutting it off at the knees," said Director Wray. • Genesis Market: The FBI disrupted the dark web marketplace that offered access to data stolen from over 1.5 million compromised computers around the world, containing over 80 million account access credentials. Market users were located across the globe; investigators worked to identify the most prolific users, which resulted in hundreds of leads being sent to FBI field offices and overseas partners. The disruption, announced in April, involved 45 of the FBI’s 56 field offices. • Snake Malware Network: The FBI neutralized a global peer-to-peer network of computers compromised by malware called Snake. For nearly 20 years, a unit within the Federal Security Service of the Russian Federation has used versions of the Snake malware to steal sensitive documents from hundreds of computer systems in at least 50 countries. Read more about the FBI’s challenges and triumphs in 2023 here: https://lnkd.in/gJ8JuRKV
Year in Review 2023 | Federal Bureau of Investigation
fbi.gov
To view or add a comment, sign in