January 07 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.

download January 07 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.

If you can't read please download the document

description

 The SWRCCU are dealing with increased incidents in relation to teenage cyber crime. Help your children make the right choice and stay clear of cyber crime.  Please full screen to watch the video. NOT PROTECTIVELY MARKED

Transcript of January 07 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.

January 07 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED Current Threats Teenage Cyber Crime Awareness Investigation Update Malware Ransom32 Action Fraud Reports from the South West Region PBX/Dial Through Attack Miscellaneous CiSP New non-protectively marked briefing NOT PROTECTIVELY MARKED The SWRCCU are dealing with increased incidents in relation to teenage cyber crime. Help your children make the right choice and stay clear of cyber crime. Please full screen to watch the video. NOT PROTECTIVELY MARKED Investigation Updates: Ransomware We are currently investigating a ransomware attack against an organisation in which a laptop holding sensitive information was infected. This attack may be linked to the new Ransom32 malware. NOT PROTECTIVELY MARKED Malware: Ransom32 New easy-to-use ransomware code has been discovered it has been named Ransom32 and is believed to be a first of its kind. It is known to affect Windows, Mac and Linux. The malicious code and administration system are written in the web languages HTML, CSS and JavaScript, which are commonly used on mainstream websites. It manipulates the JavaScript framework to infiltrate the victims computer. The Ransom32 code is freely downloadable from one dark web site and can be downloaded by anyone who pays with Bitcoin. Ransom32 has been designed for users who lack technical skills to create their own brand of ransomware. NOT PROTECTIVELY MARKED Malware: Ransom32 (continued) Infection: The main method of distribution is currently via, though it is also possible to unknowingly download the malware from a compromised website. The malware arrives embedded in a self-extracting RAR (compressed) file. Ransom32 will connect to a command-and-control (C&C) server over the TOR anonymised network. Once the malware has infected a system, victims can be locked out of their computer and asked to pay a ransom via Bitcoin currency to regain access. The malware looks for and scrambles a huge variety of files including images, movies, documents and data archives. It is highly unlikely that any encrypted files will be recoverable. Paying the ransom is no guarantee of getting the files back. NOT PROTECTIVELY MARKED Malware: Ransom32 (continued) Prevention: Make sure anti-virus and malware scanners are running and up-to-date. Be very cautious of unexpecteds in your inbox and do not open any attachments from unknown sources. Keep your web browsers and Java installations up-to-date. Do not open an executable files that may appear randomly on your computer, unless you are familiar to it. Make regular backups. Backup all sensitive data and personal files and store them offline on a different media such as an external hard drive. Avoid surfing questionable sites. NOT PROTECTIVELY MARKED Hacking PBX/ Dial Through We have received a report of a PBX/Dial Through attack on a dental lab based in Devon. The telephone system was compromised and calls were placed to premium rate numbers resulting in a financial loss of 343. In order to prevent yourselves becoming the next victim: Use strong pin/passwords for your voic system, ensuring they are changed regularly. If you still have your voic on a default pin/ password change it immediately. Disable access to your voice mail system from outside lines. If this is business critical, ensure the access is restricted to essential users and they regularly update their pin/ passwords. If you do not need to call international/ premium rate numbers, ask your network provider to place a restriction on your line. Consider asking your network provider to block outbound calls at certain times eg when your business is closed. Ensure you regularly review available call logging and call reporting options. Regularly monitor for increased or suspect call traffic. Secure your exchange and communications system, use a strong PBX firewall and if you dont need the function, close it down! Speak to your maintenance provider to understand the threats and ask them to correct any identified security defects. NOT PROTECTIVELY MARKED CiSP - Cyber Crime Threats Shared The Cyber Security Information Sharing Partnership (CiSP), which is run by Cert-UK, is an information sharing platform used to share and publish cyber crime threat information. The aim of the platform is to allow members to take remedial action and modify their organisations to prevent cyber attacks. If you would like to join the CiSP then please sign up atand contact us as we can sponsor you.www.cert.gov.uk/cisp A regional South West CiSP is in place and will formally launched in March 2016; more details will be shared in due course. NOT PROTECTIVELY MARKED Additional Briefing Dissemination This document has been given the protective marking of NOT PROTECTIVELY MARKED and may be disseminated outside law enforcement with no restriction. If you know anyone else who would like to receive this, please send us theiraddress and we will add them to the distribution list. Any comments or queries pleaseSouth West Regional Cyber Crime Unit at: NOT PROTECTIVELY MARKED