Cyber Attacks Continue to Grow and Evolve

Locke Lord LLP
Contact

Cyber criminals continue to prey on websites with unpatched vulnerabilities and ill-protected point of sale (POS) systems to steal credentials such as personal data, credit card numbers and bank account details.

Common methods to be aware of
Fraudsters are known to use methods most commonly associated with their victim’s normal business practices - wire transfers in most cases, cheques in others. Intrusions are facilitated through a phishing scam in which a victim receives an email from a seemingly legitimate source that contains a malicious link. When the victim clicks on the link, it downloads malware, allowing the criminals unrestricted access to data, including passwords or financial account information.

Fraudsters also contact companies by email or phone pretending to be lawyers or representatives of law firms claiming to handle confidential or time-sensitive matters. Organizations and Internet users should be vigilant in strengthening their guard against the anticipated surge in cyber attacks targeting web servers, POS systems and mobile devices.

It is predicted that extortion via DDoS (distributed denial-of-service) and Ransomware will also flourish as cyber criminals are increasingly offering paid ransomware services (complete with kits for attacks on different operating systems) and managing ransom payments.

Prevention

  • Regularly assess web server security; patch any security loopholes
  • Isolate POS systems from open network to limit attack avenues
  • Regularly backup data; keep an offline copy to minimize risks of ransomware
  • Carefully scrutinize all email requests for transfer of funds to determine legitimacy
  • Know the habits of your customers, including the details of, reasons behind, and amount of payments
  • Be wary of unsolicited software or hyperlinks, and abnormal requests for credential data or change of payment account details
  • Individuals need to take steps to protect mobile devices

Computer Crimes Ordinance in Hong Kong
The main piece of legislation in Hong Kong which has been introduced against computer related crime is the Computer Crimes Ordinance. Enacted in 1993, it has, through amending the Telecommunications Ordinance (Cap. 106), Crimes Ordinance (Cap. 200) and Theft Ordinance (Cap. 210), created some new offences and broadened the coverage of existing offences, as follows:

Related Crimes - Hong Kong

Law  Provisions Maximum Penalty
Telecommunications Ordinance
S.27A, Cap. 106
By telecommunications, obtains unauthorized access to any computer Fine of $25,000
Crimes Ordinance
S.59, Cap. 200
Extending the meaning of property to include any program or data held in a computer or in computer storage medium Not applicable
Crimes Ordinance
S.59 and 60, Cap.200
Extending the meaning of criminal damage to property to misuse of a computer program or data 10 years' imprisonment
Crimes Ordinance
S.85, Cap. 200
Extending the meaning of making false entry in bank book to falsification of the books of account kept at any bank in electronic means Life imprisonment
Crimes Ordinance
S.161, Cap. 200
Extending the meaning of making false entry in bank book to falsification of the books of account kept at any bank in electronic means 5 years' imprisonment
Theft Ordinance
S. 11, Cap. 210
Extending the meaning of burglary to include unlawfully causing a computer to function other than as it has been established and altering, erasing or adding any computer program or data 14 years' imprisonment
Theft Ordinance
S. 19, Cap. 210
Extending the meaning of false accounting to include destroying, defacing, concealing or falsifying records kept by computer 10 years' imprisonment

 

 

 

 

 

 

 

 

 

Source: www.infosec.gov.hk/english/ordinances/corresponding.html

Computer crime in Hong Kong
The Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT) handled 4,928 security incident reports in 2015, up 43% from 2014. Phishing (1,978 cases) powered the surge, with an increase of 233%, as a result of new “flash” phishing attacks (1,375 cases, or 69% among phishing) that were launched using local web hosting services as cover. Incidents relating to mobile devices also rose by 86% to 286 cases. 

BEC Scams in the United States - US$798 million and counting

Business E-mail Compromise (BEC) scams continue to grow and evolve targeting businesses of all sizes. The FBI’s Internet Crime Complaint Center (IC3) reported a 270 percent increase in identified victims and exposed loss since January 2015. The scam has been reported in all 50 states and in 79 countries. Fraudulent wire transfers were sent to 72 countries, with the majority of transfers going to Asian banks located in China and Hong Kong.

The IC3 reports that from October 2013 to August 2015, BEC scams claimed 8,179 individual victims (7,066 in the U.S. and 1,113 non-U.S.) with a total exposed loss of US$798,897,959.25. Similar incidents identified by international law enforcement agencies during the same period bring the BEC exposed loss to over US$1.2 billion.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Locke Lord LLP | Attorney Advertising

Written by:

Locke Lord LLP
Contact
more
less

Locke Lord LLP on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide

This website uses cookies to improve user experience, track anonymous site usage, store authorization tokens and permit sharing on social media networks. By continuing to browse this website you accept the use of cookies. Click here to read more about how we use cookies.