Vous êtes sur la page 1sur 63

INTERNET

ORGANISED
CRIME THREAT
ASSESSMENT
INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2019

© European Union Agency for Law Enforcement Cooperation 2019.

Reproduction is authorised provided the source is acknowledged. For any use or


reproduction of individual photos, permission must be sought directly from the copyright
holders.This publication and more information on Europol are available on the Internet.

www.europol.europa.eu
CONTENTS

foreword 04 abbreviations 05 executive summary 06

#1 #2 #3
key findings 08 recommendations 10 introduction 13

#4 #5 #6
crime priority: crime priority: child sexual crime priority: payment fraud 35
cyber-dependent crime 14 exploitation online 29
6.1. Key findings
4.1. Key findings 5.1. Key findings 6.2. Card not present fraud
4.2. Ransomware 5.2. Online distribution of CSEM 6.3. Skimming
4.3. Data compromise 5.3. Online sollicitation of children for 6.4. Jackpotting
sexual purposes
4.4. DDoS attacks
6.5. Business email compromise
5.4. Production of self-generated
4.5. Attacks on critical infrastructure explicit material 6.6. Future threats and developments
4.6. Website defacement 5.5. Sexual coercion and extortion 6.7 Recommendations
of minors for new CSEM
4.7. What happened to…?
5.6. Live distant child abuse

#9
4.8. Future threats and
developments 5.7. Future threats and developments
4.9. Recommendations 5.8. Recommendations

cross-cutting

#7 #8
crime factors 50

9.1. Key findings

9.2. Social engineering


the criminal abuse of the convergence of cyber
the dark web 43 and terrorism 47
9.3. Money mules

7.1. Key findings 9.4. The criminal abuse of


8.1. Key findings cryptocurrencies
7.2. Recommendations
8.2. The use of the internet by 9.5. Common challenges for law
terrorist groups enforcement

8.3. Recommendations 9.6. Future threats and developments

9.7. Recommendations

references 60
4 IOCTA 2019 FOREWORD

I am pleased to introduce the 2019 Internet Organised Crime Threat Assessment


(IOCTA), Europol’s annual presentation of the cybercrime threat landscape, high-
lighting the key developments, threats and trends, as seen by law enforcement
authorities across Europe. As always, I extend my gratitude to the invaluable contri-
butions from our colleagues within European law enforcement and to our partners
in private industry and academia for their ongoing support and input.

FOREWORD This year’s IOCTA demonstrates that while we must look ahead to anticipate what
challenges new technologies, legislation, and criminal innovation may bring, we
must not forget to look behind us. ‘New’ threats continue to emerge from vulnera-
bilities in established processes and technologies. Moreover, the longevity of cyber
threats is clear, as many long-standing and established modi operandi persist,
despite our best efforts. Some threats of yesterday remain relevant today and will
continue to challenge us tomorrow.

Ransomware maintains its reign as the most widespread and financially damaging
form of cyber-attack, while criminals continue to defraud e-commerce and attack
the financial sector. Criminals target and exploit vulnerable minors across the
globe. All of these crimes seriously impact the physical, financial and psychological
safety, security and stability of our society and require a coherent and coordinated
response by law enforcement.

Cybercrime continues to mature and become more audacious, shifting its focus to
larger and more profitable targets. To tackle it, law enforcement must be equally
audacious in order to meet the challenge head-on.

To do so, however, law enforcement needs the knowledge, tools and legislation
required to do so quickly and effectively. As criminals adapt, law enforcement and
legislators must also innovate in order to stay ahead, and seek to capitalise on new
and developing technologies. This in turn requires training to produce the special-
ised capabilities required to investigate technically challenging or complex cyber-
crimes, such as those involving the abuse of cryptocurrencies or the dark web.

Europol is addressing these challenges with its Strategy 2020+. Our agency is at
the forefront of law enforcement innovation and acts as a knowledge platform for
the provision of EU policing solutions in relation to encryption, cryptocurrencies
and other issues. In doing so, we expand the toolbox available to law enforcement
officers across Europe and beyond, increasing their technical and forensic capabil-
ities. The European Cybercrime Centre (EC3) at Europol is the first port of call for
cybercrime investigators.

This only enforces the need for greater cooperation and collaboration with the
private sector and academia, with whom law enforcement shares the responsibility
for fighting cybercrime, and with the policy-makers who shape our society.

The IOCTA continues to celebrate the many successes of law enforcement in the
fight against cybercrime, and the feats that can be achieved from the synergistic
relationships with its partners in both the public and private sector. I have no doubt
that such relationships will continue to go from strength to strength, but their full
potential can only be realised under the right legislative and budgetary conditions.
We can look forward to reporting further successes in the years to come.

Catherine De Bolle
Executive Director of Europol
ABBREVIATIONS IOCTA 2019 5

ABBREVIATIONS
AMLD 5 5th EU Anti-Money Laundering GDPR General Data Protection Regulation
Directive
GPU Graphics Processing Unit
APT Advanced Persistent Threat
I2P Invisible Internet Project
ATM Automated Teller Machine
ICANN Internet Corporation for Assigned
BEC Business Email Compromise Names and Numbers

C2C Criminal to Criminal IOCTA Internet Organised Crime Threat


Assessment
CERT Computer Emergency Response Team
IP Internet Protocol
CNP Card Not Present
IS Islamic State
CPU Central Processing Unit
JIT Joint Investigation Team
CSE Child Sexual Exploitation
LDCA Live Distant Child Abuse
CSEM Child Sexual Exploitation Material
NCPF Non-Cash Payment Fraud
DDoS Distributed Denial of Service
OCG Organised Crime Group
DMARC Domain-based message
authentication, reporting and conformance OSP Online Service Provider

EBA European Banking Authority PNR Passenger Name Record

EBF European Banking Federation RDP Remote Desktop Protocols

EC3 Europol’s European Cybercrime Centre RWE Right-wing extremism

EMAS Europol Malware Analysis Solution SGEM Self-Generated Explicit Material

EMMA European Money Mule Actions SWIFT Society for Worldwide Interbank
Financial Telecommunications
EMPACT European Multidisciplinary Platform
Against Criminal Threats THB Trafficking in Human Beings

EMV Europay, MasterCard and Visa Tor The Onion Router

EPC European Payment Council URL Uniform Resource Locator

FIOD Dutch Fiscal Information and VIDTF Victim Identification Task Force
Investigative Service
VPN Virtual Private Network
6 IOCTA 2019 EXECUTIVE SUMMARY

EXECUTIVE
SUMMARY

This annual assessment of the centre stage even more after the scam exploits the way corporations
cybercrime threat landscape highlights implementation of the General Data do business, taking advantage of
the persistence and tenacity of a Protection Regulation (GDPR). While it segregated corporate structures, and
number of key threats. In all areas, we is too early for a full assessment, the internal gaps in payment verification
see how most of the main threats have response to data breaches — through processes. Such attacks vary by the
been reported previously, albeit with media headlines and high fines — will degree of technical tools used. Some
variations in terms of volumes, targets potentially have a positive impact and attacks can successfully employ only
and level of sophistication. This is not lead to enhanced data security. social engineering, while others deploy
for lack of action on the side of the technical measures such as malware
public and the private sector. Rather, Ransomware remains the top threat and network intrusion. In both cases,
this persistence demonstrates the in this year’s IOCTA. Even though data is again at the centre of the crime
complexity of countering cybercrime we have witnessed a decline in the scene.
and the perspective that criminals only overall volume of ransomware attacks,
innovate when existing modi operandi those that do take place are more While using ransomware to deny
have become unsuccessful. Therefore, targeted, more profitable and cause an organisation access to its own
while much focus in contemporary greater economic damage. As long data may be the primary threat in
parlance is on the potential impact of as ransomware provides a relatively this year’s report, denying others
future technological developments easy income for cybercriminals, access to that organisation’s data
on cybercrime, such as Artificial and continues to cause significant or services is another significant
Intelligence, we must approach damage and financial losses, it is likely threat. Distributed Denial of Service
cybercrime in a holistic sense. to remain the top cybercrime threat. (DDoS) Attacks are yet another data-
Countering cybercrime is as much In the area of payment fraud, we focused threat to cope with. Of all
about its present forms as it is about continue to identify card not present the motivations behind such attacks,
future projections*. New threats do (CNP) fraud as the main priority — as those with an extortion element were
not only arise from new technologies reported by law enforcement and overwhelmingly the most prevalent.
but, as is often demonstrated, come confirmed by private sector reporting
in the payment fraud arena. Criminals Whereas criminals require data for
from known vulnerabilities in existing
primarily manage to carry out CNP most of their crimes, law enforcement
technologies.
fraud through data gathered from needs access to relevant data for
This year’s IOCTA demonstrates data security breaches and social their investigations. Indeed, the
that for all cybercrime, data remains engineering. ability of law enforcement agencies
the key element, both from a crime to access the data needed to
perspective and from an investigative Data returns to the discussion of conduct criminal investigations is an
perspective. Criminals target data for other threats as well. A crucial priority increasing challenge. This is a result of
their crimes, making data security reported by both Member States technological developments, such as
with respect to organisations and and the private industry is Business the enhanced use of encryption which
awareness of consumers all the more Email Compromise (BEC). While criminals abuse to obfuscate their
important. Data security has taken BEC is not new, it is evolving. This tracks, as well as cryptocurrencies

* These were usefully explored in Europol’s recent publication “Do Criminals Dream of Electric Sheep? How Technology Shapes the Future of Crime and Law Enforcement”
(https://www.europol.europa.eu/publications-documents/do-criminals-dream-of-electric-sheep-how-technology-shapes-future-of-crime-and-law-enforcement)
EXECUTIVE SUMMARY IOCTA 2019 7

to hide their illicit earnings. However, how the evolution of existing threats is and deterring users from illicit activity
inaccessibility of relevant data also often a result of scale. Self-generated on the dark web.
comes due to legislative barriers explicit material (SGEM) is more and
or shortcomings, which we must more common, driven by a growing As more and more companies
overcome to enhance cross-border number of minors with access to outsource areas of their business,
access to electronic evidence and high-quality smartphones. On top such as moving more infrastructure to
the effectiveness of public-private of this growing access, a lack of third-party cloud services, we expect to
cooperation through facilitated awareness about the risks on the side see a growth in supply chain attacks,
information exchange. of minors exacerbates the problem. At and the evolution of such attacks to
Europol, through the organisation of become increasingly complex. This
These barriers are often related to the the first European Youth Day, we have develops a clear interdependency
principle of territoriality, which sets specifically aimed to enhance minors’ between organisations and leads to
limits to the scope of jurisdiction and awareness about online risks. The the necessity of having a higher level of
to the investigative powers which law online solicitation of children for sexual cybersecurity across the spectrum to
enforcement and judiciary have at purposes remains a serious threat, with ensure the minimisation of successful
their disposal under their national law. a largely unchanged modus operandi in cybercrime attacks. When an attack
As a result, the tools in the hands of terms of grooming and sexual coercion, does occur, being prepared to respond
investigators and prosecutors do not demonstrating again the tenacity of rapidly is essential. Therefore, building
correspond to what would be needed existing forms of cybercrime. on important steps already taken, we
to deal with data flows, for which need to continue to enhance synergies
questions of territoriality are of no Access to data allows criminals to carry between the network and information
relevance. out various forms of fraud. Such data security sector and the cyber law
is also available on the dark web, which enforcement authorities, in order to
At the same time, there is also the ever- is often a key enabler of many other improve the overall cyber resilience of
increasing challenge of data overload, forms of illegal activity. Within this the entire cybersecurity ecosystem.
as we can see in the area of online report, it once again becomes evident
Child Sexual Exploitation (CSE). The how the dark web underpins many The IOCTA is a resource for the
amount of Child Sexual Exploitation crime areas and how investigators intelligence-led deployment of law
Material (CSEM) detected online by highlight the phenomenon as a priority. enforcement resources. It also contains
law enforcement and the private sector recommendations for policy-makers
continues to increase. This increase Moreover, as the dark web evolves, and for the orientation of further
puts a considerable strain on law it has become a threat in its own research and prevention measures.
enforcement resources and requires a right, and not only as a medium for The diversity and complexity of
response to ensure that the volume of the sale of illicit commodities such online threats is such the full range
data does not impede law enforcement as drugs, firearms or compromised of public and private actors must
authorities’ responsibility to conduct data. The impact of law enforcement work together to make progress in
criminal investigations into CSEM. action in this arena is palpable as prevention, legislation, enforcement and
This is one example where innovation the environment remains in a state prosecution. All of these elements are
and law enforcement agencies must of flux. As a result, more coordinated necessary in order to disrupt organised
innovate to find ways to digest the investigation and prevention actions crime activity and reduce the online
increasing volumes of data coming in. targeting the phenomenon are required, threat to businesses, governments and,
demonstrating the ability of law above all, EU citizens.
Related challenges also demonstrate enforcement to have a lasting impact
8 IOCTA 2019 KEY FINDINGS

KEY
FINDINGS #1

CYBER- CHILD SEXUAL


DEPENDENT EXPLOITATION
CRIME ONLINE
»» While ransomware remains the top »» The amount of CSEM detected online by law
threat in this report, the overall volume enforcement and the private sector continues
of ransomware attacks has declined as to increase, putting considerable strain on law
attackers focus on fewer but more profitable enforcement resources.
targets and greater economic damage. »» The online solicitation of children for sexual
»» Phishing and vulnerable remote desktop purposes remains a serious threat with a
protocols (RDPs) are the key primary largely unchanged modus operandi.
malware infection vectors. »» SGEM is more and more common, driven
»» Data remains a key target, commodity and by growing access of minors to high quality
enabler for cybercrime. smartphones and a lack of awareness of
the risks.
»» Following the increase of destructive
ransomware, such as the Germanwiper »» Although commercial CSE remains limited,
attacks of 2019, there is a growing concern live distant child abuse (LDCA) is a notable
within organisations over attacks of exception to this.
sabotage.

»» Continuous efforts are needed to further


synergise the network and information
security sector and the cyber law
enforcement authorities to improve the PAYMENT FRAUD
overall cyber resilience and cybersecurity.
»» CNP fraud continues to be the main priority
within payment fraud and continues to be a
facilitator for other forms of illegal activity.

»» Skimming continues to evolve with criminals


continuously adapting to new security measures.

»» Jackpotting attacks are becoming more


accessible and successful.
KEY FINDINGS IOCTA 2019 9

THE CRIMINAL THE CONVERGENCE


ABUSE OF THE OF CYBER AND
DARK WEB TERRORISM
»» The dark web remains the key online enabler »» The wide array of online service providers
for trade in an extensive range of criminal (OSPs) exploited by terrorist groups presents
products and services and a priority threat for a significant challenge for disruption efforts.
law enforcement.
»» Terrorist groups are often early adopters
»» Recent coordinated law enforcement of new technologies, exploiting emerging
activities, combined with extensive Distributed platforms for their online communication and
Denial of Service (DDoS) attacks have distribution strategies.
generated distrust in The onion router
(Tor) environment. While there is evidence
»» With sufficient planning and support from
sympathetic online communities, terrorist
administrators are now exploring alternatives,
attacks can rapidly turn viral, before OSPs
it seems the user-friendliness, existing market
and law enforcement can respond.
variety and customer-base on Tor makes a full
migration to new platforms unlikely just yet.

»» There are increases in single-vendor


shops and smaller fragmented markets on
Tor, including those catering for specific
languages. Some organised crime groups CROSS-
(OCGs) are also fragmenting their business
over a range of online monikers and
CUTTING CRIME
marketplaces, therefore presenting further FACTORS
challenges for law enforcement.

»» Encrypted communication applications »» Phishing remains an important tool in the


enhance single-vendor trade on the dark web, arsenal of cybercriminals for both cyber-
helping direct users to services and enabling dependent crime and non-cash payment
closed communications. Although there is no fraud (NCPF).
evidence of a full business migration, there »» While cryptocurrencies continue to facilitate
is a risk the group functions could become cybercrime, hackers and fraudsters now
increasingly used to support illicit trade. routinely target crypto-assets and enterprises.
10 IOCTA 2019 RECOMMENDATIONS

RECOMMEN-
#2
DATIONS

The following recommendations respond


to the Key Findings found above in chapter
1 and the threats described throughout
this report. These recommendations are
intended to support law enforcement,
regulators and policy-makers in their
CYBER-DEPENDENT decision-making processes. Crucially they
CRIME are of fundamental importance in informing
the respective European Multidisciplinary
Successfully tackling major crime-as-a-service
Platform Against Criminal Threats (EMPACT)
providers can have a clear and lasting impact. priorities when setting the actions for the
Law enforcement should continue focusing 2020 Operational Action Plans for the
its concerted efforts into tackling such three sub-areas of the EMPACT priority in
service providers. cybercrime: cybercrime attacks against
information systems, NCPF, and CSE online.
Enhanced cooperation and improved data
These recommendations should also help
sharing between law enforcement, computer
security incident response teams and private inform research and innovation efforts and
partners will be the key to tackling complex programmes at national and EU level.
cyberattacks, and allow the private sector
to take the necessary preventative security
measures to protect themselves and
their customers. Further enhance the collaboration between the
network and information security sector and the
In response to major cross-border cyber-
cyber law enforcement authorities by involving
attacks, all cooperation channels should be
the latter in cyber resilience-related activities
explored, including Europol’s and Eurojust’s
such as cyber simulation exercises.
support capabilities as well as legal instruments
designed for closer cross-border cooperation Low-level cybercrimes such as website
(such as Joint investigation Teams (JITs) and defacement should be seen as an opportunity
spontaneous exchange of information) in order for law enforcement to intervene in the criminal
to share resources and coordinate. career path of young, developing cybercriminals.
RECOMMENDATIONS IOCTA 2019 11

PAYMENT FRAUD
Cooperation between the public and the private
sector as well as within the sectors is crucial
to come to fruitful results. To this point, speedy
and more direct access to and exchange of
information from the private sector is essential
CHILD SEXUAL for Europol and its partners.

EXPLOITATION ONLINE Organisations must ensure they train their


employees and make their customers aware of
how they can detect social engineering and other
Coordinated action with the private sector and the scams.
deployment of new technology, including Artificial
Intelligence, could help reduce the production
and distribution of online CSEM, facilitate
investigations, and assist with the processing of
the massive data volumes associated with CSEM
cases.
THE CRIMINAL ABUSE
A structural educational campaign across
Europe to deliver a consistent high-quality OF THE DARK WEB
message aimed at children about online risks
is of the utmost importance to reduce the risks More coordinated investigation and prevention
derived from SGEM such as sexual coercion and actions targeting the phenomenon are required,
extortion. demonstrating the ability of law enforcement
As much CSEM, particularly that arising from and deterring users from illicit activity on the
LDCA, originates from developing countries, it is dark web.
essential that EU law enforcement continues to The ability to maintain an accurate real-time
cooperate with, and support the investigations of, information position is necessary to enable law
law enforcement in these jurisdictions. enforcement efforts to tackle the dark web. The
Fighting CSE is a joint effort between law capability needs to enable the identification,
enforcement and the private sector and a categorisation, collection and advanced analytical
common platform is needed to coordinate processing, including machine learning and AI.
efforts and prevent a fragmented approach and An EU-wide framework is required to enable
duplicated efforts. judicial authorities to take the first steps to
To prevent child sex offenders from travelling attribute a case to a country where no initial link
to third countries to sexually abuse children, EU is apparent due to anonymity issues, thereby
law enforcement should make use of passenger preventing any country from assuming jurisdiction
name record (PNR) data accessible through the initiating an investigation.
Travel Intelligence team within Europol. Improved coordination and standardisation of
undercover online investigations are required to
de-conflict dark web investigations and address
the disparity in capabilities across the EU.
12 IOCTA 2019 RECOMMENDATIONS

THE CONVERGENCE
OF CYBER AND
TERRORISM

Limiting the ability of terrorists to carry out


transnational attacks by disrupting their flow
of propaganda and attributing online terrorism-
related offences requires continued and
heightened counterterrorism cooperation and CROSS-CUTTING
information sharing across law enforcement
authorities, as well as with the private sector. CRIME FACTORS
Any effective measure to counter terrorist groups’
online propaganda and recruitment operations Law enforcement and the judiciary must continue
entails addressing the whole range of abused to develop, share and propagate knowledge on
OSPs, especially start-ups and smaller platforms how to recognise, track, trace, seize and recover
with limited capacity for response. cryptocurrency assets.

Cross-platform collaboration and a multi- Law enforcement must continue to build trust-
stakeholder crisis response protocol on terrorist based relationships with cryptocurrency-related
content online would be essential to crisis businesses, academia, and other relevant private
management the aftermath of a terrorist attack. sector entities, to more effectively tackle issues
posed by cryptocurrencies during investigations.
A better understanding of new and emerging
technologies is a priority for law enforcement Despite the gradual implementation of the
practitioners. Upcoming policy debates and Directive (EU) 2018/843 of the European
legislative developments should take into Parliament and of the Council1 (known as AMLD
account the features of these technologies in 5, 5th Anti-Money Laundering Directive) across the
order to devise an effective strategy to prevent EU, investigators should be vigilant concerning
further abuse. emerging cryptocurrency conversion and cash-out
opportunities and share any new information with
Europol.
INTRODUCTION IOCTA 2019 13

#3

INTRODUCTION The European Union Serious and


Organised Crime Threat Assessment
(SOCTA) 2017 identified cybercrime
as one of the 10 priorities in the
fight against organised and serious
international crime2. This overarching
category includes cybercrime attacks
against information systems, NCPF,
CSE online and other enabling criminal
activities.

Aim
Methodology
The IOCTA aims to inform decision-makers at strategic,
policy and tactical levels in the fight against cybercrime, The 2019 IOCTA was drafted by a team of Europol analysts
to direct the operational focus for EU law enforcement. and specialists drawing predominantly on contributions
The 2019 IOCTA will contribute to the setting of priorities from 26 Member States and European third-party members,
for the 2020 EMPACT operational action plan in the three the European Union Cybercrime Taskforce, Eurojust,
above-mentioned sub-areas of the EMPACT priority of cy- Europol’s Analysis Projects Cyborg, Dark Web, Terminal,
bercrime, as well as cross-cutting crime enablers. Twins and the Cyber Intelligence Team of Europol’s
European Cybercrime Centre (EC3), via structured surveys
Scope and feedback sessions. This has been enhanced with open
The 2019 IOCTA focuses on the trends and developments source research and input from the private sector, namely
pertinent to the above-mentioned priority crime areas. In EC3’s Advisory Groups on Financial Services, Internet
addition to this, the report will discuss other cross-cutting Security and Communication Providers. These contributions
factors that influence or impact the cybercrime ecosystem, have been essential to the production of the report.
such as criminal abuse of cryptocurrencies and social
engineering. Acknowledgements

This report provides an update on the latest trends and Europol would like to extend thanks to all law enforcement
the current impact of cybercrime within Europe and the and private sector partners who contributed to this report,
EU. Each chapter provides a law enforcement-centric in particular the European Banking Federation (EBF) and the
view of the threats and developments within cybercrime, EC3’s Academic Advisory Network.
based predominantly on the experiences of cybercrime
investigators and their operational counterparts from
other sectors. Furthermore, it draws on contributions from
strategic partners in private industry and academia to
support or contrast this perspective. The report seeks to
highlight future risks and emerging threats and provides
recommendations to align and strengthen the joint efforts
of EU law enforcement and its partners in preventing and
fighting cybercrime.
14 IOCTA 2019 CYBER-DEPENDENT CRIME

CRIME PRIORITY

cyber-
dependent
crime

Cyber-dependent crime can be defined as


any crime that can only be committed using
computers, computer networks or other forms
of information communication technology
(ICT). Such crimes are typically directed at
computers, networks or other ICT resources.
In essence, without the internet criminals
could not commit these crimes3. It includes
such activity as the creation and spread
of malware, hacking to steal sensitive
personal or industry data and denial of
service attacks to cause financial and/or
reputational damage.
CYBER-DEPENDENT CRIME IOCTA 2019 15

4.1 » KEY FINDINGS

•• While ransomware remains •• Following the increase of


the top threat in this report, destructive ransomware,
the overall volume of such as the Germanwiper
ransomware attacks has attacks of 2019, there is
declined as attackers focus a growing concern within
on fewer, but more profitable organisations over attacks
targets, and greater of sabotage.
economic damage.
•• Continuous efforts are
•• Phishing and vulnerable needed to further synergise
RDPs are the key primary the network and information
malware infection vectors. security sector and the
cyber law enforcement
•• Data remains a key target,
authorities to improve the
commodity and enabler for
overall cyber resilience and
cybercrime.
cybersecurity.

4.2 » RANSOMWARE

Ransomware evolves as it the top cyber threat faced by European Curve-Tor-Bitcoin-Locker also featured
remains the most prominent cybercrime investigators, the second prominently in EMAS submissions.
threat most prominent threat for the private While the Rapid ransomware only
sector5, and one of the most common surfaced in January 2018, the other
The majority of private sector
samples submitted to the Europol families, and many of the less
reporting indicates that there was
Malware Analysis Solution (EMAS). frequently reported families have
a notable decline in ransomware
Moreover, as long as ransomware been in circulation for several years,
attacks throughout 20184. This may be
provides a relatively easy income highlighting the persistence of these
attributable to a number of factors: an
for cybercriminals, and continues to threats once released into the wild.
increased awareness among potential
cause significant damage and financial
victims — fuelled by industry and law
losses, it is likely to remain the top Attacks shift to more valuable
enforcement initiatives to mitigate the
cybercrime threat. targets
threat (such as NoMoreRansom); the
increasing use of mobile devices by Investigators cited over 25 individual
consumers (with most ransomware identifiable families of ransomware, Last year law enforcement began to
targeting Windows-based devices); targeting citizens, and private and see the shift from untargeted, scat-
and a decline in the use of exploit kits public entities within Europe. Several tergun attacks affecting citizen and
(which were a key delivery method). of these featured more prominently in businesses alike, to more targeted at-
law enforcement reporting, including tacks. Both European law enforcement
Despite this, the number of victims is and Europol’s private sector partners
the various versions of Dharma/
still high, and ransomware clearly and confirm a diminishing number of ran-
CrySiS, ACCDFISA, GlobeImposter,
overwhelmingly retains its position as somware attacks targeting individual
and Rapid. GandCrab, Locky, and
16 IOCTA 2019 CYBER-DEPENDENT CRIME

citizens, and more attacks specifically primary infection vector7. The use of
engineered towards individual private vulnerable RDPs also continues to
and public sectors entities. This is also grow. Attackers can either brute force
a likely explanation for the apparent access to a target’s RDP or often can
decline in the overall volume of attacks. buy access to the target network on
a criminal forum. In this area, the
While targeting specific companies is importance of patching once again
potentially more labour-intensive and becomes apparent. In May 2019, for
technically challenging, requiring the example, Microsoft published the
attackers to follow the cyber kill-chain6, security vulnerability CVE-2019-0708,
it also means that attackers are able named sometime later as BlueKeep.
to pitch the ransom for decrypting
An attacker can exploit this
the victim’s files based on the victim’s
vulnerability by connecting via RDP
perceived ability to pay. For example,
to the target machine and sending
there are cases where a company’s
specifically crafted requests. This
encrypted files have been ransomed for
particular vulnerability does not
over EUR 1 million.
require either victim interaction nor
user authentication, allowing any
Remote desktop protocols and attacker who succeeds in exploiting
emails remain the key infection the vulnerability to execute arbitrary
case study methods code on the compromised machine.
The exploit works completely filelessly,
Such targeted cyber-attacks require
Ransomware attacks against local providing full control of a remote
specific tactics to infect the target
and state government agencies in system without having to deploy any
network. The trend in the use of social
the United States: malware. In addition, it also does not
engineering and targeted phishing
require an active session on the target.
Most visible ransomware attacks emails as a primary infection method
in 2019 were those against continues from last year. Some reports Almost one million devices may
local governments, specifically highlight that as many as 65 % of be vulnerable to this exploit8.
in the United States. This trend groups rely on spear-phishing as their Unfortunately, the vast majority of these
commenced earlier. In 2018, a
ransomware attack paralysed the
city of Atlanta for several weeks
and this only proved to be the tip
of the iceberg. After that, already
more than half a dozen cities and
public services across the US
had fallen victim to ransomware,
on a near-monthly basis11. Other
examples of 2019 include Baltimore
and Florida. The Governor of
Louisiana even declared a state
of emergency after another local
ransomware attack12. According to
an extensive historical overview of
ransomware attacks targeting local
and state governments, based on
public disclosures, every state in
the US has been hit with an attack
with the exception of Delaware and
Kentucky13. Whether this trend will
also become a threat to Member
States is something to be seen, but
the experiences in the US definitely
function as a warning.
CYBER-DEPENDENT CRIME IOCTA 2019 17

case study

In January 2019, authorities from


several US agencies, along with
police and prosecutors from
Belgium and Ukraine as part of a
JIT assisted by Eurojust, seized
the xDedic marketplace in an
operation supported by the German
Federal Criminal Police Office and
devices will likely remain unpatched, company data. Such concerns are
Europol. Law enforcement seized
allowing cybercriminals to include the particularly valid given the conclusion
the servers and domain names
BlueKeep vulnerability exploitation that cyberattacks designed to cause
of the xDedic marketplace, and
attack in their arsenal to be used with damage doubled during the first six the website’s criminal activities
other well-known malicious software, months of 2019, of those attacked stopped.
like ransomware inside private and 50 % are in the manufacturing
business networks. sector9. Whereas historically speaking The xDedic marketplace sold
destructive malware was predominantly access to compromised computers
While their use continues and new associated with nation-state actors, worldwide as well as personal data
ones continue to be developed, exploit since late 2018 cybercriminals are and operated on both the clear
kits did not feature in law enforcement also increasingly incorporating ‘wiper and dark web. Users of xDedic
reporting this year. elements’ as part of their attacks, could search for compromised
computer credentials by criteria,
through new strains of malware.
such as price, geographic location,
Sabotage: a growing fear for GermanWiper surfaced during the
and operating system. The victims
the private sector summer of 2019 as a new type
came from all around the globe and
of ransomware which rather than
a variety of industries, including
Another key development in the encrypting the victim’s files, rewrites
local, state, and federal government
wake of attacks such as NotPetya, is the content resulting in the permanent infrastructure, hospitals, emergency
that many private sector companies destruction of the victim’s data10. services, major metropolitan
now fear not only ‘conventional’ Without back-ups, victims are most transit authorities, accounting
ransomware attacks, but also likely to have permanently lose and law firms, pension funds, and
destructive cyber-attacks; acts of their data. universities. Authorities believe
sabotage which would permanently the website facilitated more than
erase or otherwise irreversibly damage EUR 60 million in fraud.
18 IOCTA 2019 CYBER-DEPENDENT CRIME

Partners 151
Academia
Founding EU Agencies
members
3% 4%
3 Associate Supporting
15 133 Law CERTs
28% 12%
enforcement
Non profit / Public
6% organisations
Partners
28% 72%
breakdown
Law Public - Private 7% Telcos
Enforcement entities 7%
Financial services

Partners annual growth 3%


Consulting

34%

Internet security companies

53 115 136 151


2016 2017 2018 2019

Tools 82 109
32 32 Emsisoft ransomware
11 11 Avast families covered
7 9 Bleeping Computer
7 7 Bitdefender
5 30 Kaspersky
5 5 Check Point
200K
3 4 McAfee Tools victims helped
3 6 Cisco Ransomware
2 2 CERT_PL families
2 2 ESET
$108M
2 27 Trend Micro
11 French Police criminal profit prevented
1 1 Telefónica
11 F-Secure
188
countries have accessed
Language & countries the NMR portal

Top 5 languages among 36 available Top 5 countries of traffic


30.5% English
South The
21.5% Korean Korea USA Russia Brazil
Netherlands
8.4% Dutch
7.6% Russian
21.5 9.5 7.5 5.5 3.7
4.3% Portuguese % % % % %
CYBER-DEPENDENT CRIME IOCTA 2019 19

Attackers compromise e-commerce Attackers receive


platform and injects malicious script payment information

Source: Trend Micro


FRONT-END ONLINE STORE USER

User accesses
affected online
stores

FRONT-END ONLINE STORE USER

WEB SERVER
ATTACKER’S SERVER
Shared libraries
injected with User loads skimming
malicious script script and unwittingly
get loaded by sends payment
front-end information to
FRONT-END ONLINE STORE USER
online store. attackers’ server

criminal case study 4.3 » DATA COMPROMISE


The Magecart group
The Magecart group, which actually Compromised data continues is potentially much more valuable,
comprises at least six distinct groups to fuel the cybercrime engine particularly to the more sophisticated
operating independently, has been cybercrime gangs who may have the
After ransomware, the compromise capability to best exploit it. Criminals
active since approximately 2015.
It came to notoriety throughout of data represents the second-most can use the data to facilitate other
2018 when a number of prominent prominent cyber-threat tackled by targeted cyberattacks such as
companies suffered massive data European cybercrime investigators. spear phishing, CEO/BEC fraud,
breaches. One breach alone resulted This most frequently relates to the account takeover, business process
in the compromise of over 380 000 illegal acquisition of financial data, compromise and other frauds, any
credit card details and a fine for the such as credit card information, of which could yield much more
company of over GBP 183 million online banking credentials or significant criminal profits.
under GDPR14. cryptocurrency wallets, through
means such as phishing, data Most data breaches yield a variety
The groups share a common modus
breaches and information gathering of data types. One of the largest
operandi — attacking shopping cart
malware. Such data is easily data breaches of 2018 was hotel
platforms or third-party services
monetisable, either through its sale giant Marriot International. Over
used by e-commerce websites by in-
on the digital underground or direct 300 million records were disclosed.
jecting code that allows them to skim
use in fraud. This is also a major These records included data such
sensitive customer data; a technique
known as formjacking. source to facilitate CNP fraud (see as names, postal addresses, phone
chapter 6). numbers, dates of birth, gender, email
The above illustration demonstrates addresses, passport numbers and
Second to financial data, is personal
the process of how the crime takes credit card data. Much of the data
data and other login credentials.
place step by step, from its inception was encrypted however.
While not directly monetisable (other
until the attackers receive payment
than through its sale), such data
information.
20 IOCTA 2019 CYBER-DEPENDENT CRIME

As hardware and software manufacturing supply chains


become ever more extended, the cybersecurity of some
extremely important targets will become dependent upon
the weakest link in this chain. Due diligence and sound
engineering processes must be a part of any Secure
Development Life Cycle.

― P R O F E S S O R A L A N W O O D W A R D, U N I V E R S I T Y O F S U R R E Y, U K

industry insight

Supply Chain Attacks


A clear and growing concern for
Europol’s private sector partners was
attacks directed at them through
the supply chain, i.e. the use of
compromised third parties as a
The growing threat from within GDPR implemented but more
means to infiltrate their network.
time needed to evaluate impact
The threat from malicious insider Often this will be suppliers of third-
activity is an increasing concern for party software or hardware, but
Closely connected to the crucial
also other business services. Large
financial institutions, according to threat of data compromise is the
companies may have a multitude
Europol’s private sector partners, some implementation of the GDPR. Perhaps
of third-party suppliers, some with
of whom rank insider threats as the one of the most anticipated pieces
which they have a high degree of
third-most significant threat actors. of legislation of the last few years,
connectivity, each bringing its own
The potential impact of such attacks one year after entering into effect, risk. Such risks are similarly incurred
made apparent by a number of attacks many stakeholders demonstrated a when a larger company acquires
publicised in 2019, such as the attacks welcomed eagerness to take stock a smaller company which may
on US telecoms company AT&T, where of the developments and to gauge have lower cybersecurity maturity.
insiders allegedly took bribes to unlock the impact of the legislation. In terms Such was the case in the Marriot
more than 2 million devices and planted of available figures, the International International breach.
malware on the company network15. Association of Privacy Professionals
(IAPP) appears to have developed one Several partners have even indicated
The threat from such attacks is of the most comprehensive overviews that supply chain attacks are
amplified where the malicious insider of the numbers pertaining to the GDPR considered to be the highest risk
works for a third-party service provider, to their business. Some industry
one-year anniversary.
who may have access to the data reporting indicate that supply chain
of multiple companies and their Others describe how, despite the attacks increased by 78 % in 201823.
customers. Such was the case with passage of a year, we are too early in
Such attacks are becoming more
the Capital One breach, where a former the process to evaluate the impact
complex, with compromised fourth
employee of Amazon Web Services is of the legislation17. Yet, momentum or even fifth party suppliers exploited
suspected of accessing data belonging is essential and some write ‘[i]n the in multi-tier supply chain attacks24.
to 106 million Capital One customers absence of large headlines about Moreover, many companies are
stored on Amazon’s Simple Storage closed investigations that result in becoming increasingly reliant on
Servers (S3)16. enormous fines, one of the questions third-party services such as the cloud.
144,000+
individual
COMPLAINTS 375,000+
Complaint topics included: 182,000+ Germany
access requests ORGANIZATIONS are 51,000+ France
right to erasure
unfair processing
DOCUMENTED to have 48,000+ Italy
32,000+ UK
disclosure
unwanted marketing
registered DPOs 30,000+ Spain

89,000+ 500,000
data breach ORGANIZATIONS are
ESTIMATED to have
NOTIFICATIONS registered DPOs

280,000+ 440+
cross-border
CASES RECEIVED CASES
by DPAs

criminal case study

Operation ShadowHammer
In January 2019, Kaspersky Lab
discovered that a server for a
about GDPR now is whether companies means of data security on the side of
live software update tool for will become complacent and companies that handle customer data.
users of ASUS products had downscale their privacy programs18‘. At In this sense, the impact of such an
been compromised by attackers the time of its one-year anniversary, the action based on legislation such as
and that an estimated 500 000 largest fine issued — to Google — did GDPR could be significant; especially
Windows machines had received not concern a data security breach, the public coverage of the development
a compromised file that effectively rather the French Data Protection can lead to improved security
acted as a backdoor to the devices Authority issued the fine because of the practices. Previous research with
for the attackers. The malicious file processing of data by the company. regard to investment in cybersecurity
was signed with legitimate ASUS demonstrates the value of incidents in
digital certificates to make it appear After the passage of the one-year terms of enhancing security practices
to be an authentic software update anniversary mark, however, at of companies21. The magnitude of the
from the company. least two companies received a fine combined with increasing public
However, the malware was ‘headline’ fine. The United Kingdom’s awareness of the impact of data
designed to only activate on about Information Commissioner’s Office compromise must act as a strong
600 unique machines, based on (ICO) issued its biggest penalties to incentive for boards to closely examine
their MAC addresses, indicating date when it fined British Airways for their cybersecurity posture. At the same
that despite the number of affected GBP 183 million19 and the Marriott for time, high fines could also backfire, as
machines, the attack was extremely nearly GBP 100 million20. The fines are it could bring the potential for GDPR
targeted25. perceived as a wake-up call to improve extortion back into the discussion22.
22 IOCTA 2019 CYBER-DEPENDENT CRIME

4.4 » DDoS ATTACKS

While denying a public or private sector entity access


criminal case study to its own data may be the primary threat in this
year’s report, denying others access to that entity’s
data or services was the third most significant threat
Memcached amplification GitHub, and an unnamed
attacks28 United States-based website highlighted by European cybercrime investigators. Of
respectively. Attacks in all the motivations behind such attacks those with
2018 witnessed the two 2019, however, trumped an extortion element were overwhelmingly the most
largest DDoS attacks seen these figures. At the start prevalent.
to date, using a previously of 2019, Imperva’s DDoS
unknown amplification Protection Service mitigated It’s all about the money…
technique. Memcache is an a DDoS attack against one
open-source application that of its clients which crossed As in last year’s report, while extortion was the primary
can be used to store small the 500 million packets per motivation behind DDoS attacks reported to European
chunks of arbitrary data; its second (mpps) mark. That
law enforcement, attacks of an ideological/political
purpose to help websites and is more than four times the
nature were also common, as were attacks without an
applications load content volume of packets sent at
apparent motive and which appeared purely malicious.
faster. Social networks and GitHub in 2018. In addition,
other content providers the company believed at the
commonly use it. Where stated, the most commonly identified
time, it was the largest PPS
attack publicly disclosed30. In targets were financial institutions, and public sector
By spoofing the targets
April 2019, this belief became entities such as police or local governments. Other
IP address, exposed
obsolete, as Imperva recorded targets included the likes of travel agents, internet
memcached-enabled servers
an even larger attack against infrastructure, and services related to online gaming.
can be used to mount a UDP-
based reflection attack, with its clients of 580 mpps.
an amplification factor of over These DDoS attacks have No honour among thieves
50 00029. serious consequences as
they paralyse organisations, Interestingly, not only ‘legitimate’ enterprises are
Such was the case in February including parts of critical targets for DDoS attacks. Anyone familiar with any
of 2018, when two record infrastructure such as banks, Darknet market listing service, such as the now defunct
breaking DDoS attacks of as well as continuously DeepDotWeb, will know that markets are typically
1.35 terabytes per second forcing them to increase their listed with an ‘uptime’, with the primary reasons for
and 1.7 terabytes per second mitigation capacity to ensure downtimes being DDoS attacks. Hidden services
were launched against attack business continuity. are more vulnerable to DDoS attacks due to traits
against code depository associated with the Tor browser itself. In early 2019
CYBER-DEPENDENT CRIME IOCTA 2019 23

4.5 » ATTACKS
ON CRITICAL
INFRASTRUCTURE

The fourth cyber threat highlighted by


European cybercrime investigators
was attacks that disrupt or subvert the
internal functions of one or more critical
infrastructures. Predictably, there is some
the three largest Darknet markets were overlap between these attacks and some
all under intense and prolonged DDoS of the attack tools earlier in this chapter,
attacks, with the moderators of Dream i.e. these attacks may have involved
Market allegedly being extorted for DDoS or cryptoware, but these cases
USD 400 000 (≈ EUR 356 000), showing focus on attacks where the primary
industry insight motive was to attack the infrastructure
that anyone vulnerable to such attacks
and with the means to pay is fair game itself.
DDoS attacks were one of the
to a DDoS extortionist26.
most prominent threats reported to
Europol by its private sector partners, Law enforcement is increasingly
superseded only by phishing and responding to attacks on critical
Operation Power Off infrastructure
other social engineering attacks, and
has significant and lasting
ransomware.
impact on DDoS-as-a-service This year law enforcement appears to
Despite a noted decline in attacks by have become involved in a much wider
several banks following Operation Operation Power Off was executed in variety of investigations into attacks on
Power Off, many banks report that April 2018, led by the Dutch Police and critical infrastructures, including attacks
DDoS attacks remain a significant the UK’s National Crime Agency, and on the energy, transport, water supply,
problem, resulting in the interruption supported by Europol and a dozen law and health sectors. It is not possible to
of online bank services, creating more enforcement authorities from around say whether this is due to an increasing
of a public impact rather than direct the world. The operation resulted in number of attacks, or simply the growing
financial damage. the takedown of webstresser.org — involvement of law enforcement in
considered at the time to be one of such investigations. Attacks on these
Such attacks typically originate from
the world’s largest marketplaces for infrastructures by financially motivated
low-capability actors, who can still
hiring DDoS services — with over 150 criminals remain unlikely, as such attacks
leverage easily accessible DDoS-for-
hire services that exploit booters/
000 registered users, and the source of draw the attention of multiple authorities
stressers. While most attacks can 4 million attacks. A year later and the and as such pose a disproportionate risk.
be successfully mitigated, emerging success of the operation still resonates. The most likely potential perpetrators
DDoS techniques which may be Moreover, the activity continues as include nation states as well as script
significantly harder to defend against, several law enforcement authorities kiddies. The accessibility of crime as a
such as memcached attacks, are a pursue the users of these services, and service allows such attackers to carry out
concern for the financial sector. target other DDoS-for-hire services27. potentially destructive attacks.
24 IOCTA 2019 CYBER-DEPENDENT CRIME

Early Detection
2
1 & Identification
of a Major
Threat
Classification

3
Cyber-Attack

Emergency
Emergency
Response
Response
Protocol OSINT & Coordination
Closure
Tactical Centre

7 Coordination

Investigation & Early 4


Multi-Layered Warning
Analysis Notification
Law

6
Enforcement
Operational
Action Plan
5

Emergency Response Protocol authorities, international bodies and


developed to improve cyber relevant private partners. Since law
preparedness enforcement play a crucial role in
investigating such cyber-attacks (e.g.
The coordinated response to large- electronic evidence collection, technical
scale cyber-attacks remain a key attribution, prosecution of suspects,
challenge to effective international etc.), their early involvement in the
cooperation in the cybersecurity
criminal case study emergency response to cybersecurity
ecosystem. The development of incidents or crises of a suspected
the EU Blueprint for Coordinated malicious nature is essential. Their
In March 2019, Norwegian
company Norsk Hydro AS — Response to Large-Scale Cross-Border proactive participation in cyber
renewable energy supplier and one Cybersecurity Incidents and Crises resilience-related activities such as
of the world’s largest aluminium (Blueprint) and especially the EU Law cyber simulation exercises is also
producers — was compromised Enforcement Emergency Response indispensable as such collaboration
by the LockerGoga ransomware Protocol have significantly improved raises awareness of the roles,
in a targeted cyber-attack. The the cyber preparedness by shifting responsibilities and capabilities of each
attack affected large parts of the away from incongruent incident-driven actor and increase the level of trust. In
business, resulting in production and reactive response measures and terms of next steps, it is crucial for the
stoppages in Europe and the acting as critical enablers for rapid Blueprint to be operationalised, while
USA. Projected costs for the response capabilities that support ensuring alignment and de-confliction
company are up to NOK 350 million cyber resilience. Furthermore, such among the different procedures within
(≈EUR 35 million). standardised procedures facilitate the the EU’s crisis response architecture,
LockerGoga currently targets multi-stakeholder coordination and especially the EU’s Hybrid Threats
multiple industries with targeted ensure effective de-confliction between framework31.
attacks36. the different national competent
CYBER-DEPENDENT CRIME IOCTA 2019 25

Financial sector increasingly hit Cryptocurrency exchanges continue to The motive behind such attacks varies,
by APT-style cybercrime gangs be a magnet for financially motivated but is typically for political/ideological
hacking groups. In 2018, over USD 1 reasons, or without purpose and purely
Another area of concern, highlighted billion in cryptocurrencies were stolen malicious. The latter likely represents
by both European law enforcement from exchanges and other platforms budding cybercriminals testing their
and Europol’s private sector partners, worldwide35. capabilities.
is attacks directed at internal networks
within the financial sector. There are a Such attacks not only result in huge The reason this crime area has been
growing number of cases of complex criminal profits, but cause severe highlighted as a key threat is that by
attacks on banks by sophisticated reputational damage to the victims and investigating these attacks, it provides
cyber-crime gangs employing Advanced undermine confidence in the financial law enforcement the opportunity to
Persistent Threat (APT)-style tactics to sector as a whole. intervene with the perpetrators at an
take control over certain aspects of a early stage in their cybercrime career.
bank’s internal network. Such attacks This could be a pivotal moment in
can manipulate internal fund transfer 4.6 » WEBSITE preventing them from pursuing a career
in cybercrime, which is the foundation
systems, such as those interfacing with
the SWIFT network, in order to make DEFACEMENT of many national cybercrime prevention
illicit payments, or take control of card campaigns.
processing systems to allow mass
cash-outs at ATMs.
Defacing websites — a gateway
to more serious cybercrime
Financially motivated criminal APT-style
groups such as Cobalt, MoneyTaker, While not a top priority for any individual
and Silence largely carry out such country, collectively a significant
attacks32. In some instances however, number of European states have
highlighted simple website defacement
nation states are involved, such as in
as one of the priorities for their
the case of the Lazarus group. This APT
jurisdiction. This implies that such
group, which has ties to North Korea,
activity, while low impact, is sufficiently
was allegedly responsible for over half
common to result in a significant
a billion USD in cryptocurrency thefts
number of cases and commands a
since 201733, and ongoing attacks
corresponding proportion of limited law
against banks in South East Asia34.
enforcement resources.
26 IOCTA 2019 CYBER-DEPENDENT CRIME

4.7 » WHAT HAPPENDED TO...?

DATA STEALING/MANIPULATING MALWARE

For the second year running, data stealing malware did not feature
prominently in law enforcement reporting, with only two Member
States stating it as a priority. What industry reporting highlighted,
is that criminals use some banking Trojans, particularly those with
a modular and therefore variable functionality, such as Emotet and
Trickbot, more for their network intrusion and malware delivery
capabilities than simply their data-stealing capacity37. In some
cases, criminals use such malware to install other malware,
including ransomware.

Some of Europol’s private sector partners report that banking


Trojans remain a moderate threat and indeed they were submitted
as samples to Europol’s EMAS in significant numbers. While losses
from banking Trojan activity against customers are at an all-time
low, the ability of this malware to affect network hygiene remains a
key concern. Banking Trojan veterans Dridex, Trickbot and Gozi still
present the most significant banking threats, with some new Trojans
such as BackSwap also now coming to the fore. Moreover, some
malware families, such as Retefe, had a revival throughout 2018 and
2019, highlighting that while the popularity and prevalence of data
gathering malware and banking Trojans may have declined, their
development and refinement continues within certain cyber OCGs.

CRYPTOMINING

Last year we highlighted a massive surge in cryptomining; both


passive cryptomining through scripts running in a victim’s internet
browser and more intrusive cryptojacking malware. Both techniques
exploit a victim’s processing power without their permission to mine
cryptocurrencies — typically Monero. The size of this surge varies
wildly across industry reporting but the veracity of the trend is almost
unanimous. Some reports also attribute the decline in ransomware to
attackers shifting to stealthier cryptojacking attacks38.

Despite this, and despite some submissions of crypto-related


malware to Europol’s EMAS, we found no representation of this
phenomenon in law enforcement reporting from 2018. This is likely
due to its comparatively low impact (in most cases) compared to
other cyber threats. Apart from the occasional exceptional case,
cryptomining is likely to remain a low-priority threat for EU law
enforcement.

The closure of Coinhive in March 2019 has led to a decline in the


instances of browser-based cryptomining. However, attacks against
public and private sectors entities not only continue, but continue
to evolve (see also 9.4). There are reports of cryptojacking malware
both going ‘file-less39’, and incorporating the Eternal Blue exploit in
order to adopt worm-like spreading properties40.
CYBER-DEPENDENT CRIME IOCTA 2019 27

MOBILE MALWARE

Despite a large number of mobile malware submissions to


Europol’s EMAS, once again mobile malware featured only
marginally in law enforcement reporting for 2018, although
there was still an increase in reporting from the previous
year. What law enforcement reported, related to data stealing
malware, ransomware, and cryptomining malware, and, as in
previous years, this largely related to Android phones. Private
sector comments — from both Europol’s private sector
partners, and industry reporting — mirrored this. The latter
highlighted parallel trends in mobile malware, such as the
expansion of cryptomining malware and a general decline in
ransomware43. Other mobile threats, such as banking Trojans
continue to grow though, capitalising on the increase in
m-banking.

4.8 » FUTURE THREATS AND DEVELOPMENTS

The majority of attacks rely on existing modi operandi and that have implemented the SWIFT recommended security
benefit from known vulnerabilities. Often, existing attacks will program, it is not unlikely that sophisticated attackers could
spread to previously untapped victims, such as ransomware identify other upstream applications that generate transfers
targeting data centres or backup servers, and existing and similarly exploit those in a comparable fashion.
attack tools will continue to evolve, such as banking Trojans
routinely incorporating self-propagating worm functionality. Various entities within the cryptocurrency ecosystem have
presented themselves as profitable targets for competent
New threats do not only arise from new technologies but, as cybercriminals. As the trend of crimes that traditionally
is often demonstrated, come from pre-existing vulnerabilities target fiat currencies evolving to targeting cryptocurrencies
in pre-existing technologies. For example, Memcached continues, we will see more financially motivated APT-
was first released in 200341 and yet the first DDoS attack style cybercrime gangs shift their focus to any entity with
exploiting it only occurred 15 years later. large cryptocurrency assets42 — hacking exchanges and
manipulating the Blockchain with 51 % attacks*.
As more and more companies outsource areas of their
business, we expect to see a growth in supply chain attacks, In early, 2019, Internet Corporation for Assigned Names and
and the evolution of such attacks to become increasingly Numbers (ICANN) issued a warning over an ‘ongoing and
complex. Cloud services pose a particular risk in this regard, significant risk to key parts of the Domain Name System
as one company is likely to store the data for multiple clients, (DNS) infrastructure’. The warning relates to attacks with
marking itself as a valuable target for financially motivated the potential to see data in transit, redirect traffic or allow
criminals and having a major impact if compromised. attackers to ‘spoof’ specific websites. It is likely that either
further existing, ongoing attacks on the DNS infrastructure
While attacks on internal bank systems, which may interface will come to light, or that a new incident will occur.
with the SWIFT network, may have been mitigated by banks

* 51 % attacks can hypothetically occur when attackers control 51 % of the blockchain hashing power and can effectively double spend cryptocurrencies by reversing
transactions.
28 IOCTA 2019 CYBER-DEPENDENT CRIME

The biggest cybercrime threat of the future may be familiar to


us already. The major threats we face today, such as ransomware
or business email compromise, have been around for years.
While we may see something quite novel, it’s more likely that
cybercriminals will continue refining attacks that have been
shown to work, even relatively unsophisticated frauds that
leverage social engineering for great monetary gain.

― D R J O N AT H A N L U S T H A U S , U N I V E R S I T Y O F O X F O R D, U K

4.9 » RECOMMENDATIONS

Successfully tackling major crime-as-a-service providers can


have clear and lasting impact. Law enforcement should continue
focusing its concerted efforts into tackling such service providers.

Enhanced cooperation and improved data sharing between law


enforcement, computer security incident response teams and
private partners will be key to tackling complex cyberattacks and
will allow the private sector to take the necessary preventative
security measures to protect themselves and their customers.

In response to major cross-border cyber-attacks, all cooperation


channels should be explored, including the support capabilities
of Europol and Eurojust and legal instruments designed for
closer cross-border cooperation (such as JITs and spontaneous
exchange of information) in order to share resources and
coordinate.

Further enhance the collaboration between the network and


information security sector and cyber law enforcement authorities
by involving the latter in cyber resilience-related activities such as
cyber simulation exercises.

Low-level cybercrimes such as website defacement should be


seen as an opportunity for law enforcement to intervene in the
criminal career path of young, developing cybercriminals.
CRIME PRIORITY

#5 child sexual
exploitation
online

Online CSE refers to the sexual abuse and


exploitation of children via the internet.
Whereas the sexual abuse or exploitation
very much takes place in the physical
world, the subsequent sharing of images and
videos depicting this abuse significantly
aggravates the impact of this crime. The
amount of online CSEM is staggering and
continues to increase. As the number of young
children accessing the internet grows, and
offenders become more aware of anonymisation
techniques, law enforcement authorities and
industry partners fighting these disturbing
crimes continue to face considerable
challenges.
30 IOCTA 2019 CHILD SEXUAL EXPLOITATION ONLINE

5.1 » KEY FINDINGS


•• The amount of CSEM •• SGEM is more and more
detected online by law common, driven by growing
enforcement and the private access of minors to high
sector, continues to increase, quality smartphones and a
putting a considerable lack of awareness about the
strain on law enforcement risks.
authorities’ resources.
•• Although commercial CSE
•• The online solicitation of remains limited, LDCA is a
children for sexual purposes notable exception to this.
remains a serious threat,
with a largely unchanged
modus operandi.

5.2 » ONLINE DISTRIBUTION OF CSEM


The amount of detected online CSEM links that involve CSEM.
continues to increase, as is reported
by both law enforcement authorities In 2017, Europol handled 44 000
and industry partners44. This has a referrals from the USA for 18 Member
serious impact on victims, who are States, increasing to 190 000 in 2018.
repeatedly victimised every time such In June 2019, the number of referrals
case study pictures or videos are shared. Out of had already reached 170 000.
19 Member States who responded Referrals from Canada have seen a
Over the course of two weeks in similar trend, increasing from 6 000
to this question, 10 have seen an
May 2019, Europol hosted the sixth for all 28 Member States in 2018 to
increase in this criminal activity,
Victim Identification Taskforce
with the other 9 believing the online a current conservative prediction of
(VIDTF 6), an exercise where
distribution of CSEM has remained 24 000 in all of 2019 for the same
experts from Member States
relatively stable. 5 out of 7 third number of countries. Moreover, there
gather to analyse CSEM in order to
partners also see an increase in this are currently over 46 million unique
identify victims and perpetrators.
activity. images or videos relating to CSEM in
The taskforce continues to expand
annually, with 34 experts from 24 Europol’s repository45.
countries, supported by INTERPOL Referrals from industry and third
country partners have reached record The vast majority of online CSEM is
specialists, and intelligence
highs, putting a serious strain on detected on image host websites on
analysts from Europol staff.
the capacity of law enforcement the open web, with the Netherlands
During VIDTF 6, 466 new datasets authorities in the EU to investigate continuing to be the main hosting
were uploaded to the International these crimes. At least 18 Member country46. Offenders keep using a
Child Sexual Exploitation database States received referrals from number of ways to disguise online
hosted at INTERPOL, and new the USA through Europol and all CSEM, making it more complicated
data was added to more than 280 for law enforcement authorities to
Member States received referrals
existing datasets, increasing the detect such images and videos.
from Canada through Europol. Many
chance victims could be identified. Although online distribution of CSEM
of the referrals from the USA come
via law enforcement partners from continues to take place via a variety
The efforts led to three victims
the National Center for Missing and of platforms, peer-to-peer sharing
being tentatively identified: one in
Exploited Children, an NGO that remains among the most popular
Europe, one in the USA and one in
Russia, with another investigation collects reports of online CSEM. way among perpetrators to share
ongoing to identify another Electronic service providers in the CSEM. This includes both one-on-one
European victim and offender. USA are obliged to report content or communication and larger groups.
CHILD SEXUAL EXPLOITATION ONLINE IOCTA 2019 31

5.3 » ONLINE
SOLICITATION
OF CHILDREN FOR
SEXUAL PURPOSES

The online solicitation of children for


sexual purposes remains a serious
threat in the EU, with many Member
However, dedicated bulletin boards on States reporting this crime is on the rise.
the Darknet are increasingly popular As more and more minors are active
among offenders as a channel for on social media at a younger age, the
the distribution of CSEM. This is number of potential victims continues
especially the case for offenders with to be high. At the same time, some
niche interests, including CSEM with countries have reported a decrease in case study
infants and non-verbal children and cases related to online solicitation since
demeaning material depicting torture the last IOCTA, possibly as a result of In March 2019, a German court
and severe cruelty against children47. growing public awareness or offenders convicted four men to sentences
More generally, in many cases offenders operating more carefully. between 4 and 10 years in
use encryption and install software prison for running the online CSE
to cover their IP address and prevent The modus operandi for this criminal platform ‘Elysium’ on the Darknet.
identification, such as Virtual Private activity remains largely unchanged. They had set up, administered
Offenders generally use the open and moderated what was one
Networks (VPNs) and TOR.
web, as it simply much easier to get of the largest forums of its kind,
There is an ongoing increase in in contact with children than on the with more than 11 000 registered
the distribution of CSEM via social dark web. They get in touch with users from all over the world. One
potential victims through a variety of of the men was also convicted
media applications. The self-destruct
for the sexual abuse of two
function of some of these applications social media services, creating fake
young children. None of the men
make investigations particularly profiles and frequently pretending to
involved had known each other
complicated. In some cases, this is be of the same age. This can happen
in person. The forum had a wide
the result of self-generated material on many different platforms, ranging
range of different categories of
being shared with peers, after which it from Facebook and Instagram to online
CSEM, including serious violence
is further distributed via social media gaming environments. Minors are and very young children.
and eventually ends up on CSEM also sometimes approached on live
platforms. There are also instances video platforms. Once trust has been
where fake social media accounts established, communication is quickly
are created in order to spread private moved to encrypted online messaging
pictures and videos of underage applications, such as WhatsApp or
A man in Sweden was sentenced
victims together with their personal Viber. Whereas explicit material is
to 10 years imprisonment for
information. Although such accounts initially shared voluntarily, offenders
forcing children, all under the
are often quickly deleted, it is easy for subsequently use this material for age of 15, from primarily North
perpetrators to simply create a new further coercion and extortion for new America and the United Kingdom
account. CSEM. In some cases, suspects will to commit sexual acts in front of
harass their victims so that they do not a camera or webcam. Despite the
In many cases, offenders distributing file a complaint against them. fact that he was not physically
CSEM online are also involved in hands- present at the crime scenes, the
on CSE. The demand for such material Victims are mostly young teenagers, court nonetheless convicted him
perpetuates the ongoing abuse of both girls and boys. Some offenders as a hands-on offender on the
children. However, there are also many specifically target profiles with many basis of the concept of ‘virtual
perpetrators who possess and share friends, as they believe this means rape’. It was the first time an
such material, but are not involved in the a higher chance of successfully online CSE perpetrator had been
actual sexual exploitation of children. establishing contact. convicted as a hands-on abuser.
32 IOCTA 2019 CHILD SEXUAL EXPLOITATION ONLINE

#SaferInternetDay
Do you really know who is on the other side?
Not everyone is who they claim to be on the internet.
Child sexual offenders may pose as someone young to
gain your trust and explicit pictures.
SENDING AN
INTIMATE PICTURE That image can become public.
OF YOURSELF The receiver may share it with other
people (accidentally or voluntarily).
TO SOMEONE? Your data could be hacked.
CONSIDER THE You or the receiver could lose the
phone or have it stolen, compromising
WHOLE PICTURE the security of the files.

Such materials can end up in the possession


of online child sex offenders.

Offenders can obtain images through sexual extortion


and coercion of minors. Even more common is for them
to get their hands on material that the children have
#SID2019 shared with their peers or posted on social media.

5.4 » PRODUCTION OF
SELF-GENERATED EXPLICIT MATERIAL
case study

European Youth Day to raise


awareness SGEM has been a growing problem are making themselves vulnerable
for several years, as more and more on a number of levels through this
On 20 November 2018, Europol young children share explicit material behaviour, including in the context
introduced a new initiative: The online. Growing access to high quality of online solicitation by child sexual
European Youth Day. This was a smartphones and other devices, offenders. Moreover, in many cases
first event of its kind, which brought in combination with relatively low the pictures or videos may be spread
together Europol experts and around awareness of the risks of producing further, first between other peers, but
100 young students aged between and sharing SGEM, means this trend is eventually ending up in the collections
12 and 15 years old under the topic likely to continue. of online child sex offenders. Such
‘Digital Rights of Youth against cases can subsequently lead to the
Violence’. Following on from the A distinction can be made between minors being subjected to sexual
#SayNo initiative, the 2018 European SGEM produced voluntarily and SGEM coercion and extortion by online
Youth Day at Europol took the produced under coercion or extortion child sex offenders for new SGEM
discussion one step further, allowing by a child sex offender. Regarding or material involving their siblings or
young people themselves to bring
the first category, there is a growing other friends.
their opinions to the table on current
number of minors sharing sexual
cyber threats affecting them, as well
pictures or videos with peers. Children
as how best to tackle these.
CHILD SEXUAL EXPLOITATION ONLINE IOCTA 2019 33

5.6 » LIVE DISTANT CHILD ABUSE

Monetisation of online CSE is generally platforms with the possibility of video


limited, as offenders are more often conference. Often perpetrators have the
driven by a desire to obtain more CSEM chance of orchestrating and directing
than by financial gain. However, in a the abuse in real time. Perpetrators
small number of cases offenders do generally pay via online payment
seem to seek financial gain from online methods, but cryptocurrencies are still
CSE. One method is hosting legitimate rarely used. Some of the offenders also
‘pay-per-click’ advertisements on travel to third countries to engage in
websites hosting CSEM. Especially hands-on abuse.
when the CSEM is disguised, this
5.5 » SEXUAL increases the platform’s click rate and
COERCION AND the potential profits per click. There
have also been instances of offenders
EXTORTION OF sharing CSEM in exchange for money,
MINORS FOR but this is far less common than case study
exchanging images for other images.
NEW CSEM On rare occasions, offenders also use In May 2019, a British man was
SGEM to coerce victims for money sentenced to five years in prison for
instead of producing new CSEM. attempting to incite minors under 13
Although sexual coercion and extortion However, the most common form of to engage in sexual acts and planning
of minors also happens for financial commercial CSE is LDCA. to sexually abuse several minors in the
gain, in the majority of cases the aim Philippines. The offender was based
is to obtain new CSEM. Offenders Because of growing internet speed in as a teacher in Malaysia and Thailand
mostly use existing explicit pictures many third countries, offenders can at the time of the offences, but was
or videos of a victim and threaten to watch live streams of CSE taking place convicted under a section of the
share this with the victim’s network or on the other side of the world. In many British Sex Offences Act that allows
on social media, unless they receive cases, perpetrators pay for watching British nationals to be prosecuted for
more material. These existing pictures this kind of CSE. The Philippines offences committed abroad. He was
or videos can come from two sources: remains the most prominent country arrested upon arrival in the United
either through online solicitation of in terms of location of the victims, Kingdom after investigators found he
minors for CSEM, or because they although there are indications this had made money transfers to online
have found SGEM and have been able is taking place in a larger number of payment accounts of members of a
to identify and contact the victim. countries. Contact is established in a Filipino OCG involved in LDCA.
Some offenders will send explicit variety of ways. In some cases, first
images and messages to a minor. contact takes place on commercial Evidence showed the offender had
Even if they do not receive any explicit adult porn websites, after which also sent money to a Filipino mother
pictures, they use screenshots of the conversations take place on encrypted of two girls aged 7 and 11 and a boy
conversations for coercion purposes. messaging platforms. In most cases, aged 5, based in Cebu. The money
As stated above, such coercion can the CSE is live streamed on online was sent in order for her to buy food
involve producing material of or with for her children, with the offender
other children within or outside their requesting pictures of her 11-year-old
own family. The impact is significant daughter in return. He subsequently
as sextortion can lead to significant also had direct conversations with the
trauma for the victim or in some cases girl that were sexual in nature. After
even to suicide. This makes educating he sent more money, the offender
children about the risks of sextortion expressed an interest in the 7-year-old
as well as the need to seek help when child and indicated he would like to
victimised crucial. meet her in order to have sex with her.
An arrangement was made to meet in
Manilla, although there are no records
of the offender actually travelling to the
Philippines.
34 IOCTA 2019 CHILD SEXUAL EXPLOITATION ONLINE

5.7 » FUTURE THREATS 5.8 » RECOMMENDATIONS


AND DEVELOPMENTS
Coordinated action with the private sector and the deployment of
The main threats related to online CSE have new technology, including Artificial Intelligence, could help reduce the
remained relatively stable over the last number production and distribution of online CSEM, facilitate investigations and
of years and it is unlikely that there will be assist with the processing of the massive data volumes associated with
any major changes in this crime area in the CSEM cases.
foreseeable future. However, one development
that could be of concern for online CSE is A structural educational campaign across Europe to deliver a consistent,
the ongoing improvements of so-called high-quality message aimed at children about online risks is of the
deepfakes. Deepfake technology is an AI- utmost importance to reduce the risks derived from SGEM such as
based technique that places images or videos sexual coercion and extortion.
over another video. It has already been used
to place the faces of celebrities on existing As much CSEM, particularly that arising from LDCA, originates from
pornographic videos. Although the technology developing countries, it is essential that EU law enforcement continues
is still relatively new, it is rapidly improving to cooperate with and support the investigations of law enforcement in
and becoming more accessible and easy to these jurisdictions.
use. It may be a matter of time before the
Fighting CSE is a joint effort between law enforcement and the private
first deepfakes appear depicting online CSE,
sector and as a common platform is needed in order to coordinate
resulting in the generation of new ‘personalised’
efforts and prevent a fragmented approach and the duplication of effort.
CSEM. This can also have serious implications
for law enforcement authorities, as it might To prevent child sexual offenders from travelling to third countries to
raise questions about the authenticity of sexually abuse children, EU law enforcement should make use of PNR
evidence and complicate investigations. data accessible through the Travel Intelligence team within Europol.
CRIME PRIORITY

#6 payment
fraud

6.1 » KEY FINDINGS

•• CNP fraud continues to •• Skimming continues to


be the main priority within evolve with criminals
payment fraud and also continuously adapting to
continues to be a facilitator new security measures.
for other forms of illegal
•• Jackpotting attacks are
activity.
becoming more accessible
and successful.
36 IOCTA 2019 PAYMENT FRAUD

6.2 » CARD NOT PRESENT FRAUD

CNP fraud is the main priority for third-party breaches, phishing


investigators of payment card fraud emails and scam text messages
within Member States. One law (see section 4.3). Magecart attacks,
enforcement respondent specifically for example, briefly described in
states ‘it is the single most common chapter 4, have hit nearly 17 000
form of fraud’. This follows the e-commerce websites since April
pattern from previous years, 2019. The criminals are able to
especially since the number of online exploit vulnerabilities that occur
transactions and the e-commerce when website owners inadvertently
industry continue to evolve. Within misconfigure their Amazon Web
CNP fraud, fraud relating to the Server (AWS) S3 storage servers.
case study purchase of physical goods is at According to Farinelli, ‘[t]hese servers
the top of the list. Member States act as cloud-based “buckets” that
In May 2018, a regional unit in mention the purchase of (high- store important data — including
a Member State uncovered the value) electronic devices such as credit card numbers that are
criminal activities of an organised mobile phones, laptops and tablets collected by e-commerce websites.
group from Côte d’Ivoire and several times. Another Member State AWS S3 servers are secure when
Morocco specialising in the theft specifically notes how the modi their standard settings are used;
of credit card numbers for the operandi in this area of cybercrime however, many companies customize
purpose of distance selling fraud.
have not seen any major innovation these settings. If the customisation
The modus operandi set up by the
during the last year. While there is misconfigured, a security gap
scammers consisted of obtaining
has been no major shift in 2018, can occur48.’ This misconfiguration
credit card numbers (by phishing
according to private sector input, provides anyone with an AWS
victims or following purchases on
CNP is increasingly moving into account with the opportunity to not
the Darknet) as well as connection
identifiers to victims’ internet other sectors such as travel (hotels, only read the content of the ‘bucket’
boxes in order to schedule a call car rentals, etc.) postal services, but also develop new code — such
forwarding to the scammers. As a giftcards, etc. Fewer cases have as code to collect card data from an
result, calls from banks to confirm been reported to law enforcement e-commerce site.
purchases were forwarded directly since there is not yet the same level
to the criminals. Law enforcement of awareness as in, for instance, More interestingly, Magecart
recovered technological products e-commerce. attacks now target smaller vendors
purchased fraudulently. Intangible that supply functionality services
products (Western Union mandates The data required to execute CNP to large enterprise websites
and TransCash cards) were fraud generally seems to originate including analytics, browser
recovered in Morocco. from data compromise, including display requirements, social media,
PAYMENT FRAUD IOCTA 2019 37

marketing and chatbots. This means fingerprints contain all the necessary type of crime also facilitates other types
that when the code from one of information to enhance the possibility of illegal activity. Examples include the
these vendors is compromised, the of avoiding detection mechanisms facilitation of illegal immigration and
compromise affects all of the websites of companies, namely e-commerce. more specifically Trafficking in Human
that contract with the vendor49. This Criminals obtain the fingerprints as Beings (THB). Criminals do this through
also connects to the increasing threat real-time fingerprints or generated the purchase of plane tickets with
and growing concern with respect to when scratched by the bot from the compromised credit card credentials,
supply chain attacks (see Industry user’s device. booking hotels, rentals, etc. They do
insight in section 4.3). this through CNP fraud in combination
The platform provides a simple user- with forged identification documents.
The European Central Bank (ECB) also friendly interface which allows other
recognises the ‘ongoing shift of fraud criminals to set up a different digital One of our cases illustrates how CNP
from the card-present to the card not identity. This way it is much easier for fraud can underpin and facilitate other
present environment’. Data seems criminals to commit fraud compared to forms of illegal activity. In September
readily available. 23 million stolen purchasing compromised credit card 2018, with the support of Europol and
credit cards are for sale on the dark details or account details and risk the Frontex, two suspects were arrested
web in the first half of 201950. With detection of security measures. in a series of coordinated raids
all the data available and accessible across Germany and Sweden in an
for criminals, the focus ought to CNP fraud used to facilitate investigation targeting a Syrian OCG
be on monitoring and detection of other forms of crime suspected of cyber fraud. The arrestees
accounts as a means to curb the are believed to be the key organisers of
number of frauds and the amount Whereas we often discuss CNP fraud a cyber fraud gang.
of damage. From that perspective, purely from a financial perspective, this
the ECB notes how ‘the market has
started to develop a plethora of fraud
prevention and detection security tools
with the objective of bringing online
fraud rates down (e.g. implementation
of 3D Secure, risk-based analysis,
Tokenization)51’.

More detailed data to


circumvent detection

Simultaneously, criminals expand on


their existing repertoire of methods
as the prevention and security
measures of companies improve.
One relatively new development,
for example, is a crime-as-a-service
facility where criminals provide a
platform with available bots that
contain a victim’s real digital fingerprint,
cookies, saved passwords and other
personal information including bank
and payment information. These
38 IOCTA 2019 PAYMENT FRAUD

6.3 » SKIMMING
Skimming surfaced as both on the Darknet and via traditional
the second priority as websites. Several cases by the judicial
reported by investigators police have shown that this fraudulently
of payment card fraud acquired data is being reused in bank
within the Member States withdrawals, mainly in America and
throughout 2018. As one South-East Asia’. Other Member States
Member State describes, echo this conclusion. As long as EMV
The German Federal Criminal Police ‘the phenomena of credit card fraud compliance in those parts of the world
Office initiated operation Goldring continue to evolve with increasingly remains absent, skimming cards and
in October 2017. The intelligence- sophisticated skimming or shimming subsequently using the data remains
led operation uncovered an OCG, tools, often deployed by criminal groups profitable. The EPC confirms this when
composed of Syrian nationals, which from Central Europe or the Balkans, in it writes: ‘Concerning card payment
was involved in fraudulently purchasing real raids targeting the whole continent’. fraud, as long as the mag-stripe is
airline and train tickets. According Industry also confirms the lingering needed for international transactions,
to information from Germany, more threat of skimming. In general, the skimming will remain an issue53’.
than 493 fraudulent bookings were European Payment Council (EPC)
identified. The tech-savvy smugglers echoes law enforcement reporting
Deep insert skimmers
avoided detection by making the when it states how skimming remains
frequently used by criminals
bookings using compromised one of the most common frauds52.
corporate credit cards and credentials, The ongoing threat of skimming is
With respect to the modus operandi,
purchased online from other criminals the direct result of the fact that not all
several Member States describe how
offering them for sale. payment terminals and ATMs in Europe
suspects use deep insert skimmers in
contain the necessary anti-skimming
The private sector brought the order to copy the data stored on the
measures. This makes the copying of
fraudulent transactions to the attention magnetic stripe. This type of skimmer
magnetic-stripe track data at Point of
of law enforcement, highlighting is composed of metal or plastic. The
Sales terminals and ATMs possible
once again how instrumental public- criminal also installs a camera on the
and still a predominant type of fraud in
private partnerships are in fighting this ATM in order to steal the PIN. Other
Europe. Subsequent usage of a cloned
type of fraud. This effective working Member States specifically report on
magnetic-stripe payment card is hardly
relationship has been established over investigations pertaining to criminals
possible in the European area since
the course of recent years as a result who actually prepare and distribute the
the industry has secured cards with
of Europol’s Global Airport Action devices for skimming. Different OCGs
Europay, MasterCard and Visa (EMV)
Day, a recurrent operation bringing then use these devices to skim ATMs
chip technology. On a global level, the
together law enforcement, the airline both in and outside the EU. Software
situation is different especially with
industry and payment card companies skimming malware intercepts card
concern to countries that have yet
to target airline fraud. As part of this and PIN data at the ATM, allowing the
to introduce EMV compliance. As a
operation, Europol and Frontex have criminal to copy the data and later
result, this remains a major concern for
jointly identified significant crossovers create counterfeit cards for use at
European card issuers.
between payment card fraud and non-EMV compliant ATMs. Alternatively,
irregular migration and THB, leading Law enforcement provides the same criminals send the skimmed data with
to a number of arrests in recent years. perspective on the matter. As one the pin codes to other offenders to
The operational successes have respondent writes: ‘The European facilitate the unauthorised withdrawals
confirmed this trend. card data collected is then resold, from ATMs outside the EU.
PAYMENT FRAUD IOCTA 2019 39

6.4 » JACKPOTTING

Nowadays, jackpotting — also referred protected55. According to one law the screen from the ATM and a few
to as black-box attacks — to cash-out enforcement respondent, ‘attacks on technical operations in order to access
the ATM is the most widespread type of ATMs using the “jackpotting” technique also the connections of the server
logical ATM attack. Criminals perform have diversified and intensified’. The managing the cash registers. One
jackpotting in one of two ways. Either same Member State describes how in Member State reported three cases of
the criminal uses malware which sends 2018, its law enforcement unit recorded black box attacks in 2018, where the
commands to the dispenser, or uses 39 cases, including 27 attempts, mainly attacks involved melting a hole above
their own ‘black box’ hardware device in the capital region. The financial the monitor of the ATM and plugging a
connected directly to the dispenser, to losses from such attacks can vary USB cable into the ATMs printer cable.
cash-out the ATM and empty it of cash. between EUR 2 200 and EUR 128 800 Other Member States confirm this
These attacks can only be performed depending on the point of attack. Based modus operandi. Once criminals have
against certain ‘old’ ATMs which, due to on law enforcement intelligence, the gained physical access, they use, for
lower security standards, are vulnerable authors of the malware appear to come example, the Cutlet Maker software.
for these type of attacks. from Romania, Moldova and Russia. More recent cases involved criminals
The majority of reported jackpotting breaking the deposit slot plastic,
attacks have involved some physical opening the monitor and connecting
Jackpotting attacks appear to
access to the ATM. This is the main the ATM USB cable. Subsequent
be evolving
obstacle for criminals, since physical withdrawal of cash occurred through
access increases the risk of being usage of the software ATMdesk.
Compared to last year, jackpotting
caught.
attacks appear to be evolving. Some law enforcement respondents
Several Member States describe According to one Member State, the do indicate how in certain cases
how perpetrators have committed modus operandi of piercing the front of perpetrators get to the ATM without any
these attacks or at least attempted an ATM in order to connect a computer damage, using the original key to install
to do so. This may also be due to the seems to have disappeared. Criminals a laptop that connects to the USB
necessary equipment becoming more appear to have started using different output. The laptop is also connected to
available and accessible. WinPot and methods. The first method consists the internet via hotspot from a prepaid
Cutlet Maker are both available on of disconnecting the front of the ATM phone. The laptop is removed after
the dark web54. This seems to be an from its base in order to allow direct withdrawing money. Overall, the time of
unusual development, as ATM hackers access to the connections. The second the ATM attack is about 10 minutes.
have generally kept their work more method requires simply removing
40 IOCTA 2019 PAYMENT FRAUD

6.6 » FUTURE
THREATS AND
DEVELOPMENTS

The landscape of payment fraud


demonstrates the resilience of certain
criminal modi operandi. As a result, for
payment fraud, the past and present
are important indicators for what we
can anticipate in the future. As long as
CNP fraud as well as skimming remain
profitable, criminals shall carry out such
6.5 » BUSINESS EMAIL COMPROMISE modi operandi. For CNP fraud the added
problem is the role it plays in facilitating
other forms of criminal activity.
One of the most economically of legitimate email accounts, social
damaging attacks is business email engineering or intrusion techniques. With regard to jackpotting, some evolution
compromise (BEC). Several industry is evident. The accessibility and availability
partners highlight that perpetrators BEC exploits the way corporations
of jackpotting-related malware may make
aim more and more attacks at upper do business, taking advantage of
jackpotting a more accessible crime.
(C-level) level management, and that segregated corporate structures, and
Authors of the malware also look for ways
such attacks are becoming more internal gaps in payment verification
to reduce obstacles, better target their
professional and convincing. Such processes. Such attacks vary by the
efforts in order to steal more money in a
attacks were also a top priority for degree of technical tools used. Some
lesser amount of time57. Simultaneously,
European law enforcement. According attacks can only successfully employ
even if unsuccessful, jackpotting tries are
to the Internet Crime Complaint Centre, social engineering, while others deploy
still a problem as they cause considerable
between December 2016 and May technical measures such as malware
damage to the infrastructure. This makes
2018, there was a 136 % increase in and network intrusion. This variety in
it a particularly complex problem to tackle.
identified global exposed losses, and modi operandi also requires a variety in
more than USD 12 billion in losses response. At the low-tech end, where In the previous IOCTA, we reflected on
since October 201356. social engineering reigns, awareness the potential for instant payments to
and training for staff are key. BEC complicate fraud prevention and especially
While BEC is not a new phenomenon, was part of the broader cyber scams mitigation. Since 2017, a number of
criminals are finding new modi operandi campaign organised by EC3 as part instant payment schemes have been
to take advantage of this technique. of the cybersecurity month in 2018. launched; most recently, the ECB launched
The main or original techniques used Yet, even though creating awareness the TARGET instant payment settlement
by criminals are the use of social among employees can assist in service in November 2018. Such
engineering strategies to impersonate detection of social engineering attacks schemes allow the settling of electronic
a company staff member, usually as a means for criminals to engage in payments between European banks
a CEO or other staff member who BEC, more high-tech methods such as (almost) instantly. While these provide
can authorise transfers, and deceive malware and network intrusion require clear benefits to the financial sector and
employees and executives within a different type of response. Those commerce, they can also inadvertently
the company. The target companies enterprises without the resources expedite various frauds. Such transactions
are usually firms with frequent wire to enact such measures, such as not only provide money launderers with
transfers or with foreign suppliers. many server message blocks, remain better option for money mule accounts,
However, the attacks take place through particularly at risk. but also make it harder for the financial
different methods: the compromise sector to block suspect transactions.
CEO/BUSINESS EMAIL COMPROMISE (BEC) FRAUD
CEO/BEC fraud occurs when an employee authorised to make payments is tricked into
paying a fake invoice or making an unauthorised transfer out of the business account.

A fraudster calls or
emails posing as a Often, the request is
high ranking figure for international
within the company payments to banks
(e.g. CEO or CFO). outside Europe.

The employee
They have good
knowledge about HOW DOES transfers funds to an
account controlled
the organisation.
IT WORK? by the fraudster.

They require an
urgent payment. Instructions on how
to proceed may be
given later, by a third
person or via email.

They refer to a sensitive


situation (e.g tax control,
merger, acquisition).
The employee is
requested not to
follow the regular
authorisation
They use language such as: procedures.
‘Confidentiality’, ‘The
company trusts you’, ‘I am
currently unavailable’.

WHAT ARE THE SIGNS?


Unsolicited email/phone call Unusual request in contradiction with
Request for absolute confidentiality
internal procedures

Direct contact from a senior Pressure and a sense of urgency Threats or unusual flattery/promises
official you are normally not in of reward
contact with

WHAT CAN YOU DO?

AS A COMPANY AS AN EMPLOYEE

Be aware of the risks and ensure that employees are Strictly apply the security procedures in place for
informed and aware too. payments and procurement. Do not skip any steps and do
not give in to pressure.
Encourage your staff to approach payment requests
with caution. Always carefully check email addresses when dealing with
sensitive information/money transfers.
Implement internal protocols concerning payments.
In case of doubt on a transfer order, consult a competent
colleague.
Implement a procedure to verify the legitimacy of payment
requests received by email.
Never open suspicious links or attachments received by
email. Be particularly careful when checking your private
Establish reporting routines for managing fraud. email on the company’s computers.

Review information posted on your company website, restrict Restrict information and show caution with regard to
information and show caution with regard to social media. social media.

Upgrade and update technical security. Avoid sharing information on the company’s hierarchy,
security or procedures.

! Always contact the police in case of fraud


attempts, even if you did not fall victim to
the scam. ! If you receive a suspicious email or call,
always inform your IT department.
42 IOCTA 2019 PAYMENT FRAUD

Alongside instant payments, developments with respect to and technology-neutral legal framework is in place. It will help
the Directive (EU) 2015/2366 of the European Parliament and eliminate existing challenges to investigation and prosecution
of the Council58 (known as the Payment Services Directive of fraud and is expected to make a very positive impact
2, PSD 2) are also ongoing. The implementation deadline in the fight against NCPF. A particular focus of the NCPF
of the Directive has passed however on 14 September Directive is on improving cooperation on cross-border fraud
2019, financial service providers (from banks to Fintechs) cases. Such cooperation requires a fertile environment which
must adhere to certain security requirements with respect facilitates parties to engage in information exchange. Most
to strong customer authentication. The European Banking often, criminals attack the financial sector as a whole rather
Authority (EBA) has indicated that if needed providers can than a specific institution. As such, information exchange of
receive an extension. The EBA has a crucial role in the new modi operandi or ongoing criminal campaigns require
establishment of the security standards with respect to PSD information exchange between private parties as well as
2. As the EBA notes in its opinion, ‘[o]ne of the fundamental between public and private parties.
changes introduced by PSD 2 is to formalise payment
security requirements in national law. One such requirement
is for PSPs to apply SCA to electronic transactions59’. In
principle, if implemented, the SCA should enhance security;
6.7 » RECOMMENDATIONS
yet, the ability to file for an extension could in theory make
certain providers more vulnerable to attacks in case criminals Cooperation between the public and the private sector as well
discover SCA is not yet in place by the deadline. as within the sectors is crucial to come to fruitful results. To
this point, speedy and more direct access to and exchange of
Other developments around the same date are relevant for
information from the private sector is essential for Europol as
the criminal landscape. As we reported last year, one of the
well as its partners.
central issues arising out of open banking revolves around
the concept of screen scraping. Screen scraping allows Organisations must ensure they train their employees as well
third-party providers to access customers’ interfaces and as make their customers aware of how they can detect social
collect relevant data to gain access to a bank account. While engineering and other scams.
aimed at improving consumer experience, screen scraping
is susceptible to man-in-the-middle attacks and other forms
of fraud. Given the number of security-related concerns, the
European Commission has decided to ban screen scraping
from September 2019 as part of the regulatory technical
standards of PSD 2. If this goes through, it would be a
positive development as it eliminates a criminal opportunity.
Despite this, the overall open banking development remains
one to monitor from a threat perspective and makes proper
and timely implementation of SCA all the more important to
manage fraud. As Fortuna notes, ‘[w]ith Open Banking, data
will increasingly be passing through a client (a customer) to
an open interface, becoming extremely vulnerable to attacks
as there is no way to control the customer’s device, whether
that be a mobile phone or a web browser. By facilitating
access to customer data, third-party providers also become
targets for client-side attacks60’.

On a final note, the current legislative situation with respect to


non-cash means of payment fraud is unsatisfactory to both
private industry and law enforcement. However, Directive
(EU) 2019/713 on combating fraud and counterfeiting of non-
cash means of payment61 (known as the non-cash-payment
fraud (NCPF) Directive) — which Member States have two
years to implement — will help in ensuring that a clear, robust,
#7 the criminal
abuse of the
dark web

7.1 » KEY FINDINGS

•• The dark web remains the •• There are increases in single-


key online enabler for trade vendor shops and smaller
in an extensive range of fragmented markets on Tor,
criminal products and services including those catering for
and a priority threat for law specific languages. Some OCGs
enforcement. are also fragmenting their
business over a range of online
•• Recent coordinated law
monikers and marketplaces,
enforcement activities,
therefore presenting further
combined with extensive
challenges for law enforcement.
DDoS attacks, have generated
distrust in the Tor environment. •• Encrypted communication
While there is evidence applications enhance single-
administrators are now vendor trade on the dark
exploring alternatives, it seems web, helping direct users to
the user-friendliness, existing services and enabling closed
market variety and communications. Although
customer-base on Tor, there is no evidence of a full
makes a full migration to new business migration, there is a
platforms unlikely just yet. risk the group functions could
become increasingly used to
support illicit trade.
44 IOCTA 2019 THE CRIMINAL ABUSE OF THE DARK WEB

Often used interchangeably are the received millions of euros in kickbacks


terms Darknet and dark web. For the for referrals to dark web marketplaces
purpose of this report, the Darknet selling fentanyl, heroin and other illegal
is the encrypted part of the internet goods.
accessed using specific software that
in themselves are not criminal, such The coordinated law enforcement
as the Tor browser. The dark web efforts, together with continued DDoS
is the many criminal websites and attacks, have had a significant impact
services hosted on these networks. on the dark web in terms of generating
distrust and, at the time of writing, the
Investigator feedback across all the environment remains in a state of flux.
crime areas in this report highlighted The emergence of new multi-vendor
the dark web as a priority threat top markets is apparent, however, as case study
area. These reports related almost are increased exit scams, including
exclusively to the sale of criminal some of those initially appearing to In May 2019, two prolific dark
products and services, including dominate. The apparent re-emergence web marketplaces, the Wall Street
drugs, weapons and explosives, of the Dream Market, which claims Market and Valhalla (also known
compromised data and credit to have re-opened in July 2019 as as Silkkitie), were taken down in
cards, malware, counterfeit goods Samsara Market has also taken place. simultaneous global operations by
and currency and fake documents. EU law enforcement.
This highlights the extent to which Evolution of online trade After the takedown of the three
this threat facilitates a range of continues largest markets in 2017, Wall Street
criminality62.
was one of the largest remaining
Dark web reports almost exclusively illegal online markets. At the time
Highlighted each year is the
refer to use of the Tor platform, of its closure, it had over 1 150
volatility of the dark web ecosystem.
although there is evidence of 000 users and 5 400 vendors. The
This continues to be the case,
criminality on most similar privacy- German Federal Criminal Police
intensified by effective coordinated
orientated software i.e., Tor, I2P, Office, supported by the Dutch
law enforcement activity in early
Zeronet, Freenet, Openbazaar, etc. In National Police, Europol, Eurojust,
2019. Authorities undertook global
previous reports, the suggestion was and a number of US government
action against vendors in February, agencies, arrested three suspects
the succession of law enforcement
and Dream Market, arguably the in Germany. Police officers seized
takedowns and other security issues
largest market at that time, shut over EUR 550 000 in cash, as well
would push the dark web sites and
down voluntarily, after this. This as cryptocurrencies Bitcoin and
services to these other platforms. The
was supposedly in response to a Monero in six-digit amounts. Two of
Libertas Market did briefly switch to
prolonged and persistent DDoS the markets highest-selling suppli-
solely operating on I2P following the
attack as discussed earlier in section ers of narcotics were also arrested
recent law enforcement activities, only
4.4. Soon after law enforcement in the USA.
to cease operating shortly after due
announced the shutdown of two of
to a low customer base. There are no Finnish Customs seized the Valhal-
the remaining top dark web markets,
other examples of this type of move, la marketplace server and its con-
Wall Street Market and Valhalla,
therefore, while the risk of alternatives tents in close cooperation with the
followed by Bestmixer, the mixing and
remains, it seems the user-friendliness, French National Police and Europol.
tumbling service hosted in part on
existing market variety and customer- As a result of the operation Finnish
the dark web (see section 9.7). Lastly,
base on Tor, makes a full migration Customs also made a significant
law enforcement shut down the
from customers or markets to new Bitcoin seizure. Valhalla was one of
online dark web information resource the oldest and internationally best-
platforms unlikely just yet.
DeepDotWeb after its administrators known Tor trade sites.
THE CRIMINAL ABUSE OF THE DARK WEB IOCTA 2019 45

However, for this market growth has and keeps them under the radar of law
been slow due to continued suspicion enforcement, compared to the attention
over law enforcement involvement. they might receive operating as a
Finally, some markets have changed single multi-commodity vendor with
their policies to prohibit the sale of a higher customer base. This creates
fentanyl and weapons and explosives further challenges for law enforcement,
in an attempt to avoid law enforcement as in addition to the usual attribution
attention, albeit the sale of these issues associated with dark web
commodities continues under different investigations, investigators must also
guises and on other sites. make these connections on order to
determine the true scope and scale of
Instead, criminals are exploring an OCG.
alternative means of circumventing
law enforcement within the Tor In addition to circumventing law
environment. In last year’s report, the enforcement, criminal developers are
suggestion was the closure of larger also motivated by the need to increase
marketplaces would result in a growth trust with their customer-base on Tor,
in the number of single-vendor shops both in terms of anonymity but also
and smaller fragmented markets. by reducing the risk of exit scams. An
case study This forecast is indeed true with example of such a market is Black
confirmed increases in single-vendor Dog, scheduled for launch in August
In mid-2018, German authorities shops operating on independent 2019. It claims to be the ‘first ever
identified a Darknet market vendor .onion sites and smaller markets, truly decentralised crypto market’ and
selling various narcotic drugs, coun- including those catering for specific depends on the Ethereum blockchain to
terfeit currency and counterfeiting facilitate transactions, without the need
languages. However, not anticipated
equipment. The vendor had been
last year was the emergence of multi- for a traditional marketplace GUI as
active for over two years on multiple
identity business models, where OCGs found on Tor markets. The market also
marketplaces and was suspected to
maintain multiple profiles online, on utilises the smart contracts component
be living in Germany.
multiple platforms, in order to operate of the Ethereum blockchain to allow
Officers trained in cryptocurrency as multiple distinct individuals rather credible transactions without the need
investigation were able to identify than a single entity. By fragmenting for a third party. As with alternative
the vendor as a 35-year-old German their business over a range of online platforms, it is unclear how, and to what
national and affect an arrest. The monikers on marketplaces and extent, cybercriminals will adopted this
suspect had made over EUR 700 000 disparate vendor shops, it reduces the type of market model, again taking into
over the two years he was active. perception of the scale of the OCG, account the effects of AMLD 5.
46 IOCTA 2019 THE CRIMINAL ABUSE OF THE DARK WEB

Separate to Darknet platforms, to services and enabling closed security for their customers, i.e. there
predicted last year was that some communications, there does not appear is no escrow or similar services. They
vendors might migrate their business to be a full business migration. There can also be less technically challenging
to encrypted communications have been some instances where group than a Tor-based site to take down, as
applications, running their shops within functions have supported functional they sometimes only require an abuse
private channels/groups and even marketplaces with perpetrators notification sent to the provider, who,
the encrypted messaging platforms selling different criminal commodities, if they respond to such requests (not
evolving into functional marketplaces. much like the different sub-forums always the case), can ban or delete
Although there does appear to on a typical online forum. However, the group. It is therefore unclear how
be an increased use of encrypted these markets, although simple to and to what extent cybercriminals may
communications applications to set up (as the platform provides the adopt this market approach, and much
enhance the single-vendor trade on infrastructure) and easy to revive if of which depends on law enforcement
the dark web, helping direct users taken down, offer little in the way of relationships with industry partners in

this sector and the ability to locate


and effectively take them offline once 7.2 » RECOMMENDATIONS
identified.

The currency of the dark web More coordinated investigation and An EU-wide framework is required
enterprises remains virtual and an prevention actions targeting the to enable judicial authorities to take
estimated USD 1 billion has been dark web as a whole are required, the first steps to attribute a case to a
spent on the dark web this year demonstrating the ability of law country where no initial link is apparent
alone63. Bitcoin remains the most enforcement and deterring those due to anonymity issues, thereby
frequently used currency, believed to who are using it for illicit activity. preventing any country from assuming
be a consequence of familiarity within An improved real-time information jurisdiction initiating an investigation.
the customer base (see also section position must be maintained to enable
law enforcement efforts to tackle the Improved coordination and
9.4). However, there has been a more
dark web. The capability will enable standardisation of undercover online
pronounced shift towards more
the identification, categorisation and investigations are required to de-
privacy-orientated currencies, a trend
analysis through advanced techniques conflict dark web investigations and
that it is anticipated will continue as
including machine learning and artificial address the disparity in capabilities
criminal users become more security
intelligence. across the EU.
aware.
#8
the
convergence
of cyber and
terrorism

8.1 » KEY FINDINGS

•• The wide array of OSPs •• With sufficient planning and


exploited by terrorist groups support from sympathetic
presents a significant challenge online communities, terrorist
to disruption efforts. attacks can rapidly turn
viral, before OSPs and law
•• Terrorist groups are often early
enforcement can respond.
adopters of new technologies,
exploiting emerging platforms
for their online communication
and distribution strategies.
48 IOCTA 2019 THE CRIMINAL ABUSE OF THE DARK WEB

8.2 » THE USE OF THE INTERNET BY


TERRORIST GROUPS

The loss of the Islamic State’s (IS) Terrorist groups boast a diversified online infrastructure for the
territorial control into core areas of diversified online infrastructure dissemination of its propaganda and
Iraq and Syria denied the group one of persists in publishing on a wide array of
its most potent propaganda assets. Terrorist groups continue to expand media and file-sharing sites, especially
IS’ online capabilities in 2018 reflect and diversify their conduits for the smaller platforms with reduced capacity
the overall collapse of the physical dissemination of their propaganda for disruptive actions64.
caliphate, previously the central pillar online. In doing so, they exploit a wide Similarly, the spread of terrorist content
of its project. However, this collapse array of OSPs, which are spread across linked to the Christchurch attack
combined with the group’s battlefield multiple jurisdictions and differ greatly in involved the concurrent exploitation
attrition did not stop the group’s terms of size, services offered, business of multiple kinds of OSPs by different
online sympathisers from exploiting models, and abuse policies. While communities of Internet users, spurred
the internet to advance their cause. certain platforms are more abused by different motives but a common
than others, the sheer number of OSPs purpose: making this type of terrorist
In parallel, the 15 March 2019 right- exploited for terrorist purposes presents content viral and resilient.
wing extremism (RWE) motivated a challenge for disruption efforts.
terrorist attack on two mosques These include forums, file-sharing sites,
in Christchurch, New Zealand, has pastebins, video streaming/sharing
IS propagandists strive to
brought about unprecedented sites, URL shortening services, blogs,
remain relevant online
elements in the exploitation of the messaging/broadcast applications,
IS’ critical situation in 2018 had
internet for terrorist purposes. The news websites, live streaming platforms,
a significant impact on its digital
attack’s recorded livestreaming video social media sites and various services
capabilities: propaganda produced
and the gunman’s manifesto rapidly supporting the creation and hosting
by official IS media outlets has visibly
went viral and gained digital depth, of websites (including registries* and
declined65. The only publication that
highlighting new challenges in the registrars**). The ongoing abuse of
continued to be issued on a regular
fight against terrorist content online. legitimate services by terrorist groups
basis throughout 2018 was the group’s
extends also to VPNs, anonymised
official Arabic weekly newsletter al-Naba’
cryptocurrencies and DDoS mitigation
(The News). In their quest for virtual
services.
survival, IS and its supporters responded
to frequent deletions of content in 2018
Faced with the loss of its state-building
by promoting ways to enhance online
project and increasingly hostile attitudes
resilience. Pro-IS media outlets, including
towards its online propaganda machine,
the al-Saqri Corporation for Military
IS continues to reconfigure its tactics
Sciences, Horizons Electronic Foundation
to remain relevant online. In spite of
and the United Cyber Caliphate became
intensified takedown campaigns in
more prolific in providing guidelines
2018 by law enforcement and social
on cyber and operational security. The
media platforms — including Telegram
instructions ranged from suggesting
— the group still boasts a highly

* A registry is an organisation that manages the administrative data for the TLD domains and subdomains under its
authority, including the zone files that contain the addresses of the name servers for each domain. Source: Google
Domains Help, “About registrars and registries”, https://support.google.com/domains/answer/3251189?hl=en, 2019.

** A registrar is an organisation that manages the registration of domain names for one or more top-level domain
(TLD) registries. Source: Google Domains Help, “About registrars and registries”, https://support.google.com/domains/
answer/3251189?hl=en, 2019.
THE CONVERGENCE OF CYBER AND TERRORISM IOCTA 2019 49

secure browsers and privacy-oriented of open source, decentralised was livestreamed and its recording,
applications to promoting the use of platforms. Accounts and pages alongside the gunman’s manifesto,
the Tor browser and decentralised disseminating mostly official IS spread rapidly online. The exceptional
platforms. These unofficial but propaganda have been created on virality, velocity and volume of the
increasingly specialised media Mastodon, Nextcloud, Rocket.Chat materials’ online diffusion points to
outlets also provided advice on how and ZeroNet. The resilient character a savvy use of internet technologies
to circumvent account suspension, of these platforms, coupled with and communication, not only by the
with suggestions including using multiple options for anonymity and attacker, but by multiple communities
channel names and profile pictures enhanced usability, are all features that of internet users, beyond RWE
that cannot be associated with IS. play into the online communication sympathisers.
Additionally, IS sympathisers created and distribution strategies of terrorist
multiple versions of the same account, groups. The interplay of online communities
allowing them to swiftly rebound from who share the same Internet slang and
account suspensions. IS-affiliated However, jihadist activities on these memes contributed to the widespread
websites that act as repositories for the platforms failed to gain traction in dissemination of the content and its
organisation’s propaganda responded 2018. This is probably due to the digital endurance.
to recurrent suspensions by creating alternative platforms’ smaller user
new domain names and re-emerging base and weaker outreach capabilities. Internet users have adopted different
at new locations from backup copies, Thus, Telegram remains the platform of techniques to circumvent disruption
including from and to the dark web. choice for terrorist sympathisers, who efforts by OSPs. In particular, edited
Yet despite its advantageous features continue to exploit its advantageous versions of the Christchurch video
in terms of privacy and resilience, encryption and file-sharing capabilities. appeared to fly under the radar of
the exploitation of the dark web for detection measures enforced by OSPs.
propaganda dissemination purposes Terror goes viral with Reponses by practitioners and OSPs
remained limited and propagandists Christchurch mosques attack could not measure up to the scale
continued to prefer the visibility and of online dissemination and with the
The Christchurch attack marks a existing cooperation frameworks
reach afforded by the surface web.
defining point in the fight against keeping terrorist content at bay
IS continue to seek out terrorist content online: the attack remains challenging.
new vectors for their online
propaganda

Terrorist groups continue to lay claim 8.3 » RECOMMENDATIONS


to a degree of technological
adaptability and are often early
adopters of new technologies. A case Limiting the ability of terrorists to carry Cross-platform collaboration and a
in point is IS’ seemingly coordinated out transnational attacks by disrupting multi-stakeholder crisis response
and near-synchronous shift to open their flow of propaganda and attributing protocol on terrorist content
source, decentralised platforms***. online terrorism-related offences online would be essential to crisis
In the aftermath of an intense requires continued and heightened management the aftermath of a
suspension campaign carried out by counterterrorism cooperation and terrorist attack.
Telegram in late 2018, IS supporters information sharing across law
on Telegram started advocating enforcement authorities, as well as with A better understanding of new and
for the use of alternative platforms the private sector. emerging technologies is a priority for
and software. Since then, the IS has practitioners. Upcoming policy debates
established a presence on a number Any effective measure to counter and legislative developments should
terrorist groups’ online propaganda take into account the features of these
and recruitment operations entails technologies in order to devise an
addressing the whole range of abused effective strategy to prevent further
*** Decentralised systems are a particular type of
distributed system where no single entity is in control of
OSPs, especially start-ups and smaller abuse.
the underlying infrastructure. Source: Blockstack PBC, platforms with limited capacity for
Blockstack Technical Whitepaper v2.0, 2019. response.
#9
cross-
cutting
crime
factors

Cross-cutting crime factors are those which


impact, facilitate or otherwise contribute
to multiple crime areas but are not
necessarily inherently criminal themselves.
CROSS-CUTTING CRIME FACTORS IOCTA 2019 51

9.1 » KEY FINDINGS

•• Phishing remains an •• While cryptocurrencies


important tool in the arsenal continue to facilitate
of cybercriminals for both cybercrime, hackers and
cyber-dependent crime and fraudsters now routinely
NCPF. target crypto-assets and
enterprises.

criminal case study

GDPR entered into effect across


the EU in May 2018 (see also
section 4.3). Prior to this, many 9.2 » SOCIAL ENGINEERING
companies sent out emails to
their customers, detailing privacy
Social engineering, and in particular Attackers can create a pretext either
policies and the rights of their
customers concerning their data. phishing, overwhelmingly represented based on genuine data found on the
It was not long before criminals the most significant cross-cutting internet from a previous data breach,
exploited these legitimate cyber-threat faced by both European or a purely fictitious scenario to extort
messages with a wave of copycat cybercrime investigators, and the money from a victim. Such extortions
phishing emails. These malicious most significant cyber-threat overall are often of a sexual nature.
emails would typically contain by Europol’s private sector partners.
links to fake sites that would then While the financial sector is, and
capture victims’ data to be used or always will be, a significant target
Phishing — a core attack for such attacks, industry reporting
sold by the cybercriminals.
method for all cybercrime
indicates that most phishing attacks
are currently targeting Software-as-
Both investigators of cyber-
as-Service such as cloud services,
dependent crime and NCPF
case study highlighted phishing as a key threat.
and webmail66.

In cases related to NCPF, perpetrators


In March 2019, the Spanish Civil Even though phishing remains an
primarily used phishing to gather
Guard, as part of operation Neptuno, ongoing challenge, certain solutions
personal banking credentials,
dismantled a criminal organisation or mitigating measures do exist. Do-
payment card data, or other login
dedicated to scamming victims main-based message authentication,
credentials. Criminals either sell such
through phishing. The investigation reporting and conformance (DMARC)
originated in September 2018, when data on underground markets, or use
is one such option, which has been
an increase in complaints related to it directly to commit fraud.
introduced years ago. DMARC is
banking scams were detected, whose In cases related to cyber-dependent an email authentication, policy, and
common link was the withdrawal of crime, criminals also use phishing reporting protocol. DMARC makes it
money from the bank accounts of the to gain login credentials. However, easier for email senders and receivers
victims. The perpetrators sent out as highlighted in section 4.2, it to determine whether or not a given
phishing emails pretending to be one is also currently the dominant message is legitimately from the
of six banks.
malware delivery method, through sender and what to do if it is not. This
either malicious attachments, or makes it easier to identify spam and
The operation has resulted in 11
people arrested, aged between 17
links to malicious URLs. Either may phishing messages and keep them
and 28 years of age. In addition, ultimately lead to attackers gaining out inboxes. Yet, according to one
police seized several laptops, more unauthorised access to a private study, DMARC adoption is non-exis-
than 20 mobile phones, EUR 7 500 in network. tent at 80 % of organisations67. This
cash, notes with identity documents is a missed opportunity as the United
and access codes to online banking, Some law enforcement respondents
Kingdom National Cyber Security
virtual currencies (bitcoin) and note how criminals use some
Centre (UK NCSC) demonstrates
bankcards. phishing attacks for extortion.
52 IOCTA 2019 CROSS-CUTTING CRIME FACTORS

of targeted attack groups 32 % breaches


used spear phishing as the involve phishing 73
primary infection vector 70

1 in 3 207 emails are


48 % of phishing emails 74
malicious email
attachments are
office files 71

phishing was
present in 78 %
up to 0.55 % of all incoming of cyber espionage
emails were phishing emails 72
incidents 75

9.3 » MONEY MULES

Money mule activity continues case study


to support all aspects of
cybercrime In 2018, over the course of three
months, law enforcement and
how it has achieved recent success by The use of money mules to launder private sector partners from over
using ‘Synthetic DMARC.’ This ‘works criminal funds was the second most 30 countries participated in the
by assigning a DMARC record for all prominent cross-cutting threat highlighted fourth European Money Mule Action
domains attempting to pass-off as gov. by European law enforcement. Again, this (EMMA). Europol, Eurojust, the EBF
uk domains, by analysing and vetting pertained to both cyber-dependent crime and more than 300 banks supported
non-existing subdomains against DNS and NCPF investigations, although the the initiative.
records and building on authentication majority of references related to the latter.
The action resulted in the
systems of the past68.’ Because of the
While this was a top threat, law identification of over 1 500 money
technology, the UK NCSC has been
enforcement did not identify new modi mules and 140 money mule
able to stop 140 000 separate phishing
operandi this year. Instead, they confirmed organisers, and over 168 arrests.
attacks in the last year and has taken
the use of typical recruitment methods Financial sector participants
down a record 18 067 phishing sites.
reported 26 376 fraudulent money
This is a noticeable improvement such as job advertisements targeting
mule transactions, preventing an
when compared to the takedown rate disadvantaged or low-income individuals.
estimated loss of over EUR 36
of 14 124 in 201869. The technology In some instances, perpetrators recruited
million.
comes with its challenges, namely from mules with a stronger financial standing,
an interoperability perspective, but still allowing them to open corporate The campaign also raised awareness
provides promising results for those accounts through which the funnelling of the dangers of becoming a money
able to implement it. of international funds may attract less mule throughout the participating
attention. nations.
54 IOCTA 2019 CROSS-CUTTING CRIME FACTORS

9.4 » THE CRIMINAL ABUSE


OF CRYPTOCURRENCIES

In previous years’ reports, we have to incorporate cryptocurrencies. As


extensively highlighted the criminal such, we now routinely see malware
abuse of cryptocurrencies across all and phishing targeting crypto-investors
areas of cyber-related criminality due and enterprises, and new frauds,
to the perceived level of anonymity such as investments frauds related
they provide. This trend persists as to cryptocurrency investment. Such
investigators of cyber-dependent crime approaches may be more successful
and NCPF report that these currencies due to the lower levels of knowledge
continue to pose investigative potential victims are likely to have about
challenges for law enforcement. Crypto these assets.
case study investigations are now a core part of
daily business for law enforcement. As Cryptojacking remains an
In June 2019, six offenders a result, investigators require training to issue, but not a priority
were arrested in the UK and the ensure they have the appropriate skills
Netherlands after a 14-month Cryptojacking remains an issue.
to handle such investigations.
investigation into phishing activities The activity appears to have peaked
that netted the perpetrators over Predominantly, such currencies play in 2018 and decreased throughout
EUR 24 million in cryptocurrencies. an essential role in the underground 2019, partially due to the shut down
The phishing relied on economy. They are used for most of Coinhive, the most popular mining
typosquatting, where a large number criminal to criminal (C2C) payments script, in March. The most suitable
of websites belonging to well- cryptocurrencies were those that are
on criminal forums and marketplaces.
established cryptocurrency wallets memory intensive, meaning that they
In addition to C2C payments, many
and exchanges were recreated by
attackers demand payment from are suitable for CPU or GPU mining,
criminals with the sole purpose
victims for attacks such as ransomware and that are difficult to trace; Monero
of stealing users’ credentials and
or DDoS extortion by cryptocurrencies. ticked both boxes, as such it was the
funds.
Such criminally obtained funds, while first choice for this type of abuse.
While phishing is commonplace already inherently challenging to trace, Although these incidents affect many,
across both traditional financial as are often further laundered through the damage per victim is typically low
well as cryptocurrency sector, what mixing services, which serve to and thus such abuse is rarely reported
makes this operation unique was obfuscate the financial trail. (see also 4.7).
the scale — over 4 000 victims had
their funds stolen with the numbers While we have previously reported
continuing to grow.
Crypto-assets now routinely a small shift towards more privacy-
targeted by fraudsters focused cryptocurrencies such
The operation was another as Monero, Bitcoin still remains
demonstration of exemplary The most apparent development
the currency of choice for both
cooperation between law with regards to cryptocurrencies, first
legitimate and criminal use. The main
enforcement and the private highlighted in last year’s report, is that
developments regarding this trend
sectors, particularly security attacks and frauds which historically
are on the Darknet markets, several of
researchers and cryptocurrency targeted other payment systems or
which also accept Monero, or in some
exchanges. fiat currencies have now been adapted
cases exclusively trade in it.
CROSS-CUTTING CRIME FACTORS IOCTA 2019 55

Global uptakes of digital currencies, combined with proliferation


of AI-based applications, are gradually becoming the main means of
exchanging goods and services. The key challenge for law enforcement
agencies and other stakeholders such as national/international
authorities and financial services are to protect public and economy
against full spectrum of criminal acts using artificial intelligence
and digital currencies (e.g. cyber-enabled fraud, misuse of personal
data, money laundering, serious and organised crime to CSE).

― PROFESSOR BABAK AKHGAR, DIRECTOR OF CENTRIC, UK

As technology continues to become more complex and distributed systems


even more intertwined fewer people understand the dependencies and
interaction patterns. One particularity interesting form of distributed
systems are cryptocurrencies and smart contracts. They are based on
assumptions some of which are still poorly understood. There is a risk
in wide-spread adoption because attacks have huge immediate financial
implications; correctly working financial incentives are, however, a
basic building block of public blockchains. Attacks can be executed
globally at unprecedented speeds and difficult to fix.

― DR EDGAR WEIPPL, SBA RESEARCH, AUSTRIA


56 IOCTA 2019 CROSS-CUTTING CRIME FACTORS

9.5 » COMMON CHALLENGES FOR


LAW ENFORCEMENT

Much of the IOCTA is focused on the in 2018 has deprived law enforcement
threat posed by criminal actors and their of a number of key sources of data,
modi operandi. At the same time, it is namely communications data and
crucial to reflect on how law enforcement WHOIS data. In contrast, the wide-scale
can and does respond to these threats, implementation of carrier-grade network
and what barriers the law enforcement address translation technologies by
and judicial community encounter in internet service providers results in often
responding. In June 2019, Europol prohibitively large volumes of data (as
and Eurojust revisited their joint 2017 one IPv4 address may be shared by
paper on the Common Challenges in multiple end-users at one).
Combatting Cybercrime with a fresh look
at how these challenges developed over In last year’s report, we highlighted
the preceding two years. Many of these the impact of WHOIS ‘going dark’,
challenges are not unique to cybercrime particularly in the scope of cyber
and cut across all areas of serious investigations. In September 2018,
organised crime and terrorism. ICANN published the draft results of a
survey that directly measured the impact
These challenges are extremely relevant of the unavailability of WHOIS data.
to this assessment and therefore we will Almost 26 % of respondents indicated
summarise some of the most pertinent that it had resulted in investigations
issues. For full details, including ongoing being discontinued, with a further 52 %
activities and open issues, readers indicating that it delayed investigations
should refer to the full report76. to some degree. Moreover, only 33 % of
respondents indicated that WHOIS (at
The key challenges remain unchanged least partially) met their investigative
and fall into five main areas of needs, compared to 98 % prior to the
discussion. changes77.

The loss of data Encryption, while recognised as an


essential element of our digitised
This refers to several legislative changes society, also facilitates significant
and technologies that effectively either opportunities for criminals. Investigative
deny law enforcement access to data or techniques, such as lawful interception,
have resulted in there being limited or no are becoming increasingly ineffective
data for law enforcement to access for (or even impossible) as criminals
a criminal investigation. The overturning exploit encrypted communication
of the Data Retention Directive in 2014 services, applications and devices.
and the implementation of the GDPR Similarly, criminals can deny forensic
CROSS-CUTTING CRIME FACTORS IOCTA 2019 57

investigators access to critical evidence international instruments continue large-scale cyber-attacks, particularly
by encrypting their data. The criminal to be a serious impediment to the where such attacks rapidly affect
abuse of encryption technologies, international criminal investigation multiple industries across a range of
whether it be anonymisation via VPNs and prosecution of cybercrime. sectors and geographies, such as the
or Tor, encrypted communications or The main differences relate to the WannaCry and NotPetya attacks of
the obfuscation of digital evidence criminalisation of conduct and 2017. Such attacks constitute a specific
(especially in cases of CSEM), was provisions to investigate cybercrime challenge to international cooperation.
a significant threat highlighted by and gather e-evidence. For example,
respondents to this year’s IOCTA should legislation that regulates law Challenges of public-private
survey. enforcement presence and action in partnerships
an online environment be harmonised
Cryptocurrencies are another The private sector plays a key role
at EU level, this would allow for more
application of encryption technology, in many cyber investigations and
effective joint operational actions
and, as outlined in 13.4, also present cybersecurity activity, being the
such as large-scale botnet takedowns,
significant challenges for law custodians of crucial data, having
or increased possibilities to monitor
enforcement78. essential capabilities in the takedown
criminal activities online and to lawfully
of criminal infrastructures and
collect critical evidence on the Deep
The loss of location Web and Dark Web.
removal of illicit content. Public-private
partnerships also play a key role in
The increasing level of criminal use of mitigating cybercrime and increasing
encryption and/or anonymisation tools, Obstacles to international cybersecurity through prevention and
crypto-currencies and the Dark Web, cooperation awareness. There is, however, little
as well as the growing use of cloud- consensus on the legal framework
based technologies, have also led to The lack of a common legal framework that is required to facilitate effective
situations in which law enforcement which exists for the expedited sharing and trust-based cooperation with the
may no longer (reasonably) establish of evidence continues to hamper private sector, while at the same time
the physical location of perpetrators, criminal investigations and judicial regulating legal and transparency
criminal infrastructure or electronic proceedings, with the current process issues surrounding that cooperation.
evidence. The territoriality-based of Mutual Legal Assistance being
investigative powers and jurisdiction of perceived as too slow to gather and This challenge also includes those
the competent national authorities offer share electronic evidence effectively. associated with new and emerging
no appropriate tools to tackle these The use of the European Investigation technologies. The criminal misuse of
situations. Order (EIO) may go some way towards technology has become an engine of
addressing these issues for the cybercrime, although many of these
majority of Member States, but may technologies can be equally dual-
Challenges associated with not provide the speed that is required to purposed to assist law enforcement.
national legal frameworks capture electronic evidence. Technologies such as quantum
computing, and artificial intelligence
Differences between domestic legal Another issue under this banner is law may have applications at both ends of
frameworks in the member states and enforcements ability to respond to the lawful spectrum*.

* For a more extensive description of these please see: Europol & Eurojust, First Report of the Observatory Function on Encryption, 2019.
58 IOCTA 2019 CROSS-CUTTING CRIME FACTORS

If the speed of developments with regard to quantum


computing continues (currently already exceeding 50 qubit)
this has the potential to end the effectiveness of currently
used encryption methods within the next five years. Within
the same time period, it is likely that while artificial
intelligence is not capable to fully draw level with human
strengths it is surpassing what is necessary to exploit
human weaknesses. As a consequence we will most likely see
an increasing use of artificial intelligence in areas of
crime where it is currently not utilised.

― P R O F E S S O R D R M A R C O G E R C K E, U N I V E R S IT Y O F C O LO G N E, G E R M A NY
CROSS-CUTTING CRIME FACTORS IOCTA 2019 59

9.6 » FUTURE To combat phishing, leading platform


providers are investing in engineering
Enforcement in these areas as well as
to inform research priorities79.
THREATS AND to deploy machine learning and other
DEVELOPMENTS AI-based approaches, leveraging In July 2018, the 5th EU Anti-Money
Laundering Directive (AMLD 5) entered
the newest technologies to protect
consumers. However, enterprise into force. With 18 months to transpose
adoption and deployment of these the new Directive into national
technologies is slow, therefore legislation, all member states should
phishing is likely to continue to be a adopt the Directive by the closure of
primary attack vector for attack for the 2019. One of the key changes proposed
near future. Equally, criminals will apply by the Directive was the regulation of
such methods too to bypass these virtual currency platforms (exchanges)
systems. and custodian wallet providers (wallet
services where the service holds its
The incorporation of innovation, as users’ private keys). Such entities will
part of an effective crime response, be required to apply full customer due
however, is not exclusively a private diligence, thereby de-anonymising
sector affair. Europol already works their clients, and to report suspicious
together with industry partners and transactions to financial intelligence
the European Commission to identify units.
challenges and opportunities for law
enforcement arising from new and While this new legislation may
emerging technologies, such as 5G. capture a significant proportion of
However, to tackle previously identified cryptocurrency users, those using
as well as future challenges, one hardware or software wallets, or
consideration is to establish a hub for trading via other peer-to-peer exchange
law enforcement innovation, bringing systems, can still operate largely
together the most relevant partners, anonymously80. Similarly, users of
tailored to the needs of Member privacy-orientated cryptocurrencies
States’ law enforcement authorities. such as Dash and Monero, until they
case study Such an entity could enhance the EU’s are required to interact with a virtual
ability to articulate an operational currency exchange or add their holdings
In May 2019, the Dutch Fiscal vision of innovation with-in the realm to a custodian wallet provider can also
Information and Investigation of internal Security, to decide on key remain anonymous.
Service (FIOD), in close cooperation partnerships, critical investments and
with Europol and the authorities in How the criminal community will react
be ready for future disruptions. The
Luxembourg, took down on one of to these developments remains to be
objective would be to identify and
the world’s leading cryptocurrency seen. However, it is likely we will see
categorise common challenges in
mixing service Bestmixer.io. The op- the rise of criminal exchange services
the area of innovation and emerging
eration, which was initiated in 2018 operating on the digital underground,
technologies in order to provide
by the FIOD with the support of the exchanging fiat and cryptocurrencies
guidance and opportunities for EU Law
internet security company McAfee, outside the regulated sector.
resulted in the seizure of six servers
in the Netherlands and Luxembourg.
Bestmixer.io was one of the three 9.7 » RECOMMENDATIONS
largest mixing services for crypto-
currencies and offered services for
mixing bitcoins, bitcoin cash and Law enforcement and the judiciary private sector entities, to more
litecoins. The service started in must continue to develop, share effectively tackle issues posed by
May 2018 and achieved a turnover and propagate knowledge on how cryptocurrencies during investigations.
of at least USD 200 million (approx. to recognise, track, trace, seize and
Despite the gradual implementation of
27 000 bitcoins) over one year. recover cryptocurrency assets.
AMLD 5 across the EU, investigators
The operation had a significant Law enforcement must continue to should be vigilant concerning emerging
impact on the mixer community, build trust-based relationships with cryptocurrency conversion and cash-
resulting in at least one other mixing cryptocurrency-related businesses, out opportunities, and share any new
service voluntarily shutting down81. academia, and other relevant information with Europol.
60 IOCTA 2019 REFERENCES

REFERENCES

1 Directive (EU) 2018/843 of the European Parliament bribes-to-plant-malware-on-the-companys-network/


and of the Council of 30 May 2018 amending Directive (EU) 16 https://www.scmagazine.com/home/security-news/
2015/849 on the prevention of the use of the financial capital-one-breach-exposes-not-just-data-but-dan-
system for the purposes of money laundering or gers-of-cloud-misconfigurations/; https://krebsonsecurity.
terrorist financing, and amending Directives 2009/138/EC com/2019/07/capital-one-data-theft-impacts-106m-people/
and 2013/36/EU.
17 Weinbaum, N, “The GDPR- One Year Later”, https://secur-
2 Europol, European Union Serious and Organised Crime ingtomorrow.mcafee.com/business/data-security/the-gdpr-
Threat Assessment: Crime in the age of technology, 2017. one-year-later/, 2019.
3 McGuire, M & Dowling, S., “Cyber crime: A review of the 18 King, A. & Weaver, R., “GDPR One Year Later: What We’ve
evidence”, UK Home Office Research Report 75, 2013. Learned So Far”, https://www.fireeye.com/blog/executive-per-
4 Symantec, Internet Security Threat Report (ISTR) Vol. 24, spective/2019/05/gdpr-one-year-later-what-we-ve-learned-so-
2019; IBM, X-Force Threat Intelligence Index, 2019; Microsoft, far.html, 2019.
Microsoft Security Intelligence Report Vol. 23, 2018. 19 O’Flaherty, K., “British Airways Hit With Record Fine Follow-
5 EC3 Advisory Groups. ing 2018 Cyberattack”, https://www.forbes.com/sites/kateofla-
hertyuk/2019/07/08/british-airways-hit-with-record-fine-follow-
6 https://www.lockheedmartin.com/en-us/capabilities/
ing-2018-cyberattack/#795491d21f8e, 2019.
cyber/cyber-kill-chain.html
20 Sweney, M., “Marriott to be fined nearly £100m over GDPR
7 Symantec, Internet Security Threat Report (ISTR) Vol. 24,
breach”, https://www.theguardian.com/business/2019/jul/09/
2019.
marriott-fined-over-gdpr-breach-ico, 2019.
8 https://blog.erratasec.com/2019/05/almost-one-mil-
21 Van der Meulen, Investing in Cybersecurity, 2015.
lion-vulnerable-to.html#.XUvgvm9LiUk
22 Boiten, E., “Nearly £100m for Marriott, £138m for BA- what
9 https://www.zdnet.com/article/cyberattacks-against-in-
is the take home message from these sudden massive ICO
dustrial-targets-double-over-the-last-6-months/#ftag=RSS-
fines?”, https://www.computing.co.uk/ctg/opinion/3078677/
baffb68
gdpr-marriott-ba-ico-massive-fines, 2019.
10 https://www.zdnet.com/article/germanwiper-ransom-
23 Symantec, Internet Security Threat Report (ISTR) Vol. 24,
ware-hits-germany-hard-destroys-files-asks-for-ransom/
2019.
11 Newman, L., “Ransomware Hits Georgia Courts as
24 Microsoft, “Attack inception: Compromised supply chain
Municipal Attacks Spread”, https://www.wired.com/story/
within a supply chain poses new risks”, https://www.microsoft.
ransomware-hits-georgia-courts-municipal-attacks-spread/,
com/security/blog/2018/07/26/attack-inception-compro-
2019.
mised-supply-chain-within-a-supply-chain-poses-new-risks/,
12 https://www.zdnet.com/article/louisiana-governor-de- 2018.
clares-state-emergency-after-local-ransomware-outbreak/
25 Zetter, K., “Hackers Hijacked ASUS Software Updates to
13 Liska, A., “Early Findings: Review of State and Local Gov- Install Backdoors on Thousands of Computers”, https://www.
ernment Ransomware Attacks”, https://go.recordedfuture. vice.com/en_us/article/pan9wn/hackers-hijacked-asus-software-
com/hubfs/reports/cta-2019-0510.pdf, 2019. updates-to-install-backdoors-on-thousands-of-computers, 2019.

14 Jay, J. “Formjacking attacks compromised over 50,000 26 Cimpanu, C. “Dark web crime markets targeted by recur-
retailer websites in 2018”, https://www.scmagazineuk.com/ ring DDoS attacks”, https://www.zdnet.com/article/dark-web-
formjacking-attacks-compromised-50000-retailer-web- crime-markets-targeted-by-recurring-ddos-attacks/, 2019;
sites-2018/article/1526282, 2019; Stone, J. “British Airways Crawley, K. “What about all those Dark Web DDoS attacks?”,
fined $229 million under GDPR for data breach tied to https://www.peerlyst.com/posts/what-about-all-of-those-dark-
Magecart”, https://www.cyberscoop.com/british-airways-gd- web-ddos-attacks-kimberly-crawley, 2019.
pr-fine-magecart/, 2019.
27 Europol, “Authorities Across the World Going After Users
15 https://www.zdnet.com/article/at-t-employees-took- of Biggest DDoS-for-hire Website”, https://www.europol.europa.
REFERENCES IOCTA 2019 61

eu/newsroom/news/authorities-across-world-going-after-us- sis/threat-reports/roundup/2018-mobile-threat-landscape, 2019.


ers-of-biggest-ddos-for-hire-website, 2019.
44 Inhope, Inhope Statistics 2018, 2019; Internet Watch Foun-
28 Akamai, “Memcached DDoS explained”, https://www. dation, Once upon a year, 2018; Netclean, Netclean Report 2018:
akamai.com/us/en/resources/our-thinking/threat-advisories/ A report about child sexual abuse crime, 2018.
ddos-reflection-attack-memcached-udp.jsp.
45 Analysis Project Twins.
29 Cloudflare, “Memcached DDoS Attack”, https://www.
46 Internet Watch Foundation, Once upon a year, 2018; Net-
cloudflare.com/learning/ddos/memcached-ddos-attack/.
clean, Netclean Report 2018: A report about child sexual abuse
30 Shani, T., “Updated: This DDoS Attack Unleashed the crime, 2018.
Most Packets Per Second Ever. Here’s Why That’s Important”,
47 Analysis Project Twins.
https://www.imperva.com/blog/this-ddos-attack-unleashed-
the-most-packets-per-second-ever-heres-why-thats-impor- 48 Farinelli, B., “Could a Magecart Attack Hit Your E-Commerce
tant/, 2019. Website?”, https://blog.clear.sale/could-a-magecart-attack-hit-
your-e-commerce-website, 2019; see also: Cimpanu, C., “New
31 European Commission, Communication from the Com-
Magecart attacks leverage misconfigured S3 buckets to infect
mission to the European Parliament, the European Council and
over 17K sites”, https://www.zdnet.com/article/new-magecart-
the Council: Nineteenth Progress Report towards an effective
attacks-leverage-misconfigured-s3-buckets-to-infect-over-17k-
and genuine Security Union, 2019; Fiott, D. & Parkers, R., Pro-
sites/, 2019.
tecting Europe: the EU’s response to hybrid threats, 2019.
49 Alberts, A., “Why Online Fraud Prevention Controls are
32 Group-IB, “Two hacker groups attacked Russian banks
Failing”, https://medium.com/@aalberts/why-online-fraud-pre-
purporting to be Central Bank of Russia”, https://www.group-
vention-controls-are-failing-ba90d7036c4f, 2019.
ib.com/media/cbrf-double-attack/, 2019.
50 Preminger, B., “23 Million Stolen Credit Cards for Sale on
33 Canellis, D., “North Korean hacker crew steals $571M in
the Dark Web in the First Half of 2019”, https://www.cybersixgill.
cryptocurrency across 5 attacks”, https://thenextweb.com/
com/stolen_credit_cards/, 2019.
hardfork/2018/10/19/cryptocurrency-attack-report/, 2018.
51 European Central Bank, “Card Fraud Report”, https://www.
34 Stolarchuk, J., “Hackers hit government agencies and
ecb.europa.eu/pub/cardfraud/html/ecb.cardfraudreport201809.
banks hard in Singapore”, http://theindependent.sg/hack-
en.html, 2019.
ers-hit-government-agencies-and-banks-hard-in-singapore/,
2019. 52 European Payments Council, 2018 Payment Threats and
Fraud Trends Report, 2018.
35 Chainalysis, Crypto Crime Report: Decoding increasing-
ly sophisticated hacks, darknet markets, and scams, 2019; 53 European Payments Council, 2018 Payment Threats and
CipherTrace, Cryptocurrency Anti-Money Laundering Report, Fraud Trends Report, 2018.
2018. 54 Barret, B., “ATM Hacking Has Gotten So Easy, The Malware’s
36 CERT-EU, Threat Landscape Report Q1 2019, 2019. A Game”, https://www.wired.com/story/atm-hacking-win-
pot-jackpotting-game/, 2019.
37 Zamora, W. “TrickBot takes over as top business threat”,
https://blog.malwarebytes.com/101/2018/11/trickbot-takes- 55 Barrett, “ATM Hacking Has Gotten So Easy, The Malware’s A
top-business-threat/, 2018. Game”, 2019.

38 IBM, X-Force Threat Intelligence Report, 2019. 56 Federal Bureau of Investigation, “Business e-mail com-
promise the 12 billion scam”, https://www.ic3.gov/me-
39 Palmer, D., “This new cryptomining malware targets Busi-
dia/2018/180712.aspx, 2018.
ness PCs and servers”, https://www.zdnet.com/article/this-new-
cryptomining-malware-targets-business-pcs-and-servers/, 2018. 57 Seals, T., “ATM Jackpotting Malware Hones Its Heist
Tools”, https://threatpost.com/atm-jackpotting-malware-win-
40 Symantec, “Beapy: Cryptojacking Worm Hits Enterprises pot/141960/, 2019.
in China”, https://www.symantec.com/blogs/threat-intelli-
gence/beapy-cryptojacking-worm-china, 2019. 58 Directive 2015/2366/EU of the European Parliament and of
the Council of 25 November 2015 on payment services in the
41 Wikipedia, “Memcached”, https://en.wikipedia.org/wiki/ internal market, amending Directives 2002/65/EC, 2009/110/
Memcached, 2019. EC and 2013/36/EU and Regulation (EU) No 1093/2010, and
repealing Directive 2007/64/EC.
42 Akamai, State of the Internet Report, 2018.
59 European Banking Authority, Opinion of the European Bank-
43 Trend Micro, “2018 Mobile Threat Landscape”, https://
ing Authority on the elements of strong customer authentication
www.trendmicro.com/vinfo/in/security/research-and-analy-
under PSD2, 2019.
62 IOCTA 2019 REFERENCES

60 Fortuna, P., “Is Security The Loser As Open Banking Takes


Hold?”, https://www.infosecurity-magazine.com/opinions/secu-
rity-loser-open-banking/, 2019.

61 Directive (EU) 2019/713 of the European Parliament and of


the Council of 17 April 2019 on combating fraud and counter-
feiting of non-cash means of payment and replacing Council
Framework Decision 2001/413/JHA.

62 Europol, Do Criminals Dream of Electric Sheep?, 2019, p. 13.


63 Kharif, O., “Bitcoin Criminals Set to Spend $1 Billion on
Dark Web This Year”, https://www.bloomberg.com/news/
articles/2019-07-01/bitcoin-criminals-set-to-spend-1-billion-on-
dark-web-this-year, 2019.

64 Europol, European Union Terrorism Situation and Threat


Report, 2019, p. 39.

65 Europol, European Union Terrorism Situation and Threat


Report, 2019, p. 34.

66 APWG, Phishing Activity Trends Report, 1st Quarter 2019;


Europol Advisory Groups.

67 Seals, T., “ThreatList: DMARC Adoption Nonexistent at 80 %


of Orgs”, https://threatpost.com/dmarc-adoption-nonexist-
ent/146751/, 2019.

68 Abbott, C. & Aggromito, M., “The Battle Against Phishing”,


https://www.natlawreview.com/article/battle-against-phishing,
2019.

69 National Cyber Security Centre, Active Cyber Defence: The


Second Year, 2019.

70 Symantec, Internet Security Threat Report Vol. 24, 2019.


71 Symantec, Internet Security Threat Report Vol. 24, 2019.
72 Microsoft, Microsoft Security Intelligence Report Vol. 23,
2018.

73 Verizon, Data Breach Incident Report, 2019.


74 Symantec, Internet Security Threat Report Vol. 24, 2019.
75 Verizon, Data Breach Incident Report, 2019.
76 Europol & Eurojust, “Common challenges in combatting
cybercrime”, https://www.europol.europa.eu/publications-docu-
ments/common-challenges-in-combating-cybercrime, 2019.

77 ICANN, Registration Directory Services (RDS)-WHOIS2 Re-


view, 2019, p. 24.

78 Europol, Do Criminals Dream of Electric Sheep?, 2019, p. 13.


79 Europol, Do Criminals Dream of Electric Sheep?, 2019, p. 21.
80 European Parliament, Cryptocurrencies and blockchain: Le-
gal context and implications for financial crime, money launder-
ing and tax evasion, 2018.

81 Redman, J., “Mixing Service Bitcoin Blender Quits After Best-


mixer Takedown”, https://news.bitcoin.com/mixing-service-bit-
coin-blender-quits-after-bestmixer-takedown/, 2019.
www.europol.europa.eu

Vous aimerez peut-être aussi