Blog

In 5 days, the conference on Information Technology Security (BIT St. Petersburg 2020) will take place in the Northern capital. The IX meeting will be devoted to information security and cybersecurity issues, the focus of attention will be on the discussion of CII and the implementation of the requirements of 187-FZ.

By tradition, Victor Minin (Chairman of the Board of ACISO) will deliver a welcoming speech and present a plenary report for the current year. In two sections (trends, practice), leading experts in the field of cybersecurity will share their experience. Among them, Natalia Manuylova (Chief Compliance Officer SICP) - Cryptocompliance for the security of CII, Alexander Podobnykh (CISO SICP, Special Development Department of Technopark St. Petersburg) - Digital financial assets and CII subjects, as well as other respected experts.

The conference will be held on October 15, in compliance with the requirements aimed at preventing the spread of the new coronavirus infection...

Source: BIT-Aciso

Tuesday, 06 October 2020 16:44

CRYPTOCOMPARE EXCHANGE BENCHMARK JULY 2020

Written by
Published on July 10, 2020. CryptoCompare Exchange Benchmark ranks more than 165 global spot exchanges to bring transparency and accountability to the cryptoasset exchange landscape by providing a framework for assessing risk. The Benchmark assigns a AA - F grade to help identify the lowest risk venues in the industry.
 
Key Highlights
 
The analysis reveals that US exchanges retained the top spots, with Gemini ranked first. Gemini is followed by Coinbase (2), Kraken (3), itBit (4) and Bitstamp (5).
  • Lower-Tier exchanges (grades C-E) have continued to lose market share to Top-Tier exchanges (grades AA-B), quarter on quarter.
  • Top-Tier exchanges (grades AA-B) accounted for 32% of global volumes in Q4 2019. In 2020, they accounted for 36% in Q1 and 40% in Q2.
  • The top three decentralised exchanges (DEXs) based on our refined DEX methodology are Binance DEX, Switcheo, and IDEX.
Friday, 04 September 2020 18:45

BUSINESS INFORMATION SECURITY SUMMIT 2020

Written by

The Business Information Security Summit will be held at the end of September, online (September 24-25). Topic of the event: Demo version of the new reality. Information security strategy for change management. The participants of the meeting will answer questions and tell about approaches: what strategy is chosen by information security for managing change, from the VUCA world to BISSEXTUS 2020, turbulence as a springboard or a struggle for survival.

Day 1. Discussion 1. Welcome, or No unauthorized entry is allowed. Experts: Natalya Kasperskaya (President of InfoWatch Group), Alexander Malkevich (Deputy Chairman of the Commission for the Development of the Information Community, Mass Media and Mass Communications of the Public Chamber of the Russian Federation), Alexander Maslyuk (expert on HR transformation in SAP CIS), Vladimir Dubrovin (Technical Advisor on Information Security Mail.ru Group).

Discussion 2. Information security in an era of change - here and now: risks, consequences, expectations. Speakers: Dmitry Manannikov (director of corporate security at Ozon), Mona Arkhipova (co-founder and COO at sudo.su (MIRTs), Roman Bondarenko (deputy head at SB FC Pulse), Stepan Deshevykh (head of InfoWatch product development department).

Discussion 3. Security of the digital future: what are digital assets and how to protect them. Speakers: Mikhail Smirnov (director of the InfoWatch expert and analytical center), Alexander Podobnykh (independent information security expert SICP), Vladislav Pak (IT director of Stoloto).

Day 2. Round table. Regulatory requirements 2020-2021. Speakers: Artyom Sychev (First Deputy Director of the IB Department of the Bank of Russia), Vitaly Lyutikov (Deputy Director of FSTEC of Russia), Dmitry Sytin (General Director of TEK-Torg CJSC), Evgeny Tsarev (Managing Director of RTM Group), Konstantin Samatov (Director of the Center Information Security Institute of Management and Information Technologies USUE).

Also, the opinions of vendors will be presented, taking into account new approaches, and a master class on the preparation of a Disaster Recovery Plan (DRP) will be organized. Closing discussion: Who should be “shot” for the incident? Lev Paley (head of the information security department of SO UES), Vasily Okulessky (deputy head of the information security service of Vozrozhdenie bank), Sergey Sherstobitov (general director of Angara), Kirill Ermakov (CTO QIWI).

Source: BIS Summit

The European Union Agency for Law Enforcement Cooperation, or Europol, 09/10/2019 released its annual Internet Organized Crime Threat Assessment (IOCTA) report for the year. And we weren’t surprised to find that ransomware, despite its palpable decline in volume these past few months—a trend we’ve also seen and documented—remains the most prominent threat in terms of prevalence and financial damage.

While the IOCTA report talks about online threats that both consumers and businesses face on a daily basis, it also puts data at the center of it all. We rely on it—often, all too much—and criminals know this. And yet, most threat actors behind attack campaigns rely on our data to make their attacks more successful, compelling us to take action. After all, nowadays an attack that doesn’t use data against its owners wouldn’t be much of a money-earning scheme.

Threat actors can deprive organizations and individuals’ access to their own files by encrypting and holding them for ransom, such is the case for ransomware. And they can also deny the average user access to an organization’s data (and services) through Distributed Denial of Service (DDoS) attacks. According to Europol, such attacks with an extortion element in them are the most prevalent.

Data also enables other forms of online crime like fraud. Criminals are primarily after financial data, such as credit card information, online banking credentials, and cryptocurrency wallet data. They are also after personally identifiable information (PII) and other login credentials. Such data fuels other profitable, targeted attacks like business email compromise (BEC) scams, spear phishing, and account takeovers.

There is also the challenge of data overload, particularly in the realm of child sexual exploitation (CSE) crimes. The staggering amount of material online detected by law enforcement and private companies continues to increase to the point that it’s putting a strain on law enforcement resources to investigate these crimes. One contributing factor to the increase of availability of CSE material online is that more underage users are accessing and using social media, thus, criminals reach and communicate with them via these platforms.

Other IOCTA findings:

  • The IOCTA report also noted that key infection vectors are phishing and remote desktop protocol (RDP) vulnerabilities. Simple patching can address vulnerabilities. As for phishing, did you know that you can be targeted on your desktop and smart phone?
  • Organizations are growing more concerned about sabotage performed by malicious insiders.
  • Ransomware tactics have shifted, from a scattergun approach of infecting systems to a more focused and refined targeting of profitable victims. This means that ransomware proponents target those with a greater ability to pay a ransom than the average, normal user.
  • BEC is evolving. There have been campaigns wherein threat actors used malware and network intrusion.
  • Self-generated explicit material (SGEM) is on the uptick. Young children now have access to high-quality smart phones, which enables them to produce and share SGEM, either voluntarily or under coercion. The rising number of SGEM victims will likely to continue. Parents and guardians: Please talk to your kids about this, and other online risks.
  • Jackpotting, also known as black-box attacks, against ATMs are becoming more widespread and accessible due to tools like Cutlet Maker being more available on the dark web.
  • Card-not-present (CNP) fraud and skimming continue to plague financial institutions. Don’t be a victim of skimming.
  • Due to law enforcement activity and extensive DDoS attacks against hidden services, many have grown distrustful of the onion router (Tor) environment. While underground market administrators are currently exploring alternatives, a migration to a new platform will not likely happen yet.

Source: Europol

Source: Malwarebytes Labs

Monday, 03 August 2020 18:25

SICP ANNOUNCED THE LAUNCH OF CRYPTOCERT

Written by

On July 30, the SICP (Security Intelligence Cryptocurrencies Platform) platform announced the launch of the first Russian commercial Center for monitoring cryptocurrency transactions, identifying the risks of cryptocurrency wallets and responding to incidents in the field of cryptocurrency circulation (CryptoCERT).

This service is the first in Russia and the UIS. Today, any citizen or organization can send information about fraud (another threat or risk) related to cryptocurrencies. Additionally, the publicly available interactive map displays profiled crypto wallets by country. The custom menu allows you to display one or more profiles. The legend displays the share and number of wallets associated with the profile. For registered and verified users, a wider visualization functionality is available.

It should be noted that on July 22, the State Duma of the Russian Federation adopted in the 3rd reading the law "On digital financial assets". The new rules will enter into force on January 1, 2021. The law "On digital currency" is expected to be considered in the coming autumn.

Remarkably, today is World Day Against Trafficking in Persons. It is a serious crime and gross violation of human rights. The United Nations Office on Drugs and Crime (UNODC), as the guarantor of the United Nations Convention against Transnational Organized Crime and the Protocols thereto, assists States in their efforts to implement the Trafficking in Persons Protocol.

By the way, this factor is taken into account when assessing the risks of crypto wallets, in the SmartEcho service, and identifying suspicious transactions ...

Source: sicp.ueba.su

Source: k4y0t.ru

Fraudsters are trying to make money amid the coronavirus pandemic and the fight against it. In particular, at the beginning of this week the number of spam mails allegedly on behalf of the World Health Organization (WHO) has increased. The letters speak of fundraising for COVID-19 Funds worldwide.

Specialists of the portal SICP.ueba.su analyzed one of these letters, which was sent from This email address is being protected from spambots. You need JavaScript enabled to view it.. It turned out that the second-level domain is actually used by WHO, but it was this letter that was sent from a mail server located in the state of Colorado in the United States of America and in transit passed through a reference mailer in the German municipality of Mauern.

Experts also learned that a link to a picture with a QR code (the address of a bitcoin wallet for donations) leads the reader directly to the portal of the investment company Five Stand Capital, located in the US city of Atlanta from Georgia. As follows from the official information on the company's website, it is a partner of large US investment funds in the United States. The portal itself is hosted by GoDaddy in Oregon (Portland). Still there are three site mirrors - for various domain zones.

This email was first sent from the SendGrid.net mail server, which is also located on GoDaddy’s resources in Colorado, Denver. And, judging by the information bases, another 13 resources are located on this IP address, nevertheless, only one of them is displayed - a web-based mail gateway.

It is important to consider that on the official website of the WHO there is no way to donate funds in the form of cryptocurrency - bitcoin. The same is true of their dedicated donation collection site. And there is even a warning that they do not send any letters.

Apparently, fraudsters are trying to cunningly take advantage of the global crisis situation, possessing a good knowledge of modern technology. Or maybe the owners of WHO decided to use all available tools to raise funds. And experts are wondering, where is the hosting site for WHO?

Interestingly, so far, no funds have been received to the cryptocurrency wallet, which is indicated in the letter of the scammers. The wallet is constantly monitored by SICP platform experts, however, like other malicious purses known to them.

Source: CryptoRussia.ru

On April 24, 2020, Russian President Vladimir Putin signed the Law “On an experiment to establish special regulation in order to create the necessary conditions for the development and implementation of artificial intelligence technologies in the subject of the Russian Federation - the city of federal significance Moscow and amending Articles 6 and 10 of the Federal Law” About personal data.

Essentially brief:

- from July 1, 2020, over 5 years, an experiment will be conducted in Moscow to establish special regulation in order to create the necessary conditions for the development and implementation of artificial intelligence technologies in Moscow, as well as the subsequent possible use of the results of the application of artificial intelligence in other regions. At the end of the term, regulatory documents issued for the purpose of the experiment are canceled;

- in the Law for the realization of its goals the concept of “artificial intelligence”, as well as “artificial intelligence technology” is given;

- in order to establish an experimental legal regime (hereinafter referred to as the ELR), the Moscow Government will determine, inter alia, cases of mandatory application and (or) consideration of the results of the use of artificial intelligence in the activities of the Moscow Government, as well as the procedure and cases of transfer by owners of funds and photo and video surveillance of images obtained in accordance with the conditions provided for in subparagraphs 1 and 2 of paragraph 1 of Article 1521 of the Civil Code of the Russian Federation, as well as providing access to such media cameras and photo and video surveillance systems to state authorities and organizations performing public functions in accordance with regulatory legal acts of the Russian Federation. The list of organizations performing public functions is established by the Moscow Government;

- when making transactions and other legally significant actions, an ELR participant will be obliged to notify persons who are not participants in the experimental legal regime of his status as an ELR participant and indicate the application of the Moscow Government adopted in accordance with the Law in relation to his regulatory acts. if the legally significant actions specified in this part are committed using the Internet information and telecommunication network, the participant in the experimental legal regime inform the user (party to the transaction) of all applicable provisions of regulatory legal acts of the Government of Moscow adopted in accordance with the Law in question

- requirements for agreements between ELR participants and the authorized body (it is appointed by the Moscow Government), should provide mechanisms to ensure the confidentiality of the transmitted data and the security of their storage.

- (!) Personal data obtained as a result of depersonalization and processed in accordance with paragraph 6 of part 1 of Article 4 of the relevant Law cannot be transferred to persons who are not parties to the ELR. In the event that the ELR participant status is lost or the experiment is terminated after its expiration, the person who is the ELR participant loses the right to receive personal data obtained as a result of depersonalization and personal data stored in the form The result of such depersonalization is subject to destruction in the manner established by the authorized body by agreement with the authorized federal executive body, carrying out functions for the development and implementation of state policy and regulatory regulation in the field of information technology.

- for the destruction of personal data obtained as a result of depersonalization, in the prescribed manner, the procedure for assessing the conformity of information protection means, which include the function of information destruction, is carried out. The participants of the ELR are responsible for observing the rights of the subjects of personal data in accordance with the Federal Law of July 27, 2006 No. 152-FZ “On Personal Data” for the entire duration of the experiment and after the termination of their participation in the experiment.

- during the experiment, it is not allowed to store personal data obtained as a result of depersonalization and processed on the basis of an agreement with the authorized body specified in paragraph 6 of part 1 of this article, outside the subject of the Russian Federation - the city of federal significance of Moscow.

- the status of an ELR participant is acquired from the moment it is included in the corresponding public register;

- the decision on inclusion or rejection is made by the authorized body (appointed by the Moscow Government) within a period of not more than thirty calendar days from the date of receipt of the application;

- The law provides requirements for the applicant, which, which can only be a legal entity or individual entrepreneur, registered in the territory of Moscow, as well as for the type of activity. The IP and the governing bodies of a legal entity have a requirement for the absence of an unexpunged or outstanding criminal record for crimes in the economic sphere, as well as for crimes of medium gravity, serious and especially serious crimes.

- the reasons for the refusal to be included in the register are prescribed in the Law (it seems to me quite common); in case of refusal to include in the register of ELR participants, the authorized body shall notify the applicant of this with a motivated justification for such a refusal.

- the reasons for the exclusion of the ELR participant from the register are also indicated, the exclusion is carried out within 10 working days.

- the formation of strategic directions and monitoring the activities of participants is planned to be entrusted to the ELR Coordination Council, which, on the proposal of the Government of the Russian Federation, includes representatives of federal executive bodies.

- Amendments to Article 6 and Article 10 of the Federal Law of 07.27.2006 No. 152-FZ "On Personal Data" in terms of processing conditions and in the processing of special personal data, respectively.

Using the new scheme, fraudsters plan to steal money and passport data, gain access to accounts on social networks and electronic mailboxes of Russians who needed to issue passes during the quarantine period. At the moment, criminals are working on creating clones of government agencies responsible for issuing documents (including mos.ru, mosreg.ru and gosuslugi.ru), and fake media portals on which it is planned to post fake news, experts told Izvestia on cybersecurity. In addition, the planned hackers and the mass mailing of messages via e-mail, social networks and instant messengers. To protect against intruders, experts advise using information verification services. About how to do this - in the material of Izvestia.

Clone attack

Forced isolation due to the COVID-19 pandemic is forcing people to spend more and more time on the Internet. The network is needed for working remotely, studying, ordering goods and organizing home leisure activities. The growth of traffic was even confirmed by the deputy head of the Ministry of Communications Alexey Volin, who said that "when they stayed at home, the people rushed to the Internet, and rushed there with terrible force."

According to the Russian company "Internet Rozysk", network scammers also decided to take advantage of the trend. Now they are organizing a global criminal system consisting of fake sites, hacked accounts on social networks and malicious Telegram bots. Criminals are going to attract people with a service to provide passes for moving around the city in the context of the COVID-19 epidemic, and then steal their money and personal data.

“We got information about the upcoming action using our bots, which are embedded in the darknet (the shadow segment of the Internet. - Izvestia) and a number of closed chats,” said Igor Bederov, CEO of the company. “We learned from them that a scheme is being prepared for deceiving people who plan to obtain passes for themselves.”

According to the expert, this scheme, known as the “rabbit hole”, involves the mass mailing of addresses of fake sites that will be as similar as possible to the resources of government agencies with the authority to issue documents (including mos.ru, mosreg.ru and gosuslugi.ru ) It is expected that this will happen with the help of hacked accounts on social networks and Telegram bots. Attackers will try to confirm the legitimacy of the messages with links to articles allegedly posted in leading Russian media - their sites will also receive clones.

Throughput pressure

After users switch to malicious resources, they will be asked for passport data for issuing passes, as well as bank card details - supposedly to pay for the service upon receipt.

“Their further actions can be predicted from earlier criminal actions of this type, which, in particular, were conducted under the guise of receiving certain compensatory state payments or paid bank surveys,” warned Igor Bederov. - Then the criminals, as a rule, sought a voluntary transfer of money, after which they managed to withdraw the remaining funds from the cards with the help of the details already received.

At the same time, personal data of users is likely to become goods for sale on the black market, forming new illegal bases. The final stage of the scheme is usually the hacking of the personal accounts of the deceived user on social networks and his mailboxes (this is done using the captured cookies), after which they are connected to the distribution of malicious messages.

The large-scale nature of the illegal action was confirmed by specialists of the Security Intelligence Cryptocurrencies Platform (SICP) risk analysis service.

“The scale of the new threat is comparable to the financial pyramids, the organizers of which spend huge sums on promotion through famous people and popular sites,” said Aleksandr Podobnykh, an independent expert at SICP. - And the state’s symmetric response to this, I’m afraid, can only be a significant increase in control over SIM cards, hosting and data centers.

According to experts, in addition to the already mentioned increase in Russian Internet traffic, there are a number of additional factors that will play into the hands of criminals, increasing their chances of success.

“First of all, they include neurotization of people against the background of the epidemic, which makes it easier to manipulate,” said Luka Safonov, director of the information security department of the National Engineering Corporation. - On the other hand, the situation is complicated by the situation with state portals, which now do not withstand the influx of visitors. The fact is that when people cannot get a pass through an official resource, they are most likely to be interested in an alternative offer.

Simple calculations

Despite the sophistication of criminal methods, you can still protect yourself from fraud using a few simple tools that allow you to calculate fraudsters. The instruction for checking incoming messages to Izvestia was provided by Internet Rozysk:

- all state organizations and private companies operating in Russia have domain names registered in our country. Therefore, suspicious links should be checked through the WHOIS service, which reveals their true owners. If, according to the results of the examination, they turn out to be hidden, then it is better not to trust the received information.

- checking the sender of the letter, which can be carried out through the verifiers of mailboxes located on the sites https://2ip.ru/mail-checker/, will be useful in such a situation; http://ru.smart-ip.net/check-email/ and https://ivit.pro/services/email-valid/. It will make sure that the message came from the server of the organization whose employees were indicated as its authors.

- also an indirect sign of fraud can be the so-called shortened link, which has the end click.ru, goo-gl.ru, etc. Its original address is also worth checking (without going to it!) Using special services - they are available at: https://scanurl.net/; https://vms.drweb.ru/online/, https://virusdesk.kaspersky.ru/ and https://iplogger.ru/url-checker/.

The Izvestia source in the power structure confirmed the need for additional verification of the legitimacy of the request when receiving a request for the transfer of funds. “This needs to be done even if it seems that the message was sent to one of the state structures,” he noted.

The expert also proposed an additional way to check emails received via e-mail: you should try to reply to a suspicious message. If the address of the organization’s employee does not change, then with a high degree of probability it is not fake.

However, this does not eliminate the need for additional checks described in the instructions.

Roskomnadzor responded to a request from Izvestia that they were ready to promptly send administrators of sites hosting false information notifications of the need to delete it, if the Prosecutor General's Office so requires.

“If this instruction is not followed, information will be communicated to telecom operators about the need to limit the access of Russian users to this content,” the organization noted.

At the same time, Roskomnadzor emphasized that they do not have the authority to conduct investigations to prevent cybercrime and fraud on the Internet.

Izvestia also sent inquiries to the Ministry of Internal Affairs, the FSS and the Moscow Department of Information Technology. However, operational responses could not be obtained.

Source: IZ.ru

About SICP

Security Intelligence Cryptocurrencies Platform - Cybersecurity infrastructure of the blockchain and antifraud in the cryptocurrency sphere. SICP - antiscam, trust, compliance.

Get In Touch

Address: Russia St. Petersburg Marshal Tukhachevsky 22

Phone: +7 (812) 983-0483

Fax: +7 (812) 983-0483

Email: sicp@ueba.su

Website: www.ueba.su

Join Our Community

Sign up to receive email for the latest information.
© 2020 SICP. All Rights Reserved.                                                                                                                                     Grant BTC 1CdD6Xk9RDZ9wyeRqq1uXkktgdaPpGpt8f

Search