LAST WEEK'S RELEASES

LAST WEEK'S RELEASES (9)

Monday, 03 August 2020 18:25

SICP ANNOUNCED THE LAUNCH OF CRYPTOCERT

Written by

On July 30, the SICP (Security Intelligence Cryptocurrencies Platform) platform announced the launch of the first Russian commercial Center for monitoring cryptocurrency transactions, identifying the risks of cryptocurrency wallets and responding to incidents in the field of cryptocurrency circulation (CryptoCERT).

This service is the first in Russia and the UIS. Today, any citizen or organization can send information about fraud (another threat or risk) related to cryptocurrencies. Additionally, the publicly available interactive map displays profiled crypto wallets by country. The custom menu allows you to display one or more profiles. The legend displays the share and number of wallets associated with the profile. For registered and verified users, a wider visualization functionality is available.

It should be noted that on July 22, the State Duma of the Russian Federation adopted in the 3rd reading the law "On digital financial assets". The new rules will enter into force on January 1, 2021. The law "On digital currency" is expected to be considered in the coming autumn.

Remarkably, today is World Day Against Trafficking in Persons. It is a serious crime and gross violation of human rights. The United Nations Office on Drugs and Crime (UNODC), as the guarantor of the United Nations Convention against Transnational Organized Crime and the Protocols thereto, assists States in their efforts to implement the Trafficking in Persons Protocol.

By the way, this factor is taken into account when assessing the risks of crypto wallets, in the SmartEcho service, and identifying suspicious transactions ...

Source: sicp.ueba.su

Source: k4y0t.ru

Using the new scheme, fraudsters plan to steal money and passport data, gain access to accounts on social networks and electronic mailboxes of Russians who needed to issue passes during the quarantine period. At the moment, criminals are working on creating clones of government agencies responsible for issuing documents (including mos.ru, mosreg.ru and gosuslugi.ru), and fake media portals on which it is planned to post fake news, experts told Izvestia on cybersecurity. In addition, the planned hackers and the mass mailing of messages via e-mail, social networks and instant messengers. To protect against intruders, experts advise using information verification services. About how to do this - in the material of Izvestia.

Clone attack

Forced isolation due to the COVID-19 pandemic is forcing people to spend more and more time on the Internet. The network is needed for working remotely, studying, ordering goods and organizing home leisure activities. The growth of traffic was even confirmed by the deputy head of the Ministry of Communications Alexey Volin, who said that "when they stayed at home, the people rushed to the Internet, and rushed there with terrible force."

According to the Russian company "Internet Rozysk", network scammers also decided to take advantage of the trend. Now they are organizing a global criminal system consisting of fake sites, hacked accounts on social networks and malicious Telegram bots. Criminals are going to attract people with a service to provide passes for moving around the city in the context of the COVID-19 epidemic, and then steal their money and personal data.

“We got information about the upcoming action using our bots, which are embedded in the darknet (the shadow segment of the Internet. - Izvestia) and a number of closed chats,” said Igor Bederov, CEO of the company. “We learned from them that a scheme is being prepared for deceiving people who plan to obtain passes for themselves.”

According to the expert, this scheme, known as the “rabbit hole”, involves the mass mailing of addresses of fake sites that will be as similar as possible to the resources of government agencies with the authority to issue documents (including mos.ru, mosreg.ru and gosuslugi.ru ) It is expected that this will happen with the help of hacked accounts on social networks and Telegram bots. Attackers will try to confirm the legitimacy of the messages with links to articles allegedly posted in leading Russian media - their sites will also receive clones.

Throughput pressure

After users switch to malicious resources, they will be asked for passport data for issuing passes, as well as bank card details - supposedly to pay for the service upon receipt.

“Their further actions can be predicted from earlier criminal actions of this type, which, in particular, were conducted under the guise of receiving certain compensatory state payments or paid bank surveys,” warned Igor Bederov. - Then the criminals, as a rule, sought a voluntary transfer of money, after which they managed to withdraw the remaining funds from the cards with the help of the details already received.

At the same time, personal data of users is likely to become goods for sale on the black market, forming new illegal bases. The final stage of the scheme is usually the hacking of the personal accounts of the deceived user on social networks and his mailboxes (this is done using the captured cookies), after which they are connected to the distribution of malicious messages.

The large-scale nature of the illegal action was confirmed by specialists of the Security Intelligence Cryptocurrencies Platform (SICP) risk analysis service.

“The scale of the new threat is comparable to the financial pyramids, the organizers of which spend huge sums on promotion through famous people and popular sites,” said Aleksandr Podobnykh, an independent expert at SICP. - And the state’s symmetric response to this, I’m afraid, can only be a significant increase in control over SIM cards, hosting and data centers.

According to experts, in addition to the already mentioned increase in Russian Internet traffic, there are a number of additional factors that will play into the hands of criminals, increasing their chances of success.

“First of all, they include neurotization of people against the background of the epidemic, which makes it easier to manipulate,” said Luka Safonov, director of the information security department of the National Engineering Corporation. - On the other hand, the situation is complicated by the situation with state portals, which now do not withstand the influx of visitors. The fact is that when people cannot get a pass through an official resource, they are most likely to be interested in an alternative offer.

Simple calculations

Despite the sophistication of criminal methods, you can still protect yourself from fraud using a few simple tools that allow you to calculate fraudsters. The instruction for checking incoming messages to Izvestia was provided by Internet Rozysk:

- all state organizations and private companies operating in Russia have domain names registered in our country. Therefore, suspicious links should be checked through the WHOIS service, which reveals their true owners. If, according to the results of the examination, they turn out to be hidden, then it is better not to trust the received information.

- checking the sender of the letter, which can be carried out through the verifiers of mailboxes located on the sites https://2ip.ru/mail-checker/, will be useful in such a situation; http://ru.smart-ip.net/check-email/ and https://ivit.pro/services/email-valid/. It will make sure that the message came from the server of the organization whose employees were indicated as its authors.

- also an indirect sign of fraud can be the so-called shortened link, which has the end click.ru, goo-gl.ru, etc. Its original address is also worth checking (without going to it!) Using special services - they are available at: https://scanurl.net/; https://vms.drweb.ru/online/, https://virusdesk.kaspersky.ru/ and https://iplogger.ru/url-checker/.

The Izvestia source in the power structure confirmed the need for additional verification of the legitimacy of the request when receiving a request for the transfer of funds. “This needs to be done even if it seems that the message was sent to one of the state structures,” he noted.

The expert also proposed an additional way to check emails received via e-mail: you should try to reply to a suspicious message. If the address of the organization’s employee does not change, then with a high degree of probability it is not fake.

However, this does not eliminate the need for additional checks described in the instructions.

Roskomnadzor responded to a request from Izvestia that they were ready to promptly send administrators of sites hosting false information notifications of the need to delete it, if the Prosecutor General's Office so requires.

“If this instruction is not followed, information will be communicated to telecom operators about the need to limit the access of Russian users to this content,” the organization noted.

At the same time, Roskomnadzor emphasized that they do not have the authority to conduct investigations to prevent cybercrime and fraud on the Internet.

Izvestia also sent inquiries to the Ministry of Internal Affairs, the FSS and the Moscow Department of Information Technology. However, operational responses could not be obtained.

Source: IZ.ru

The quarantine situation causes the rapid development of distance services, as well as the widespread use of contactless payments and electronic currencies. At the same time, a significant event took place on the Russian cryptocurrency market. A few days ago, the SICP platform team received a notification from the Federal Intellectual Property Service of the Russian Federation about the state registration of a computer program (03/18/2020 No. 2020613600) - Security Intelligence Cryptocurrency Platform (SICP) or Cognitive (corporate) analytics system Transaction Cryptocurrency Asset.

The platform’s web services are designed to provide cybersecurity for the infrastructure of blockchains (distributed registries) and implement anti-fraud measures in the field of cryptocurrency circulation. Functionality: risk assessment of Digital Assets; cryptocurrency investigations; conducting complex events in the field of cryptocurrency circulation; cryptocurrency wallet and ICO reliability assessment; tracking transactions correlating with a real object (organization); ordering advice on the possibility of an investigation (and the collection of necessary evidence); Advanced analytics of public blockchains and reports on suspicious transactions and related objects.

Today, a large number of SICP users leave user ratings about crypto-wallets and transactions, researchers actively use the SmartEcho and CryptoSonar services to evaluate crypto-wallets and visualize research (investigation) scenes, experts use CryptoSonar and MetaSphere services to save scenes and analyze the wallet and transaction pool (by internal tags).

In your personal account, verification tools are available for owners of crypto-wallets and even crypto-firms, with obtaining the appropriate status (and the ability to share certificates on social networks and on sites). There is the possibility of monitoring wallets for incoming / outgoing transactions (other events), saved scenes and functionality for conducting joint investigations (by registered users).

It is noteworthy that it is on Cosmonautics Day that we will announce this event! .. A significant step, if not for the entire global financial and technological sector, then surely for the entire industry of end-to-end technologies...

Source: K4Y0T Project.

On September 3, 2019, in St. Petersburg, specialists and residents of the SafeNet RIC of the St. Petersburg Technopark, together with the Russoft NP and Bee Pitron, held a presentation session for the Indian delegation of Infinity Group. The key focus of the event was the creation of a platform for interaction between participants in the Russian-Indian market.

As part of the meeting, Igor Bederov presented the developments of the Special Development Department for a distinguished guest from India. Mr. Darbari drew particular attention to existing developments in the field of cryptocurrency transaction control and crime prevention. According to him, in India, up to 20% of the population and a significant amount of low-level crime use cryptocurrencies. In addition, the country has not resolved the problem of relapse in previously convicted criminals.

Back in July, in the format of the Second Russian-Indian strategic dialogue, in order to establish a technology transfer, an agreement was signed between RUSSOFT and Infinity Group. As a result, the ICT Center of Excellence project was launched in India, designed to establish cooperation between the two countries in the direction of business development and international assistance to SMEs.

The delegation of the Infinity Group, headed by Mr. Darbari, flew to Russia to meet with potential recipients of investments and to transfer technology from Russia to India under the “Made in India” program.

After a tour of the engineering center, SafeNet residents presented their projects in the areas of Artificial Intelligence, Internet of Things, cyberphysical security, blockchain, virtual and augmented reality. The parties discussed the situation on the international high-tech market and considered options for potential mutually beneficial cooperation. ICT experts emphasized the relevance of Russian solutions to the market of India and other countries and discussed the possibility of implementation.

Source: Engineering center SafeNet.

BRUSSELS, 1000, BELGIUM, June 18, 2019. CYBERPOL Public Search Criminal Database to include Crypto Currency wallets used in cyber crime.

CYBERPOL The International Cyber Policing Organization established by decree no WL 22/16.595 established today four years ago in Brussels made available to the public the first cyber criminal database empowered by the "Neural symbiotic network of the super computer" as the international cyber utility agency leader in investigation in cyber crimes and terror of the Dark-Web today.

This first Cyber Criminal Public Record Database in Beta Test mode currently will allow four basic levels of searching of wanted cyber criminals allowing for verification and searches of IP's, emails and Cryptocurrency wallets used in on-line scams related to cyber crimes listed in the database.

In addition to this, all cryptowallets using crypto currencies in cybercrime will now be listed on the Cyber Crime search engine by CYBERPOL organization making it very difficult for cyber criminals to use crypto-currencies as payment methods for scams and cyber crimes.

You can now report any scam email to CYBERPOL that when verified will be listed in the CYBERPOL Cyber Criminal Public Database open to public to search.

More than £108,000 in bitcoin was paid by victims of the WannaCry ransomware attacks using bitcoin as undetectable crypto-currency payment. Since such wallets used in crimes are not considered privacy breaches but in the interest of the law it is in the public interest to warn public and make such wallets black listed public records globally before further victims falls pray to cyber crimes Baretzky President of CYBERPOL said.

Public and law enforcement can use this CYBERPOL facilities for free and report such e-mail of extortion to be entered into the public records of CYBERPOL Public Utility directly by requests.

Several entries is already public to search on-line and don't try to fool CYBERPOL. The tracking of cyber crimes goes the extra mile to track the same hackers when visiting the search engine on CYBERPOL website using a new AI (Artificial Intelligence) named 666 to capture both mac and serial number of such computers. Don't be a hackers fool to search yourselves if you are already involved in cyber crimes, the CYBERPOL Spokes Person warned.

This will be a huge blow for crypto currencies and wallets used in cyber crimes and scams as the wallet numbers will be public listed and open to see to all public and law-enforcement free of charges in disrupting cyber crimes.

The message is clear and simple President Ricardo Baretzky of CYBERPOL said "Don't use any Crypto Currencies in INTERNET crimes as we will not only find you but list your crypto WALLET accounts for good in the block-chain based search engine of CYBERPOL Supper Computer AI 666 symbiotic neural network and let me assure all those financial criminals, once listed there is no escape! I hope this message is clear to criminals and corruption".

It seems the days messing with elections using secret corruption payments could be counted as CYBERPOL has set a new paradigm in combating cyber crimes and global corruption never seen before...

Source: EIN Presswire.

In early July, SafeNet regional engineering center (structural division of JSC Technopark of St. Petersburg) has introduced a new project.

Thus, together with the company Internet-Rozysk was announced the creation of the Special elaborations department. Which purpose is the organization of work with information and analytical and other products intended for the prevention, suppression and investigation of the offenses committed by means of information and telecommunication technologies.

Key activities of the new Department:

1. interaction with profile startups, companies and developers;
2. organization of interaction with state and law enforcement agencies. Control over the legality and legality of the development;
3. consulting and carrying out examinations, development of methodical and scientific base, training and professional development for the persons engaged in law enforcement activity, and also other persons;
4. organization of demonstration zones, exhibitions, interaction with the media, negotiations aimed at attracting interest in the development of the Department, the implementation of its product line, promotion of activities.

Developers engaged in the following project categories are invited to interact:

- assessment of reliability of contractors and staff;
- non-instrumental lie detection;
- detection of illegal activities in social networks;
- analysis and tracking of cryptocurrency transactions;
- establishing users phone numbers and email addresses;
- establishing users of secure messengers;
- enrichment and analysis of large amounts of publicly available data;
- detection and suppression of confidential information leaks;
- darknet Analytics;
- analysis and decoding of Internet traffic.

Source: SafeNet еngineering center.

Solution to protect crypto assets by fighting fraud, scams, and malicious threats.

Singapore, 29 October 2018 — Sentinel Protocol announces the launch of the Interactive Cooperation Framework API (ICF API). After the successful launch of the UPPward Chrome Extension, a crypto scam protection solution, Sentinel Protocol continues to lead the crypto security industry by arming crypto exchanges and wallet services with its ICF API.

The new ICF API is designed to be integrated with financial software applications to proactively protect crypto assets belonging to organizations and clients from malicious threats. Before completing a transaction, the ICF API enables a financial application to query Sentinel Protocol’s Threat Reputation Database (TRDB) and check whether or not a specific crypto wallet address, URL, domain, or Telegram ID is safe. Within milliseconds, the TRDB sends a response. Depending on the type of response, a pending transaction can be immediately rejected and terminated; an alert or warning could be generated; or the transaction could be allowed if the alert level is low.

The key features of the ICF API are:

- Platform agnostic — can be used by any exchange, wallet, DApp, or application.

- Online access to collective security intelligence data held in the TRDB.

- Validated whitelists and blacklists of crypto wallet addresses, URLs, and domains related with malware, phishing, and scams.

While blockchain’s core technology has earned an excellent reputation for strong security, cryptocurrency assets continue to be stolen on a daily basis. Crypto exchanges and wallet services today have limited capabilities for preventing users from accepting or sending crypto funds to malicious addresses or for identifying malicious URLs associated with phishing and malware.

To address the above needs, the ICF API beta version will be made available to organizations by the end of October for testing and evaluation. The full production version will be deployed in early 2019.

Sentinel Protocol, is the world’s first crowd-sourced threat intelligence platform utilizing the advantages of decentralization to protect cyberspace with blockchain security. It aims to equip individuals and organizations with cybersecurity solutions that protect their valuable cryptocurrency assets from malicious threats, attacks, and fraud. Sentinel Protocol is headquartered in Singapore and has offices in Seoul, South Korea and Tokyo, Japan.

Source:  Medium.

In the Moscow region raised the Auditor blockchain. Thus, the Center of Neuroinnovations, formed with the support of the Rating agency for the evaluation of digital economy projects at Plekhanov University, and the expert-analytical platform “Smart country” (resident of the Phystechpark in Dolgoprudny) announced the launch of the project under the working name Neuro Auditor Blockchain (NeuroB) — which is an artificial intelligence, focused on the fight against fraudulent schemes of fashion technology ICO.

The project will minimize the losses of investors in the blockchain sector, which currently amount to more than $ 9 million per day...

This is a platform based on neural calculations to identify unscrupulous blockchain projects, a kind of Auditor. That is, Scam (fraud) can be shot back on the approach of high-tech guns, and investors will not lose money. The most important task of the project, according to the businessman, to return to ordinary investors in cryptonomicon.

Since the beginning of 2018, 537 ICO have been registered for a total amount of $ 13.7 billion. For comparison, in 2017, 552 ICO were held with the volume of attracted funds of only $ 7 billion. Also, compared to last year, the average ICO size almost doubled: from $ 12.8 million to more than $ 25.5 million...

Source:  Hi-tech News.

Sunday, 21 October 2018 16:44

WAVES KEEPER LAUNCHED

Written by

Waves Ecosystem Comes To Your Browser. Waves has launched an extension to securely sign transactions. Now it is even more convenient to purchase token SICP.

The new Waves Keeper browser extension turns your browser into a keychain that enables you to sign transactions securely on third-party web resources without entering your seed or password. So now, if a Waves-integrated website or dApp requires you to sign a transaction, you can do it with just a couple of clicks, right in your browser.

This is the first version of the browser extension, which currently works only in Google Chrome. In forthcoming releases they are planning to extend its functionality and develop a cross-browser solution, available for all popular browsers.

Source: blog Waves Platform.

About SICP

Security Intelligence Cryptocurrencies Platform - Cybersecurity infrastructure of the blockchain and antifraud in the cryptocurrency sphere. SICP - antiscam, trust, compliance.

Get In Touch

Address: Russia St. Petersburg Marshal Tukhachevsky 22

Phone: +7 (812) 983-0483

Fax: +7 (812) 983-0483

Email: sicp@ueba.su

Website: www.ueba.su

Join Our Community

Sign up to receive email for the latest information.
© 2020 SICP. All Rights Reserved.

Search