Egypt achieves record primary budget surplus of EGP 629bn despite sharp fall in Suez Canal revenues    Escalation in Gaza, West Bank as Israeli strikes continue amid mounting international criticism    Egypt recovers collection of ancient artefacts from Netherlands    Resumption of production at El Nasr marks strategic step towards localising automotive industry: El-Shimy    Egypt harvests 315,000 cubic metres of rainwater in Sinai as part of flash flood protection measures    Egypt, UNDP discuss outcomes of joint projects, future environmental cooperation    United Bank achieves EGP 1.51bn net profit in H1 2025, up 26.9% year-on-year    After Putin summit, Trump says peace deal is best way to end Ukraine war    Jordan condemns Israeli PM remarks on 'Greater Israel'    Egypt's Supreme Energy Council reviews power supply plans for 14 industrial projects    Egypt, Namibia explore closer pharmaceutical cooperation    Fitch Ratings: ASEAN Islamic finance set to surpass $1t by 2026-end    Renowned Egyptian novelist Sonallah Ibrahim dies at 88    Egypt's FM discusses Gaza, bilateral ties in calls with Saudi, South African counterparts    Egypt prepares to tackle seasonal air pollution in Nile Delta    Egyptian, Ugandan Presidents open business forum to boost trade    Al-Sisi says any party thinking Egypt will neglect water rights is 'completely mistaken'    Egypt's Sisi, Uganda's Museveni discuss boosting ties    Egypt's Sisi warns against unilateral Nile measures, reaffirms Egypt's water security stance    Egyptian pound closes high vs. USD on Tuesday – CBE    Egypt, Colombia discuss medical support for Palestinians injured in Gaza    Egypt, Huawei explore healthcare digital transformation cooperation    Egypt's Sisi, Sudan's Idris discuss strategic ties, stability    Egypt's govt. issues licensing controls for used cooking oil activities    Egypt to inaugurate Grand Egyptian Museum on 1 November    Egypt's Sisi: Egypt is gateway for aid to Gaza, not displacement    Greco-Roman rock-cut tombs unearthed in Egypt's Aswan    Egypt reveals heritage e-training portal    Sisi launches new support initiative for families of war, terrorism victims    Egypt expands e-ticketing to 110 heritage sites, adds self-service kiosks at Saqqara    Palm Hills Squash Open debuts with 48 international stars, $250,000 prize pool    On Sport to broadcast Pan Arab Golf Championship for Juniors and Ladies in Egypt    Golf Festival in Cairo to mark Arab Golf Federation's 50th anniversary    Germany among EU's priciest labour markets – official data    Paris Olympic gold '24 medals hit record value    A minute of silence for Egyptian sports    Russia says it's in sync with US, China, Pakistan on Taliban    It's a bit frustrating to draw at home: Real Madrid keeper after Villarreal game    Shoukry reviews with Guterres Egypt's efforts to achieve SDGs, promote human rights    Sudan says countries must cooperate on vaccines    Johnson & Johnson: Second shot boosts antibodies and protection against COVID-19    Egypt to tax bloggers, YouTubers    Egypt's FM asserts importance of stability in Libya, holding elections as scheduled    We mustn't lose touch: Muller after Bayern win in Bundesliga    Egypt records 36 new deaths from Covid-19, highest since mid June    Egypt sells $3 bln US-dollar dominated eurobonds    Gamal Hanafy's ceramic exhibition at Gezira Arts Centre is a must go    Italian Institute Director Davide Scalmani presents activities of the Cairo Institute for ITALIANA.IT platform    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



New Cyber security method to pursue hackers
Published in Amwal Al Ghad on 01 - 06 - 2015

With online crime it is much harder for the police to pursue a single perp. This has provoked a change in the way hi-tech crimes are tackled.
Now it is about infrastructure, not individuals.
"It's all part of a realisation among info-security workers and law enforcement that traditional ways of doing investigations have not been working," said Steve Santorelli from Team Cymru, a non-profit group that monitors the net seeking botnets and other criminal resources.
"The more traditional 'identify the bad guys, arrest them and lock them up' has been falling short," he said.
Server shutdown
Bureaucracy is part of the reason for this, said veteran computer security expert Chester Wisniewski from Sophos. Cross-continental co-operation between police forces has improved in recent years, he said, but the procedures required to mount international operations remain formidable.
Typically, he said, official requests for help between forces are done via a diplomatic agreement known as a Mutual Legal Assistance Treaty.
"The MLAT process can take a year among friendly nations," he said. "So between nations that do not have the best relationship it might never happen."
MLATs are also not designed to handle the volumes of cases revealed by work to combat cross-border cybercrime. Instead, he said, it is meant for a few high profile cases.
Police forces have found other ways to collaborate internationally and this has prompted a change in tactics. Now, instead of going after the criminals they go after the servers and compromised computers used to carry out the crimes.
"You need to increase the cost of them doing business," said Mr Santorelli. Taking away servers, cutting off access to the armies of compromised PCs all makes it more troubling, and costly, for criminals to operate.
One large-scale effort to get at the criminal infrastructure is Europe's Advanced Cyber Defence Centre (ACDC).
Funded by the European Commission, this has led to the creation of call centres in nine European nations. These get information about infected machines from ISPs who tell customers to contact the call centre to get help to clean up their compromised machines.
Removing machines from botnets is essential for a couple of reasons, said Peter Meyer, co-ordinator of the Centre.
"If you just catch one guy and do not shut down the infrastructure then the next day there will be someone that takes it over," he said. "It's really important to shut down the command and control systems."
It's a big job, he said, because up to 5% of the computers on domestic ISPs are believed to be part of a criminal botnet.
As well as cleaning up machines, the initiative is also trying to help police forces.
"Law enforcement is really interested in getting a better picture because they are often not well-funded and we have data," he said. "The fight against cybercrime is not something one individual can win."
Knocked offline
The change in tactics has led to a flurry of raids. In early April, the FBI, Europol and the UK's National Crime Agency took action against the Beebone botnet. The forces seized web domains used by the botnet's owners to control the distributed system of infected machines. Knocking these out meant control of the botnet was taken away from its operators. It was one of a rash of raids carried out in 2014 and early 2015.
In mid-2014 a huge operation was mounted against the botnet GameOver Zeus that, by itself, was responsible for infecting millions of computers every year. It was also one of the main routes by which the notorious cryptolocker bug was spread. This malicious program encrypted data and demanded a ransom of 400 US dollars or euros within a short time limit or the scrambled data would be deleted.
The gang behind cryptolocker is believed to have made about $3m (£2m) via the ransomware. Seizing its infrastructure helped security experts decode cryptolocker and get at the keys it used to lock data away.
The operations against Beebone and Gameover Zeus took lots of time, planning and international co-operation. At other times, security firms have moved more quickly simply because the scale of the criminal activity demands it.
A case in point was the action that Cisco's Talos security team and Level 3 took against a cybercrime group known as SSH Psychos.
"The attacks they were carrying out were just so blatant and aggressive," said Craig Williams, technical head of the Talos team.
The Psychos were scanning the entire internet looking for servers running the secure SSH protocol. This is the technology that protects your credit card and payment information when you buy something online.
At its peak, the SSH Psycho scanning consumed more than one-third of all net traffic intended for servers capable of handling it.
On every server, the attack tried 300,000 common passwords in succession to see if any worked.
Some did and very quickly the Psychos had compromised about 1,000 machines.
Usually such attacks are much more stealthy, said Mr Williams, adding: "These guys didn't care they were being noticed."
In response, Level 3 and Cisco changed the way data from the attack was handled by net hardware they controlled. They essentially poured it into a virtual dustbin. This ended the scanning and stopped the password attacks. It got more even effective when some other large ISPs joined in.
Source: BBC news


Clic here to read the story from its source.