How Cyber Criminals Are Increasingly Targeting The Tourism Market

privacy

How Cyber Criminals Are Increasingly Targeting The Tourism Market

Distributed Denial of Service (DDoS) attacks are up 16% in the last year. Shutterstock

Imagine if a hacker shut down the baggage handling system of one of the world’s busiest airports. Or took control of a fleet of autonomous delivery trucks and re-routed them to disrupt rush hour traffic in a major metropolis. What if the hacker then demanded a ransom to unlock the digital networks they’d hijacked?

According to the latest State of the Internet report from Akamai, one of the world’s largest providers of computer servers and networks, these scenarios aren’t fantasies of some distant dystopia. They are just around the corner.

Technology continues to evolve with advances in artificial intelligence, automation, biometrics and a rapidly expanding Internet of Things. With this comes an increasing and potentially catastrophic risk of malicious actors bringing digital infrastructure and the societal services that rely on it to a grinding halt.

Even if we’re not quite there yet, there are several worrying trends highlighted in the report that show what cyber security professionals are already confronting.

DDoS for hire

The first concern relates to an increasing frequency and volume of Distributed Denial of Service (DDoS) attacks – up 16% in the last year. These attacks bombard computers with huge amounts of data. They are used by malicious actors to disrupt and delay networks and make them unavailable to their users.

The most famous DDoS attacks were against Estonia in 2007, shutting down banks, media organisations and government ministries.

Fast forward a decade and the volume of data harnessed in such attacks has increased exponentially. According to the Akamai report, the largest DDoS attack in history was recorded in February this year against a software development company. It involved a data flow of 1.35 terabytes (1,350 gigabytes) per second.

The Southern Cross Cable connecting Australia and New Zealand’s internet has an estimated overall capacity of greater than 22 Tbps – due in large part to recent upgrades. Such a high-volume attack directed at a single choke point could have a big impact on transcontinental and national internet speeds.

Perhaps even more concerning is that DDoS technologies are being commercialised and sold to cyber criminals on “DDoS-for-hire” websites.

They’re also becoming more sophisticated. Previously seen as a fairly simple way of exploiting internet traffic, the latest DDoS attacks exhibit more novel ways of creating “botnets” (networks of compromised computers) to redirect data flows against a target. According to the Akamai report, attackers have been paying attention to mitigation efforts and changing the nature of their attacks as they unfold.

Hacking holidays

Cyber criminals will invariably look for the weakest links. This might be individuals who never update their passwords and use unidentified wifi networks without due diligence. Or it could be particular commercial sectors that are lagging behind in cyber security standards.

The Akamai report highlights that in the last year organised cyber criminals are increasingly targeting the tourism market. A staggering 3.9 billion malicious login attempts occurred during the last year against sites belonging to airlines, cruise lines, hotels, online travel, automotive rental and transport organisations.

Finding out who is responsible is a trickier problem. Evidence suggests that exploitation of hotel and travel sites is mostly emanating from Russia and China, and it’s possibly the work of organised cyber criminals targeting tourists for easy gain. But more work needs to be done to map cyber crime and understand the complex criminal networks that underpin it.

It’s not all doom and gloom

While the report warns of larger more destructive DDoS attacks before the end of 2018, it’s not all doom and gloom. The potential for cooperation is also evident.

In April 2018, the Dutch National High Tech Crime Unit and the UK National Crime Agency ran the appropriately named “Operation Power Off”. This targeted a DDoS-for-hire site that was responsible for somewhere between four and six million DDoS attacks over its lifetime. The successful operation led to arrests and likely criminal prosecutions.

These sorts of high level cyber crime collaborations are growing in frequency and strength. Our own national Computer Emergency Response Team (CERT) in New Zealand, for example, is working with its Australian counterpart – and CERTs all around the Asia Pacific region – to identify and counter cyber crime.

The ConversationThe New Zealand government is currently consulting on a “refreshed” national cyber security strategy, and new powers have been invested in the Australian Signals Directorate to combat, prevent and disrupt cybercrime committed outside of Australia. So it appears Trans-Tasman responses to these problems are growing teeth too.

Joe Burton, Senior Lecturer, New Zealand Institute for Security and Crime Science, University of Waikato

This article was originally published on The Conversation. Read the original article.

Related Books

IoT Hackers Handbook: An Ultimate Guide to Hacking the Internet of Things and Learning IoT Security

privacyAuthor: Aditya Gupta
Binding: Paperback
Studio: CreateSpace Independent Publishing Platform
Label: CreateSpace Independent Publishing Platform
Publisher: CreateSpace Independent Publishing Platform
Manufacturer: CreateSpace Independent Publishing Platform

Buy Now
Editorial Review: 2017 has seen IoT devices being hacked like never before. We have seen attacks such as the Mirai Botnet, vulnerabilities in popular cars, hacking of IoT rifles, attackers taking advantage of smart toys and the list goes on. Everything is getting connected like never-before, yet, security is one of the last thoughts during the product launch stage for most of the manufacturers. This book can be treated as a technical journey into mistakes which manufacturers make while building IoT devices, or the so-called “smart things”. IoT Hackers Handbook is written in a beginner-friendly way covering everything from the extreme basics and then using exercises and labs to have the readers learn-by-doing. Some of the contents that are covered in the book include: Embedded Device Exploitation Firmware Exploitation and Emulation Hardware communication protocols – UART, SPI etc. JTAG debugging and exploitation Software Defined Radio, ZigBee and BLE Exploitation After reading the book, you will be able to understand the various security vulnerabilities crippling the Internet of Things devices, and how you can play a major role in identifying these security issues, thus making the IoT ecosystem safer.




HACKING INTERNET OF THINGS: BLUETOOTH LOW ENERGY

privacyAuthor: Shashank Pandey
Binding: Kindle Edition
Format: Kindle eBook
Studio: Cytheon Ltd
Label: Cytheon Ltd
Publisher: Cytheon Ltd
Manufacturer: Cytheon Ltd

Buy Now
Editorial Review: According to IHS Markit, the number of IoT (Internet of Things) devices will grow to 30.7 billion in 2020, and to 75.4 billion by 2025! IDC Forecasts Worldwide spending on the IoT to reach $772 Billion in 2018!

Whether it is connected automobiles, fitness watches, smart coffee machines, smart locks or even medical equipment such as insulin pumps, IoT is becoming all-pervasive. In the future, there will hardly be any aspect of our lives that IoT will not touch one way or the other. Bluetooth Low Energy (BLE) is one of the popular radio protocols used by many IoT devices.

As the footprint of IoT devices has increased, so have the attacks on these devices by cyber criminals. Given our increasing dependency on IoT and the increasing number of cyber attacks on these devices, it’s intuitive that their security will have a huge implication on safety and security of the digital society that we are a part of!

If you wish to acquire hands-on (BLE) IoT penetration testing and securing skills and be a white hat cyber security superstar, this book is for you!




Hacking & Tor: The Complete Beginners Guide To Hacking, Tor, & Accessing The Deep Web & Dark Web (Hacking, How to Hack, Penetration Testing, Computer ... Internet Privacy, Darknet, Bitcoin)

privacyAuthor: Jack Jones
Binding: Paperback
Studio: CreateSpace Independent Publishing Platform
Label: CreateSpace Independent Publishing Platform
Publisher: CreateSpace Independent Publishing Platform
Manufacturer: CreateSpace Independent Publishing Platform

Buy Now
Editorial Review:

Would You Like to Learn Exactly What It Means to be a Hacker & How To Protect Your Identity On The Web? - NOW INCLUDES FREE GIFTS! (see below for details)


Have you always secretly admired how tech savvy hackers are?
Does the word “hacker” make you think of the cool kids who don’t obey society’s rules?
Or does the idea of someone hacking your system and stealing your data make you break out into a cold sweat?
Do you want to understand how hacking works for once and for all?
Have you been drawn to the dark side of the web?
Do you long for the days when anonymity on the web was the norm rather than the exception?
Do you want to experience the web away from all prying eyes and experience real online freedom?
Do you want to learn to play safely in the deep web?
If the answer to any of these questions is yes, this book will provide you with the answers you've been looking for!
In this book we’ll delve into the worlds of both Hacking and using Tor to stay anonymous. It might come as a surprise to you is that hacking does not need to mean having mad computer skills. You need to know some basics, naturally, but hacking a computer system is a lot simpler than you might think. And there are a lot of software and tools out there that can help you grow from a hacking novice to a hacking expert in a very short period of time.
When it comes to Tor, the deep web, it’s one of the last true bastions of freedom on the internet. It is the place that few search engines dare to tread. It is exciting and has a true air of mystery about it. But it’s also a place that not too many people know how to access.
Now I’m going to let you in on a secret – you can keep your anonymity on the web. You don’t have to know how to run elaborate software to delete all your tracks. All you need is a simple program. It’s free, it’s super-simple to install and run and you can use it today. TOR will do it all for you – it acts as an intermediary so that you don’t have to divulge your personal information when you are online. And then it routes your online activity through a number of different secure nodes making it really difficult to track.
Could it really be that simple? Despite what you see in the movies, yes it can. But you do need to know the rules. You need to know how the system works and how to get it to work for you. This book is going to show you how to do that. You will learn how to make your first forays into the deep web. And hold your horses, it will be a fun ride. The deep web is totally different from your normal internet. You need to know how to get it to give up its secrets. But, once you do, you will have a blast.
In this 3-book pack, we will look at:
  • How Hacking Works

  • Hacking Networks and Computer Systems

  • Information Gathering

  • Using the Data You Gathered

  • Password Cracking for Beginners

  • Applications to Gain Entry to Systems

  • Wireless Hacking

  • Staying Anonymous on the Deep Web

  • What the TOR network is

  • Whether or not TOR is the answer for you

  • How to get started with TOR quickly and safely

  • How to stay completely anonymous with TOR

  • How to surf the dark web safely

  • What you can expect to find on the dark web

  • …and much more!

  • Also included for a limited time only are 2 FREE GIFTS, including a full length, surprise FREE BOOK!

Take the first step towards becoming an expert hacker while maintaining complete online anonymity today. Click the buy now button above for instant access. Also included are 2 FREE GIFTS! - A sample from one of my other bestselling books, and a full length, FREE BOOK included with your purchase!




privacy
enafarzh-CNzh-TWtlfrdehiiditjamsptrues

follow InnerSelf on

google-plus-iconfacebook-icontwitter-iconrss-icon

 Get The Latest By Email

{emailcloak=off}

follow InnerSelf on

google-plus-iconfacebook-icontwitter-iconrss-icon

 Get The Latest By Email

{emailcloak=off}