The bad news is that while the rise of online shopping and banking has made life easier for us, it has also made conducting fraud much simpler – and in the worst case scenario, a cyber criminal could gain access to your personal finances simply by stealing your username and password. One of the most common methods cyber criminals use to steal usernames and passwords for bank accounts is phishing attacks, where they’ll send an email – or an SMS message – claiming to be from a bank or retailer. SEE: A winning strategy for cybersecurity (ZDNet special report) The aim of the attack is to trick the victim into clicking on a phishing link, and one of the ways to drive victims towards this is by using fear or doubt. For example, the message could claim that a transaction or purchase has been made with a request to click the link to investigate further. Often, the attackers will design a fake version of the bank’s website. If the unlucky recipient of the fake message is tricked into entering their username and password, it is then in the hands of the attackers. Banks are not the only entities that can be impersonated in this way – it can also be retailers, government agencies or pretty much anyone else. The aim is to get access to your details by any means. “Throughout the coronavirus pandemic, we’ve seen a range of topical scam campaigns – from bogus missed delivery texts to offers of fake vaccine appointments. In addition to using these hooks, cyber criminals can take information from social media to target individuals with tailored, convincing-looking scams,” says Sarah Lyons, deputy director for economy and society at the UK’s National Cyber Security Centre (NCSC). Beyond this threat, there’s also the hackers who aim to infect victims’ devices with banking trojan malware, which monitors the user’s computer or smartphone for activity to do with financial transactions and sends all the relevant information back to the attackers. Attackers will often trick victims into downloading malware, once again with either phishing links or fake and infected versions of popular software, and even malicious apps hidden in popular mobile app stores. In order to avoid falling victim to cyberattacks that are targeting financial information, the NCSC recommends maintaining good cyber hygiene across online accounts in order to keep them as secure as possible. This approach includes using a strong, separate password for each online account and turning on multi-factor authentication – both will make it much more difficult for attackers to breach accounts. Users should also take care with what they click on and limit the personal information they post on public social media accounts – as that information could be exploited to help identify accounts they have or conduct social-engineering attacks. “We can reduce the likelihood of being targeted with convincing phishing emails by taking extra care when using social media. Minimising the amount of our personal information shared on social media and enabling privacy settings keeps us secure,” says Lyons. Banks and other services will often send alerts about suspicious activity on accounts – paying attention to these alerts can help keep accounts secure, but users should also be wary as cyber criminals build their own versions of these alerts to trick people into providing information. If you have suspicions about alerts like this, it’s a good idea to contact the bank directly by using the contact details on their official website to report them. In the event it turns out you’ve fallen victim to a phishing email, you should change your passwords immediately, as well as changing the passwords on any accounts that might use the same password. If you’ve lost money as a result of cybercrime, you should report the loss to your bank and also to the police. As for malicious apps, these can use clever tricks to bypass the security screening designed to keep them out of app stores, often posing as commonly used or high-profile applications. They can remain in app stores for months at a time before being uncovered and removed, although not before being downloaded, in some cases by hundreds of thousands of victims. Users should be wary when downloading apps. Checking reviews can give an indication if something is wrong. Often, people who’ve lost out to cyber criminals after downloading the app will mention that this has been the case, while reviews could also suggest that the application is fake if it doesn’t work as advertised. SEE: My stolen credit card details were used 4,500 miles away. I tried to find out how it happened While these basic security recommendations can apply to many online services, a new area of interest for criminals is cryptocurrency. The rise of cryptocurrency, especially high-value cryptocurrencies like Bitcoin, means that cyber criminals are increasingly focusing their attention on this new area. Cryptocurrency is harder to trace than traditional finances and the decentralised nature of the ecosystem means that if your cryptocurrency is stolen, it is unlikely to be returned in the way ’traditional’ finances can be returned by your bank in the event of your falling victim to fraud. That reality means storing cryptocurrency securely is vital, especially as the growth in popularity means it’s becoming an increasingly popular target for cyber criminals – it’s reported that $7.7 billion worth of cryptocurrency was stolen in 2021 alone. “As cryptocurrency is in the news more – and as people know about it more as it becomes more valuable – the attackers flock to it,” says Christopher Budd, senior threat labs communications manager at cybersecurity company Avast. Much of the advice for keeping your online bank accounts secure also applies to cryptocurrency: use strong passwords, use multi-factor authentication and be wary of phishing emails and other scams. But there are additional measures that need to be considered. Many users will opt to keep their cryptocurrency in a crypto exchange, allowing them to easily buy, sell and trade different cryptocurrencies. The rise of cryptocurrency means that many different exchanges have emerged. While relying on a professional service to help store and secure your cryptocurrency might seem like the best option at first, there are also potential risks. In the same way criminals will target banks and retailers to steal money and credit card information, crypto exchanges are a high-profile target for cyber criminals who want a big pay day – and there have been instances of hackers walking away with hundreds of millions of dollars worth of cryptocurrency in successful attacks targeting the exchanges themselves. Much like banking and retail, it’s almost impossible that an organisation can guarantee assets are 100% secure, but there’s a greater chance that an established exchange will have better protocols in place than a newcomer with little background information online. Cryptocurrency users should also be mindful that one of the best ways to ensure cryptocurrency is securely stored is if they’ve put the appropriate protections in place themselves. An exchange may claim to have special security features to keep users secure, but if the user isn’t able to examine or operate these features themselves, then it might be worth considering a different option. “You don’t do yourself any benefit if you get something that has supposedly great security, but you don’t know how to use it,” says Budd. “Having a good, old-fashioned deadbolt lock that you know how to use on your house is more effective than a $100,000 security system that you don’t know how to use.” At the very least, cryptocurrency users who want to store their assets in a crypto exchange should look for one that allows multi-factor authentication – and they should also apply multi-factor authentication to the email address tied to the account as an additional barrier. For those who feel that storing their cryptocurrency in an exchange that could be targeted by attackers is too much of a risk, there’s the option of storing cryptocurrency on their own devices. It could be tempting to keep complex crypto-authentication keys in a document in order that they can be easily accessed, copied and pasted when the need arises. However, this carries risks because if your username and password for your cloud documents are compromised, the key is waiting for the cyber criminal who has accessed your account. Even if the document is stored offline, there’s the chance it could be accessed if an attacker manages to infect your PC with malware. In this case, using traditional methods could be the best way to keep assets safe: writing the key down and storing it safely in your home. What’s important here is ensuring that your device is as secure against attacks as possible – multi-factor authentication should be applied to accounts, passwords should be complex enough to not be breached in brute-force attacks – and the same password shouldn’t be shared among different accounts, because if attackers can steal it from one service, they could attempt to use the same password against other accounts linked to your email address. SEE: Variant of Phorpiex botnet used for cryptocurrency attacks in Ethopia, Nigeria, India and more If you buy cryptocurrency, it needs to be stored in a crypto wallet and there are two key forms of wallet. Users can choose to use one or both of them to store their cryptocurrency. Both have advantages and disadvantages. A hot wallet is a cryptocurrency wallet that’s always connected to the internet, and linked to public and private keys, which an individual can use to easily and conveniently send and receive cryptocurrency. However, the always-on connection to the internet could potentially leave these wallets vulnerable to being hacked. Cold storage is when cryptocurrency is kept offline, with hardware, physical keys and PINs or passwords used to keep the crypto secure. These hardware wallets are designed to prevent hacking and are only accessible when plugged into your computer. This second form of wallet is the more secure way to store cryptocurrency, although it is much less convenient, requiring the user to store a separate physical device. And much like traditional banknotes, any device with cryptocurrency on it should be stored in a safe place where it can’t be lost or stolen.
MORE ON CYBERSECURITY
Android malware warning: Over 500,000 users have been infected after downloading this app from Google PlayThis old malware has just picked up some nasty new tricksPolice found 225 million stolen passwords hidden on a hacked cloud server. Is yours one of them?More than $97 million stolen from Liquid cryptocurrency exchangeHow to lock down your Microsoft account and keep it safe from outside attackers