CryptoLocker Was Just the Beginning

Back in 2013, CryptoLocker was terrifying enough. It didn’t sneak in to steal your passwords or spy on your browsing habits, no!, it marched straight in, slammed the door behind it, encrypted everything in sight, and flashed a blinking red ransom note demanding Bitcoin like a digital hostage negotiator with a countdown clock. It was bold, it was brutal, and it was the first time many people realized: your files could be locked up and leveraged against you with no Hollywood-style hacker, just a suspicious ZIP file in your inbox.

CryptoLocker didn’t need a flashy exploit or deep system knowledge. It weaponized trust disguised as invoices, delivery slips, or bank statements and lured users into opening attachments that detonated silently in the background. Once triggered, it encrypted documents, photos, spreadsheets, and anything else it could get its hands on, and then calmly asked for payment in Bitcoin, which, at the time, still sounded like something from a hacker movie.

But that was then, the opening act. What followed after my first article, was a decade-long escalation that turned ransomware from a nuisance

Read more

Of Hacks & Keyloggers – Part 1

Of Hacks & Keyloggers…!!! “I don’t know what happened!; I don’t remember visiting any dodgy websites, downloading any weird apps, opening any suspicious emails or attachments, let alone links!, why I am receiving these sms & email notifications from my Bank!?!?” Sounds familiar right? Come to think of it, in most cases the unsuspecting victim is being honest. That being said, I just remembered something; a previous write up revolving around one of the methods used to carry out this type of attack. It can happen to anyone, in fact I was once a victim!

 

 

What is a keylogger? 

Read more

Youth Pathways into Cybercrime

Acrobat Youth Pathways into Cybercrime
Author: Research leads: Professor Mary Aiken, Professor Julia Davidson & Dr Philipp Amann
Source: http://www.mdx.ac.uk/
Overview: Many security and police professionals spend their time analysing the technical and mechanical aspects of cybercrime, dissecting malware and exploit tools, forensically analysing code and techniques. However, few actively focus on the social and psychological aspects: who for example is the attacker, what motivates them, and more importantly how and when did this deviant behaviour begin? Understanding the behavioural and developmental aspects of cybercriminality is becoming increasingly important, and underlies the necessity of a shift in focus from sanctions to deterrence and prevention. That being said, there is an urgent need to understand the pathways that lead some young people into cybercrime hence it is important for parents to be aware of their own youth’s online activity and risk. Read More