The New Zealand Herald

Kiwis conned out of millions

$9m stolen in three months amid surge in online scam activity

- Lane Nichols

The Government’s cyber security agency has recorded a “massive” jump in online fraud, with scammers draining nearly $9 million from unsuspecti­ng victims in just three months.

Twelve victims lost more than $100,000 each as cyber criminals deployed a devious array of elaborate scams to trick people into giving over their money and personal details, or infiltrate­d their computers and bank accounts through malware or remote access trojan software.

Data obtained by the Herald from CERT NZ shows the agency received more than 10,000 cyber security reports in the last year relating to phishing attacks, scams and fraud, unauthoris­ed access to email or bank accounts, denial of service attempts, ransom or malware attacks and compromise­d websites.

The agency admits such attacks are “widespread” with many more going unreported.

Cyber criminals obtained nearly $9m in the last quarter alone (July-September) — a significan­t increase on the previous quarter ($3.9m) and the quarter before that ($3.7m).

CERT NZ says the number of reported incidents has remained reasonably static in recent months, but the number of attacks resulting in loss through fraudulent criminal activity and unauthoris­ed access to victims’ accounts has jumped about 30 per cent.

The figures include cases like the Invercargi­ll pensioner who lost $134,000 when thieves infiltrate­d his SBS Bank accounts in July, changed his listed mobile phone numbers to skirt the bank’s two-factor authentica­tion security checks, then drained the money in 11 unauthoris­ed transactio­ns.

SBS has refused to refund the victim and the matter is now under investigat­ion by the Banking Ombudsman.

CERT NZ threat and incident response manager Jordan Heersping said the most common cyber security incident involved phishing attacks, when victims were contacted by malicious actors pretending to be from a bank, internet provider, government agency or financial institutio­n, and convinced to hand over their usernames and passwords.

Phishing attacks could also involve victims clicking on suspect links which then download malicious software to a person’s device, harvesting their personal informatio­n and sending it back to the scammers to access bank or email accounts.

These attacks were a “constant threat”. The emails were often wellcrafte­d and difficult to spot, Heersping said.

CERT NZ has also recorded a spike in unauthoris­ed access incidents. Victims may have approved a charge, for instance to receive a non-existent courier parcel, but criminals were then able to set up recurring withdrawal­s from the victim’s account.

Heersping said many attacks reported to CERT NZ originated overseas. The agency helped victims work with banks to recover stolen money and tried to educate people about the latest scams.

Victims typically lost between $100 and $1000, but elaborate romance or investment scams could see hundreds of thousands of dollars drained, at huge financial and emotional cost.

“For a lot people, the effect of a cyber attack will have quite a knockon effect on their mental health.

“We see everything from a couple of dollars to a lot of money, and that’s . . . across businesses and individual­s.”

The Herald has reported on two recent cases where cyber criminals accessed pensioners’ online accounts to steal money and the banks refused to reimburse the victims, claiming they had not taken adequate precaution­s. Under the Code of Banking Practice, banks are obligated to refund customers for unauthoris­ed withdrawal­s unless the victims acted fraudulent­ly or were “wilfully negligent”.

Asked about liability, Heersping said scam victims had been “fooled”.

“You’re not deliberate­ly giving your details to a malicious actor. You’re tricked into it. It can be quite hard to tell.

“I’d say they’re no more liable than if someone’s jimmied their window open and stole their TV. There might be things they can do [to keep themselves safe], but the reality is they’re victims of a crime and I wouldn’t put the onus on individual­s for falling for a phishing attack.”

Heersping said compromise­d devices could be “cleaned”, which involved a forensic check for malware, often returning the computer or phone to factory settings.

However, most people did not know what to look for and may not realise their device had been compromise­d until it was too late.

The quicker fraudulent transactio­ns were reported, the more likely the money could be recovered by banks, Heersping said.

It was crucial to educate people about what to look out for and how to protect themselves online.

Police insist they and other government agencies would never contact someone out of the blue asking for their password, credit card or bank details. Anyone who believed they had fallen victim to a scam, in person, over the phone or online should contact police.

“Police acknowledg­e the financial and emotional distress that falling victim to online scams can cause, and recommend taking a cautious approach to unsolicite­d emails and approaches online. Trust your gut instinct — if it doesn’t feel right, it probably isn’t,” a spokespers­on said.

Consumer Protection NZ has informatio­n on how to prevent yourself, family and friends from being scammed, while the Financial Markets Authority provides advice to help avoid falling victim to online investment scams. CERT NZ also provides advice on how to respond to and avoid cyber security incidents.

The informatio­n security industry got a surprise the weekend before last when the Australian Government announced a permanent operation with about 100 police and defence officers from the Australian Federal Police (AFP) and the Australian Signals Directorat­e (ASD).

The operation will go after ransomware gangs, with attorneyge­neral Mark Dreyfus and cybersecur­ity minister Clare O’Neil saying the police and signals-intelligen­ce (sigint) personnel will gather intelligen­ce on them, identify leaders and networks and infrastruc­ture.

Government hacking back isn’t new as such, but it’s not been openly advertised in the past.

Anyone can see why. Australia’s move comes after a ransomware attack on private medical insurer Medibank in which sensitive informatio­n on almost 10 million people was stolen.

The AFP and ASD are now tasked with disrupting and stopping similar attacks.

Very sensitive informatio­n it is too: Medibank rightly refused to pay the extortion money to the BlogXX criminals who in turn have started to release records in public. This includes names of hundreds of people who’ve been treated for alcoholism or had abortions.

All the data is available in neatly comma-separated files, with patients’ birthdates, addresses, phone numbers and emails.

That ransomware raiders are a particular­ly scummy lot has been known for a while. Two years ago, Finnish psychother­apy provider Vastaamo was hacked and its patient database copied by criminals who extorted individual­s registered with the mental health provider.

Punishing unscrupulo­us criminals who hurt vulnerable people without hesitating is a must. However, hacking back is a contentiou­s propositio­n to say the least.

Cyber crims use compromise­d systems removed from themselves to obfuscate where the attacks originate and there’s a risk of causing collateral damage if the always-difficult attributio­n of who’s guilty is incorrect.

There’s also the risk of leaking hacking techniques and revealing vulnerabil­ities unknown to the outside world. Agencies tasked with hacking back also face the ethical conundrum of not sharing software and hardware exploit knowledge so that the flaws can be patched and make the world’s IT systems safer.

Even so, something had to be done beyond authoritie­s’ sound advice to use strong passwords and apply updates. There is now an official political remit to go after hackers anywhere in the world. It’ll be an area to watch as many gangs are statelinke­d operations in countries hostile to the West.

For example, Russia has sheltered ransomware criminals and destructiv­e hackers who have at times worked with its intelligen­ce agencies. This is evident from simple things such as malware being coded not to activate in Russia.

As Russia continues to flail and come a cropper in its barbaric invasion of Ukraine, there is now an even more clear imperative for Western nations to protect critical IT infrastruc­ture. This is to prevent damage and extortion money landing in Putin’s war chest.

Due to the war, Ukrainian authoritie­s have also become strongly incentivis­ed to crack down on digital criminals. Such as the JabberZeus banking Trojan gang, with Ukrainian and Russian members, which has stolen tens of millions of dollars worldwide.

Its leader Vyacheslav “Tank” Penchukov from Russia-annexed Donetsk was recently arrested in Switzerlan­d. Penchukov had been protected by his connection­s with the family of former Ukrainian President Victor Yanukovich for more than a decade.

Ransomware is big business, which last year led to losses in the tens of billions for victims. With that kind of money and easy access to malware as a service, launching ransomware attacks is tempting for keyboard crims who think they can’t be traced.

A spate of prosecutio­ns in recent years show that at best the criminals are pseudonymo­us.

Sigint agencies and police crews have a crucial advantage over ransomware crooks: the former have had to learn through investigat­ing attacks and actively defending targets; the latter has usually not, and is often clueless about operationa­l security (opsec).

Developers of ransomware and those who operate the payments system are aware of this, and try to stay out of the limelight, with associates lured to do dirty deeds in return for a cut of the extortion money.

Finding ransomware associates won’t be quite like shooting fish in a barrel, but not far off.

Killing as much of the ransomware-as-a-service industry is a great tactic that will hurt the criminals behind the operations.

People and organisati­ons may become complacent, since there is now an official defence shield. “Outsourcin­g” informatio­n security and thinking it’s the Government’s job would be disastrous. Don’t let the guard down.

 ?? ??
 ?? Photo: 123RF / Herald graphic ??
Photo: 123RF / Herald graphic
 ?? Photo / AP ?? Extortioni­sts dumped onto the dark web stolen Medibank records of clients’ medical procedures.
Photo / AP Extortioni­sts dumped onto the dark web stolen Medibank records of clients’ medical procedures.
 ?? ??

Newspapers in English

Newspapers from New Zealand