Law enforcement agencies talk about the widespread concept of "crime as a service." A powerful stimulus to the development of attack tools is provided by the ever-increasing automation of attack methods. Cybercriminals are increasingly publishing open-source malware. Hackers either themselves disclose such data, or via the help of a leak.
People without special skills begin to engage in illegal activities on the Web. Today, everyone has the opportunity to purchase ready-made tools on the Internet and commit technically complex crimes. If you can’t buy something, then you can rent it.2. State Hackers
Previously, cyber terrorists were focused exclusively on the theft of money. In the past year, many targeted attacks on financial institutions with political goals were committed. Their organizers are now interested in confidential information about top managers, about VIP-clients, cash flow.
As a rule, most companies have security systems. But not everyone understands what needs to be protected, and they also have a poor idea of what cyberterrorism is today, what tools are used by scammers.3. Sabotage as a way to cover the tracks
If earlier criminal groups, having stolen money they tried to disappear, now, after a successful cyber operation, they try to destabilize work in the place of theft. For example, run ransomware viruses. This helps hackers prevent an investigation.
After the restoration of work due to sabotage, most digital evidence, as a rule, has already been destroyed, and time is also lost. According to experts, there will be more such incidents, and banks should prepare for this.
One of the possible scenarios of sabotage may be an attempt to influence exchange rates by trading on exchanges on behalf of a financial institution.4. Transition to the crypto industry
Hackers turn their attention from banks to the crypto industry (ICOs, wallets, exchanges, funds), where more money is concentrated. It has become easier to steal bitcoins, and the law does not protect victims of operations. Besides, the level of maturity of information security in blockchain companies is lower than in credit organizations. The features of blockchain technology contribute to anonymity and significantly reduce the risk for an attacker to be caught when cashing out.5. Android at gunpoint
Android Trojans are popular because of the prevalence of this OS on the Global market. This operating system is installed on 87,5% smartphones. With the help of a special virus, any device can be monetized, even if it doesn't have Internet banking. Often this happens after the user is asked to link the card to Google play.
A lot of new banking Android Trojans are created by Russian developers. Before, large customers were more often attacked via SMS banking. Now danger lurks users when they transfer money from card to card. There are other theft schemes with fake mobile banking, and purchases using Play market and Apple Pay, etc. Also, Android trojans are often focused on extracting confidential user data.