UK government blocked four times as many cyber-scams in 2021
Reading Time: 2 Minutes
More than 2.7 million scams were removed from the internet in 2021 thanks to an expansion of the UK government’s Active Cyber Defence (ACD) program.
Led by GCHQ’s National Cyber Security Centre (NCSC), successful ACD action has increased by a factor of four over the past 12 months.
This is according to preliminary figures in the latest ACD annual report, which was released today (May 10) on the first day of the NCSC-organized CyberUK conference.
Behind the scenes
During a directors’ panel session at CyberUK today, Ian Levy, technical director of NCSC, said the volume of scams blocked by the agency has increased by a factor of almost four, thanks in part to the inclusion of new categories of fraud.
For example, the NCSC has started blocking extortion-based scams against individuals and parcel delivery firms, along with ‘celebrity endorsed investment scams’.
Themes used by scammers included fake coronavirus vaccines and vaccine passports. One campaign was even discovered to be impersonating the CEO of the NCSC, Lindy Cameron.
For example, the NCSC removed more than 1,400 NHS-themed phishing campaigns last year – an 11-fold increase on 2020.
The ACD program – which works alongside the disruption of cybercrime forums such as the recent takedown of Hydra – to “increase costs and reduce opportunities for cybercriminals”, according to the NCSC.
Levy added that the agency was working with telecommunications providers to make it more difficult for criminals to spoof the phone number of reputable firms, a trick sometimes used by scammers to make frauds more credible.
Eastern front
The preliminary results from the annual report on the ACD program were released on the first day of CyberUK 2022. The full version is due to be published next week.
Other key topics topping the agenda at the event included Russia’s invasion of Ukraine and the ongoing threat from ransomware.
Western government agencies including GCHQ have blamed Russia for a series of attacks in the run up to and during its invasion of Ukraine.
These have included the deployment of destructive wiper-style malware, as well as the February 24 attack against ViaSat – an attack primarily aimed at the Ukrainian military that also hit wind farms in central Europe and internet users outside Ukraine.
“We’ve seen spill over from some of the attacks on Ukraine but nothing on the scale of NotPetya,” commented the NCSC’s Lindy Cameron.
NCSC operations director Paul Chichester added that the war in Ukraine has been accompanied by the “most offensive set of cyber operations one country has launched against another country” and the only reason they have not had a bigger effect is because of the “resilience of Ukraine”.
See Also: Attackers Use Event Logs to Hide Fileless Malware
See Also: OSINT Tool: MOSINT
See Also: Write up: Find hidden and encrypted secrets from any website
Source: portswigger.net
Source Link