Internet organised crime threat assessment IOCTA (2020).pdf

(10466 KB) Pobierz
_2
IOCTA
2020
[2020]
get.password+
launch.a�½ack
windows.code
launch.a�½ack<
INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2020
© European Union Agency for Law Enforcement Cooperation 2020.
Reproduction is authorised provided the source is acknowledged. For any use or
reproduction of individual photos, permission must be sought directly from the
copyright holders.This publication and more information on Europol are available on
the Internet.
www.europol.europa.eu
Contents
IOCTA
2020
_3
Contents
Foreword
Key findings
04
08
Abbreviations
Introduction
05
10
Executive summary
06
1
Cross-cutting crime facilitators and
challenges to criminal investigations
1.1
1.2
1.3
1.4
1.5
1.6
Introduction
11
4
Payment fraud
4.1
4.2
4.3
4.4
4.5
4.6
Introduction
Increase in SIM swapping and SMishing
Business Email Compromise remains a
threat and growing area of concern
42
COVID-19 demonstrates criminal opportunism
Data compromise
Cryptocurrencies facilitate payment for all
forms of cybercrime
Challenges with reporting plague ability to
create accurate overview of crime
Law enforcement access to data continues
to challenge investigations
Online investment fraud draws in victims all
over Europe
Card-not-present fraud continues
to increase as criminals diversify
Terminal attacks increase as popularity of
black-box attacks soars
2
3
Cyber-dependent crime
2.1
2.2
2.3
2.4
Introduction
Ransomware
Malware
DDoS
23
5
The criminal abuse of the Darkweb
5.1
5.2
5.3
5.4
Introduction
Marketplace developments
54
Administrators and users adapt as they aim
to enhance security and resilience
Infrastructure preferences remain stable, but
criminals do use alternatives
Privacy enhancing wallets emerge as top
threat, as privacy enhancing coins gain pop-
ularity
Surface web platforms offer an additional
dimension to Darkweb trading
Steady supply of diverse Darkweb market
items
Child sexual exploitation online
3.1
3.2
3.3
3.4
3.5
3.6
3.7
Introduction
The amount of online child sexual abuse
material continues to increase
34
5.5
5.6
5.7
Criminals increasingly encrypt their
communications complicating investigations
Darkweb offender communities are
continuously evolving
Livestreaming is becoming mainstream
Commercia-lisation of online CSE is an
emerging threat
Online child sexual abuse to remain
significant threat
Recommendations
60
References
62
_4
IOCTA
2020
Foreword
Foreword
Catherine De Bolle
Executive Director of Europol
I am pleased to introduce the Internet Organised Crime
Threat Assessment (IOCTA) 2020.
The IOCTA is Europol’s flagship strategic product
highlighting the dynamic and evolving threats from
cybercrime. It provides a unique law enforcement-
focused assessment of emerging challenges
and key developments in the area of cybercrime.
We are grateful for the many contributions from
our colleagues within European law enforcement
community and to our partners in the private
industry for their input to the report. Combining law
enforcement and private sector insights allows us to
present this comprehensive overview of the threat
landscape.
The data collection for the IOCTA 2020 took place
during the lockdown implemented as a result of the
COVID-19 pandemic. Indeed, the pandemic prompted
significant change and criminal innovation in the
area of cybercrime. Criminals devised both new
modi operandi and adapted existing ones to exploit
the situation, new attack vectors and new groups of
victims.
The analysis for the IOCTA 2020 clearly highlights
cybercrime as a fundamental feature of the European
crime landscape. Cybercrime remains among the
most dynamic forms of crime encountered by law
enforcement in the EU. While ransomware, business
email compromise and social engineering are familiar
cybercrime threats, their execution evolves constantly
and makes these criminal activities more complex to
detect and to investigate. Ransomware in particular
remains a priority threat encountered by cyber
investigators across the EU. The amount of online child
sexual abuse material detected continues to increase,
further exacerbated by the COVID-19 pandemic, which
has had serious consequences for the investigative
capacity of law enforcement authorities.
Europol is at the forefront of law enforcement
innovation and offers various policing solutions in
relation to encryption, cryptocurrencies and other
challenges. The European Cybercrime Centre (EC3)
at Europol is the platform of choice for cybercrime
investigators across the EU and beyond to connect,
collaborate and communicate.
The case studies illustrating this report demonstrate
the necessity and effectiveness of international law
enforcement cooperation in tackling cybercrime
as well as the vital role played by private-public
partnerships in this area. Europol provides an ideal
framework for these different stakeholders to come
together, exchange information and take concerted
action.
Cybercrime affects citizens, businesses and organisations across the
EU. Europol plays a key role in countering cybercrime by working with
our many partners in law enforcement and the private sector and by
offering innovative solutions and effective, comprehensive support to
investigations. I hope this analysis can inform effective responses to
these evolving threats and make Europe safer.
_5
IoCtA
2020
AbbrevIAtIons
Abbreviations
AaaS
Access-as-a-Service
AI
Artificial Intelligence
ATM
Automated teller machine
BEC
Business email compromise
BPH
Bulletproof hosting
CaaS
Cybercrime-as-a-Service
C&C
Command & control
CNP
Card-not-present
CSAM
Child sexual abuse material
CSE
Child sexual exploitation
DDoS
Distributed Denial of Service
DNS
Domain Name System
DoH
DNS over HTTPs
E-commerce
Electronic commerce
EC3
Europol’s European Cybercrime Centre
E-skimming
Electronic skimming
GDPR
General Data Protection Regulation
HTML
Hypertext Markup Language
HTTP
Hypertext Transfer Protocol
HTTPs
Hypertext Transfer Protocol Secure
IOCTA
Internet Organised Crime Threat
Assessment
IoT
Internet of Things
IP
Internet protocol
ISP
Internet service provider
IT
Information technology
J-CAT
Joint Cybercrime Action Taskforce
KYC
Know your customer
LDCA
Live distant child abuse
MaaS
Malware-as-a-Service
NCMEC
The National Center for Missing and
Exploited Children
OTP
One time password
PC
Personal computer
PGP
Pretty Good Privacy
POS
Point of sale
P2P
Peer-to-peer
RaaS
Ransomware-as-a-Service
RATs
Remote access tools
RDP
Remote desktop protocol
SIM
Subscriber identity module
SQL
Structured query language
Tor
The onion router
VIDTF
Victim Identification Taskforce
VPN
Virtual private network
VPS
Virtual private server
2FA
Two-factor authentication
Zgłoś jeśli naruszono regulamin