Members of the Ministry of Internal Affairs, the Department for Suppressing High-tech Crime, filed 166 criminal charges against 168 persons suspected of having committed a high-tech crime-related offense from the beginning of 2020 to October 13.
– The most frequent criminal offenses are fraud, crime against sexual freedom committed against underage persons, displaying, obtaining and owning pornographic material and using an underage person for pornography, stalking, endangering of safety,
unauthorized access to a protected computer, computer network and electronic data processing, computer fraud, computer sabotage and others – the Ministry of Internal Affairs says for eKapija.
In order for companies to be protected from high-tech crime, they need to invest in technical equipment, up-to-date operating systems and antivirus tools and in the education of their employees, the ministry advises.
Over 90% of cyber attacks start with phishingWhen it comes to ICT systems of special importance, the institution in charge of monitoring incidents on a national level is CERT (National Center for Prevention of Security Risks at the ICT Systems of the Republic of Serbia).
Attacks on such systems have mostly come from abroad. Phishing is the dominant attack vector, aiming to distribute the malware called LokiBot, Jovan Milosavljevic of CERT says and clarifies:
– This trojan is one of the most famous infostealers, which uses a keylogger to oversee the browser and the screen activities and steal cookies and credentials, that is, usernames and passwords stored on such services as web browsers, messaging apps, VPN, FTP, email, gamer accounts and accounts used for online payments and so on.
He adds that, in Serbia, LokiBot has been distributed since May 2020,
initially being directed at users in the financial sector and then at public institutions and business entities.
– Considering that over 90% of cyber attacks begin with a phishing campaign,
there are preventive solutions which can considerably reduce the reception of such messages. Primarily, these are protocols like SPF, DMARC and DKIM. For that reason, the National CERT has, among other things, presented this topic in the form of a publication available at our web page
www.cert.rs, where there`s a detailed explanation about how these protocols are implemented and how important they are.