by Ivan Cimmarusti 10 April 2018
A secure computer is a computer disconnected from the network. But it is also a useless machine. "Investment in cyber security and respect for canons of prudence, perhaps codified in corporate best practices, are the right answers for preventing hacker attacks," assures deputy quaestor Ivano Gabrielli, head of the Cnaipic (National Cybercrime Centre for Critical Infrastructure Protection) of the Postal Police.
At stake is a multi-million business based on the illicit trafficking of sensitive data, often stolen with computer viruses and used to damage the legitimate owners, through computer fraud and extortion. Resale within black markets allocated in the dark web, that part of the Internet that makes controls difficult because it is covered by an anonymisation system, is not excluded. Lawyers and accountants in particular are in the crosshairs, but also those companies that turn to these professionals for financial transactions that should remain secret but risk ending up in the hands of cybercriminal organisations that can resell them, also favouring forms of insider trading.
Sensitive data and privacy
Everything revolves around the sphere of privacy and the trafficking of sensitive data, the online sale of which promises maximum profits but low risks (see interview below). We are talking about confidential material that may concern 'the financial structure of a professional firm or a company,' Gabrielli explains, 'but also data pertaining to the personal sphere of individuals, who could thus also end up the victim of blackmail. Investigators often have to deal with two types of computer crime, which professional firms also incur. The most critical is 'ransomware': a system that can be compared to a 'worm', a worm,' Gabrielli explains, 'that once entered through an email, starts moving from computer to computer, encrypting the contents of files with an access key that is impossible to decipher. Within minutes, the firm finds itself deprived of all its data. To get it back, it has to pay through cryptocurrencies that make even financial investigations difficult'.
Dark web
What is different are 'Ceo' and 'Bec' frauds: the former takes its name from the chief executive officer - i.e. the managing director of a company - while the latter from business email compromise. Through these two forms of fraud, professional firms can have sensitive confidential data stolen that could be used for various purposes, in addition to fraud. Investigators do not rule out the possibility that behind these attacks there may be hackers specifically hired on the dark web to break into the computer systems of professional firms and companies in order to steal sensitive documents relating to sensitive financial transactions.
Protocols and cyber security
Protection must follow two parallel tracks: on the one hand, investment in cyber security, a cost related to improving the security of the IT infrastructure, and on the other hand, planning a proper protocol to which reference can be made in order to minimise the risk of computers being infected. 'Issuing precise corporate cyber security policies can be an important factor in governing risk,' Gabrielli concludes.