Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Be informed with free updates
Simply register Cyber security Myft Digest – Delivered directly to your box.
The writer is a professor of emergency losses at the director of Cambridge Kibercrine Center and Cambridge University
In the last few weeks, Marx and Spencer, Co-op and Harrods can have heard the “scattered spider” in connection with the ongoing violation. In the absence of a public attribute For cyber attacks UK retailers are still assumed that the tactics used in the use of this name is similar to the network. Other reports offer cooperation with another cyber criminal group provided by a ransom program as a service.
The scattered spider was closed in a number of high-profile companies and leaked cyber security experts, media and the government. His symbolic power has yet been strengthened with its surprising name – it is superior to its technical skills.
The size of the group may seem the size of the alleged goals, as if the ability to hack it is required. However, the reports indicate that it enters the organizations through doors by giving access to access to this.
It can be done through social engineering (manipulating people to share personal information), targeted phishing, very factor of fattening and SIM replacement. This tactic is not a novel. They cover their credentials and use a smooth speaking employees to take advantage of a weak inspection experience to fake websites. None of these crimes require highly qualified enemies.
In the cyber security industry, marketing is everything. The names are selected to invite a visceral reaction and promote fear. This fears helps people turn expensive high-tech security products.
The scattered spider is not the official group that actually named him. The name was first summoned by a cyber security company Crowdstrike in 2022. You can also buy scattered spider figurines, shirts, mouse pads, mugs and crowdstrike Online store. (Crowdstrike, you can remember that the company accused the blame for millions of computers who violated offline, airlines, news media, health services and ambulance centers and ambulance centers last summer Botched software update.(
Simply, the deviation is not a camentstrike that comes with names for groups involved in behavior. Other security companies will jump to Jostle, media releases and select the moniker caught to ensure that the website is at the beginning of the search results. The scattered spider is given many other names, including StarFraud, UNC3944, Scattering pig and mixed scales.
There are some exceptions. Dragonforce seems to be able to use a headline selected by a security company’s marketing department and call himself in attempting to receive a title.
The names given to cyber criminal groups do not only describe their behavior, they can form. These linguistic choices provide legality of a group of young people or young adults seeking the symbolic capital of a group, seeking or seeking a reputation or reputation. For them, cyber crime can only be a transition rites, not for wealth. The scattered spider is strengthened by the same industry designed to neutralize them.
Often, the high-tech services sold by the cyber security sector protect the front door, and criminals continue to hide behind low technological methods.
In a world associated with hacker groups, the sinners can be governed by the country or language, regardless of the country and the recognition of peers. Kiberi criminal crimes usually do not give any results for their crimes because cyber threats are needed to solve cyber threats. Global prosecutor’s degrees are extremely low. Many criminals avoid the investigation, because they are relatively low despite the fact that their crimes are at a high level.
Effective border cooperation, except for the most secular cyber crimes, but it is regularly important for the police to engage in this work. You need a responsible ecosystem that can move in the early stages of security breaches.
If we must protect ourselves from the attack of cyber crime, we require both growing accusations and a mature computer security industry that nor provocate names.