Events

Discussing cybercrime laws in Sao Paulo

This week I was invited to speak at the Fifth Congress on Cybercrime, an event promoted by the São Paulo State Federation of Commerce (FECOMERCIO). There were more than 1500 participants, including journalists, politicians, lawyers, security professionals, police and businessman, all of them discussing the effects of cybercrime in the country and how society is trying to tackle it.

9177

Some very thorough research was unveiled during the Congress, which showed how Brazilians are affected by cybercrime, data leakage, privacy concerns and mobile usage. To see the complete research, download a summary here or the complete data here (Portuguese). According to this study, the most common cybercrimes reported by the respondents were:

1) Credit card cloning

2) Malicious use of personal data

3) Theft of money from Internet banking services

4) Making purchases on fake e-commerce sites

9178

The Congress discussed the latest cybercrime legislation, the recently approved “Carolina Dieckmann law”, and its effect on society. Lawyers and experts alike concluded that the law does not go far enough – the sentences are too lenient to deter the criminals.

Two more projects are awaiting approval. Brazil’s Government is considering two high-priority pieces of legislation which may change the cybercrime situation in the country: one is a law on personal data protection which aims to regulate how companies manage the data of Brazilian citizens; a second is the“Internet Constitution”, which would regulate the neutrality of the Internet and oblige IT companies to host their servers and user data locally.

I presented an overview of Brazilian malware and botnets, detailing recent attacks such as the DSL modem vulnerabilities, the latest techniques used by the crooks and the current trends among Brazilian Trojan bankers.

9179

At the end of the event the audience had reached a consensus: any successful battle against cybercrime will require a joint effort from government, industries, commerce, and security companies.

Discussing cybercrime laws in Sao Paulo

Your email address will not be published. Required fields are marked *

 

Reports

APT trends report Q2 2021

This is our latest summary of advanced persistent threat (APT) activity, focusing on significant events that we observed during Q2 2021: attacks against Microsoft Exchange servers, APT29 and APT31 activities, targeting campaigns, etc.

LuminousMoth APT: Sweeping attacks for the chosen few

We recently came across unusual APT activity that was detected in high volumes, albeit most likely aimed at a few targets of interest. Further analysis revealed that the actor, which we dubbed LuminousMoth, shows an affinity to the HoneyMyte group, otherwise known as Mustang Panda.

WildPressure targets the macOS platform

We found new malware samples used in WildPressure campaigns: newer version of the C++ Milum Trojan, a corresponding VBScript variant with the same version number, and a Python script working on both Windows and macOS.

Ferocious Kitten: 6 years of covert surveillance in Iran

Ferocious Kitten is an APT group that has been targeting Persian-speaking individuals in Iran. Some of the TTPs used by this threat actor are reminiscent of other groups, such as Domestic Kitten and Rampant Kitten. In this report we aim to provide more details on these findings.

Subscribe to our weekly e-mails

The hottest research right in your inbox