Internet Organised Crime Threat Assessment Iocta 2020 PDF
Internet Organised Crime Threat Assessment Iocta 2020 PDF
Internet Organised Crime Threat Assessment Iocta 2020 PDF
[2020]
get.password+
launch.a�ack
windows.code
launch.a�ack<
INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2020
www.europol.europa.eu
Contents IOCTA 2020 _3
Contents
4.1 Introduction
1.1 Introduction
4.2 Increase in SIM swapping and SMishing
1.2 COVID-19 demonstrates criminal opportunism
4.3 Business Email Compromise remains a
1.3 Data compromise threat and growing area of concern
1.4 Cryptocurrencies facilitate payment for all 4.4 Online investment fraud draws in victims all
forms of cybercrime over Europe
1.5 Challenges with reporting plague ability to 4.5 Card-not-present fraud continues
create accurate overview of crime to increase as criminals diversify
1.6 Law enforcement access to data continues 4.6 Terminal attacks increase as popularity of
to challenge investigations black-box attacks soars
2 Cyber-dependent crime 23
2.1 Introduction
5 The criminal abuse of the Darkweb 54
5.1 Introduction
3
5.5 Privacy enhancing wallets emerge as top
Child sexual exploitation online 34
threat, as privacy enhancing coins gain pop-
ularity
3.1 Introduction
5.6 Surface web platforms offer an additional
3.2 The amount of online child sexual abuse
dimension to Darkweb trading
material continues to increase
5.7 Steady supply of diverse Darkweb market
3.3 Criminals increasingly encrypt their
items
communications complicating investigations
3.4 Darkweb offender communities are
continuously evolving
3.5 Livestreaming is becoming mainstream
3.6 Commercia-lisation of online CSE is an
emerging threat
3.7 Online child sexual abuse to remain
significant threat
Recommendations 60 References 62
_4 IOCTA 2020 Foreword
Foreword
Catherine De Bolle
Executive Director of Europol
I am pleased to introduce the Internet Organised Crime email compromise and social engineering are familiar
Threat Assessment (IOCTA) 2020. cybercrime threats, their execution evolves constantly
and makes these criminal activities more complex to
The IOCTA is Europol’s flagship strategic product detect and to investigate. Ransomware in particular
highlighting the dynamic and evolving threats from remains a priority threat encountered by cyber
cybercrime. It provides a unique law enforcement- investigators across the EU. The amount of online child
focused assessment of emerging challenges sexual abuse material detected continues to increase,
and key developments in the area of cybercrime. further exacerbated by the COVID-19 pandemic, which
We are grateful for the many contributions from has had serious consequences for the investigative
our colleagues within European law enforcement capacity of law enforcement authorities.
community and to our partners in the private
industry for their input to the report. Combining law Europol is at the forefront of law enforcement
enforcement and private sector insights allows us to innovation and offers various policing solutions in
present this comprehensive overview of the threat relation to encryption, cryptocurrencies and other
landscape. challenges. The European Cybercrime Centre (EC3)
at Europol is the platform of choice for cybercrime
The data collection for the IOCTA 2020 took place investigators across the EU and beyond to connect,
during the lockdown implemented as a result of the collaborate and communicate.
COVID-19 pandemic. Indeed, the pandemic prompted
significant change and criminal innovation in the The case studies illustrating this report demonstrate
area of cybercrime. Criminals devised both new the necessity and effectiveness of international law
modi operandi and adapted existing ones to exploit enforcement cooperation in tackling cybercrime
the situation, new attack vectors and new groups of as well as the vital role played by private-public
victims. partnerships in this area. Europol provides an ideal
framework for these different stakeholders to come
The analysis for the IOCTA 2020 clearly highlights together, exchange information and take concerted
cybercrime as a fundamental feature of the European action.
crime landscape. Cybercrime remains among the
most dynamic forms of crime encountered by law
enforcement in the EU. While ransomware, business
Abbreviations
C&C Command & control NCMEC The National Center for Missing and
Exploited Children
CNP Card-not-present
OTP One time password
CSAM Child sexual abuse material
PC Personal computer
CSE Child sexual exploitation
PGP Pretty Good Privacy
DDoS Distributed Denial of Service
POS Point of sale
DNS Domain Name System
P2P Peer-to-peer
DoH DNS over HTTPs
RaaS Ransomware-as-a-Service
E-commerce Electronic commerce
RATs Remote access tools
EC3 Europol’s European Cybercrime Centre
RDP Remote desktop protocol
E-skimming Electronic skimming
SIM Subscriber identity module
GDPR General Data Protection Regulation
SQL Structured query language
HTML Hypertext Markup Language
Tor The onion router
HTTP Hypertext Transfer Protocol
VIDTF Victim Identification Taskforce
HTTPs Hypertext Transfer Protocol Secure
VPN Virtual private network
IOCTA Internet Organised Crime Threat
Assessment VPS Virtual private server
Executive summary
The threat landscape over the last year described in the COVID-19 crisis; a recent case shows production also
IOCTA 2020 contains many familiar main characters. takes place in the EU.
The starring roles in terms of priority threats went to
the likes of social engineering, ransomware and other Data compromise once more features as a central
forms of malware. Several interviewees captured the aspect throughout a number of threats. Both law
essence of the current state of affairs of the threat enforcement and private sector representatives
landscape by stating: cybercrime is an evolution, not consistently report on social engineering among
a revolution. As time passes, the cyber-element of the top threats. With regard to social engineering, in
cybercrime infiltrates nearly every area of criminal particular phishing, cybercriminals are now employing
activity. Key elements mentioned in previous editions a more holistic strategy by demonstrating a high level
of the IOCTA that return this year merit more, of competency when exploiting tools, systems and
rather than less, attention. The repetition means vulnerabilities, assuming false identities and working
the challenge still exists and has, in many cases, in close cooperation with other cybercriminals.
increased, underlining the need to further strengthen However, despite the trend pointing towards a growing
the resilience and response to well-known threats. sophistication of some criminals, the majority of social
The IOCTA 2020 makes clear that the fundamentals engineering and phishing attacks are successful
of cybercrime are firmly rooted, but that does not due to inadequate security measures or insufficient
mean cybercrime stands still. Its evolution becomes awareness of users. In particular, as attacks do not
apparent on closer inspection, in the ways seasoned have to be necessarily refined to be successful.
cybercriminals refine their methods and make their
The developments in the area of non-cash payment
artisanship accessible to others through crime as a
fraud over the past twelve months reflect the overall
service.
increase in sophistication and targeting of social
The COVID-19 crisis illustrated how criminals actively engineering and phishing. Fuelled by a wealth of readily
take advantage of society at its most vulnerable. available data, as well as a Cybercrime-as-a-Service
Criminals tweaked existing forms of cybercrime to fit (CaaS) community, it has become easier for criminals
the pandemic narrative, abused the uncertainty of the to carry out highly targeted attacks. As a result, law
situation and the public’s need for reliable information. enforcement and industry continue to identify well-
Across the board from social engineering to Distributed established frauds as a major threat.
Denial of Service (DDoS) attacks and from ransomware
Subscriber identity module (SIM) swapping is one of
to the distribution of child sexual abuse material
the new key trends this year, having caused significant
(CSAM), criminals abused the crisis when the rest
losses and attracted considerable attention from
of society was trying to contain the situation. The
law enforcement. As a highly targeted type of social
opportunistic behaviour of criminals during the
engineering attack, SIM swapping can have potentially
pandemic, however, should not overshadow the overall
devastating consequences for its victims, by allowing
threat landscape. In many cases, COVID-19 caused an
criminals to bypass text message-based (SMS) two-
amplification of existing problems exacerbated by a
factor authentication (2FA) measures gaining full
significant increase in the number of people working
control over their victims’ sensitive accounts.
from home. This is perhaps most noticeable in the area
of child sexual abuse and exploitation. As in previous Business Email Compromise (BEC) continues to
years, the amount of online CSAM detected continues increase. As criminals are more carefully selecting
to increase, further exacerbated by the COVID-19 their targets, they have shown a significant
crisis, which has had serious consequences for the understanding of internal business processes and
investigative capacity of law enforcement authorities. systems’ vulnerabilities. At the same time, certain
In addition, livestreaming of child sexual abuse other forms of fraud have entered the spotlight due
increased and became even more popular during the to the sheer number of victims they have generated.
Executive summary IOCTA 2020 _7
The spread of online investment fraud all over Europe forces to provide a response to shared challenges.
is not necessarily new but has generated increased This means they are able to make their business more
law enforcement attention as victims at times lose robust and in particular incorporate better security
their life savings to professional organised criminal solutions to ensure that law enforcement are unable
groups that have incorporated cyber elements into to trace them. Overall, cybercriminals are showing
their scams. an improved level of operational security and proving
to be highly aware of how to hide their identities and
The clear majority of law enforcement respondents criminal activities from law enforcement or private
once again named ransomware as a top priority threat. sector companies. With cryptocurrencies, criminals
Although this point has been made in past editions also manage to complicate law enforcement’s ability
of the IOCTA, ransomware remains one of the, if not to trace payments connected to criminal activities.
the, most dominant threats, especially for public and
private organisations within as well as outside Europe. To respond to the cybercrime challenges in a more
Considering the scale of damage that ransomware effective manner, a number of key ingredients are
can inflict, victims also appear to be reluctant to come essential. First, information sharing is at the heart
forward to law enforcement authorities or the public of any strategic, tactical and operational response
when they have been victimised, which makes it regardless of the specific type of cybercrime.
more difficult to identify and investigate such cases. Sharing information, which needs to be purpose-
Criminals continued making their ransomware attacks driven and actionable, requires reliable coordination
increasingly targeted. Ransomware has shown to and cooperation from public and private partners.
pose a significant indirect threat to businesses and At the same time, information sharing requires a
organisations, including in critical infrastructure, legal framework and attitude that is sensitive to the
by targeting supply chains and third-party service timely exchange of information, which is crucial as
providers. Perhaps one of the most crucial cybercriminals can move their infrastructure within
developments is the new way of pressuring victims the blink of an eye. This is particularly evident in the
to pay by stealing and subsequently threatening to criminal abuse of the Darkweb, where short lifecycles
auction off victims’ sensitive data. of marketplaces influences law enforcement’s ability
to conduct investigations. There is also the need
Besides ransomware, European law enforcement to foster a culture of acceptance and transparency
reported malware in the broader sense to be when organisations or individuals fall victim to
widely present in cybercrime cases. Criminals have cybercrime. Re-victimising victims after a cyber-attack
converted some traditional banking Trojans into more is counterproductive and a significant challenge, as
advanced modular malware to cover a broader scope law enforcement need companies and individuals
of functionality. These evolved forms of modular who have been subject of a crime to come forward.
malware are a top threat in the EU, especially as This can help resolve the challenges in reporting we
their adaptive and expandable nature makes them currently face. Besides information sharing through
increasingly more complicated to combat effectively. enhanced coordination and cooperation, other key
elements to include in an effective response are
With a range of threat actors, this makes drawing
prevention and awareness and capacity building.
general conclusions about particular threats
We can reduce the success rate of many forms of
challenging. In areas ranging from social engineering
cybercrime by educating individuals and organisations
and phishing, to ransomware and other forms of
in recognising criminal activity before they fall victim
malware, law enforcement authorities witness a broad
to it. It is worth underlining the importance of the
spectrum of threat actors. These actors vary in terms
responsibility of industry in integrating security and
of level of skill, capability and adaptability. The top
privacy in their design as fundamental principles,
tier criminals manage to run their operations like a
instead of shaming end users as the weakest link.
professional enterprise, whereas less sophisticated
Through capacity building, on the other hand, law
threat actors tend to rely on off-the-shelf materials
enforcement across different crime areas will be able
to conduct their criminal activities. The availability
to understand and respond to the cyber-element of
of the materials through CaaS, however, continues
crimes. Finally, taskforce work such as coordinating
to make such activities accessible. Moreover,
and de-conflicting law enforcement operational
across the board threat actors in different types of
response, for which the Europol Joint Cybercrime
cybercrime demonstrate their resilience. Perhaps
Action Taskforce (J-CAT) platform is vital, continues to
more importantly, in areas such as the Darkweb,
play a key role in the current cybercrime landscape.
criminals have enhanced their cooperation and joined
_8 IOCTA 2020 Key findings
Key findings
» The amount of online CSAM detected continues considerable resilience and are continuously
to increase, further exacerbated by the COVID-19 evolving.
crisis, which has serious consequences for the
capacity of law enforcement authorities.
» Livestreaming of child sexual abuse continues
to increase and became even more prevalent
» The use of encrypted chat apps and industry during the COVID-19 crisis.
proposals to expand this market pose a
substantial risk for abuse and make it more
» The commercialisation of online CSE is
becoming a more widespread issue, with
difficult for law enforcement to detect and
individuals uploading material to hosting sites
investigate online CSE activities.
and subsequently acquiring credit on the basis
» Online offender communities exhibit of the number of downloads.
Key findings IOCTA 2020 _9
Introduction
2) combating child sexual abuse and child sexual The semi-structured interviews contained open
exploitation, including the production and questions. As a result, the range of answers was
dissemination of child abuse material; broader than in the previous structured survey
approach wherein which respondents mainly
3) targeting criminals involved in fraud and
selected from a drop down menu. Through using
counterfeiting of non-cash means of payment,
open questions, answers became less comparable
including large-scale payment card fraud
in a traditional sense, but rather than a limitation, the
(especially card-not-present (CNP) fraud),
team perceived this is an opportunity to illustrate the
emerging threats to other non-cash means
complexity of cybercrime especially in connection to
of payment and enabling criminal activities.
establishing a comprehensive threat assessment. The
Furthermore, the IOCTA aims to consolidate
ultimate purpose of the IOCTA is to assist Member
findings on current cyber threats, which could
States in establishing priorities with respect to
contribute to the discussion of research and
cybercrime. This pertains to the type of threats but
development priorities as well as planning at the
also concerns other considerations such as how we
EU-level.
approach this crime area in terms of analysis.
1
Cross-cutting crime facilitators
and challenges to criminal
investigations
KEY FINDINGS
1.1 INTRODUCTION
This is a crucial observation to include report, whereas others are included within
in any assessment, especially as the the respective chapters of the different
emphasis when discussing cybercrime is crime areas. Several of these challenges
often placed on how quickly cybercrime pertain to the ability of law enforcement
and, in particular, cybercriminals change to execute its core mission of preventing
their tactics. Perpetrators may operate at and combatting crime, identifying
the speed of the internet, as they are able to suspects, protecting victims and arresting
quickly move parts of their infrastructure, perpetrators.
alter a particular aspect of the code, adapt
This chapter contains three key
the functionality, gather more victim data,
components. First, a reflection on
etc, but these changes do not inherently
overarching threats that are cross-
alter the threat, especially not at an abstract
cutting facilitators for other forms of
level at which we discuss the threats
cybercrime. The second part includes a
within the IOCTA. We can also witness
brief description of a general challenge
the evolution of cybercrime through the
with respect to gathering (accurate) data
integration of the cyber-component into
about the prevalence of specific forms
nearly all forms of traditional crime.
of cybercrime. The third and final part
Another reason to reflect on this focuses on challenges which pertain
observation is to understand that to to law enforcement agencies’ ability to
combat cybercrime effectively we need to conduct criminal investigations due to
respond to several challenges. Some of societal developments that criminals
these are included within this chapter of the opportunistically manage to exploit.
Cross-cutting crime facilitators and challenges to criminal investigations IOCTA 2020 _13
While discussions and models have emerged over Spread of disinformation enhances
several decades surrounding the threats posed by cybercrime opportunities
a pandemic crisis, the outbreak of COVID-19 has
demonstrated the unfortunate impact potential of The pandemic also gave rise to disinformation
such crises on our daily lives across the globe. As campaigns and activities. Disinformation efforts
physical lockdowns became the norm, cybercrime are often associated with hybrid threats, which are
became more popular than before. There is no denying defined as threats combining conventional and
that the arrival of COVID-19 was a crucial factor in unconventional, military and non-military activities
any development discussed with respect to 2020. which may be used by non-state or state actors to
However, COVID-19 in connection to cybercrime needs achieve political aims3. A wide range of measures
to be placed within its context. If anything, COVID-19 applied in hybrid campaigns include cyber-attacks
demonstrated how cybercrime – at its core – remains and disinformation, disruption of critical services,
largely the same but criminals change the narrative. undermining of public trust in governmental
They adapt the specifics of their approach to fit the institutions and exploiting social vulnerabilities. The
societal context as a means to enhance their rate presence of disinformation became a crucial feature
of success. This is not new, in many ways this is in the overall threat landscape during the crisis. Many
business as usual. The difference with COVID-19 is Member States reported problems with respect to the
that due to the physical restrictions enacted to halt spread of disinformation.
the spread of the virus, with a subsequent increase in
Users become vulnerable and receptive to
working from home and remote access to business
disinformation and fake news due to the paradoxical
resources, many individuals and businesses that
oversaturation with available information combined
may not have been as active online before the crisis
with a perceived lack of trustworthy sources of news
became a lucrative target.
that reinforce some of the users’ preconceived notions
Traditional cybercrime activities such as phishing and and beliefs. Disinformation can also be linked to
cyber-enabled scams quickly exploited the societal cybercrime in efforts to make social engineering and
vulnerability as many citizens and business were phishing attacks more impactful.
looking for information, answers and sources of help
Both seasoned cybercriminals and opportunistic
during this time. There were even more challenges for
individuals spread disinformation to benefit from it in
both individuals and business as teleworking during
different ways. Significant political motives can drive
the pandemic became the norm. Europol followed all
disinformation to influence elections or referendums
developments closely and shared its findings through
affecting entire countries. However, for criminals the
frequent corona strategic reports2.
SAFE TELEWORKING
ultimate aim is always to obtain profit. Some individuals seeking to sell items that they claim will help prevent
simply seek to obtain direct financial gain through or cure COVID-19, which emerged both on the Clearnet
digital advertisements, as engagement with fake and the Darkweb.
news messages about COVID-19 can be very high.
The number of new domains and websites related to The hybrid nature of this threat underlines the
COVID-19 soared at the start of the pandemic4. importance of a combined, hybrid response, especially
considering that law enforcement agencies are not
Another strategy to profit financially from the typically mandated with investigating cases involving
COVID-19 crisis was to spread fake news about disinformation or fake news, despite their potential to
potential cures for the virus or effective prevention bolster criminal activities.
measures. Such messages also facilitated criminals
easier for technically inexperienced criminals to Overall, cybercriminals are employing a more holistic
carry out phishing campaigns using existing criminal strategy to phishing by showing a high level of
infrastructure and support services – a trend that is competency concerning the use of tools, systems
expected to continue in the future. and vulnerabilities they exploit, assuming false
identities and working in close cooperation with other
Targeting human weakness in the security chain, cybercriminals. Regarding the latter, criminals have
social engineering and phishing have a high impact shown their sense for innovation, as they use shared
on society and enable the majority of cybercrimes, platforms to distribute their scams, which makes
ranging from scams and extortion to the acquisition of blocking or tracing difficult for incident responders.
sensitive information and the execution of advanced Criminals have also been observed maintaining a level
malware attacks. of situational awareness, with a number of phishing
campaigns having taken advantage of the COVID-19
While criminals typically employ social engineering
pandemic10.
to convince targets to engage in fraudulent schemes
unknowingly, criminals use phishing to either Further to this, criminals have also employed a much
distribute malware or to obtain credentials and gain more targeted approach when attacking their victims.
access to sensitive accounts and systems. Advanced actors focus more on selected victims
as opposed to a random group in order to optimise
financial gains, as they are becoming increasingly
More sophisticated and more targeted specialised in information gathering and victim
phishing profiling activities. As the main threat relates to spear
phishing, criminals have proven apt at adapting their
A key trend over the past year relates to the growing attacks to a specific context for fraud schemes in
sophistication9 of phishing. Phishing has become particular, for instance by improving their language
more difficult to detect, with many phishing emails skills or even using local ‘customer agents’ who
and sites being almost identical to the real ones. At communicate with their victims speaking their regional
the same time, phishing campaigns have become accents, or by making reference to current cultural,
faster and more automated, forcing respondents to political, and local events.
act quicker than before as in some cases it takes one
day from a credential leak to an attack.
FAKE NEW S
COVID-19 DISINFORMATION CAN ENDANGER PEOPLE’S LIVES
Fake products
Mistrust in
and services
official
guidelines
False
mitigation
and cures
COMMENT
SHARE
DO NOT ENGAGE
as encrypted email and messaging applications as Often, these less obvious legitimate services are safer
well as Virtual private network (VPN) providers to for criminals to use and minimise risks associated
hide criminal activity, exploiting increasingly privacy- with using underground services more commonly
oriented policies, which make it difficult for law used by criminals in the past.
enforcement to gain relevant information in time.
The abuse of cryptocurrencies continue to play an The extortion scam typically involves sextortion, theft
important role in facilitating payments for transactions of data or, more recently, COVID-19 related threats.
across all areas of cybercrime. Reliability, irreversibility While the majority of the population is immune to
of transactions and a perceived degree of anonymity such attempts, criminals still seem to benefit from
have made cryptocurrencies the default payment the activity. The scalability of cybercrime compared
method for victim-to-criminal payments in ransomware to traditional forms of crime presents a key challenge,
and other extortion schemes, as well as criminal-to- as cybercriminals can target a relatively large number
criminal payments on the Darkweb. These activities of potential victims with relatively low investment,
have been long established with Silk Road emerging in being able to profit despite a small percentage of
2011 and Cryptolocker hitting its first victims in 2013. responses. According to a recent study analysing
a subset of 4 million intercepted sextortion emails,
At that time, more than 20% of transactions were over 12 500 bitcoin addresses were extracted, 245
directly attributable to criminal activity. Although the of which received one or more payments13. Although
level of criminal abuse has grown substantially, the such efficiency is much lower than observed across
legitimate use of cryptocurrencies grew at a much ransomware campaigns, it is still much more lucrative
faster rate. In 2019, the overwhelming majority of when compared to traditional low-tech scams.
bitcoin transactions were linked to investment and
trading activity so, despite considerable abuse,
criminal activity corresponds to only 1.1% of total
transactions12. The figure includes transactions
Cryptocurrency users also target of
stemming from fraudulent activities, Darkweb trade, criminals
thefts and ransomware. The growing adoption of cryptocurrencies increases
the number of vulnerable victims, so it is no surprise
that thefts from individual and enterprise wallets
Criminals continue to use cryptocurrency have become more prominent over the last few years.
as a method of payment for extortion In 2019, there were 10 publicly confirmed hacks of
activities exchanges where criminals stole cryptocurrencies,
resulting in a theft of €240 million worth of assets.
Although Initial Coin Offering scams and a wide Although the number of incidents was higher than
range of Ponzi schemes abusing the increasing in any of the previous years, the total amount stolen
popularity of cryptocurrencies dominated criminal decreased compared to the previous year with €950
abuse by volume, most of the crimes reported to law million stolen in 2018, including almost €500 million
enforcement included various forms of extortion. stolen from Japanese exchange Coincheck14.
The last two years have seen an increase in extortion
spam, where the suspect attempts to frighten the
victim with a promise of a devastating event should
they not receive payment in cryptocurrency, typically
Cooperation with the private sector
bitcoin corresponding to hundreds or even thousands While a massive effort has taken place in the
of euros. While in its most basic form the suspect cryptocurrency industry to deal with proceeds from
simply expects naïve victims to trust the threat, a criminal activities, the exchanges still differ in the
slightly more advanced approach includes victims’ degree to which they address the issue and the level
passwords, typically leaked from one of the large of assistance they provide to investigators. In order
public data breaches. to assess the players across the industry, Europol is
_18 IOCTA 2020 Cross-cutting crime facilitators and challenges to criminal investigations
For several years now, the advancement and increased while positioned as a privacy-enhancing technology, it
implementation of certain technological developments still allows internet service providers (ISPs) to profile
have complicated the ability of law enforcement to users as other data points of the Hypertext Transfer
gain access to and gather relevant data for criminal Protocol (HTTP) traffic remain unencrypted.
investigations. One of the most prominent examples in
this regard remains the widespread use of encryption, Other related developments include the use of
which contains many benefits from a security cryptocurrencies by criminals, as indicated earlier
perspective but is also a development that criminals in this chapter. Whereas law enforcement, including
have gratefully used to their advantage20. Europol has Europol, continues to focus on improving capabilities
spoken about this in previous iterations of the IOCTA in the area of cryptocurrency tracing, significant
and jointly with Eurojust in its dedicated Observatory challenges remain.
Function reports in 2019 and 2020.
in the disruption of criminal activities including violent As an infrastructure element, BPH facilitates a broad
attacks, corruption, attempted murders and large- variety of key threats, including CSAM, terrorism-
scale drug transports. Certain messages indicated related content, command and control (C&C) servers
plans to commit imminent violent crimes and used in cyber-attacks as well as platforms for criminal-
triggered immediate action. to-criminal trade and discussion21. It is linked to
several threats in cyber-dependent and cyber-enabled
This investigation confirms that advanced crime, making it a key concern in the threat landscape.
technologies enable criminals to secretly As such, both the private and public sectors have a
communicate or transfer illicit goods and resources. key role to play in hindering a BPH criminal application.
There is a growing risk to public safety as organised This calls for cooperation internationally, as well as
crime are drawn to using encrypted communication an appropriate legislative framework which would
platforms that are almost technically impossible for hinder BPH providers from acting maliciously by
law enforcement to access. Due to these emerging hosting criminal interests. For example, regional
technologies used by criminals and the opportunities internet registries, local internet registries and ISPs
new technology may pose for law enforcement, an have a significant responsibility in maintaining data
even more intense thinking beyond law enforcement accuracy when sub-allocating IP addresses to network
cooperation is required, including with the private operators in order to maintain traceability, with
sector. regard to combatting BPH, as IP addresses have a
substantial role in BPH.
While the dismantling of EncroChat is a considerable
success against serious and organised crime and the BPH providers may run their own static servers to
result of a multi-national investigation, the ingredients host malicious content of their clients. BPH services
needed to come to such a success include the ideal have also registered as resellers with low-end service
combination of information, resources, skills, partners providers (for example ISPs, large hosting providers
and opportunity. This means this type of success is and content delivery networks) due to low-level
an exception as the rule remains that law enforcement verification and authentication requirements. With the
continues to battle the challenges of criminal use of growth of cloud services, a new modus operandi has
advanced technologies. emerged in which threat actors rent virtual private
servers from legitimate hosting providers using fake or
stolen identities. This highlights the need for stronger
Bulletproof hosters are the backbone of KYC policies with businesses and organisations
criminal infrastructure across the sector.
2 CRIME PRIORITY
Cyber-dependent crime
KEY FINDINGS
2.1 INTRODUCTION
2.2 RANSOMWARE
The clear majority of law enforcement respondents brought was an increase of the attack surface, with
named ransomware as a top priority threat yet unmanaged endpoints/devices (PC systems) being
again. As reported in previous years’ IOCTA reports, remotely connected and having access to companies’
ransomware remains one of the, if not the, most information technology (IT) infrastructure. The fast
dominant threat, especially for public and private shift to telework made some companies ‘alleviate’
organisations within as well as outside Europe. some of their IT security policies and some IT security
What makes it even more challenging as a threat, is responsibility has been transferred to the individual
the impact it has on its victims. This victimisation users, where varying levels of (or lack of) associated
goes beyond the primary target, most often a public security training has created a new gap in security.
organisation or private business, as ransomware This gap has subsequently provided new ways
also affects those whose data is compromised. for cyber-actors to gain access to companies’ IT
Considering the scale of damage that ransomware infrastructure.
can inflict, victims also appear to be reluctant to come
forward to law enforcement authorities or the public Typically, ransomware attacks deployed against
when they have been victimised, which makes it more large corporations occur in different stages and
difficult to identify and investigate such cases. With are executed by different threat actors. The first
ransomware, criminals do not only abuse encryption initial step (performed by one group of criminals) of
to hide their identity and obfuscate their financial a ransomware infection is the computer/network
transactions but also actively abuse encryption as intrusion which is done by the use of multiple attack
part of their modus operandi. This leads to a situation vectors and malware types. The access is then
where they can almost act with impunity. sold to different cybercriminals that perform IT
infrastructure mapping, privilege escalation, lateral
move, data exfiltration etc. and finalised by deploying
the ransomware.
Ransomware is becoming increasingly
targeted
Criminals continued the trend introduced last year Ransomware and third-party providers
by making their ransomware attacks increasingly form a lethal combination
sophisticated and more targeted. The number of
targeted ransomware cases has increased over the Ransomware has shown to pose a significant indirect
past year, which has led to a significant increase in threat to businesses and organisations by targeting
threat actor capability as well as a higher impact on supply chains and third-party service providers.
victims. Europol has followed up on attacks on organisations
playing a key role in the supply chains of major
Ransomware attackers continue to target public financial institutions, which are believed to be an
and private sector organisations of various size, attempt by the attackers to enhance pressure on the
industry and nationality rather than individual personal victim to pay the ransom. Private sector respondents
computers (PCs). This enables threat actors to reported concerns over the differences in the IT
increase both the ransom amount requested and the security apparatus across supply chains, which leaves
probability of successfully making the victim pay the companies that play a key role as a service provider
ransom. Victim reconnaissance plays a significant vulnerable to attacks. These attacks then have an
role in the preparation of an attack. European law impact across the whole supply chain, which may
enforcement and Europol have observed attacks do substantial damage through long downtime or
targeting local governments and ministries; other information leaks for organisations indirectly affected
public sector organisations in healthcare and by the attack. One case saw an IT service provider
education (including hospitals, universities and high being attacked with Maze ransomware, which can sit
schools); as well as businesses in manufacturing, on the victim’s servers for several months. This allows
finance, energy, and transport industries. While the criminals to perform reconnaissance by monitoring
context of the COVID-19 pandemic crisis has affected internal communications in order to identify a key
the cybercrime field, ransomware attacks targeting moment, such as merging, selling, big meetings with
the healthcare industry took place well before the customers/sales, etc., for the deployment of the
crisis had a substantial effect in Europe and the US, ransomware. Criminals deploy the ransomware before
which suggests that the COVID-19 crisis was not a such events with the aim of putting pressure on the
trigger for these kinds of attacks23. What COVID-19 victim. At the same time, criminals can also exfiltrate
_26 IOCTA 2020 Cyber-dependent crime
the data prior to the deployment of the ransomware attempted to auction data which it gathered from a
to have another means of pressuring the victim. The ransomware attack24. According to Member States
existing presence of the criminals on the victim’s and private sector respondents, several ransomware
servers is difficult to identify by security investigators families including Sodinokibi (also known as REvil),
as the security measures mainly focus on inbound Maze, Doppelpaymer, Nemty and Snatch published
detection. data which criminals stole from their victims over the
past year. In particular, the auctioning of the data by
criminal groups marks a new step and demonstrates
an escalation in methods aimed at coercing victims to
A perverse twist to guarantee payment:
pay the ransom. It is anticipated that other groups will
threatening to auction or wipe data
begin to adopt these coercive measures too.
Ransomware attackers have introduced a new way
of pressuring their victims to pay by stealing the Additionally, in the 2018 IOCTA Europol predicted
victim’s sensitive data and threatening to publish it scenarios in which fines for violating the GDPR could
online. Once criminals gain a foothold on victims’ be used by threat actors as additional leverage with
networks, which can be done in various ways, they regard to the threat of leaking their victim’s data
explore the networks and exfiltrate data, before online25. Both Member States and private sector
delivering the ransomware. If the victim fails to pay respondents witnessed this phenomenon over the
the ransom demand, attackers will post the victim’s past year. Some ransom notes specifically mention
sensitive data online or sell it to the highest bidder. GDPR fines to enhance the pressure on victims.
The group behind Sodinokibi ransomware has already
An alternative to the publication of data is its Investment costs for criminals increase,
destruction. Some ransomware families, such as but so do the potential profits
NotPetya have destructive wiper functionalities which
may cause irreversible damage to the victim. Europol While the overall investment cost of ransomware is
observed a case of destructive malware which took increasing, the amounts extorted by attackers have
place in 2020, in which attackers managed to rewrite increased too. Attackers who launch ransomware
the master boot record. attacks have requested ransom from anywhere
between less than a thousand to millions of euros. The
damages caused by e.g. downtime have increased
significantly as well. When targeting their victims,
European law enforcement found attackers surveying
their victims and assessing both the victim’s capacity
Cyber-dependent crime IOCTA 2020 _27
to pay (by reading e.g. financial reports) and the five thousand euros; and well-organised crime groups
most effective way of infecting as many machines as with better technical capabilities targeting higher-
possible during the attack. Attackers have also used value targets for ransom of up to millions of euros.
encrypted communication means (such as Protonmail, Threat actors have displayed significant adaptability
Tutanota and cock.li) and set up customer service in conducting lateral movement, reconnaissance and
portals – many times a hidden service on Tor darknet in establishing new footholds. Several stages are still
– to help facilitate the extortion process. executed through more manual steps (and again by
using legitimate tools) where lack of strong internal
Ransomware attackers are becoming increasingly controls and logging does not expose and reveal the
innovative in pursuing profits from the crime area. In suspicious activities. The availability of Ransomware-
addition to shifting to corporate and organisational as-a-Service (RaaS) on Darkweb marketplaces has
targets and finding new ways of adding leverage to also decreased the barrier of entry for new, less skilful
their extortion, threat actors are seen collaborating criminal actors. Lockbit, for example, which emerged in
with other criminals and adding new layers to January 2020, was brokered on underground forums
their attacks, including crypto mining. Increasingly for other cybercriminals to use27. However, on the
professional affiliate schemes are reflected in the opposite side, already established and mature RaaS
increase in migration among criminal affiliates, as was actors have raised the bar by including only trusted
seen with the migration from GandCrab to Sodinokibi. affiliates into affiliate programmes. These trusted
affiliates have previously displayed the capacity to
infect large companies. Affiliates that cannot infect
Ransomware attacks display higher skill, large companies or are inactive on the platform for
sophistication and adaptivity among threat more than one week are expelled (e.g. Sodinokibi).
actors
The business-type nature of ransomware attackers
Ransomware attacks continue to be a relatively is also demonstrated in their engagement in online
diverse, low risk and easy way for cybercriminals to public relations activities. Some ransomware groups
acquire money. The level of sophistication also varies conduct their own information campaigns to advance
across threat actors. European law enforcement their goals. The Maze ransomware group for example
reported at least two distinct types of ransomware released a statement on their website claiming that
actors: lone actors who utilise data and services from they would ‘spare’ healthcare organisations during
Darkweb market places, who demand ransom up to the COVID-19 pandemic crisis. This turned out to be
disinformation, as the group allegedly attacked an limiting reputational damage (see Chapter 1). The
urgent care centre in Texas soon after their release shift in ransomware targeting individual PCs to more
(refusing to pay ransom, Maze continued to publicise high-value targets such as businesses and public
stolen patient data)28. The Maze group was also sector organisations introduces unique challenges
allegedly behind an attack on the Hammersmith to law enforcement investigations. Private and public
Medicines Research facility in the UK, who have been sector victims of ransomware are disproportionately
involved in developing vaccines for the COVID-19 more affected by the threat of leaking data compared
virus29. to ransomware cases in which PCs and individual
persons were affected. Negative publicity leading to
Both Member States and private sector respondents reputational fallout may lead to re-victimisation, which
have noticed an increase in subcontracting and may prevent victims from coming forward to law
cooperation among threat actors, which has improved enforcement authorities with information which could
their capabilities. Similarities in how criminals be crucial in identifying and catching the perpetrators.
behind the trio Ryuk ransomware, Trickbot and Victims prefer to engage with private sector security
Emotet malware operate suggests that criminals firms for investigating the attack or negotiating with
across different attack approaches could either the extortionists to manage the crises triggered by
belong to the same overall structure, or that they ransomware (some IT security firms hire specialist
are becoming smarter at cooperating with each negotiators, some of whom get discounts from
other. Well-organised criminal groups who engage in organised crime groups). Some of the companies
ransomware, have been observed by European law that negotiate the ransom payment are working on
enforcement cooperating over malware, infrastructure the edge of legality, as they have developed a trusted
and money laundering activities. The relationship business relationship with the ransomware actors.
between Emotet, Ryuk and Trickbot is considered one
of the most notable in the cybercrime world. Companies are normally referenced by cybercriminals
in their negotiations as a proof or ledger that the
Some ransomware actors have also grown more victim’s data will be decrypted after the ransom
cautious. Member States and private sector payment. Some of these companies negotiate behind
respondents reported that some of the actors behind the scenes with the ransomware actors to obtain
ransomware attacks have become less vocal on a bigger discount from the ransom payment. Other
underground forums, setting up alerts and alarms. companies might reflect this discount in the victim’s
They have also been observed using additional invoice, others may not. Cyber actors provide ransom
VPN layers and cryptocurrencies with mixers and discounts to victims if they use the services of specific
swappers to hide their tracks. According to European companies. By using such companies, victims will
law enforcement, attackers have also found a way not file an official complaint, which increases the lack
of using C&C servers when deploying malware to of visibility and awareness concerning real figures of
place the payload into the memory of the company’s ransomware attacks among law enforcement. Not
servers. This way there is no trace on the victim’s reporting cases to law enforcement agencies will
hard disk and no way of recreating it once it is gone obviously hamper any efforts, as important evidence
from memory. The IOCTA 2018 and 2019 include a and intelligence from different cases can be missed.
section on file-less malware as an emerging threat in
cyber-dependent crime, and the IOCTA 2018 included Furthermore, a case involving personal computers
a forecast that file-less malware would become an being targeted by ransomware shows that victims
increasingly standard component of CaaS offerings by had opted to purchase new machines rather than
2023. report the event to law enforcement. Here victims
were stunned when they were contacted by law
enforcement over the ransomware attacks, and were
under the impression that law enforcement would not
Ransomware remains an under-reported
do anything about the situation.
crime
Several law enforcement authorities mentioned
identifying ransomware cases through (local)
media and approaching victims to assist them by
potentially starting a criminal investigation. This was
not generally a priority of the victim organisation, as
the primary focus was on business continuity and
Cyber-dependent crime IOCTA 2020 _29
2.3 MALWARE
2.4 DDoS
In 2019, the DDoS attack celebrated its 20th DDoS has become increasingly adaptive
anniversary. Ongoing investigations show that the
DDoS threat is still prevalent in the cyber landscape. Cybercriminals who engage in DDoS attacks have
However, this topic has also had several success adapted against increasingly robust protection
stories in prevention, mitigation and investigation. measures. Instead of targeting high-value targets
Attackers have adapted to these security measures with massive volume attacks, attackers have shifted
by using attacks more efficiently, using both new tools their focus on smaller organisations with less mature
and reigniting old techniques, and targeting more security apparatus. Downscaling their targets enable
vulnerable victims. attackers to utilise volume more efficiently, and ensure
maximum payout when the attacks are financially
motivated. For example, private sector respondents
reported smaller volume attacks which are capable
Different types of attacks witnessed of blocking smaller data centres. Small requests from
Private sector and Member States respondents 700 IP addresses make it difficult to block against a
observed several phenomena relating to DDoS DDoS attack, and difficult for investigators to trace
attacks over the past year. Private sector respondents the attacker responsible as the attack comes from
reported seeing an increase in massive and simple multiple IP addresses. These attacks incorporated
DDoS attacks. European law enforcement did not additional methods which allowed the attackers to
witness significantly impactful attacks in 2019 but bypass the firewall’s operational capacity.
reported two kinds of attacks: targeted attacks which
aim to damage specific industries or information
systems; and crimes using automated tools.
Automated attacks have been growing over the past
year and are likely connected to CaaS. Threat actors
can purchase pre-existing automated tools and deploy
them for their own purpose, which makes conducting
a DDoS attack a relatively cheap and easy way of Law enforcement case study
carrying out an attack for threat actors who may have Law enforcement caught wind of a
limited skills or experience in engaging in cybercrime. DDoS attack targeting a Finnish-based
Moreover, criminals can use DDoS as a decoy or company. When approached by law
smokescreen for a more targeted attack. enforcement, however, the company did
not agree with the assessment, denying
Additionally, old DDoS methods are still prevalent.
they were under attack. The attackers
European law enforcement observed attacks
had used network mirroring DDoS via
targeting telecommunications and technology firms,
where, in some cases, DDoS attackers threatened the Finnish company to amplify their
companies with reputational harm and extorted them attack on a major casino service in
for payment. Law enforcement agencies also came Southern Europe, which was the real
across cases where threat actors engaged in small target of the attack. Law enforcement
attacks against larger organisations, extorting them thought that the Finnish company was
for money with the threat of conducting larger attacks. the target, however attackers were only
Some threat actors targeted public systems and utilising the company’s large network
websites with DDoS attacks, however, these attacks for mirroring and thus adding more
were difficult to attribute to anyone specifically. One volume to their actual DDoS attack.
reason for the change in DDoS attacks could be the This is an old technique which has
increase in protective measures used by organisations resurfaced after a few years, however
against them. with increased volume and capabilities.
European law enforcement observed a
With respect to 2020, Amazon said its Amazon Web
couple of these cases.
Services Shield service mitigated the largest DDoS
attack ever recorded, stopping at 2.3 terabyte attack in
February 202031.
Cyber-dependent crime IOCTA 2020 _33
3 CRIME PRIORITY
KEY FINDINGS
• The amount of online market, pose a substantial • Livestreaming of child
CSAM detected continues risk for abuse and make sexual abuse continues
to increase, further it more difficult for law to increase and became
exacerbated by the enforcement to detect and even more prevalent during
COVID-19 crisis, which has investigate online CSE the COVID-19 crisis, a
serious consequences activities. recent case shows CSAM
for the capacity of law production also takes place
enforcement authorities.
• Online offender in the EU.
communities exhibit
• The use of encrypted considerable resilience and • The commercialisation of
chat apps and industry are continuously evolving. online CSE is becoming a
proposals to expand that more widespread issue.
Child sexual exploitation online IOCTA 2020 _35
3.1 INTRODUCTION
The year-on-year increase of detected online CSAM States have reported an increase in detected CSAM
has continued. Law enforcement authorities in the activity on Peer-to-Peer (P2P) networks especially
EU see themselves confronted with an overwhelming in the second half of March, when lockdowns in EU
amount of online CSAM to the extent that it becomes Member States started materialising34.
unmanageable for many of the units dealing with
this crime. This includes regular complaints requiring The increase in online CSAM has serious
investigation, including production of CSAM through consequences for the capacity of law enforcement
rape and sexual assault, possession of that material, authorities to follow up and investigate reports of
grooming, sexual coercion and extortion, but also online CSE. Many investigators in EU Member States
referrals from the National Center for Missing and are faced on a daily basis with the task of making
Exploited Children (NCMEC), ISPs, and hotline impossible choices between investigating one report
reports. This ongoing increase reflects a continuous instead of another.
distribution and redistribution of CSAM content. The
There might be several reasons behind the growing
effect of this on victims is significant and ongoing32.
amount of detected CSAM, including more offenders
An international survey carried out by the Canadian
or better detection mechanisms. At least some of
Centre for Child Protection revealed that 70% of
the CSAM is being repeatedly uploaded and widely
victims feared being recognised in public as a result of
distributed. However, the harm resulting from being a
their involuntary participation in the offences against
victim of this is severe, as victims experience repeat
them33.
victimisation every time a picture or video is shared35.
The COVID-19 crisis revealed an extra surge in online
One of the drivers of the continuous growth of
distribution of CSAM. Referrals from the public, and
online CSAM is the growth in self-produced material.
industry in third-party countries reached record highs
Especially during COVID-19 related lockdowns,
during the peak months of the pandemic. EU Member
children spent more time online, sharing images
States also reported an increase in the number of
and videos that subsequently ended up with CSE
blocked attempts to access websites featuring CSAM
offenders.
during their lockdowns. Moreover, several EU Member
Speculations amongst
offenders about online
activity of children Reports from the Volume of new posts in
public online forums
Downloads on P2P
sharing networks Attempts to initiate
online contact with
children
Child sexual exploitation online IOCTA 2020 _37
Online offender communities exhibit considerable their abuse of children, encouraging others to abuse
resilience in response to operational activities and providing like-minded, technical and practical
carried out by law enforcement agencies, attacks by support to one another.
unidentified actors and losses of staff and platforms.
Their reactions include resurrecting old communities, Administrators require strict observance of the rules
establishing new communities, and making strong to avoid being banned from the forum. In addition,
efforts to organise and administer them. compliance with the rules and active participation can
lead to a progressive increase in rank. Users regularly
Parallel to the activity of large offender communities publish information and safety manuals aimed at
through Darknet forums is a development involving avoiding detection by law enforcement authorities.
smaller communities sharing CSAM directly with each Some users are also attentive to law enforcement
other via encrypted messaging platforms. Following operations and regularly publish news articles or
several high-profile law enforcement operations on even summary reports of the techniques used during
the Darkweb, many offenders seem to believe they successful operations. Cross-posting of such advice
are more secure in such small networks, sometimes across various boards and forums highlights a
based on invite-only. Offenders are also known to have collective approach to improve operational security
used encrypted communication channels to infiltrate for all. Some of these communities also meet offline,
existing child-aged groups and form break-off groups sometimes travelling great distances and bringing
involving children and adults40. physical hard drives as storage media with them.
Whereas Darkweb communities and real-life child
In response to law enforcement operations targeting sexual abusers used to be relatively separate, there
these Darkweb communities and due to the need appear to be more hands-on abusers – including
to select participants and ensure exchanges of individuals travelling for live distant child abuse
information are strictly related to child sexual abuse, – who are also very active on the Darkweb. Some
offenders tightly control their communities. They law enforcement agencies have had cases where
use Darkweb forums as meeting places where offenders keep material they produced themselves
participation is structured similarly to criminal with them for many years before uploading it to
organisations, with affiliation rules, codes of conduct, the internet, hoping to avoid victim identification.
division of tasks and strict hierarchies. The purpose This illustrates the crucial importance of victim
of the structure is to enforce rules and promote identification efforts by law enforcement agencies,
individuals based on their contribution to the such as the Victim Identification Taskforce (VIDTF)
community, which they do by recording and posting organised on a regular basis by Europol.
DARKWEB
Child sexual exploitation online IOCTA 2020 _39
Ninety suspects identified in major across Europe and beyond. The image and
online child sexual abuse operation video data seized during this investigation
has been used for Victim Identification Task
Police around the world have taken down a Forces hosted by Europol, through which
global child abuse ring with links to over forty seventy children and thirty suspects have
countries through a Belgian investigation been identified. The Belgian Federal Judicial
supported by Europol. Four suspects have Police succeeded in identifying 60 suspects
been convicted by a Belgian court. (of which 24 in Belgium) and 40 victims, which
This case was sparked by the Belgian East brings the actual total to ninety suspects and
Flanders Federal Judicial Police, after more 110 victims.
than nine million pictures and videos of the Some suspects have already appeared
abuse of thousands of children from around before court in a number of other countries.
the world were found there during a house In Australia, a suspect was sentenced to 15
search. years in prison.
The vast majority of this footage had never More arrests and rescues are expected
been seen in circulation before by law globally as police in over 40 countries
enforcement. Suspecting they were producing examine the intelligence packages compiled
their own, the Belgian investigators launched by Europol and information from the Belgian
operation Gargamel together with Europol Federal Judicial Police43.
Livestreaming of child sexual abuse continues to confirmed that this type of online CSE is not limited
increase, becoming even more popular than usual to Southeast Asian countries. A large operation in
during the COVID-19 crisis, when travel restrictions Romania uncovered significant levels of livestreaming
prevented offenders from physically abusing taking place within the country, demonstrating that the
children41. As offenders had fewer opportunities to EU is not immune to this threat.
engage in physical CSE, live streaming emerged as
a viable alternative to hands-on child sexual abuse. In some cases, those seeking live streams of CSE are
In some cases, video chat applications with built-in deceived: they pay for a live stream, but never receive
payment systems are used. This is a complicated area anything.
for law enforcement investigations, as usually none
of the material is recorded, except for occasional chat
conversations.
Last year’s IOCTA reported that commercialisation of monetise CSAM by uploading material to hosting
CSAM remained limited to LDCA44. However, the past sites (including legitimate hosting services) and
year has brought to light a number of indications that subsequently acquiring credit on the basis of the
the commercialisation of online CSE is becoming a number of downloads. This credit can be used to pay
more widespread issue. For a long time, online CSE for additional hosting or in some instances can be
was one of the few crime areas Europol focused cashed out, either in cryptocurrencies or other means.
on that was not primarily driven by financial gain. LDCA has had a commercial element for a longer
Although offenders are still primarily driven by a time, as offenders frequently pay to watch parents,
desire to obtain more CSAM, in some cases they do carers and offenders abuse children remotely to order.
seek to profit from online CSE. The emergence of a Uploading CSAM to legitimate hosting services is
profit-driven model in this crime area is a worrisome another method of monetising CSAM. The platform
development. used to download this material may not be aware of
the content or can claim not to be aware. The hosting
The monetisation of content has been seen on both site’s advertising and the potential profits per click are
the Clearnet and the Darknet, with many links on the also increased through such models.
dark web referring to Clearnet resources. Individuals
Games with
Sexual coercion Sexting gambling-like
and extortion elements
Unkn
own
num
ber
Costs of in-game
spending FRIEN
DS
Acce
p t
Decli
ne
Grooming
Child sexual exploitation online IOCTA 2020 _41
Online child sexual abuse remains a significant The growth in CSAM being detected is showing no
threat. The situation with COVID-19 has increased signs of stabilising, let alone decreasing. The end of the
the time people spend online, whether it is for remote current health crisis and the lifting of lockdown measures
working, remote schooling or spare time. Children may result in an increased number of reports of CSE,
who spend a lot of time online unsupervised are as abuse that occurred during the COVID-19 pandemic
therefore much more exposed to potential offenders may be reported to law enforcement or other authorities
through online gaming, the use of chat groups in apps, after the fact. It is highly likely that in the upcoming
phishing attempts via email, unsolicited contact on year there will be a sharp increase in the amount of
social media as well as through less secure online self-produced indecent material, which might also lead
educational applications45. Additionally, unsupervised to a corresponding increase in online solicitation and
time online further increases the risk of producing and exploitation.
distributing self-generated indecent material among
underage individuals, which could also eventually Travel restrictions and other measures during the
reach child sex offenders. Furthermore, child sex pandemic have likely prevented offenders from travelling
offenders could take advantage of lonely and isolated and so have shifted their focus further to the exchange
children online, connecting with them to produce of CSAM online. A relaxation of travel restrictions and
explicit material or to arrange a meeting in real life46. opening up of air travel will likely lead to an increase
The current situation regarding COVID-19 creates in transnational offenders seeking out CSE in certain
considerable levels of uncertainty and unpredictability countries and regions. If air travel remains limited for the
for the foreseeable future. The developments foreseeable future however, or becomes more expensive,
around the pandemic and related lockdowns and it is also possible we will see an increase in proxy
travel restrictions will have a big influence on the offending both with surrogates such as childlike sex dolls
developments regarding online CSE. or via live streaming.
_42 IOCTA 2020 4
4 CRIME PRIORITY
Payment fraud
KEY FINDINGS
4.1 INTRODUCTION
ID CARD
Restrict information and show caution with Download apps only from official providers
regard to social media. and always read the apps permissions.
Never open suspicious links or When possible, do not associate your phone
attachments received by email or text number with sensitive online accounts.
message.
Set up your own PIN to restrict access to the
Do not reply to suspicious emails or SIM card. Do not share this PIN with anyone.
engage over the phone with callers that
request your personal information. Frequently check your financial statements.
Exploitation of 2FA behind smart ID to log in to their online bank accounts using
their smart ID, for instance to change their
Three EU Member States reported cases of
bank information. Following the link, they
SMishing. Criminals used SMishing to bypass
were then directed to fake bank log in account
the 2FA mechanism offered by national
pages, which would verify a fraudulent
smart IDs. Criminals aiming to attack bank
transaction initiated by the criminal after they
accounts and the respective national banking
attempted to log in. Alternatively, threat actors
infrastructure targeted these national Smart
would use this modus operandi to create
ID solutions through social engineering.
a new Smart ID account under the victim’s
Abusing alphanumeric SMS threads, criminals
name, but under full criminal control.
sent SMS appearing to come from the bank.
These text messages prompted the recipients
BEC remains a main and further growing threat originating from Eastern Europe, Nigeria and other
for law enforcement and private industry. BEC is African countries. The most sophisticated threat
a sophisticated scam targeting businesses and actors come from Israel.
organisations, whereby criminals employ social
engineering techniques to gain access to an
employee’s or executive’s email account to initiate
BEC has increased, grown in sophistication,
bank transfers under fraudulent conditions, i.e. by
and become more targeted
pretending to be the CEO and asking the employee to
carry out a payment. Over the past twelve months, BEC has increased
across most EU Member States, with an additional
BEC causes enormous losses and disruption to increase as a result of the global outbreak of
livelihoods and business operations49. Often following COVID-19. This increase in volume coincides with
spear phishing emails, BEC is highly tailored and very a growing sophistication and a more targeted
effective with targets ranging from governments, approach. Criminals make use of technically advanced
international organisations, small to large businesses measures, such as compromising bank accounts,
and individuals. identifying the ideal time to strike, managing email
conversations with complex man-in-the-middle
The two most common types of BEC are CEO fraud
attacks or even using Artificial Intelligence (AI) to
(criminals impersonating a high-level executive
mimic the voice of a company’s CEO50. The growing
requesting urgent bank transfers) and invoice
sophistication of BEC is also reflected in the
fraud (criminals impersonating suppliers asking
establishment and use of complex criminal networks,
for legitimate payments to be directed to a bank
which are used to launder the proceeds of the fraud.
account under the criminal’s control, or creating new,
Additionally, criminals have become better at local
fraudulent invoices).
languages and the exploitation of local contexts.
According to interviews with Member States, in many
While criminals target all kinds of organisations and
cases, BEC is carried out through a compromise
businesses, there is an increased focus on smaller
of email accounts hosted by Office 365, access to
companies, rather than just large corporations. As
which is typically gained through credential phishing
a result, even cybersecurity companies not usually
in advance to the fraud. This is often possible due to
dealing with BEC have been receiving requests for
limited security measures, such as a lack of 2FA; as
technical assistance, for instance to conduct forensic
well as a lack of awareness regarding spear phishing
investigations on the servers.
attempts. These type of attacks are still mostly
_48 IOCTA 2020 Payment fraud
YOUR BANK
Don’t be rushed. Take your time and make the appropriate checks before
responding.
Never respond to a text message that requests your PIN or your online banking
password or any other security credentials.
If you think you might have responded to a smishing text and provided your
bank details, contact your bank immediately.
Payment fraud IOCTA 2020 _49
Another relative ‘newcomer’ in this year’s IOCTA is In some cases, criminals have asked victims to
online investment fraud. Many law enforcement install RATs to take control over the target computer,
agencies and financial services identified online to initiate money transfers to criminals through full
investment fraud as one of the fastest-growing crimes control over the computer and bank account. In
of the past twelve months, generating millions of addition to eliciting money transfers from their victims,
losses and affecting thousands of victims from all EU criminals have also been seen to combine this type of
countries. Many Member States witnessed this type of fraud with phishing and the theft of credentials to be
fraud for the first time. used subsequently for additional fraud.
Online investment fraud refers to a fraud type whereby Criminals usually target victims through social media,
criminals aim to lure their victims into transferring using celebrities and fake versions of news outlets,
them money with appealing get-rich-quick schemes. or come across the fraudulent investment web sites
Offering commodities such as cryptocurrencies, via search engines. Criminals have also been seen
diamonds, or gold, criminals promise victims employing blended social engineering, with a mix of
extraordinary financial returns on their investments, SMishing, cold calling and other techniques. Often
while criminals keep victims engaged through these targets include older victims, who are less
websites showing fake investment returns. While technologically savvy.
online investment fraud usually accounts for mid-level
money losses, some victims have lost their entire life Online investment fraud is difficult to investigate, as
savings before realising that they had fallen victim to criminals set up complex international schemes of
a scam. companies with legal appearance, spanning across
several legal jurisdictions. The groups behind these
schemes are difficult to identify, due in part to their
use of anonymisation tools, spoofed phone numbers
Online investment fraud demonstrate high and legitimate-looking websites.
level of complexity
Given the fast rise of investment fraud in many EU
A number of online investment fraud cases have
Member States, law enforcement agencies expect this
shown a significant level of complexity, with large
type of fraud is to continue to increase and appear in
networks of shell companies and call centres behind
so far unaffected countries, too. Perpetrators generally
these schemes, as well as the development of
seem to originate from Russia, Ukraine and other
software and communication tactics to systematise
Eastern European countries
the exploitation of victims to their last cent.
Payment fraud IOCTA 2020 _51
Spotlight: FIN6
FIN6 is a prolific group of criminals,
which has been targeting merchant point
of sale (POS) systems to gather payment
account data. In 2019, they expanded
their attacks to e-commerce merchants,
which represents a merger between CNP
fraud and e-commerce breaches. The
attackers injected malicious code into
the merchant’s websites, which would
and credit card credentials. The malicious code gather payment account number inputs
typically checks the various customer and payment and gather these account numbers into
account number inputs, exfiltrates the data to an an attacker-controlled C2 server. Other
attacker-controlled C&C server, following which skimmers have been observed gathering
criminals can use this information to commit other more input data than payment account
crimes. Criminals commonly exploit for example numbers, which puts users’ data at risk.
improperly configured cloud data repositories,
occasionally utilising automated processes to
target vulnerabilities. Other entry points that
criminals have increasingly been targeting include
e-commerce merchants directly, or their service
providers, which are supplying solutions ranging
from analytics and advertisements to other general Spotlight: Pipka
IT services.
Pipka is a new form of JavaScript
The most common type of e-skimming activity, skimmer which allows cybercriminals
which interviewees mentioned, relates to the use of to configure which form fields the
Magecart malware by organised criminal groups. programme will parse and extract,
This type of digital skimming has proven to be so including payment account numbers,
lucrative that many established cybercriminals expiration data, card verification values
have moved into conducting such attacks, with and the payment cardholder’s name
JavaScript-based skimming now considered one of and address. Pipka has the added
the main threats to financial institutions. feature of being able to remove its
malicious JavaScript component from
Private sector respondents have seen different
the Hypertext Markup Language (HTML)
variants of point of sale (POS) malware, including
code after successful execution. This
PwnPOS, AlinaPOS, and POSeidon / Backoff. FIN7
is a new development in JavaScript
and FIN8 have been active threat actors in this
skimming, and it adds interesting
area. FIN8 has also been observed using new
new layers to the malware. The Pipka
malware toolsets to target POS environments.
skimmer reflects advancements made
As with other cybercrime areas, e-skimming, too, in e-skimming, and it goes to show
has seen criminals coming up with novel technical that criminals targeting e-commerce
ways to execute their attacks, such as the Pipka will continue to develop innovative
malware. approaches to gather sensitive payment
account data.
Payment fraud IOCTA 2020 _53
Darkweb marketplaces enable increase of attacks, which is likely going to lead to a further
e-skimming increase in these types of attacks.
Logical attacks on ATMs and POS devices remain cooperation in order to stop them. These criminal
a threat and have increased across most Member groups are often Russian-speaking and with links
States. Among these, especially black-box attacks to Eastern Europe, actively targeting ATMs across
have proven popular, as organised criminal groups Europe.
successfully manage to extract large amounts of
cash in short periods of time. Black-boxing involves Criminals are targeting mostly older ATM models, for
the installation of an external device connected to the which security measures and software have not been
cash dispenser in order to bypass the need for a card updated. While the modi operandi here remain largely
authorisation to dispense cash. Typically, the actual the same; with occasional developments taking place
installation of the black box requires little technical in accordance with improved ATM security measures,
knowledge besides the provision of the device and law enforcement agencies noticed some changes in
instructions. With cybercriminals remotely sending modi operandi over the past twelve months. As such,
instructions to jackpot the ATMs, itinerant criminal one Member State respondent saw a particularly
networks are able to operate across several locations ingenious criminal group using a new type of modus
in different countries within a few days, requiring operandi for each attack, including a malware to check
quick law enforcement response and international the balance of an ATM before deciding to attack it.
_54 IOCTA 2020 5
5
CRIME PRIORITY
KEY FINDINGS
• The Darkweb environment • The nature of the enhanced cryptocurrencies
has remained volatile, Darkweb community at and an emergence of
lifecycles of Darkweb the administrator level privacy-enhanced coinjoin
market places have shows how adaptive concepts, such as Wasabi
shortened, and no clear it is under challenging and Samurai.
dominant market has times, including more
risen over the past year effective cooperation
• Surface web e-commerce
sites and encrypted
compared to previous in the search for better
communication platforms
years to fill the vacuum left security solutions and safe
offer an additional
by the 2019 takedowns. Darkweb interaction.
dimension to Darkweb
• There has been an increase trading to enhance the
in the use of privacy- overall business model.
The criminal abuse of the darkweb IOCTA 2020 _55
5.1 INTRODUCTION
More marketplaces based on purchased scripts have DDoS protection solution (nicknamed Endgame Filter),
launched over the past twelve months, but some which is free to use for other marketplaces, therefore
of these disappeared due to hacking or exit scams. expanding their role beyond a traditional information
The decrease in large-scale marketplaces has led hub. Developers have also produced a Darkweb search
to an increase in smaller marketplaces, in some engine termed Recon, a service allowing users to
cases catering to specific users or needs. Some of see what kind of drugs are for sale on the Darkweb,
these markets are growing and as they gain positive what vendors there are and what ratings they have.
feedback from users, they are becoming increasingly Another example of a Darkweb search engine is Kilos,
stable. Users are monitoring ratings and usually which emerged in November 2019 reportedly as a
tend to keep to stable markets and vendors with potential follow up of Grams. Grams was a Darkweb
high ratings. The market community has engaged search engine which ceased operations in 201754.
in new ways of building trust with its users by Since going online Kilos seems to have adopted the
developing cross-cutting solutions on information objective of indexing more platforms and adding
and reliability. A new site called DarkNet Trust has more search functionalities than Grams. Moreover,
emerged which verifies vendors’ reputations by Digital Shadows describes how “Kilos has introduced
searching through usernames and PGP fingerprints updates, new features, and services that aim to ensure
and it is able to search over ten thousand profiles from security and anonymity for its users and also add a
marketplaces52. more human element to the site not previously seen
on other prominent Darkweb-based search engines."55
After the takedown of DeepDotWeb mentioned in
the IOCTA 201953, centralisation of information on Even though marketplaces continue to appear and
Darkweb markets has stabilised and even increased. disappear, an increasing number of operationally
DeepDotWeb was a popular information service secure marketplaces, such as wallet-less and user-
which made it easier for users to navigate the less markets, have emerged. Additionally, some
Darkweb ecosystem. Users are now looking to set up marketplaces have intentionally relatively short
information hubs to increase user-friendliness in the lifecycles, which pose a challenge to law enforcement
Darkweb environment and sites such as dark.fail and investigations. Short life cycles are making it difficult
darknetlive.com have taken over DeepDotWeb’s role for law enforcement to investigate criminal cases.
as information hubs. Dread, a popular Darkweb forum Administrators seem to want to stay under the radar
found on The Onion Router (Tor), continues to operate, of law enforcement by knocking down markets and
having been around for approximately three years. keeping market lifecycles low.
The administrators of Dread additionally produced a
The criminal abuse of the darkweb IOCTA 2020 _57
Furthermore, Darkweb administrators have been and enacting no JavaScript policies. Monopoly is also
observed pulling together and showing a collaborative a wallet-less market in which payment occurs directly
spirit to maintain the environment under challenging between buyer and vendor, and instead of enacting
circumstances. When faced with similar challenges, transaction fees, the market receives a monthly
forum and service administrators have been seen commission. Marketplaces were observed using multi
working more closely together over sharing code and signature wallets in their transactions56.
security methodologies (i.e. anti-DDoS measures,
avoiding scams, creating trust-building sites to help Users have also opted to use safer communications
users navigate vendors across different marketplaces, methods. The reputation of Protonmail, an encrypted
etc.). The Darkweb is essentially shaping into a email service considered to be a former favourite
‘business sector’ in itself. There are also differences among Darkweb users57, has suffered after
in the way administrators conduct their business on accusations that it has been helping law enforcement.
the Darkweb. Some are presenting to have a moral Due to this, Darkweb users are shifting to new
compass, banning items relating to the COVID-19 emerging encrypted email services such as Sonar and
pandemic crisis, for example. This is not typical Elude58.
across the Darkweb, but it is an indication that some
In addition to encrypted email services, Darkweb
administrators differ in their approaches to conducting
users are relying increasingly on popular digital
illicit trade.
communication channels such as Discord, Wickr and
Administrators are also looking to upgrade their Telegram. As these offer some degree of anonymity
security apparatus with other new features. Some to the users, criminals consider it a safe place. This
marketplaces are already shifting to wallet-less and has introduced new initiatives, such as the Telegram
user-less markets, adopting multi signatures on vending service bot.
Bitcoin and Monero, lacking registration requirements
_58 IOCTA 2020 The criminal abuse of the darkweb
In terms of the Darkweb infrastructure, Tor remains emerged on the platform over the past year. These
the preferred option. As a result, criminal usage of include those banned by some of the other Tor
Tor continues to be the primary focus. However, market-based administrators such as weapons
criminals have started to use other privacy-focused, and fentanyl. Even though the numbers may be
decentralised marketplace platforms, such as considered limited, the nature of these items means
OpenBazaar and Particl.io to sell their illegal goods. the focus ought to be on impact rather than volume.
The emergence of decentralised privacy-oriented COVID-19 related items also emerged on OpenBazaar
platforms is not a new phenomenon in the Darkweb during the pandemic. OpenBazaar has advertised a
ecosystem but they have started to increase mobile platform Haven and has seen thousands of
interest over the last year. OpenBazaar in particular downloads on Android60.
is noteworthy as certain high priority threats have
With respect to cryptocurrency on the Darkweb, Initially, Darkweb markets relied solely on Bitcoin.
privacy-enhanced wallet services using coinjoin However, over the past few years this has changed.
concepts (for example Wasabi and Samurai wallets) An increasing number of markets are recognising
have emerged as a top threat in addition to well the benefits of offering multiple coin alternatives,
established centralised mixers. Apart from expected including Litecoin, Ethereum, Monero, Zcash,
functionality including advanced decentralised coin and Dash. While Bitcoin still remains the most
mixing or integration of Tor these offer additional popular payment method (mainly due to its wide
features. Samurai, for example, offers remote wipe adoption, reputation and ease of use), the use of
SMS commands when under distress. These wallets privacy-enhanced cryptocurrencies has somewhat
do not necessarily remove the link between the origin increased albeit not at the rate expected by their
and destination of the funds but certainly make proponents. Monero is gradually becoming the most
cryptocurrency tracing much more challenging. Some established privacy coin for Darkweb transactions,
administrators of underground markets are trying to followed by Zcash and Dash. All these privacy
apply these wallets to their payment systems. Threat coins may present a considerable obstacle to law
actors have also been witnessed increasingly using enforcement investigations, despite the competing
hardware wallets, a separate physical device, which altcoin communities uncritically favouring their
securely store seeds and private keys for a wide range implementation over the others.
of cryptocurrencies.
_59
The criminal abuse
IOCTA of
2020 the darkweb The criminal abuse
IOCTA of _59
the darkweb
2020
Some platforms existing on the clear web (or surface forum administrators including cracked.to and nulled.
web) are also catering Darkweb goods and services, to). Stores on the platform also offered stolen accounts,
which offers additional benefits for criminals’ business databases, carding, crypters, banking malware,
models. A number of cybercriminals are relying on ransomware and variants of the Mirai botnet. This
surface-level e-commerce platforms for increased platform allowed sellers to accept payments through
visibility, posting links to their online digital goods PayPal and cryptocurrencies61. Surface e-commerce
stores. One case involved an e-commerce platform sites are useful for cybercriminals, as they allow them
registered to a company based in the Middle East, to showcase their products and services and they are
hosting online stores selling malicious digital tools legitimately registered businesses. Law enforcement
from Arabic, Russian, and English language-based also found cybercrime tools available on other clear
underground forums (links were found to underground web sites.
Recommendations
cooperation, reduce time, foster a culture of There is a persistent need for better cooperation
transparency and trust); with hosting services, social media platforms, and
ISPs. Companies need to be more proactive in illegal
» enhancing the legal framework; content and activity and blocking it as soon as they
detect it. One way of improving this is to invest in
» prevention and awareness; technologies that make sure their platforms are
clean. They should also be able to demonstrate more
» capacity building. willingness to assist law enforcement agencies to
deal with, for example, CSE, and show improved
openness and transparency.
Recommendations IOCTA 2020 _61
References
1 Durbin, Steve, “The Future’s Biggest Cybercrime 10 Europol, Catching the virus: cybercrime, disinforma-
Threat May Already Be Here”, https://www. tion and the COVID-19 pandemic, 2020
darkreading.com/vulnerabilities---threats/the-fu-
11 See IIJ America, “Allow / Deny List (Domain Policy
tures-biggest-cybercrime-threat-may-already-be-
Set Level)”, https://iijasd.zendesk.com/hc/en-us/
here/a/d-id/1338439, 2020
articles/206289805-Allow-Deny-List-Domain-Pol-
2 Europol, “Staying Safe During COVID-19: What you icy-Set-Level-, 2015 and the UK National Cyber
need to know”, https://www.europol.europa.eu/ Security Centre, “Terminology: it’s not black and
activities-services/staying-safe-during-covid-19- white”, https://www.ncsc.gov.uk/blog-post/termi-
what-you-need-to-know, 2020 nology-its-not-black-and-white, 2020
3 The European Union External Action Service 12 Chainalysis, “The Chainalysis Crypto Crime Report
(EEAS), “A Europe that Protects: Countering Hybrid is Here. Download to Learn Why 2019 Was the
Threats”, https://eeas.europa.eu/topics/eco- Year of the Ponzi Scheme”, https://blog.chainaly-
nomic-relations-connectivity-innovation/46393/ sis.com/reports/cryptocurrency-crime-2020-re-
europe-protects-countering-hybrid-threats_en port, 2020
accessed 27 July 2020 , 2020
13 Paquet-Clouston et al., “Spams meet Cryptocur-
4 Europol, Catching the virus: cybercrime, disinforma- rencies: Sextortion in the Bitcoin Ecosystem”,
tion and the COVID-19 pandemic, 2020 Advances in Financial Technology (AFT19), https://
arxiv.org/pdf/1908.01051.pdf , 2019
5 Wolford, Ben, “Does the GDPR apply to compa-
nies outside the EU?”, https://gdpr.eu/compa- 14 BBC, Coincheck: World’s biggest ever digital cur-
nies-outside-of-europe/, 2020 rency ‘theft’, https://www.bbc.com/news/world-
asia-42845505, 2018
6 Palmer, Danny, “GDPR: 160,000 data breaches
reported already, so expect the big fines to follow” 15 At the time of writing – August 2020.
https://www.zdnet.com/article/gdpr-160000-da-
16 European Commission, “February infringements
ta-breaches-reported-already-so-expect-the-big-
package: key decisions”, https://ec.europa.eu/
fines-to-follow/, 2020
commission/presscorner/detail/en/inf_20_202 ,
7 Schwab, Pierre-Nicolas, “European GDPR statis- 2020
tics: evolution of the number of complaints per
17 Coin ATM Radar, https://coinatmradar.com/, 2020
country”, https://www.intotheminds.com/blog/en/
gdpr-statistics-europe/ , 2019 18 European Commission, ”Protecting victims’
rights”, https://ec.europa.eu/info/policies/jus-
8 Verizon, 2020 Data Breach Investigations Report,
tice-and-fundamental-rights/criminal-justice/pro-
2020
tecting-victims-rights_en#:~:text=The%20Europe-
9 Many interviewees used the term sophistication an%20Commission%20presented%20on,fully%20
in connection to a variety of threats. The wide- rely%20on%20their%20rights, 2020
spread use of the term, however, also makes its
19 See for example https://twitter.com/EC3Europol
value as a descriptor limited. Certain sources aim
activities.
to further unravel the answer to what makes a
particular tactic or modus operandi sophisticated. 20 For more information see Europol and Eurojust’s
See DePaula, Nic & Sanjay Goel, “A Sophistica- reports on the Observatory Function.
tion Index for Evaluating Security Breaches”, 11th 21 Alrwais, Sumayah et al., Under the Shadow of Sun-
Annual Symposium on Information Assurance, 2016, sine: Understanding and Detecting Bulletproof Host-
and Buchanan, Ben, “The Legend of Sophistication ing on Legitimate Service Provider, IEEE Symposium
in Cyber Operations”, https://www.belfercenter. on Security and Privacy, 2017
org/publication/legend-sophistication-cyber-oper-
ations, 2017 22 State Criminal Police Office Rhineland-Palat-
References IOCTA 2020 _63
29 Hammersmith Medicines Research, “HMR target- 40 Europol, ”Operation CHEMOSH: how encrypted
ed by cyber criminals”, https://www.hmrlondon. chat groups exchanged Emoji ‘stickers’ of child
com/hmr-targeted-by-cyber-criminals, 2020 sexual abuse”, https://www.europol.europa.eu/
newsroom/news/operation-chemosh-how-en-
30 Intel 471, “Understanding the relationship between
crypted-chat-groups-exchanged-emoji-%E2%80%-
Emotet, Ryuk and Trickbot”, https://blog.intel471.
98stickers%E2%80%99-of-child-sexual-abuse,
com/2020/04/14/understanding-the-relation-
2020
ship-between-emotet-ryuk-and-trickbot/, 2020
41 Europol, “Exploiting isolation: offenders and
31 AWS Shield, ”Threat Landscape Report – Q1
victims of online child sexual abuse during the
2020”, https://aws-shield-tlr.s3.amazonaws.
COVID-19 pandemic”, https://www.europol.europa.
com/2020-Q1_AWS_Shield_TLR.pdf, 2020
eu/publications-documents/exploiting-isola-
32 European Commission, “Preventing and Combat- tion-offenders-and-victims-of-online-child-sexu-
ing Child Sexual Abuse and Exploitation: Towards al-abuse-during-covid-19-pandemic, 2020
an EU Response”, https://audiovisual.ec.europa.
42 Wongsamuth, Nanchanok, ”Online child sexual
eu/en/video/I-191928, 2020
abuse cases triple under lockdown in Philippines”,
33 Canadian Centre for Child Protection, “Internation- https://news.trust.org/item/20200529090040-
al Survivors’ Survey”, https://protectchildren.ca/ 3ejzo/ , 2020
_64 IOCTA 2020 References
43 Europol, ”90 suspects identified in major online 53 Europol, Internet Organised Crime Threat Assess-
child sexual abuse operation”, https://www. ment (IOCTA) 2019, 2019
europol.europa.eu/newsroom/news/90-sus-
54 Digital Shadows, ”Darkweb Search Engine Kilos:
pects-identified-in-major-online-child-sexu-
Tipping the Scales In Favor of Cybercrime”,
al-abuse-operation, 2020
https://www.digitalshadows.com/blog-and-re-
44 Europol, Internet Organised Crime Threat Assess- search/dark-web-search-engine-kilos/ , 2020
ment (IOCTA) 2019, 2019
55 Digital Shadows, ”Darkweb Search Engine Kilos:
45 Europol, ”COVID-19: Child Sexual Exploitation”, Tipping the Scales In Favor of Cybercrime”,
https://www.europol.europa.eu/covid-19/cov- https://www.digitalshadows.com/blog-and-re-
id-19-child-sexual-exploitation, 2020 search/dark-web-search-engine-kilos/ , 2020
46 Europol, ”COVID-19: Child Sexual Exploitation”, 56 Fuentes, Mayra Rosario, “Shifts in Underground
https://www.europol.europa.eu/covid-19/cov- Markets: Past, Present, and Future”, 2020
id-19-child-sexual-exploitation, 2020
57 Fuentes, Mayra Rosario, “Shifts in Underground
47 Europol, “The SIM hijackers: How criminals are Markets: Past, Present, and Future”, 2020
stealing millions by highjacking phone numbers”,
58 Fuentes, Mayra Rosario, “Shifts in Underground
https://www.europol.europa.eu/newsroom/news/
Markets: Past, Present, and Future”, 2020
sim-highjackers-how-criminals-are-stealing-mil-
lions-highjacking-phone-numbers, 2020 59 Europol, ”Darkweb child abuse: administrator
of Darkscandals arrested in the Netherlands”,
48 Europol, “The SIM hijackers: How criminals are
https://www.europol.europa.eu/newsroom/news/
stealing millions by highjacking phone numbers”,
dark-web-child-abuse-administrator-of-darkscan-
https://www.europol.europa.eu/newsroom/news/
dals-arrested-in-netherlands, 2020
sim-highjackers-how-criminals-are-stealing-mil-
lions-highjacking-phone-numbers, 2020 60 Europol, Catching the virus: cybercrime, disinforma-
tion and the COVID-19 pandemic, 2020
49 Cimpanu, Catalin, “FBI: BEC scams accounted for
half of the cyber-crime losses in 2019”, https:// 61 Fuentes, Mayra Rosario, “Shifts in Underground
www.zdnet.com/article/fbi-bec-scams-accounted- Markets: Past, Present, and Future”, 2020
for-half-of-the-cyber-crime-losses-in-2019/, 2020. 62 Fuentes, Mayra Rosario, “Shifts in Underground
50 Stupp, Catherine, “Fraudsters Used AI to Mim- Markets: Past, Present, and Future”, 2020
ic CEO’s Voice in Unusual Cybercrime Case”,
https://www.wsj.com/articles/fraudsters-use-
ai-to-mimic-ceos-voice-in-unusual-cybercrime-
case-11567157402, 2019