THE Economic and Financial Crimes Commission, EFCC, Monday, revealed that Oyo State has the highest number of cybercrimes and corruption related cases out of the six states in the South West.
This was disclosed by the Zonal Head of the commission, Mr. Friday Ebelo when speaking with newsmen in Ibadan, Oyo State. The statistics, he noted, was based on the last six months since the baton of leadership changed in the zone.
Most of the suspects, who perpetrate cybercrimes and other fraudulent acts, he noted, are between the ages of 18 and 40.
Ebelo said: “If you are looking for the number of convictions, Oyo State should be seen as the highest. We are based in Ibadan and since I resumed here, the tempo of our activities has increased.
“These suspects of cybercrimes and fraud related cases operate from Lagos and share their loots in Ibadan. But now, most of them are leaving Ibadan for the adjoining states.”
While giving a further breakdown of the statistics, the EFCC official said: “This year, the zone received a total of 481 petitions. We were able to secure 83 convictions out of the 107 cases filed at different courts within the zone. That represents 83 per cent of the total number of cases filed.”
“From January to June 21, 2019, an aggregate sum of N116.9 million has been recovered. Others, which are in foreign currencies, include $39,129, £1,800 and £50,” he said.
He added that 65 vehicles were recovered from the suspects. Ebelo explained that in some cases, criminals, who act as agents of the commission, use its name to seal up properties saying this is a scam as the commission does not work with any agents. He appealed to parents to be more vigilant and pay constant visits to their wards in schools. (Vanguard)
Subscribe to The Republican News. Advertise with us. Call us for press release, enquiries. Email: RepublicanNewsNetwork1@gmail.com, phone: +32466100102, +2348189650279, +3249722046
The South-east Zonal Office of EFCC, on Wednesday, May 1, 2019, arrested 37 suspected internet fraudsters in Owerri, Imo State. The arrest followed a raid on some targeted residences in Okwu Urata, Aladinma and Egbu areas.
The Commission’s action followed intelligence report which pointed that the suspects were living lavish lifestyles without any known means of livelihood, alleging further that they specialize in defrauding unsuspecting victims, through the internet.
In the course of executing the search warrants, items which included laptop computers, 25 five exotic cars, which include several brands of Mercedez-Benz, Lexus,Toyota and expensive mobile phones, were recovered.
Speaking on the development, the Zonal Head, Usman Imam, who said the exercise was in line with the Commission’s mandate decried the high rate of cybercrime in the zone which he blamed on the erosion and breakdown of country’s values.
“It is true that no society has been able to totally eradicate crime, but we are ready at least to reduce it to the barest minimum and it appears that this cybercrime is one of the challenges of our time, which the EFCC is willing to face drastically,” Imam said.
Questioning the lifestyle of the suspects, Iman said; “What is the business of a university student, a new graduate or youth corper looking for money to buy a car of N10 million? Obviously, this is rushing life and a collapse of our positive value system where people rarely want to start from a humble beginning,” Imam added.
Usman lamented that if nothing was done, the country’s leadership could be jeopardized as many youths involved in cybercrimes are expected to take up leadership positions in the future.
The suspects who volunteered their statements under caution will be charged to court as soon investigations into the matter are concluded.
Subscribe to the Republican News. Advertise with us. Call us for press release, enquiries. Email: RepublicanNewsNetwork1@gmail.com, phone: +2348189650279, +32466100102, +32497220468.
SAN FRANCISCO — Intelligence officials and private security experts say that new digital clues point to North Korean-linked hackers as likely suspects in the sweeping ransomware attacks that have crippled computer systems around the world.
The indicators are far from conclusive, the researchers warned, and it could be weeks, if not months, before investigators are confident enough in their findings to officially point the finger at Pyongyang’s increasingly bold corps of digital hackers. The attackers based their weapon on vulnerabilities that were stolen from the National Security Agency and published last month.
Security experts at Symantec, which in the past has accurately identified attacks mounted by the United States, Israel and North Korea, found early versions of the ransomware, called WannaCry, that used tools that were also deployed against Sony Pictures Entertainment, a Bangladesh Central Bank last year and Polish banks in February. American officials said Monday that they had seen the same similarities.
All of those attacks were ultimately linked to North Korea; President Barack Obama formally charged the North in late 2014 with destroying computers at Sony in retaliation for a comedy, “The Interview,” that envisioned a C.I.A. plot to kill Kim Jong-un, the country’s president.
The computer code used in the ransomware bore some striking similarities to the code used in those three attacks. That code has not been widely used, and has been seen only in attacks by North Korean-linked hackers. Researchers at Google and Kaspersky, a Moscow-based cybersecurity firm, confirmed the coding similarities.
Those clues alone are not definitive, however. Hackers often borrow and retrofit one another’s attack methods, and government agencies are known to plant “false flags” in their code to throw off forensic investigators.
“At this time, all we have is a temporal link,” said Eric Chien, an investigator at Symantec who was among the first to identify the Stuxnet worm, the American- and Israeli-led attacks on Iran’s nuclear program, and North Korea’s effort to steal millions from the Bangladeshi bank. “We want to see more coding similarities,’’ he said, “to give us more confidence.’’
The new leads about the source of the attacks came as technology executives d raised an alarm about another feature of the attacks: They were based on vulnerabilities in Microsoft systems that were found by the N.S.A. and apparently stolen from it.
In a blog post on Microsoft’s website over the weekend, Brad Smith, the company’s president, asked what would happen if the United States military lost control of “some of its Tomahawk missiles” and discovered that a criminal group was using them to threaten a damaging strike. It was a potent analogy, and an unusually public airing of the newest split in the Silicon Valley-Washington divide.
Over the past few months, it has become clear that the intelligence community’s version of Tomahawks — the “vulnerabilities” the N.S.A. and C.I.A. have spent billions of dollars to develop to break into foreign computers and foil Iranian nuclear programs or North Korean missiles — are being turned against everyday computer users around the world.
“We have seen vulnerabilities stored by the C.I.A. show up on WikiLeaks,” Mr. Smith wrote, “and now this vulnerability stolen from the N.S.A. has affected customers around the world.”
His blog post on Sunday explored some of the United States’ vulnerabilities. The N.S.A.’s tools were published last month by a hacking group calling itself The Shadow Brokers, which enabled hackers to bake them into their ransomware, which then spread rapidly through unpatched Microsoft computers, locking up everything in its wake.
There is no evidence that the North Koreans were involved in the actual theft of the N.S.A. hacking tools. There are many theories, but the favorite hypothesis among intelligence officials is that an insider, probably a contractor, stole the information, much as Edward J. Snowden lifted a different trove of information from the N.S.A. four years ago.
But hackers quickly seized on the published vulnerabilities to wreak havoc on computer systems that were not “patched’’ in recent months, after the N.S.A. quietly told Microsoft about the flaw in their systems. The damage wreaked in recent days could well escalate into the billions of dollars, security experts say, particularly now that any criminal, terrorist, or nation state has the ability to tease the tools apart and retrofit them into their own hacking tools.
Not surprisingly, government officials say it is not entirely their fault. They will not confirm or deny what Mr. Smith says outright: That these “vulnerabilities” come out of America’s growing cyberarsenal. At a news conference at the White House on Monday, Thomas Bossert, President Trump’s Homeland Security adviser, told reporters, “This was not an exploit developed by the N.S.A. to hold organizations ransom,” he said. “This was a vulnerability exploit that was part of a much larger tool put together by the culpable parties.”
“The provenance of the underlying vulnerability is not of as much concern to me,” Mr. Bossert said, stepping around the delicate question of the N.S.A.’s role.
The weapons used in the attacks that started Friday, government officials insist, were cobbled together from many sources. And the fault, they argue, lies with whoever turned them into weapons — or maybe with Microsoft itself, for not having a system in place to make sure that when they issue a patch that neutralizes such attacks, everyone around the world takes the time to fix their systems. Or with the victims, who failed to run their security updates made available two months ago, or who continue to use so-called “legacy” software that Microsoft no longer supports.
When asked about the source of the attack, Mr. Bossert said on Monday, “We don’t know.’’ He told reporters at the White House. “Attribution can be difficult. I don’t want to say we have no clues. But I stand assured that the best and brightest are working on this hack.”
As Mr. Bossert was speaking to reporters, yet another N.S.A. hacking tool, very similar to the one used in the weekend’s ransomware attacks, was being retrofitted by cybercriminals and put up for sale on the underground dark web. In private hacking forums, cybercriminals were discussing how to develop more than a dozen other N.S.A. hacking tools for criminal use.
Another round of attacks using the N.S.A. tools could well affect another big issue that the Obama administration debated and never resolved when it left office: whether the government can demand that all companies assure that investigators can “unlock” encrypted communications. Before he was fired last week, James B. Comey, the F.B.I. director, often complained that the government was “going dark,” and that intelligence agencies and local police needed a way to crack the encrypted mobile conversations of terrorists or kidnappers.
But the N.S.A.’s loss of its own hacking tools has undercut that argument, executives say. If the N.S.A. and the C.I.A. cannot keep their hacking tools locked up, companies like Apple are asking, why should Americans trust them with the keys to unlock every private communication and bank transfer? Won’t those leak, too, meaning that hackers, blackmailers and thieves will all have access to everyone’s private email, health records and financial transactions?
Nine years ago, the White House created a process for deciding what unpatched holes to disclose to manufacturers like Microsoft and its competitors, and which to keep in its arsenal.
That process was refined by Mr. Obama and in 2015, Adm. Michael Rogers, the director of the NSA, said the agency had shared 91 percent of the zero-days it had discovered that year. A zero-day is a previously undisclosed flaw that leaves computer users with zero days to fix the vulnerability.
But, Michael Daniel, the White House cybercoordinator in the Obama administration, noted, “We still don’t have a good rating system for vulnerabilities in terms of their severity. Not all zero-days are created equal,” he said.
The N.S.A.’s wormlike tool was leaked online by the Shadow Brokers last month.
“What happened with the Shadow Brokers in this case is equivalent to a nuclear bomb in cyberspace,” said Zohar Pinhasi, a former cybersecurity intelligence officer for the Israeli military, now the chief executive of MonsterCloud, which helps mitigate ransomware attacks. “This is what happens when you give a tiny little criminal a weapon of mass destruction. This will only go bigger. It’s only the tip of the iceberg.” (The New York Times)