国际米兰对阵科莫 - Cybersecurity /taxonomy/subjects/cybersecurity en Researchers demonstrate the UK鈥檚 first long-distance ultra-secure communication over a quantum network /research/news/researchers-demonstrate-the-uks-first-long-distance-ultra-secure-communication-over-a-quantum <div class="field field-name-field-news-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><img class="cam-scale-with-grid" src="/sites/default/files/styles/content-580x288/public/news/research/news/gettyimages-1400360356-copy.jpg?itok=ZWmYAO7b" alt="Digital abstract background" title="Abstract background, Credit: MR.Cole_Photographer via Getty Images" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>The team, from the Universities of Bristol and 国际米兰对阵科莫, created the network, which uses standard fibreoptic infrastructure, but relies on a variety of quantum phenomena to enable ultra-secure data transfer.</p> <p>The network uses two types of quantum key distribution (QKD) schemes: 鈥榰nhackable鈥 encryption keys hidden inside particles of light; and distributed entanglement: a phenomenon that causes quantum particles to be intrinsically linked.</p> <p>The researchers demonstrated the capabilities of the network via a live, quantum-secure video conference link, the transfer of encrypted medical data, and secure remote access to a distributed data centre. The data was successfully transmitted between Bristol and 国际米兰对阵科莫 鈥 a fibre distance of over 410 kilometres.</p> <p>This is the first time that a long-distance network, encompassing different quantum-secure technologies such as entanglement distribution, has been successfully demonstrated. The researchers presented their results at the <em>2025 Optical Fiber Communications Conference (OFC)</em> in San Francisco.</p> <p>Quantum communications offer unparalleled security advantages compared to classical telecommunications solutions. These technologies are immune against future cyber-attacks, even with quantum computers, which 鈥 once fully developed 鈥 will have the potential to break through even the strongest cryptographic methods currently in use.</p> <p>In the past few years, researchers have been working to build and use quantum communication networks. China recently set up a massive network that covers 4,600 kilometres by connecting five cities using both fibreoptics and satellites. In Madrid, researchers created a smaller network with nine connection points that use different types of QKD to securely share information.</p> <p>In 2019, researchers at 国际米兰对阵科莫 and Toshiba demonstrated a metro-scale quantum network operating at record key rates of millions of key bits per second. And in 2020, researchers in Bristol built a network that could share entanglement between multiple users. Similar quantum network trials have been demonstrated in Singapore, Italy and the USA.</p> <p>Despite this progress, no one has built a large, long-distance network that can handle both types of QKD, entanglement distribution, and regular data transmission all at once, until now.</p> <p>The experiment demonstrates the potential of quantum networks to accommodate different quantum-secure approaches simultaneously with classical communications infrastructure. It was carried out using the UK鈥檚 Quantum Network (UKQN), established over the last decade by the same team, supported by funding from the Engineering and Physical Sciences Research Council (EPSRC), and as part of the <a href="https://www.quantumcommshub.net/">Quantum Communications Hub</a> project.</p> <p>鈥淭his is a crucial step toward building a quantum-secured future for our communities and society,鈥 said co-author Dr Rui Wang, Lecturer for Future Optical Networks in the Smart Internet Lab's High Performance Network Research Group at the University of Bristol. 鈥淢ore importantly, it lays the foundation for a large-scale quantum internet鈥攃onnecting quantum nodes and devices through entanglement and teleportation on a global scale.鈥</p> <p>鈥淭his marks the culmination of more than ten years of work to design and build the UK Quantum Network,鈥 said co-author Adrian Wonfor from 国际米兰对阵科莫鈥檚 Department of Engineering. 鈥淣ot only does it demonstrate the use of multiple quantum communications technologies, but also the secure key management systems required to allow seamless end-to-end encryption between us.鈥</p> <p>鈥淭his is a significant step in delivering quantum security for the communications we all rely upon in our daily lives at a national scale,鈥 said co-author Professor Richard Penty, also from 国际米兰对阵科莫 and who headed the Quantum Networks work package in the Quantum Communications Hub. 鈥淚t would not have been possible without the close collaboration of the two teams at 国际米兰对阵科莫 and Bristol, the support of our industrial partners Toshiba, BT, Adtran and Cisco, and our funders at UKRI.鈥</p> <p>鈥淭his is an extraordinary achievement which highlights the UK鈥檚 world-class strengths in quantum networking technology,鈥 said Gerald Buller, Director of the IQN Hub, based at Heriot-Watt University. 鈥淭his exciting demonstration is precisely the kind of work the Integrated Quantum Networks Hub will support over the coming years, developing the technologies, protocols and standards which will establish a resilient, future-proof, national quantum communications infrastructure.鈥</p> <p>The current UKQN covers two metropolitan quantum networks around Bristol and 国际米兰对阵科莫, which are connected via a 鈥榖ackbone鈥 of four long-distance optical fibre links spanning 410 kilometres with three intermediate nodes.</p> <p>The network uses single-mode fibre over the EPSRC National Dark Fibre Facility (which provides dedicated fibre for research purposes), and low-loss optical switches allowing network reconfiguration of both classical and quantum signal traffic.</p> <p>The team will pursue this work further through a newly funded EPSRC project, the <a href="https://iqnhub.org/">Integrated Quantum Networks Hub</a>, whose vision is to establish quantum networks at all distance scales, from local networking of quantum processors to national-scale entanglement networks for quantum-safe communication, distributed computing and sensing, all the way to intercontinental networking via low-earth orbit satellites.</p> <p>聽</p> <p><em><strong>Reference:</strong><br /> R. Yang et al. 鈥楢 UK Nationwide Heterogeneous Quantum Network.鈥 Paper presented at the 2025 Optical Fiber Communications Conference and Exhibition (OFC): <a href="https://www.ofcconference.org/en-us/home/schedule/">https://www.ofcconference.org/en-us/home/schedule/</a></em></p> </div></div></div><div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>Researchers have successfully demonstrated the UK鈥檚 first long-distance ultra-secure transfer of data over a quantum communications network, including the UK鈥檚 first long-distance quantum-secured video call.</p> </p></div></div></div><div class="field field-name-field-image-credit field-type-link-field field-label-hidden"><div class="field-items"><div class="field-item even"><a href="https://www.gettyimages.co.uk/detail/photo/rendering-motion-graphic-of-futuristic-abstract-royalty-free-image/1400360356" target="_blank">MR.Cole_Photographer via Getty Images</a></div></div></div><div class="field field-name-field-image-desctiprion field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Abstract background</div></div></div><div class="field field-name-field-cc-attribute-text field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="https://creativecommons.org/licenses/by-nc-sa/4.0/" rel="license"><img alt="Creative Commons License." src="/sites/www.cam.ac.uk/files/inner-images/cc-by-nc-sa-4-license.png" style="border-width: 0px; width: 88px; height: 31px;" /></a><br /> The text in this work is licensed under a <a href="https://creativecommons.org/licenses/by-nc-sa/4.0/">Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License</a>. Images, including our videos, are Copyright 漏国际米兰对阵科莫 and licensors/contributors as identified. All rights reserved. We make our image and video content available in a number of ways 鈥 on our <a href="/">main website</a> under its <a href="/about-this-site/terms-and-conditions">Terms and conditions</a>, and on a <a href="/about-this-site/connect-with-us">range of channels including social media</a> that permit your use and sharing of our content under their respective Terms.</p> </div></div></div><div class="field field-name-field-show-cc-text field-type-list-boolean field-label-hidden"><div class="field-items"><div class="field-item even">Yes</div></div></div> Mon, 07 Apr 2025 23:38:58 +0000 sc604 248937 at Building business partnerships in AI, quantum, cybersecurity and computer architecture /business-partnerships-computing <div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>Hear from four of our leading researchers on their work and why partnering with industry is key to their success.聽聽</p> </p></div></div></div> Wed, 18 Sep 2024 14:25:55 +0000 skbf2 247861 at Architecting the future /stories/arm <div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>Arm is working with 国际米兰对阵科莫 researchers聽to make our phones and computers more secure, more efficient and ready for the digital revolution.</p> </p></div></div></div> Tue, 08 Dec 2020 16:17:50 +0000 skbf2 220481 at Honour among thieves: the study of a cybercrime marketplace in action /research/news/honour-among-thieves-the-study-of-a-cybercrime-marketplace-in-action <div class="field field-name-field-news-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><img class="cam-scale-with-grid" src="/sites/default/files/styles/content-580x288/public/news/research/news/crop_208.jpg?itok=QwBTRxOF" alt="Someone programming a website in HTML" title="Someone programming a website in HTML, Credit: Mika Baumeister on Unsplash" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Having seen a large rise in illegal transactions during the first national lockdown last spring, the researchers warned that the second lockdown is likely to result in another surge in cybercrime activities. But they also offer聽insights on how such activity can be disrupted.</p>&#13; &#13; <p>The researchers have been collecting the data on illicit trades from HackForums 鈥 the world鈥檚 largest and most popular online cybercrime community. Two years ago, it set up a market where contracts had to be logged for all transactions as an attempt to protect members of the community from scamming and frauds.</p>&#13; &#13; <p>The contract system was introduced in 2018, and then made mandatory in spring 2019, for all market users. It logged all the illicit buying and selling of 鈥 among other things 鈥 malicious software (malware), currencies including Bitcoin and gift vouchers, eWhoring 鈥榩acks鈥 (e.g. of photos and videos with sexual content), hacking tutorials and tools that allow users illegally to access or control remote servers. 聽聽</p>&#13; &#13; <p>Ironically, HackForums had introduced the contract logging system in response to its members鈥 concerns that trades were being abused and they were being scammed. But in doing so, it unwittingly lifted the lid on the way such underground markets operate.</p>&#13; &#13; <p>The data the contract logging generated has been collected by researchers here. And after analysing it and using statistical modelling approaches, the researchers have been able to shed important new light on the way a cybercrime market operates, hopefully to the benefit of the security community.</p>&#13; &#13; <p>The researchers watched the market initially function as a forum where many individual users conducted one-off transactions. Then it changed. As the contract system became mandatory, within a few months, the market was becoming concentrated around a small group of 鈥榩ower-users鈥 offering goods and services that were attractive to many.</p>&#13; &#13; <p>鈥淭his small group of users 鈥 representing about 5 per cent of all users 鈥 are involved in around 70 per cent of all the transactions,鈥 said Anh Vu, a research assistant in the 国际米兰对阵科莫 Cybercrime Centre and co-author of the paper the Centre has just produced, <a href="https://www.cl.cam.ac.uk/~vv301/papers/imc20.pdf">鈥<em>Turning Up the Dial: the Evolution of a Cybercrime Market through Set-up, Stable, and Covid-19 Eras鈥</em></a> .</p>&#13; &#13; <p>And then came the global declaration of the coronavirus pandemic in March 2020. The research team saw the virus and the resulting lockdowns that were introduced significantly 鈥渢urn up the dial鈥 on the number of market transactions.</p>&#13; &#13; <p>鈥淭here was a big rise in transactions in what we call the 鈥楥ovid-19 era鈥,鈥 said聽Anh. 鈥淟ooking at the discussion forums, we could see that a period of mass boredom and economic change 鈥 when presumably some members were not able to go to school and others had lost their jobs 鈥 really stimulated the market.</p>&#13; &#13; <p>鈥淢embers needed to make money online and they had a lot of time on their hands, and so we saw a rise in trading activity. We expect to see another rise during the second lockdown, but we don鈥檛 think it will be as large as during the first.鈥</p>&#13; &#13; <p>The increase in business during the pandemic also meant that contracts for transactions were concluded much faster. Where in the early months of the market, the completion time for contracts was around 70 hours, during the pandemic it dropped to less than 10 hours.</p>&#13; &#13; <p>Online underground forums like HackForums are communities used for trading in illicit material and sharing knowledge. The forums support a plethora of cybercrimes, allowing members to learn about and engage in criminal activities such as trading virtual items obtained by illicit means, launching denial of service attacks, or obtaining and using malware. They facilitate a variety of illicit businesses aiming at making easy money.</p>&#13; &#13; <p>The 国际米兰对阵科莫 Cybercrime Centre researchers have done some previous work looking at underground forums. 鈥淏ut this is the first dataset we are aware of that provides insights about the contracts made in these forums,鈥 says Anh. Previously, while traders might meet online in a forum, they would likely trade offline via private messaging. But the introduction of the contract system means all trades are now logged 鈥 and can therefore be tracked.</p>&#13; &#13; <p>Using the data, the researchers looked at a variety of trading activities taking place in the market. The largest activities were currency exchanges and payments 鈥 for example, exchanging Bitcoin (a very popular currency in illicit trading because people believe that it leaves no trace) for PayPal funds.</p>&#13; &#13; <p>This activity was followed by trades in gift cards (including Amazon gift cards) and software licences. 鈥淲hen you install a software package like Windows,鈥 Anh said.聽鈥淵ou have to input a key to activate it. People often buy software keys illegally in a market like this because it is cheaper for them than purchasing it officially from Microsoft 鈥 and sometimes they can obtain it for free in exchange for other items.鈥</p>&#13; &#13; <p>Other products and services they found being traded in the underground market were hacking tutorials, remote access tools and eWhoring materials 鈥 photos and videos with sexual content that are sold to a third party, who pays for them believing that they are paying for an online sexual encounter.</p>&#13; &#13; <p>They used several methods to try and estimate the values of trades taking place via HackForums and concluded that taking both public and private transactions into account and extrapolating by each contract type, the lower bound total of trades was in excess of $6 million.</p>&#13; &#13; <p>What the researchers learned about the operation of an underground cybercrime market is valuable, they believe, to the security community. The logging of contracts when goods were traded has allowed users to build up a form of trust and reputation and this in turn led to the rise of the 鈥榩ower-users鈥 in the market.</p>&#13; &#13; <p>鈥淎nd now we know a small group of power-users are responsible for a large number of transactions, it would make sense to focus interventions on them,鈥 Anh said.聽鈥淎s that will have a much bigger impact than going after a large number of individuals.鈥</p>&#13; &#13; <p>In their paper they suggest interventions to undermine the perceived reputations and trustworthiness of the big players 鈥 for example by posting false negative reviews of them and using other methods, known as Sybil attacks, that disrupt the market鈥檚 reputation systems.</p>&#13; &#13; <p>And the researchers are continuing to watch the market. 鈥淲e鈥檙e interested to know how the marketplace evolves during this second lockdown and afterwards,鈥 said聽Anh.聽鈥淎nd will be looking to see whether any new trading activities emerge.鈥</p>&#13; &#13; <p><strong><em>Reference:聽</em></strong><br />&#13; <a href="https://www.cl.cam.ac.uk/~vv301/papers/imc20.pdf">鈥<em>Turning Up the Dial: the Evolution of a Cybercrime Market through Set-up, Stable, and Covid-19 Eras鈥</em></a><em> was presented at a seminar series of the 2020 Internet Measurement Conference. It was also presented at the <a href="https://www.cst.cam.ac.uk/seminars/list/152692">Workshop on Security and Human Behaviour</a> taking place on Thursday 5 November 2020</em>.</p>&#13; </div></div></div><div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>Researchers at the 国际米兰对阵科莫 Cybercrime Centre have revealed what they鈥檝e learned from analysing hundreds of thousands of illicit trades that took place in an underground cybercrime forum over the last two years.</p>&#13; </p></div></div></div><div class="field field-name-field-content-quote field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even">We鈥檙e interested to know how the marketplace evolves during this second lockdown and afterwards, and will be looking to see whether any new trading activities emerge</div></div></div><div class="field field-name-field-content-quote-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Anh Vu</div></div></div><div class="field field-name-field-image-credit field-type-link-field field-label-hidden"><div class="field-items"><div class="field-item even"><a href="https://unsplash.com/photos/flat-screen-computer-monitor-displaying-white-and-black-screen-J5yoGZLdpSI" target="_blank">Mika Baumeister on Unsplash</a></div></div></div><div class="field field-name-field-image-desctiprion field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Someone programming a website in HTML</div></div></div><div class="field field-name-field-cc-attribute-text field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="http://creativecommons.org/licenses/by/4.0/" rel="license"><img alt="Creative Commons License" src="https://i.creativecommons.org/l/by/4.0/88x31.png" style="border-width:0" /></a><br />&#13; The text in this work is licensed under a <a href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>. Images, including our videos, are Copyright 漏国际米兰对阵科莫 and licensors/contributors as identified.聽 All rights reserved. We make our image and video content available in a number of ways 鈥 as here, on our <a href="/">main website</a> under its <a href="/about-this-site/terms-and-conditions">Terms and conditions</a>, and on a <a href="/about-this-site/connect-with-us">range of channels including social media</a> that permit your use and sharing of our content under their respective Terms.</p>&#13; </div></div></div><div class="field field-name-field-show-cc-text field-type-list-boolean field-label-hidden"><div class="field-items"><div class="field-item even">Yes</div></div></div> Fri, 06 Nov 2020 16:19:06 +0000 Anonymous 219481 at Lockdown 'helps fuel rise in cybercrime' /research/news/lockdown-helps-fuel-rise-in-cybercrime <div class="field field-name-field-news-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><img class="cam-scale-with-grid" src="/sites/default/files/styles/content-580x288/public/news/research/news/philipp-katzenberger-iijruoerocq-unsplash.jpg?itok=Zns9odQR" alt="Close-up of a laptop&#039;s keyboard" title="Closeup of laptop computer, Credit: Photo by Philipp Katzenberger on Unsplash" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>That鈥檚 the warning from a team of researchers including Dr Ben Collier from the <a href="https://www.cambridgecybercrime.uk/">国际米兰对阵科莫 Cybercrime Centre</a>,聽part of 国际米兰对阵科莫's聽<a href="https://www.cst.cam.ac.uk/">Department of Computer Science and Technology</a>.</p>&#13; &#13; <p>The researchers have been analysing data collected by the Centre from underground forums, chat channels and marketplaces used by cybercrime communities. And in a briefing paper they have just written for Police Scotland, they say it indicates that the social changes put in place in response to the coronavirus pandemic 'have stimulated鈥 the cybercrime economy.'</p>&#13; &#13; <p>Some of the cybercrimes taking place are new. For example, early in the lockdown, some scammers sent fake texts, purporting to come from the UK's HM Revenue &amp; Customs, telling recipients they were going to be fined 拢250 for leaving their homes more than once a day.鈥</p>&#13; &#13; <p>And the researchers are also concerned that the rollout of the prospective NHS contact-tracing app has the potential to generate clear risks for those vulnerable to fraud. They warn that such people may be conned into handing over sensitive personal information by fake apps or scam texts purporting to be from the NHS.</p>&#13; &#13; <p>鈥淲e鈥檙e also seeing some general repurposing of existing cybercrime,鈥 said聽Collier. 鈥淔or example, there have long been fake online shops, but now instead of selling clothes, they are selling face masks or bogus 鈥榗ures鈥 for the coronavirus.鈥</p>&#13; &#13; <p>And meanwhile, there has been a general rise in the levels of cybercrime.聽 The 国际米兰对阵科莫 Cybercrime Centre has tracked a three-fold increase in 鈥榙enial of service鈥 attacks from around 12,000 per day to close to 30,000 attacks per day. These attacks 鈥 which can be purchased for small amounts of money from specialised online services 鈥 can be used to knock others offline, often opponents in online games.</p>&#13; &#13; <p>Such attacks, the report says, have serious implications beyond being a nuisance for gamers, as many of these children and young people will be sharing internet connections with siblings engaged in online or blended learning and parents working from home.</p>&#13; &#13; <p>We are vulnerable to such risks, Collier and his colleagues say, because we are spending much more time online as we work, or school our children, from home. And it is partly happening because 鈥渕any internet users, including adolescents and young adults, are currently confined to home with no school or work for much of the day. The increased boredom they feel may well be a key driver of online petty crime.鈥</p>&#13; &#13; <p>鈥淎nxiety over serious economic problems 鈥 such as job losses and business closures 鈥 may be prompting some people to step up existing harmful online activity as a means of generating income,鈥 said Collier.聽</p>&#13; &#13; <p>In their paper, the research team 鈥 Dr Collier, Dr Shane Horgan from Edinburgh Napier University, Dr Richard Jones from the University of Edinburgh and Dr Lynsay Shepherd from Abertay University 鈥 also voice their concerns about the potential for a steep rise in the volume of other online harms. These include online bullying, stalking and harassment of minority groups and victims of domestic abuse.</p>&#13; &#13; <p>Their paper is a rapid response briefing aimed at offering guidance on the policing of cybercrime to Police Scotland. But its findings have relevance across the UK.</p>&#13; &#13; <p>It says that while the UK has a sophisticated cybersecurity apparatus particularly at the national level, it currently lacks sufficient capability at the local level to police a significant increase in 鈥榲olume鈥 cybercrime offences.</p>&#13; &#13; <p>And it recommends that with levels of such crimes increasing, police forces need to engage more with their local communities and work with them on measures to prevent such crimes.</p>&#13; &#13; <p>The paper also recommends that police forces, including Police Scotland, immediately undertake a wide-ranging review of their cybercrime policing and prevention practices and capabilities to assess their current adequacy and potential future resilience in the event that the number of cybercrime offences increases significantly in the near future.</p>&#13; &#13; <p><a href="https://www.sipr.ac.uk/assets/files/REiP%20-%20Pandemic%20Cyber%20-%20Collier_Horgan_Jones_Shepherd.pdf"><em>The implications of the COVID-19 pandemic for cybercrime policing in Scotland: A rapid review of the evidence and future considerations鈥</em></a> is published by the Scottish Institute for Policing Research.</p>&#13; </div></div></div><div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>Take extra care before buying face masks or testing kits online, or responding to texts apparently sent to you by the UK Government or the NHS. Because while lockdown has helped reduce the spread of the coronavirus, it is also helping fuel a rise in cybercrime.</p>&#13; </p></div></div></div><div class="field field-name-field-content-quote field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even">Anxiety over serious economic problems 鈥 such as job losses and business closures 鈥 may be prompting some people to step up existing harmful online activity as a means of generating income</div></div></div><div class="field field-name-field-content-quote-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Ben Collier</div></div></div><div class="field field-name-field-image-credit field-type-link-field field-label-hidden"><div class="field-items"><div class="field-item even"><a href="https://unsplash.com/photos/closeup-photo-of-turned-on-blue-and-white-laptop-computer-iIJrUoeRoCQ" target="_blank">Photo by Philipp Katzenberger on Unsplash</a></div></div></div><div class="field field-name-field-image-desctiprion field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Closeup of laptop computer</div></div></div><div class="field field-name-field-cc-attribute-text field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="http://creativecommons.org/licenses/by/4.0/" rel="license"><img alt="Creative Commons License" src="https://i.creativecommons.org/l/by/4.0/88x31.png" style="border-width:0" /></a><br />&#13; The text in this work is licensed under a <a href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>. Images, including our videos, are Copyright 漏国际米兰对阵科莫 and licensors/contributors as identified.聽 All rights reserved. We make our image and video content available in a number of ways 鈥 as here, on our <a href="/">main website</a> under its <a href="/about-this-site/terms-and-conditions">Terms and conditions</a>, and on a <a href="/about-this-site/connect-with-us">range of channels including social media</a> that permit your use and sharing of our content under their respective Terms.</p>&#13; </div></div></div><div class="field field-name-field-show-cc-text field-type-list-boolean field-label-hidden"><div class="field-items"><div class="field-item even">Yes</div></div></div> Wed, 03 Jun 2020 10:24:06 +0000 rg580 215072 at Prevention better than cure at keeping young users from getting involved in cybercrime /research/news/prevention-better-than-cure-at-keeping-young-users-from-getting-involved-in-cybercrime <div class="field field-name-field-news-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><img class="cam-scale-with-grid" src="/sites/default/files/styles/content-580x288/public/news/research/news/crop_150.jpg?itok=gfqxZcar" alt="Eyeglasses" title="Eyeglasses, Credit: Photo by Kevin Ku on Unsplash" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>The study, by researchers from the 国际米兰对阵科莫 and University of Strathclyde, looked at four different types of law enforcement interventions, the first evaluation of the their effectiveness for this particular type of cybercrime.</p>&#13; &#13; <p>They found that while high-profile arrests and sentencing of cybercriminals only lead to a short drop in the number of attacks taking place, the takedown of infrastructure and targeted messaging campaigns were strongly associated with a sharper and longer-term reduction in attack numbers. The results will be presented today (21 October) at the ACM Internet Measurement Conference in Amsterdam.</p>&#13; &#13; <p>For just a few dollars, almost anyone can become involved in cybercrime through the use of 鈥榖ooter鈥 service websites, where users can purchase targeted denial of service (DoS) attacks. A DoS attack generates large amounts of traffic which overwhelm end users or web services, taking them offline.</p>&#13; &#13; <p>DoS attacks have been used in the past as a protest tactic, but because of booter services and the relative ease of using them, they are commonly used by users of gaming sites, as a form of retaliation against other users 鈥 the largest booter provider carries out between 30,000 and 50,000 such attacks every day.</p>&#13; &#13; <p>While DoS attacks are usually targeted at a specific end users, they can often cause collateral damage, knocking out other users or systems.</p>&#13; &#13; <p>鈥淟aw enforcement are concerned that DoS attacks purchased from a booter site might be like a 鈥榞ateway drug鈥 to more serious cybercrime,鈥 said <a href="https://www.cl.cam.ac.uk/~bjc63/">Ben Collier</a> from 国际米兰对阵科莫鈥檚 Department of Computer Science &amp; Technology, the paper鈥檚 first author. 鈥淎 big problem is that there is still relatively little evidence as to what best practice looks like for tackling cybercrime.鈥</p>&#13; &#13; <p>鈥淓ven people running booter services think that booting is lame,鈥 said <a href="https://personal.cis.strath.ac.uk/d.thomas/">Dr Daniel Thomas</a> from Strathclyde鈥檚 Department of Computer and Information Sciences. 鈥淭his makes the market particularly vulnerable to disruption.鈥</p>&#13; &#13; <p>Collier and his colleagues from the <a href="https://www.cambridgecybercrime.uk/">国际米兰对阵科莫 Cybercrime Centre</a> used two datasets with granular data about the attacks from booter sites, and modelled how the data correlated with different intervention tactics from the National Crime Agency (NCA) in the UK, the Federal Bureau of Investigation (FBI) in the US, and other international law enforcement agencies.</p>&#13; &#13; <p>While operating a booter service or purchasing a DoS attack is illegal in most jurisdictions, earlier research has found that most booter operators were unconcerned about the possibility of police action against them.</p>&#13; &#13; <p>The researchers found that arrests only had a short-term effects on the volume of DoS attacks 鈥 about two weeks 鈥 at which point activity went back to normal. Sentencing had no widespread effect, as attackers in one country weren鈥檛 affected by sentences in another country.</p>&#13; &#13; <p>Taking down infrastructure 鈥 as the FBI did at the end of 2018 鈥 had a far more noticeable effect, and suppressed the booter market for months. 鈥淭his FBI action also reshaped the market: before, it was what you鈥檇 expect in a mature ecosystem, where there several large booter services and lots of smaller ones,鈥 said Collier. 鈥淏ut now there鈥檚 really just one large booter service provider, and you鈥檙e starting to see a few smaller ones start to come back.鈥</p>&#13; &#13; <p>The most interesting results were around targeted messaging. From late December 2017 to June 2018, the NCA bought targeted Google adverts aimed at young men in the UK. When a user searched for booter services, a targeted advert popped up, explaining that DoS attacks are illegal.</p>&#13; &#13; <p>鈥淚t鈥檚 surprising, but it seems to work, like a type of digital guardianship,鈥 said Collier. 鈥淎t the exact moment you get curious about getting involved in cybercrime, you get a little tap on the shoulder.</p>&#13; &#13; <p>鈥淚t might not work for people who are already involved in this type of cybercrime, but it appeared to dramatically decrease the numbers of new people getting involved.鈥</p>&#13; &#13; <p>While the researchers say this evidence suggests that targeted online messaging has the potential to be a potent tool for preventing crime, it also poses questions about what accountability structures might be required for its wider use as a police tactic.</p>&#13; &#13; <p>This has already had direct policy impact, and the FBI and NCA have used this research to inform their strategies for dealing with booter services.</p>&#13; &#13; <p>The research was supported by the Engineering and Physical Sciences Research Council.</p>&#13; &#13; <p><strong><em>Reference:</em></strong><br />&#13; <em>Ben Collier, Daniel Thomas, Richard Clayton and Alice Hutchings. 鈥楤ooting the Booters: Evaluating the Effects of Police Interventions in the Market for Denial-of-Service Attacks.鈥 Paper presented at the <a href="https://conferences.sigcomm.org/imc/2019/program/">ACM Internet Measurement Conference 2019</a>. Amsterdam, the Netherlands. </em></p>&#13; </div></div></div><div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>Highly-targeted messaging campaigns from law enforcement can be surprisingly effective at dissuading young gamers from getting involved in cybercrime, a new study has suggested.</p>&#13; </p></div></div></div><div class="field field-name-field-content-quote field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even">A big problem is that there is still relatively little evidence as to what best practice looks like for tackling cybercrime</div></div></div><div class="field field-name-field-content-quote-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Ben Collier</div></div></div><div class="field field-name-field-image-credit field-type-link-field field-label-hidden"><div class="field-items"><div class="field-item even"><a href="https://unsplash.com/photos/closeup-photo-of-eyeglasses-w7ZyuGYNpRQ" target="_blank">Photo by Kevin Ku on Unsplash</a></div></div></div><div class="field field-name-field-image-desctiprion field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Eyeglasses</div></div></div><div class="field field-name-field-cc-attribute-text field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="http://creativecommons.org/licenses/by/4.0/" rel="license"><img alt="Creative Commons License" src="https://i.creativecommons.org/l/by/4.0/88x31.png" style="border-width:0" /></a><br />&#13; The text in this work is licensed under a <a href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>. Images, including our videos, are Copyright 漏国际米兰对阵科莫 and licensors/contributors as identified.聽 All rights reserved. We make our image and video content available in a number of ways 鈥 as here, on our <a href="/">main website</a> under its <a href="/about-this-site/terms-and-conditions">Terms and conditions</a>, and on a <a href="/about-this-site/connect-with-us">range of channels including social media</a> that permit your use and sharing of our content under their respective Terms.</p>&#13; </div></div></div><div class="field field-name-field-show-cc-text field-type-list-boolean field-label-hidden"><div class="field-items"><div class="field-item even">Yes</div></div></div> Sun, 20 Oct 2019 23:20:52 +0000 sc604 208322 at Most laptops vulnerable to attack via peripheral devices, say researchers /research/news/most-laptops-vulnerable-to-attack-via-peripheral-devices-say-researchers <div class="field field-name-field-news-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><img class="cam-scale-with-grid" src="/sites/default/files/styles/content-580x288/public/news/research/news/crop_105.jpg?itok=AQRZmGmd" alt="Macbook pro with dongle" title="Macbook pro with dongle, Credit: Theo Markettos" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>The research, presented at the <a href="https://www.ndss-symposium.org/ndss2019/">Network and Distributed Systems Security Symposium</a> in San Diego, USA, shows that attackers can compromise an unattended machine in a matter of seconds through devices such as chargers and docking stations.</p>&#13; &#13; <p>Vulnerabilities were found in computers with Thunderbolt ports running Windows, macOS, Linux and FreeBSD. Many modern laptops and an increasing number of desktops are susceptible.</p>&#13; &#13; <p>The researchers, from the 国际米兰对阵科莫 and Rice University, exposed the vulnerabilities through Thunderclap, an open-source platform they have created to study the security of computer peripherals and their interactions with operating systems. It can be plugged into computers using a USB-C port that supports the Thunderbolt interface and allows the researchers to investigate techniques available to attackers. They found that potential attacks could take complete control of the target computer.</p>&#13; &#13; <p>The researchers, led by Dr Theodore Markettos from 国际米兰对阵科莫鈥檚 Department of Computer Science and Technology, say that in addition to plug-in devices like network and graphics cards, attacks can also be carried out by seemingly innocuous peripherals like chargers and projectors that correctly charge or project video but simultaneously compromise the host machine.</p>&#13; &#13; <p>Computer peripherals such as network cards and graphics processing units have direct memory access (DMA), which allows them to bypass operating system security policies. DMA attacks abusing this access have been widely employed to take control of and extract sensitive data from target machines.</p>&#13; &#13; <p>Current systems feature input-output memory management units (IOMMUs) which can protect against DMA attacks by restricting memory access to peripherals that perform legitimate functions and only allowing access to non-sensitive regions of memory. However, IOMMU protection is frequently turned off in many systems and the new research shows that, even when the protection is enabled, it can be compromised.</p>&#13; &#13; <p>鈥淲e have demonstrated that current IOMMU usage does not offer full protection and that there is still the potential for sophisticated attackers to do serious harm,鈥 said Brett Gutstein, a Gates 国际米兰对阵科莫 Scholar, who is one of the research team.</p>&#13; &#13; <p>The vulnerabilities were discovered in 2016 and the researchers have been working with technology companies such as Apple, Intel and Microsoft to address the security risks. Companies have begun to implement fixes that address some of the vulnerabilities that the researchers uncovered; several vendors have released security updates in the last two years.</p>&#13; &#13; <p>However, the 国际米兰对阵科莫 research shows that solving the general problem remains elusive and that recent developments, such as the rise of hardware interconnects like Thunderbolt 3 that combine power input, video output and peripheral device DMA over the same port, have greatly increased the threat from malicious devices, charging stations and projectors that take control of connected machines. The researchers want to see technology companies taking further action, but also stress the need for individuals to be aware of the risks.</p>&#13; &#13; <p>鈥淚t is essential that users install security updates provided by Apple, Microsoft and others to be protected against the specific vulnerabilities we have reported,鈥 said Markettos. 鈥淗owever, platforms remain insufficiently defended from malicious peripheral devices over Thunderbolt and users should not connect devices they do not know the origin of or do not trust.鈥</p>&#13; &#13; <p>More information is available at <a href="https://thunderclap.io/">thunderclap.io</a>.</p>&#13; &#13; <p><strong><em>Reference:</em></strong><br />&#13; <em>A. Theodore Markettos , Colin Rothwell, Brett F. Gutstein, Allison Pearce, Peter G. Neumann, Simon W. Moore, Robert N. M. Watson</em><em>. 鈥楾hunderclap: Exploring Vulnerabilities in Operating System IOMMU Protection via DMA from Untrustworthy Peripherals.鈥 Paper presented at <a href="https://www.ndss-symposium.org/ndss2019/accepted-papers/">Network and Distributed Systems Security Symposium 2019</a>. San Diego, California. </em></p>&#13; &#13; <p>聽</p>&#13; </div></div></div><div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>Many modern laptops and an increasing number of desktop computers are much more vulnerable to hacking through common plug-in devices than previously thought, according to new research.</p>&#13; </p></div></div></div><div class="field field-name-field-content-quote field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even">It is essential that users install security updates to be protected against the specific vulnerabilities we have reported</div></div></div><div class="field field-name-field-content-quote-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Theodore Markettos</div></div></div><div class="field field-name-field-image-credit field-type-link-field field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/" target="_blank">Theo Markettos</a></div></div></div><div class="field field-name-field-image-desctiprion field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Macbook pro with dongle</div></div></div><div class="field field-name-field-cc-attribute-text field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="http://creativecommons.org/licenses/by/4.0/" rel="license"><img alt="Creative Commons License" src="https://i.creativecommons.org/l/by/4.0/88x31.png" style="border-width:0" /></a><br />&#13; The text in this work is licensed under a <a href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>. Images, including our videos, are Copyright 漏国际米兰对阵科莫 and licensors/contributors as identified.聽 All rights reserved. We make our image and video content available in a number of ways 鈥 as here, on our <a href="/">main website</a> under its <a href="/about-this-site/terms-and-conditions">Terms and conditions</a>, and on a <a href="/about-this-site/connect-with-us">range of channels including social media</a> that permit your use and sharing of our content under their respective Terms.</p>&#13; </div></div></div><div class="field field-name-field-show-cc-text field-type-list-boolean field-label-hidden"><div class="field-items"><div class="field-item even">Yes</div></div></div> Tue, 26 Feb 2019 00:01:28 +0000 sc604 203542 at UK's best cyber defenders battle for chance to compete with best of the USA /news/uks-best-cyber-defenders-battle-for-chance-to-compete-with-best-of-the-usa <div class="field field-name-field-news-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><img class="cam-scale-with-grid" src="/sites/default/files/styles/content-580x288/public/news/news/crop2.jpg?itok=ClBOJmZz" alt="" title="Credit: None" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>The victorious team from the University of Edinburgh won the top prize of 拢6,000, with second place going to the University of Southampton and Imperial College London taking home bronze.</p> <p>The winners will now compete with the best of the USA at C2C 鈥撯樄拭桌级哉罂颇2国际米兰对阵科莫鈥, a transatlantic contest jointly organised by the Massachusetts Institute of Technology (MIT) and the 国际米兰对阵科莫 to be held between the 29th of June and 1st of July 2018 at MIT鈥檚 Computer Science and Artificial Intelligence Laboratory.</p> <p>Now in its third year, Inter-ACE was established to help resolve the vast and growing cyber security skills gap, with an estimated shortfall of 1.8 million workers worldwide by 2022. Inter-ACE aims to inspire young tech enthusiasts into the cyber security sector, while also honing the skills of those who already have a strong aptitude for ethical hacking and helping them meet like-minded individuals and potential employers.</p> <p>Professor Frank Stajano, Founder of Inter-ACE and Professor of Security and Privacy at the 国际米兰对阵科莫, said: 鈥淚t鈥檚 no secret that the cybersecurity industry is suffering from a large and growing skills gap. We must do more to attract a more diverse pool of talent into the field. This is about demonstrating that careers in cybersecurity not only help to keep your country, your friends and your family safe, but are varied, valued and most of all fun.</p> <p>鈥淭here is still much more to be achieved, but I have been delighted over the last three years to be welcoming a growing number of female participants and contestants from increasingly diverse backgrounds to the two-day competition. We had 18 women competing this year, as opposed to just two when we started! It's working. There is no set profile for a cybersecurity professional and Inter-ACE contributes to reaching more people with that important message.鈥澛</p> <p>Nick L, a student from the winning team at the University of Edinburgh said 鈥淔or people out there thinking about getting into cybersecurity and sitting on the fence, get yourself into a cybersecurity competition. Chances are the first one might not go so great, but you鈥檒l get there and learn a lot. That鈥檚 exactly how we started out.鈥</p> <p>Inter-ACE 2018 involved a number of different scenarios, including preventing a hack on a UK city鈥檚 infrastructure and a tap on an undersea communications cable. Connected devices such as a children鈥檚 toy were also used to demonstrate the impact of hacking techniques. The two-day event featured over 20 challenges in total, set by experts from the 国际米兰对阵科莫 and sponsors including Context IS and Palo Alto Networks.</p> <p>Established through the UK鈥檚 National Cyber Security Strategy and supported by GCHQ鈥檚 National Cyber Security Centre, Inter-ACE is sponsored by Microsoft, BT, Palo Alto and Context IS.</p> <p>The 18 universities that participated in this year鈥檚 Inter-ACE were Queen鈥檚 University Belfast, the University of Birmingham, the 国际米兰对阵科莫, Cardiff University, De Montfort University, the University of Edinburgh, Edinburgh Napier University, Imperial College London, the University of Kent, Lancaster University,聽 Newcastle University, the University of Oxford, Royal Holloway University of London, the University of Southampton, the University of Surrey, University College London, the University of Warwick and the University of York.</p> </div></div></div><div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>More than 130 students representing 18 of the UK鈥檚 top聽cybersecurity聽universities battled it out at the Inter-ACE 2018聽cybersecurity聽challenge, hosted by the 国际米兰对阵科莫. The competition, supported by聽GCHQ鈥檚 National Cyber Security Centre, and designed to attract the next generation of cybersecurity talent took place over two days on the聽16th聽and聽17th聽of March 2018.</p> </p></div></div></div><div class="field field-name-field-cc-attribute-text field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="http://creativecommons.org/licenses/by/4.0/" rel="license"><img alt="Creative Commons License" src="https://i.creativecommons.org/l/by/4.0/88x31.png" style="border-width:0" /></a><br /> The text in this work is licensed under a <a href="http://creativecommons.org/licenses/by/4.0/" rel="license">Creative Commons Attribution 4.0 International License</a>. For image use please see separate credits above.</p> </div></div></div><div class="field field-name-field-show-cc-text field-type-list-boolean field-label-hidden"><div class="field-items"><div class="field-item even">Yes</div></div></div> Tue, 27 Mar 2018 14:48:39 +0000 Anonymous 196262 at