Feeds

Web pedos crack into corporate servers

Insecure servers host PPV child porn

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

Web paedophiles are turning to cracking techniques to cover their track, claims the head of the UK's National Hi-Tech Crime Unit (NHTCU).

Detective Chief Superintendent Les Hynds warned today of cases where pay-per-view child porn sites on corporate servers after gaining control to victims' servers.

Hynds declined to furnish details, citing operational reasons, but he gave a basic outline of the crime, which he describes as a growing problem.

"Organised crime gangs involved in paedophilia are starting to use hacking techniques to leave secret files on business systems," he explained.

This sounds like simple not so good old-fashioned FTP pornjacking to us.

Web paedophilia is one of five areas of serious or organised crime currently being targeted by the multi-disciplinary National Hi-Tech Crime Unit. Other areas of concern include drug trafficking (criminals using the Internet as a tool to distribute drugs and for money laundering), extortion, hacking, virus writing and fraud.

For businesses, fraud and extortion are the two most pressing concerns. In many cases the two are found to be closely related.

In order to encourage more business to come forward with information on hi-tech crimes, the NHTCU launched its Confidentiality Charter at the first UK e-crime congress in London today.

The charter is designed to provide reassurance that business can report suspicious hi-tech activity without the fear of causing unwelcome interruption. If firms report crimes to police there's a fear that police will prevent companies operating normally in order to preserve evidence.

While damage to reputation and brand remain a major obstacle to collaboration between police and business, the NHTCU reports that concern about "business continuity is the most prominent factor when developing outreach initiatives to combat cyber crime".

Hynds said: "Law enforcement must take responsibility for building the framework that will enable industry to collaborate and co-operate."

Government minister back the launch of the charter.

Home Office Minister, Bob Ainsworth, said: "The Confidentiality Charter, launched today, will help foster closer working between law enforcement and the business community it serves. The police cannot effectively tackle hi-tech crime in isolation - close working relationships based on trust between the police, IT industry and the on-line businesses are the key to tackling hi-tech crime." ®

Related Stories

Organised Net crime rising sharply - top UK cop
Pornjackers steal corporate bandwidth

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.