Feeds

Web pedos crack into corporate servers

Insecure servers host PPV child porn

  • alert
  • submit to reddit

Remote control for virtualized desktops

Web paedophiles are turning to cracking techniques to cover their track, claims the head of the UK's National Hi-Tech Crime Unit (NHTCU).

Detective Chief Superintendent Les Hynds warned today of cases where pay-per-view child porn sites on corporate servers after gaining control to victims' servers.

Hynds declined to furnish details, citing operational reasons, but he gave a basic outline of the crime, which he describes as a growing problem.

"Organised crime gangs involved in paedophilia are starting to use hacking techniques to leave secret files on business systems," he explained.

This sounds like simple not so good old-fashioned FTP pornjacking to us.

Web paedophilia is one of five areas of serious or organised crime currently being targeted by the multi-disciplinary National Hi-Tech Crime Unit. Other areas of concern include drug trafficking (criminals using the Internet as a tool to distribute drugs and for money laundering), extortion, hacking, virus writing and fraud.

For businesses, fraud and extortion are the two most pressing concerns. In many cases the two are found to be closely related.

In order to encourage more business to come forward with information on hi-tech crimes, the NHTCU launched its Confidentiality Charter at the first UK e-crime congress in London today.

The charter is designed to provide reassurance that business can report suspicious hi-tech activity without the fear of causing unwelcome interruption. If firms report crimes to police there's a fear that police will prevent companies operating normally in order to preserve evidence.

While damage to reputation and brand remain a major obstacle to collaboration between police and business, the NHTCU reports that concern about "business continuity is the most prominent factor when developing outreach initiatives to combat cyber crime".

Hynds said: "Law enforcement must take responsibility for building the framework that will enable industry to collaborate and co-operate."

Government minister back the launch of the charter.

Home Office Minister, Bob Ainsworth, said: "The Confidentiality Charter, launched today, will help foster closer working between law enforcement and the business community it serves. The police cannot effectively tackle hi-tech crime in isolation - close working relationships based on trust between the police, IT industry and the on-line businesses are the key to tackling hi-tech crime." ®

Related Stories

Organised Net crime rising sharply - top UK cop
Pornjackers steal corporate bandwidth

Remote control for virtualized desktops

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.