Feeds

Web pedos crack into corporate servers

Insecure servers host PPV child porn

  • alert
  • submit to reddit

Next gen security for virtualised datacentres

Web paedophiles are turning to cracking techniques to cover their track, claims the head of the UK's National Hi-Tech Crime Unit (NHTCU).

Detective Chief Superintendent Les Hynds warned today of cases where pay-per-view child porn sites on corporate servers after gaining control to victims' servers.

Hynds declined to furnish details, citing operational reasons, but he gave a basic outline of the crime, which he describes as a growing problem.

"Organised crime gangs involved in paedophilia are starting to use hacking techniques to leave secret files on business systems," he explained.

This sounds like simple not so good old-fashioned FTP pornjacking to us.

Web paedophilia is one of five areas of serious or organised crime currently being targeted by the multi-disciplinary National Hi-Tech Crime Unit. Other areas of concern include drug trafficking (criminals using the Internet as a tool to distribute drugs and for money laundering), extortion, hacking, virus writing and fraud.

For businesses, fraud and extortion are the two most pressing concerns. In many cases the two are found to be closely related.

In order to encourage more business to come forward with information on hi-tech crimes, the NHTCU launched its Confidentiality Charter at the first UK e-crime congress in London today.

The charter is designed to provide reassurance that business can report suspicious hi-tech activity without the fear of causing unwelcome interruption. If firms report crimes to police there's a fear that police will prevent companies operating normally in order to preserve evidence.

While damage to reputation and brand remain a major obstacle to collaboration between police and business, the NHTCU reports that concern about "business continuity is the most prominent factor when developing outreach initiatives to combat cyber crime".

Hynds said: "Law enforcement must take responsibility for building the framework that will enable industry to collaborate and co-operate."

Government minister back the launch of the charter.

Home Office Minister, Bob Ainsworth, said: "The Confidentiality Charter, launched today, will help foster closer working between law enforcement and the business community it serves. The police cannot effectively tackle hi-tech crime in isolation - close working relationships based on trust between the police, IT industry and the on-line businesses are the key to tackling hi-tech crime." ®

Related Stories

Organised Net crime rising sharply - top UK cop
Pornjackers steal corporate bandwidth

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.