Feeds

EU crackdown will see tougher sentences for stupid cyber-badhats

The ones foolish enough to work from within Brussels' jurisdiction

Beginner's guide to SSL certificates

The European Parliament has agreed to toughen criminal penalties across the EU for cyber attacks, especially any that threaten national infrastructure or are deemed to be aimed at stealing sensitive data.

The new directive forces the 28 member states to impose national maximum sentences of at least two years in prison for trying to break into any information systems. But if the attack is against a critical infrastructure network, like a power plant, transport or government network, the maximum penalty jumps to at least five years, higher than most member states currently have in force. Maximum sentences also go up to at least three years for botnet attacks or cyber intrusions that result in financial costs or loss of personal data.

"I am pleased that formal approval has been reached on new rules concerning the definition of criminal offences and the sanctions in the area of cybercrime," the EU commish for home affairs Cecilia Malmström said. "The perpetrators of increasingly sophisticated attacks and the producers of related and malicious software can now be prosecuted, and will face heavier criminal sanctions."

But security bods aren't so sure that upping the jail time is the right way to go about defeating cybercrime. Etay Maor, fraud prevention manager at security firm Trusteer, said that governments needed to be aware that the people behind cyber attacks like botnets were often nowhere near the actual attack.

"Unfortunately, in most cases the people who get caught are the money mules (that may not even be aware they are committing a crime) and not the bot masters or ring leaders," he said. "To apprehend these masterminds, law enforcement agencies will need to have cooperation with local agencies all around the world.

"This is not an easy task, and cyber-criminals know this. This is why they usually reside in a country where they will stay safe from most western governments."

The directive is also trying to improve communication and cooperation between law enforcement in European countries. According to the new rules, member states will be under an obligation to answer urgent requests from each other within eight hours and will be required to collect basic statistical data on cybercrimes.

"Together with the launch of the European Cybercrime Centre and the adoption of the EU Cyber-security Strategy, the new Directive will strengthen our overall response to cybercrime and contribute to improve cyber security for all our citizens," Malmström said.

Individual countries will have two years two years to input the decision into national law. ®

Internet Security Threat Report 2014

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
How to simplify SSL certificate management
Simple steps to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle.