How serious is Internet-related crime in South Africa?

1 January 2013 Information Security, Financial (Industry)

This is a shortened version of a blog by Dr Khomotso Kganyago on SA’s cybercrime status.

Khomotso Kganyago
Khomotso Kganyago

On Thursday, the 30th September 2012, Police Minister Nathi Mthethwa announced the South African Police Services’ (SAPS) crime statistics for the period between 31st March 2011 and 1st April 2012.

When one listens and reads through the debates on this release, this quote from an unknown author – “Facts are stubborn things, but statistics are more pliable” – brings solace to their pliability, but still reminds us that cybercrime statistics are still not part of this release. This is a fact that will remain a growing, stubborn stain on a white cloth as we continue to see a wave of technological penetration in a form of devices and services (cloud) into our homes, workplaces, schools, churches, stadiums, shebeens, etc.

The defence goes on about how difficult it is to do cybercrime statistics based on the intricacies involved. Surely, if you cannot define it, you cannot measure it. Will measuring cybercrime in Mzantsi provide us with the basis of understanding improvements in the lives of the poor and ensuring that all people in South Africa are and feel safe? Crime prevention and safety is a high priority of the SA government, and Statistics SA has begun with the Victims of Crime Survey (VOCS) 2012 and will produce a VOCS series annually.

The VOCS released by Statistics SA showed that South Africans are feeling less safe in their homes despite reported decreases in house burglaries. Objectives of VOCS are to determine:

* The nature, extent and patterns of crime in South Africa, from the victim’s perspective.

* Victim risk and victim proneness, so as to inform the development of crime prevention and public education programmes.

* People’s perceptions of services provided by the police and the courts as components of the criminal justice system.

In the quest to fill the gap left in these reports, Craig Rosewarne, MD of Wolfpack Information Risk, presented the findings of The 2012/3 South African Cyber Threat Barometer report in September 2012. The event was hosted at Microsoft SA together with SecureData. The report is a strategic public–private partnership (PPP) research project to support initiatives to address the growing cyber threat facing our nation. The official sponsor of this research was the British High Commission.

Financial institutions attacks

The 2012 SA Cyber Threat Barometer is a research project with the intention to provide ongoing strategic insight and opinion in support of Cabinet’s recently approved National Cyber Security Policy Framework for South Africa. In summary, this policy framework outlines policy positions that are intended to:

a) Address national security threats in terms of cyberspace,

b) Combat cyber warfare, cybercrime and other cyber ills,

c) Develop, review and update existing substantive and procedural laws to ensure alignment,

d) Build confidence and trust in the secure use of information and communication technologies,

e) Establishing trusted forums for information sharing,

f) Developing a cyber security curriculum,

g) Raising cyber security awareness, and

h) Encouraging the ICT security industry to increase research and development.

The key issues identified by the research are:

* Denial of service, economic fraud and the theft of confidential information were cited as the main concerns for SA.

* The top cyber services targeted are Internet banking, e-commerce sites and social media sites.

* Criminals are typically mainly after logon credentials, bank or credit card information and personally identifiable information.

* The most common attack methods are still phishing, the abuse of system privileges and malicious code infections.

* The internal monitoring of suspicious transactions and the general use of internal and third-party fraud detection mechanisms are still the most effective means of detecting cybercrime.

The common top cyber vulnerabilities are:

* Inadequate maintenance, monitoring and analysis of security audit logs.

* Weak application software security.

* Poor control of admin privileges.

* Inadequate account monitoring and control.

* Inadequate hardware/software configurations.

The research pointed out that, of the R2,65 billion lost in SA in the reporting period, about 75% was recovered. “Based on the government’s average recovery rate of 75% and similar case study recoveries, the estimated loss figure would be approximately R662,5 million,” noted Rosewarne.

Figure 1 shows that Internet banking clearly stands out as the most targeted cyber service in SA followed by e-commerce web sites. That includes enterprise web portals (Internet facing corporate websites) which are being targeted as more organisations and systems are dependent on the Internet.

Figure 1.
Figure 1.

Bank customers, according to SABRIC, reported phishing related losses of R92,4 million in approximately 10 000 incidents reported industry wide. A conservative loss estimate based on other known incidents, makes up the balance. With no other reliable industry statistics, this is considered to be the minimum loss for this sector. See the blogs: Can the financial sector bank on Cybersecurity? (www.securitysa.com/*nov12bank) and Microsoft Security Intelligence Report v13–South Africa’s Perspective (www.securitysa.com/*nov12microsoft).

It was also reported during the Justice, Crime Prevention and Security (JCPS) cluster media briefing on the 25th June 2012 that a total of 155 cybercrime matters were finalised during the past financial year. They noted that the majority of cases appear to involve unlawful electronic fund transfers/fraud etc, where the password of the complainant was obtained or cloned cards being used. The conviction rate on average stands at 89%.

It is evident from Statistics SA data and the South African Cyber Threat Barometer 2012/13 report that the criminals are now focusing on the weaker link – the citizens.

Output 8 of the JCPS talks to cyber crime being combated. Cyber security remains key priorities for JCPS as it has a detrimental effect on the economy and most vulnerable people of the country. A clear view of the cybercrime statistics will help us in understanding this emerging crime in SA and enable us to plan for its reduction.

Awareness, training and proper management of security controls would therefore reduce the financial impact firstly at a corporate level, government and ultimately then for the national economy.

The developments around the establishment of the National CSIRT by Department of Communication in partnership with members of the JCPS are very encouraging. Collaboration with private sector establishment like SABRIC, ISPA, telcos, ITA, etc will help in ensuring that we have a coordinated security incidents picture for South Africa. Awareness and skill development across the board is key and it is good to see some tertiary institution already contributing to this course.

Hopefully we should be able to 'define this problem so that we can measure it' and enhance law enforcement capabilities to curb this scourge. Lastly, we need to learn from international lessons quickly on taking down of botnets and start contributing effectively.

So you think social media is fun and nobody can glean any information from your (or your kids) online and social presence that is openly and freely available to the world? Watch this video for a different opinion: www.securitysa.com/*nov12psychic. And if you are really brave, log in with your Facebook account at this link http://www.takethislollipop.com/





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
SA's cybersecurity risks to watch
Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.

Read more...
Cyber insurance a key component in cyber defence strategies
Information Security
[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...