- Members of two organized criminal groups trading in fake cryptocurrency were arrested.
- The detainees embezzled a large sum of money, deceiving more than 10 thousand people.
- The expert believes that it is necessary to apply daily updated and modern security measures to prevent data theft: “I will note that there are standards for the protection of” data “, they are regulated by the ISO certificate.
Last week, as a result of an operation carried out by the Ministry of Internal Affairs of Azerbaijan, members of two organized criminal groups trading in fake cryptocurrency were arrested. As a result of the first operation, the persons who sold the OKOS cryptocurrency were detained, as a result of the other – the members of the Crowd-1 financial network.
The detainees embezzled a large sum of money, deceiving more than 10 thousand people.
Elvin Abbasov, an independent ICT expert, noted that this situation is of particular importance from the point of view of cyber security:
What do they have to say on crypto?
“Since cryptocurrency is not physical and is implied by software, it has to do with cybersecurity. In most cyberattacks, the primary goal is to gain access to either “data” or financial resources. If someone’s data falls into the hands of hackers, that person’s funds will be at risk. If a hacker logs in with a given password, this does not mean that the system has any problems. “
The expert believes that it is necessary to apply daily updated and modern security measures to prevent data theft:
“I will note that there are standards for the protection of” data “, they are regulated by the ISO certificate. These standards exist in order for the systems to recognize each other.
There is no difference between e-currency transfer or a situation where a hacker gains access to a mobile application and transfers physical money to another account. In both cases, transactions are performed using codes. The only difference is that the classic currency is stored in the bank, while the cryptocurrency is stored electronically in the system. It also shows that the essence of stealing money does not really change. In both cases, funds are stolen.
Also Read : How ETH Mining pool innovated to pay miners saving $10M USD in fees
Security certificates are used to protect sites and accounts. These certificates are the trust bar. A simple example of this can be seen on the websites. After entering the name of the site, a long inscription appears on the panel with the name of the site. These are the safety certificates. If the login password is familiar to the system, the certificate will grant permission. When it does not fit, it is regarded as a hacker attack, and if the system is better protected, the operation will be blocked. Again, stealing regular currency and stealing cryptocurrency are essentially the same. “