Tags Posts tagged with "Nick Nikiforakis"

Nick Nikiforakis

Pixabay photo

Internet fraud, a worsening cybercrime phenomenon, has reached downtown Port Jefferson.

Through various tactics, online scam artists have successfully targeted storefronts and events throughout Port Jefferson, scoring hundreds of dollars in profits. 

During the 4th annual ice festival in late January, scammers sold eight fake tickets for a mac ‘n’ cheese crawl organized by the Greater Port Jefferson Chamber of Commerce. On the day of the event, victims presented their fraudulent tickets.

The tickets “looked very official,” said Barbara Ransome, the chamber’s director of operations. However, when chamber staff asked those presenting these scam tickets when they had purchased them, their response revealed that something was out of place.

“They said, ‘We got them two days ago,’ and that’s when I realized this was a scam because we had been sold out … for at least a week and a half,” Ransome said, adding that the popularity of the event created an opening for scam artists. “My speculation is that this person saw that these tickets were sold out, saw that people were looking for them and created this whole fraud situation.”

At Theatre Three on Main, a similar practice has gained traction. Although the theater sells tickets at $35 per seat, online ticket scammers have capitalized by selling back-row seats at enormous markups. 

Douglas Quattrock, the theater’s director of development and artistic associate, reported one such incident where a couple spent nearly 10 times the going rate. “We had a couple that paid $672 for a pair of tickets,” he said.

Although only “a handful” of theatergoers have fallen prey to these ticket scams at Theatre Three, Quattrock considered the practice disruptive to operations.

“Being a smaller not-for-profit, we try to keep our prices very family oriented,” he said. However, he added that “scammers see this market as very attractive.”

But online scams are not limited to ticket sales. Jena Turner owns the Port Jeff-based gift shop Breathe, which offers nontraditional healing remedies and psychic readings. 

In an interview, Turner reported that multiple phony social media accounts have emerged, using her photos and business name to solicit payments from unsuspecting patrons. 

“Right now, I know that there are five accounts that stole my photos and are pretending to be me,” she said. 

Social engineering

“There are standard social engineering tactics, such as giving the victim a sense of urgency or taking advantage of their appeal to authority.”

— Nick Nikiforakis

Nick Nikiforakis, associate professor in the Department of Computer Science at Stony Brook University, said internet fraud is becoming a growing concern for small business sectors, which are increasingly vulnerable to malicious cyber activities. 

He contends that online criminals have shifted their sights on smaller boutique organizations because large corporations are investing more resources into cybersecurity systems. 

“Effectively, you have cybercriminals who are customizing their attacks toward small businesses,” he said. 

Turner’s case, according to Nikiforakis, represents a common social engineering scenario.

A social engineer “makes an online account for a company with a brick-and-mortar presence and then tries to take the recognizable name and the good faith that the business has built,” the associate professor said. 

He added, “They are targeting online users, pretending to be the person running this business,” tricking their victims “to send them money, divulge information or in some way get people to participate in a scam.”

A downtown dilemma

Turner said she has reported her digital imposters but has received no relief in removing these scam accounts from the Instagram platform. 

“I had reported it to Instagram several times — and by several, I can say probably more than 20,” she said. “Instagram hasn’t done anything about it.”

Nikiforakis noted that there are considerable technical limitations for social media companies in policing social engineering activities. While they could theoretically verify with storefront owners whenever a platform is created in their name, online scammers often find creative ways to circumvent such safeguards.

“Things can be done, but this is inherently a cat-and-mouse game,” he said. Social engineers “are not attacking a security vulnerability. … They are abusing people’s faith and trust in institutions and recognizable brands.”

Lacking assistance from Big Tech, Turner said she took matters into her own hands, creating a video in which she wrote out her authentic social media handle by hand.

“I made that video, and I just keep reposting it on my story and on my Facebook so that people aren’t falling for it,” she said. “That’s been really helpful.”

But, she added, “We have over 8,000 followers, so not everyone has seen the video. Unfortunately, the scam is still ongoing.”

To respond to the number of ticket scam incidents, Theatre Three similarly released a statement on its website condemning third-party ticket vendors. “The only place to buy tickets from us should be www.theatrethree.com,” Quattrock said.

Still, he encouraged patrons to remain on guard for potentially inflated ticket prices and to approach online transactions cautiously. 

For those who may suspect a ticketing scam, he implored them to call the theater directly before completing the transaction.

“If it looks suspicious to you, just call the theater and verify that they’re on the right website,” he said.

As online fraud persists throughout the local area, businesses and customers are not without recourse. Nikiforakis indicates that awareness of the typical social engineering strategies can help users protect themselves from participating in online scams.

“There are standard social engineering tactics, such as giving the victim a sense of urgency or taking advantage of their appeal to authority,” he said. “For both patrons and companies, by actively resisting this, you can slow down and potentially defend yourself against an attack.”

Pixabay photo

The recent ransomware attack against the Suffolk County government has raised important questions about the relationship between citizens, governments and technologies.

A confirmed ransomware event took place in early September. The hack crippled the county’s information technology infrastructure, and recovery efforts remain ongoing. 

In the wake of these events, the hack prompted critics to question the digitization of sensitive information and how governments can better secure their IT networks.

What is ransomware?

Nick Nikiforakis is an associate professor in the Department of Computer Science at Stony Brook University. His research focuses on web security and privacy. In an interview, he described how ransomware works.

“Ransomware is, effectively, malicious software that infiltrates a machine, starts encrypting all sorts of private documents, spreadsheets, anything that is of value, and then leaks out to the attacker the encryption key and potentially the data that was encrypted,” he said. 

Some forms of ransomware affect only a single machine, according to Nikiforakis. Other strains may spread into several devices, potentially infecting an entire network.

Ransomware is the confirmed vector of attack for Suffolk County. However, how hackers first entered the county’s system is unknown to the public. 

While the details of the county hack are scanty, Nikiforakis said cyberattackers commonly use emails with malicious attachments. In other instances, they can locate vulnerable software within a network, exploit that weakness and breach that system. Once hackers gain access to the system, they hold sensitive information for ransom. 

“The original idea behind ransomware is that if you don’t pay the attacker the money that they ask, then you lose access to your data,” Nikiforakis said. 

Backup software was developed, in part, to mitigate this concern. Regardless, as technologies have evolved, so has cybercrime. 

“Even if you have the ability to restore your data from backups, now you have to deal with the attacker having access to your data and threatening you with making that data public, which is what’s happening in this case,” Nikiforakis said.

Based on the information available, Nikiforakis said the attackers likely gained access to speeding tickets and various titles, among other sensitive materials. “This is definitely a cause for concern, and that is why, in certain cases, people decide to pay, to avoid this blowback that will come from the data being made publicly available.”

A question of payment

Ransomware raises an ethical dilemma for government officials, namely whether to use public funds to pay a ransom.

“People can take a philosophical approach and say, ‘We don’t negotiate with terrorists,’ and I understand that,” Nikiforakis said, “But then the rational thing for the attacker to do is to make that data available to the public. Because if he doesn’t, then the next victim will also not pay him.” 

The profitability of the ransomware operation depends upon the victim trusting that the criminals will comply with the conditions of the transaction. The ransomware business model would fail if cyberattackers generally went against their word.

For this reason, Nikiforakis said payment and compliance could sometimes be in the interests of both parties. 

“I think it’s a very rational decision to say, ‘Let’s pay and accept this as a financial loss and let’s make sure that this doesn’t happen again,’” he said.

In Suffolk County, however, putting this theoretical framework into action is more complicated. Responsibility for paying ransomware payments would be vested in the Office of the Comptroller, which oversees the county’s finances. 

During an election interview last month with county Comptroller John Kennedy Jr. (R), he hinted that compromising with cybercriminals is off the table.

“There is no predicate in the charter, in the New York State County Law, in the Suffolk County code, to take taxpayer money and give it to a criminal,” he said.

‘Technology is moving so quickly that it is incredibly challenging for government to keep up.’ 

— Sarah Anker

The effect on the county’s government operations

The ransomware attack has also aggravated concerns over securing the county’s IT apparatus. Kennedy likened the problem to a fire code, saying fire codes often include provisions for masonry walls and other buffers that reduce the spread of a fire.

“If a fire starts, it doesn’t take down the whole complex. It stops at the masonry wall,” he said. “Our system was not configured with those hard breaks, other than some separation of function out in Riverhead in the County Clerk’s Office.” 

Suffolk County Legislator Sarah Anker (D-Mount Sinai), whose office was attacked by ransomware in 2017, has advocated for serious IT reform for some time. She followed the county’s technology closely and expressed frustration over how the initial attack occurred.

“I could tell, and I could feel, that there needed to be more done,” she said. “It has hampered the government, it has affected our constituents. Maybe it could have been worse, but it should have never happened.”

Suffolk County Sheriff Errol Toulon Jr. (D) explained his office’s many challenges since the hack. Though communications systems are slowly returning online, the initial attack disrupted both external and internal communications within the Sheriff’s Office.

“From a jail and police perspective, it really hindered us in the beginning,” he said. “Emails that we received from other law enforcement agencies or any communication with our community was stopped for a significant amount of time.”

New York State’s Division of Homeland Security and Emergency assisted the Sheriff’s Office as Toulon’s staff worked without an operational communication network. Because of this coordination, Toulon maintained that the functions of the jails were more or less appropriately executed.

“We wanted to make sure that any individual that was supposed to be released from our custody was released on time,” the county sheriff said. “No one was incarcerated longer than they had to be.” 

Preparing for the future

Toulon suggested the existing IT network is too centralized and interconnected. To prevent future failure of the entire network, he proposed creating separate silos for each department.

“I feel that the District Attorney’s Office, the Sheriff’s Office, the [County] Clerk’s Office and the Comptroller’s Office should be totally separate from the County Executive’s Office,” Toulon said, “So if, god forbid, this were to happen again in the future, we wouldn’t be directly impacted like everyone else.”

Anker said she and a newly formed panel of county legislators are beginning to explore ways to harden the network and apply strategies that work elsewhere.

“As we move forward, we need to see what the other municipalities and corporations are doing,” she said. “What types of programs and software do they have that prevent these attacks?”

The rate of software development, according to Anker, is outpacing the ability of governments to respond effectively. While IT departments must remain ahead of the cybercriminals to keep their digital infrastructure safe, staying out front is easier said than done.

“Technology is moving so quickly that it is incredibly challenging for government to keep up,” she said. “I would like to see more accountability in all respects and from everyone as we move forward with new technology.”

While the recent cyberattack focuses on the government, Anker believes ordinary citizens are also at risk from hostile online actors. The county legislator contended more work should be done to alert community members of these dangers.

“Not enough is being done regarding community outreach,” she said. “There needs to be more education on preventing an attack even on your home computer.”

Nikiforakis proposed that greater attention be given to digitizing personal records. According to him, those records in the wrong hands could unleash great harm. 

“Ransomware was a big game-changer for attackers because it allows them to monetize data that would not be traditionally monetizable,” he said. “Through ransomware, suddenly everything that is of value can be monetized.”

The SBU associate professor supports software upgrades, cybersecurity protocols and other measures that protect against ransomware. But, he said, a broader conversation needs to take place about the nature of digitization and whether individuals and governments should store sensitive files online.

“More and more things that didn’t used to be online are suddenly available online,” he said. “We have to reassess the eagerness with which we put everything online and see whether the convenience that we get out of these systems being online is a good return on investment, given the risks.”