The operation, nicknamed Goldfish Alpha, involved ten distinct police forces in as many Asian countries and led to the identification of something like 20 thousand infected routers; as reported by TrendMicro, which followed the operation, the authorities of Cambodia, Indonesia, the Philippines, Brunei, Laos, Singapore, Thailand, Malaysia, Myanmar and Vietnam, coordinated by interpol, thus concluded an investigation lasting five months and whose purpose was to curb the cryptojacking epidemic that, exploiting a vulnerability of MicroTik routers, was now spreading across the continent.
As said, the authorities managed to identify as many as 20,000 infected machines and therefore promptly helped their legitimate owners to remove the threat; TrendMicro itself prepared a guidance document distributed to the victims to help them correct the vulnerability and to uninstall coinhive, the malicious software that undermined cryptocurrencies without their knowledge.
At this time it is estimated that only 78% of the infected routers would have been repaired, the authorities are therefore still working to definitively resolve the threat; in support of interpol, in this operation, also a private body (the Cyber Defense Institute) who later wanted to underline how much the coordination capacity between police forces and companies active in the field of cyber security has become today crucial importance.
In fact, without the support of qualified private personnel, the police forces could hardly have carried out a complex operation like the one we are talking about; The director of the interpol cybercrime department, Craig Jones, also said of the same opinion that only by combining the experience and data on cyber threats available to the private sector with the investigative skills of the law enforcement agencies is it possible develop effective strategies to fight cybercrime.
As digital becomes more and more central in our lives, therefore, the topic of IT security becomes more and more relevant, which, however, many people do not seem to realize; just see the use that more or less everyone makes of their devices, not to mention the way in which passwords are chosen to access the various sites, to immediately realize how little safety culture is around.
People continually use devices connected to the network but, at best, as far as the security of their devices is concerned, they do not go beyond the installation of a trivial antivirus; if it is true, therefore, to conclude, that it is necessary to foster the coordination capacity between police forces and companies in the sector, it is also true that no strategy to combat cybercrime will ever be possible without first reaching a necessary computer literacy of the masses .