Cybercriminals are constantly looking for new ways to defraud and harm organizations and individuals in Nigeria as a result of digitization and globalization. Organizations and individuals must be wary of the risks posed by these cybersecurity threats.
INTRODUCTION
With the growing popularity of online investing, there is an increasing concern about online fraud. Various studies are being conducted to discover the reasons for this online fraud. The most notable of these studies is ACI, which concludes that the rate of online fraud is increasing. And the annual increase is approximately 28.32 per cent.
A digital asset is anything that is stored digitally and is uniquely identifiable that organizations can use to realize value. Examples of digital assets include documents, audio, videos, logos, slide presentations, spreadsheets, cryptocurrencies, Non-Fungible Tokens (NFTs), and websites.
The emergence and growth of the digital world have brought about the utilization and usage of digital assets by various individuals in society. However, with this development in the digital world, there are also risks attached to the usage of digital assets. Fraudulent activities that are carried out within the digital space against digital assets can be referred to as digital assets fraud, these activities may include; phishing, pharming, skimming, malware attacks, etc.
Digital assets fraud is a form of cybercrime and in order to adequately mitigate the effect of digital assets fraud, cybersecurity laws and protocols must be enhanced to address the arising issues in the digital space.
This article discusses various forms of cyber fraud and discusses mechanisms that can be put in place to prevent such fraud.
Forms of Cyber Threats faced in Nigeria
Phishing is a type of cybercrime in which a target or targets are contacted via email, phone, or text message by someone impersonating a legitimate institution in order to trick individuals into providing sensitive data such as personally identifiable information, banking and credit card information, and passwords.
Phishing attacks have become much more prevalent in recent years, with attackers becoming more convincing in their impersonation of actual business contacts. Work Email Compromise has also increased, with bad actors using phishing campaigns to obtain business email account passwords from high-ranking executives, and then falsely requesting money from staff using these accounts.
The difficulty in stopping phishing attacks contributes to their danger. They use social engineering to target humans within a company rather than addressing technological flaws. However, there are technological countermeasures to phishing attacks.
Some ways in which a person can detect a phishing message include;
Cybercriminals use this method to hijack a service provider’s web address. When a user types in a Web address, it is automatically redirected to a fraudulent Web site without his knowledge or consent. The website will appear legitimate in order to capture unsuspecting victims’ card confidential information, such as PIN, card numbers, and token details.
Malware attacks pose a serious threat to businesses. It includes a wide range of cyber threats, such as trojans and viruses. It’s a catch-all term for malicious malware written by hackers to gain network access, steal data, or destroy data on computers. Malware is typically distributed through malicious website downloads, spam emails, or connecting to infected computers or devices.
Having strong technological defences in place can assist businesses in avoiding malware attacks in Nigeria. Endpoint Protection systems protect devices from malware downloads and provide administrators with a centralized control panel from which to manage devices and ensure that all users’ security is up to date. Web security is also important because it prevents people from visiting dangerous websites and downloading dangerous software.
It is the fraudulent collection of payment card information using a small electronic device known as a skimmer. The device, which is usually attached to an ATM or a Point-of-Sale terminal, allows e-fraud perpetrators to capture customer card information, including the PIN. With the advent of wireless technology, criminals can now remotely download stolen data without physically visiting the terminals.
This happens when an e-fraud perpetrator takes over another person’s account, first by gathering personal information about the intended victim via Phishing, Pharming, Skimming, or any other fraudulent means, and then contacting the card issuer (Financial Institutions) while impersonating the genuine cardholder and requesting a replacement of a lost card. A new card will be issued to the fraudster, and it will be used to commit various e-frauds against the victim.
Impact of Cyber-Attacks
Data protection and privacy laws provide for the security of any personal information. With the prevalence of cyber-attacks sensitive data is compromised and if proper security measures are not implemented such data can be shared with the public or an unauthorized 3rd Party.
Digital assets fraud leads to the loss of assets which has monetary value, the legitimate owner of such assets usually losses all or part of the assets with little or no monetary consideration for the loss. The loss can occur by way of theft, hack, scam, phishing, etc.
Customer relationships necessitate a high degree of trust. Cyber-attacks can damage a company’s brand and erode your customers’ trust in you. As a result, it is possible that:
Reputational damage can have an impact on suppliers as well as relationships with partners, investors, and other stakeholders.
How To Prepare Against Cyber-Threats
A security breach can destroy even the most resilient businesses. It is critical to appropriately manage the risks.
Tips to Prevent Digital Assets Fraud
Several factors can aid in the prevention of online fraud and the preservation of digital assets. The following are important ways to protect yourself from such scams:
Never fall into the trap of scanning unknown QR codes to protect yourself from code scan fraud. Also, do not click on any unknown links sent to you via SMS or email.
Use the two-factor authentication system for all of your online accounts, which sends SMS notifications if anyone tries to log in to your account. When you try to log in with this feature, you will receive an OTP to complete the process.
Always ensure to download applications from legitimate official websites. Do not install apps from links sent to you via email or SMS.
Using the same password for almost all of your accounts put such accounts at risk because if you use the same password for all of your accounts, hackers will have easy access to all of them.
Always double-check the legitimacy of any new Crypto or any other digital assets that enter the market. Do not follow trends and acquire a digital asset because the majority of the public acquired such asset.
CONCLUSION
Cybercriminals are constantly looking for new ways to defraud and harm organizations and individuals in Nigeria, as a result of digitization and globalization. Organizations and individuals must be wary of the risks posed by these cybersecurity threats.
Individuals can best protect themselves against these threats by implementing a comprehensive set of security measures and utilizing Security Awareness Training, to ensure that they are well aware of security threats and adequately equipped on how to avoid them. Proactive measures will alert you against potential hazards and strategies for mitigating their effects. It is almost impossible to avoid this system in an age when everything is going online. It is, therefore, essential for every individual to be informed of the protection mechanism available for digital assets.
AUTHOR: Oyetola Muyiwa Atoyebi, SAN, FCIArb. (UK).
Mr. Oyetola Muyiwa Atoyebi, SAN is the Managing Partner of O. M. Atoyebi, S.A.N & Partners (OMAPLEX Law Firm) where he also doubles as the Team Lead of the Firm’s Emerging Areas of Law Practice.
Mr. Atoyebi has expertise in and vast knowledge of the law and this has seen him advise and represent his vast clientele in a myriad of high-level transactions. He holds the honour of being the youngest lawyer in Nigeria’s history to be conferred with the rank of a Senior Advocate of Nigeria.
He can be reached at atoyebi@omaplex.com.ng
CONTRIBUTOR: Romeo Pupu.
Romeo is a member of the Dispute Resolution Team OMAPLEX Law Firm. He also holds commendable legal expertise in cybersecurity.
He can be reached at romeo.osogworume@omaplex.com.ng.
Introduction The legal profession has always been known for its high standards and unique demands,…
CASE TITLE: UNITY BANK PLC v. ALONGE (2024) LPELR-61898(CA) JUDGMENT DATE: 4TH APRIL, 2024 JUSTICES:…
CASE TITLE: ODIONYE v. FRN (2024) LPELR-62923(CA) JUDGMENT DATE: 5TH SEPTEMBER, 2024 PRACTICE AREA: CRIMINAL LAW…
CASE TITLE: EFFIONG v. MOBIL PRODUCING (NIG.) UNLTD (2024) LPELR-62930(CA)JUDGMENT DATE: 27TH SEPTEMBER, 2024PRACTICE AREA:…
CASE TITLE: ONWUSOR v. STATE (2024) LPELR-63031(CA) JUDGMENT DATE: 12TH NOVEMBER, 2024 PRACTICE AREA: CRIMINAL…
By Femi Falana SAN Introduction Last week, President Bola Tinubu ordered the immediate termination of…
View Comments
Great insight from a learned silk.
Thank you Busola for your kind words.