Skip to content

24/7 – Cyber-Combat-Defense-Unit
(CCDU)

Cyberspace is a dark place full of unimagined dangers!
Cyber threats to the security of businesses and exposed individuals are complex, destructive and compelling, and they are occurring with increasing frequency.

But you are not defenceless against them.

The world has become a volatile place where many dark forces seek to defraud, blackmail, damage reputations or financially harm individuals, businesses and organisations through treacherous and structured schemes. Hackers infiltrate corporate network. Basically, cybercrime can affect anyone.

The damage caused is usually enormous. Data is manipulated. Users are blackmailed or exposed (CEO fraud). The goal is to make money or intimidate victims of these cyber attacks.

Cybercriminals do not only act as individuals, but above all as criminal organisations. You are not defenceless against these organised international criminals. To get a grip on the machinations of these unscrupulous fraudsters, you don't just need a team of forensic experts to analyse the damage already done. Companies, organisations and exposed individuals need digital bodyguards or proven cyber combat units that have been successfully waging war in cyberspace for years.

The Cyber Combat Defence Unit (CCDU) will continue to adapt to the changing cyber threat landscape. CCDUs must be prepared to protect their networks and operations from the increasingly sophisticated cyber threats they face.  CCDUs müssen darauf vorbereitet sein, ihre Netzwerke und Operationen vor den immer raffinierteren Cyber-Bedrohungen zu schützen, denen sie ausgesetzt sind.

OUR SOLUTIONS

Platinum SLA

Crisis & Cyber
Incident Response Task Force (CIRT)


Gold
SLA

Crisis & Cyber
Incident Response Task Force
(CIRT)

Silber
SLA

Crisis & Cyber
Incident Response Task Force
(CIRT)

Security

Security
Operation
Center
(SOC)

Cyber

Cyber-
Combat-
Defense-Unit
(CCDU)

Cyber-Combat-Defense-Unit (CCDU)

Our elite cyber warriors with appropriate security clearance and impeccable character certificate work in the inner sanctum of the 'Computer Incident Response Capability' for our exclusive clients 24/7. Here, cyber attacks are consistently repelled! The CCDU Alliance claims to act mainly defensively. The computer warriors secure the networks and core systems of companies, organisations and their headquarters worldwide. They also fight for the security of exposed persons of public interest. With an appropriate Service Level Agreement (SLA), enormous security perspectives in cyberspace open up for our customers!

A special forces group at work storms the underground of terrorists.

SINCE 1984 WE HAVE GAINED VALUABLE EXPERIENCE AND BEST PRACTICES FOR OUR CUSTOMERS IN OVER 400 INTERNATIONAL PROJECTS!

The most common forms of cyber attacks

We have compiled the most important cybercrime examples for you. We show you what you can do:

Icon label

1.
fake public networks

Sign up. Free Wi-Fi is a good thing, and it's available almost everywhere these days. But there are also fake "public" networks. They can see everything you do online - for example, when you enter your credit card details. That can have unpleasant consequences.

Pay attention to who owns the network. If in doubt, ask or use a paid network. For example, VPN (Virtual Private Network), a network connection that uninvolved persons cannot see.

Icon label

2.
phishing

One careless click and misfortune takes its course. Phishing emails ask you to do something that puts your security at risk. For example, opening an infected attachment or a link to an infected website. You have a virus.

 Avoid online banking, online shopping and social media on public computers to protect yourself from phishing. For private use, make sure you always set up two-factor authentication and have a confirmation code sent to your smartphone.

Icon label

3.
password theft

123AllWay. Password theft is the best-known example of cybercrime. This is where cyber criminals gain access to your accounts - at your bank, your credit card company or your online shop. Sometimes this is very expensive.

It is a truly good idea to have a different secure password for each website you have an account on. Always use upper and lower case letters, numbers and punctuation marks for your passwords and change them regularly. Passwords that are automatically suggested by your computer or a secure password management application are also secure.

Icon label

4.
identity theft

Suddenly you have a doppelganger. Cybercriminals go online to get your confidential information by impersonating you. Identity theft consists of learning as much as possible about you online and then obtaining your passwords. Then enrich themselves at their own expense. Or misuse your identity to carry out fraudulent activities on online marketplaces or online shops.

As mentioned above, always use strong passwords and do not choose obvious answers, even when it comes to security questions. Never provide your full postal address, identification number of any kind or other personal information unless absolutely necessary. Do not send digital copies of your passport, ID card, driver's licence, vehicle registration document or similar documents to anyone you cannot trust. Conversely, if someone interested in your online ad sends you such a document without being asked for "identification", alarm bells should ring.

Icon label

5.
malware

The email looks serious, - but the attachment has it all. In a malware attack, a computer or an entire network is infected with a virus or malware. It can then be controlled by cyber criminals. For example, steal confidential information, destroy data or completely disable a computer - for ransom. Perfidious: Malware can be installed via a website or app or come from friends and acquaintances via email with malware attached. But also through manipulated QR codes, which have become popular due to the pandemic and can infect your mobile phone.

Remain prudent. Be careful. Before downloading or installing anything on your phone or computer, read reputable reviews (e.g. on review sites like Trustpilot). Use a solid anti-virus programme and anti-malware solution. There are also security solutions for your smartphone.

Icon label

6.
cyber espionage

Cyber criminals steal sensitive data. You read it in the news again and again: Cybercrime and cyber espionage no longer only affect politics; companies and private individuals are also at risk. Those affected often do not recognise them or only much later. This is because e-mails prepared with malware do not arouse suspicion. In addition to amusing requests and flattering invitations, they unwittingly install spyware or malware programmes to copy secret data, or hijack entire computers to seize them for ransom. Losses are difficult to quantify.

Be sceptical. Especially with unknown flatterers who send you unsolicited files by email. Regularly download recommended updates for your antivirus programme and antimalware solution.

Icon label

7.
cyberbullying

Anyone can be a victim. Cyberbullying is any form of online harassment, such as stalking, sexual harassment, doxing (revealing another person's personal information without their consent) and fraping (breaking into another person's social media and making fake posts in their name). Young people and children are particularly at risk and should be informed about this issue at an early stage. Because the damage can last for a long time.

Don't be afraid to raise the issue. Be careful when posting pictures and videos - once they are online, they are never gone. Find out more - for example in our guide on cyberbullying.

How to protect yourself from cyber attacks

  • Keep your programmes and operating system up-to-date - including your antivirus software. 
  • Use two-factor authentication, strong passwords and complex answers for security questions.
  • Never open attachments or links from spam mails. Also be vigilant with attachments of mails from family members and acquaintances. 
  • Do not give out personal information if you are not sure.
  • Keep an eye on your bank statements.

The most common cybercrime phenomena

Fraud
A procedure in which the perpetrator intentionally deceives the victim by making excuses or concealing facts for the purpose of illegal gain, damages the property of the victim or a third party and causes material losses.
#fraud

Fraudulent internet shops
Cybercriminals operate fraudulent online shops to make illegal profits. Disgruntled internet users ordered goods from the shops in question that were not delivered, were of poor quality or were fake.
#fakeonlineshop 

CEO Fraud
CEO fraud occurs when a perpetrator instructs the accounting or financial services department to pay a (usually foreign) account of the fraudster on behalf of a company owner. Fraudsters also try to defraud gift vouchers. Most often, the instructions come from fake email addresses or hacked email accounts.
Meistens stammen die Anweisungen von gefälschten E-Mail-Adressen oder gehackten E-Mail-Konten.
#ceofraud

Double Extortion
Firstly, personal contact data and access data to the IT infrastructure can be sniffed out. Sensitive information (bank data, business data, trade secrets, etc.) is subsequently stolen. Finally, data in the IT infrastructure is encrypted and stolen data runs the risk of being made public if the debt is not repaid.
#doubleextortion 

Escrowscam
Fraudsters advertise attractive products on classified ad platforms at very favourable conditions. The seller recommends that the transaction be handled by a logistics company. The money should be transferred to the shipping company. The latter keeps the money and only transfers it to the seller when the customer is satisfied with the goods (escrow). In fact, fraudsters control so-called logistics companies.
#escrowscam 

Fake policeman
A procedure in which the perpetrator usually contacts elderly people by telephone, pretends to be a police officer and persuades them to hand over their property and money to the perpetrator.
#false policeman 

Financial Agent
With attractive job offers, criminals recruit as financial agents, also called "money mules", who are supposed to move money earned by criminal means abroad, especially via the internet. Anyone involved in such "business" can be prosecuted for money laundering.
#financial agent #moneymule #money laundering 

Advertisement fraud

  • The perpetrators publish fraudulent offers/advertisements on small ads and online platforms. The buyers pay for the goods, but they are never delivered.
  • The perpetrator buys goods on classified ad and online platforms, has them sent to him by the seller and never pays for the goods.
  • The perpetrator publishes a false real estate advertisement and demands that interested parties pay a deposit in advance.
  • #ad fraud 

Love deception
A fateful relationship begins on the internet. Perpetrators use social media to contact victims, receive compliments, fall in love and build online relationships. Slowly, a relationship of trust is built. Due to the so-called state of emergency, the question of money quickly arose. As long as the money is transferred, the so-called relationship remains. When the flow of money stops, the love disappears with the money.
#love cheat #marriage cheat #lovescam #romancescam

Malware
Refers to computer programs designed to perform unwanted and potentially harmful functions. Malware is a collective term for viruses, Trojans and malicious software.
#malware 

Online investment fraud
Cybercriminals operate fraudulent investment platforms to invest online. Simulate successful "deals" with high profits for customers. However, cybercriminals are only after deposits. Nothing is done and the money is lost.
#online investment fraud #onlinetrading

phishing
Procedure to obtain confidential data, in particular access data to e-mail or e-banking accounts as well as credit card information, with the aim of committing property offences.
#phishing 

Ransomware
A malicious programme that locks a computer or encrypts data on a computer. Perpetrators blackmail victims by making it clear that the screen or data will not be released until the ransom is paid.
#ransomware

Sextortion
Blackmail through photos or videos with sexual content of the aggrieved person.
#sextortion 

Smishing
Phishing is a combination of the words "SMS" and "phishing". In phishing, cybercriminals send fraudulent emails designed to trick recipients into opening an attachment or clicking on a malicious link. Smishing uses text messages (SMS, messenger services) instead of email.
#smishing #sms

Spam
English term for unsolicited mass e-mails received.
#spam 

Spoofing
Das Vorgehen des Täters z. B. ihre echte Telefonnummer technisch so ändern, dass sie eine andere Nummer anzeigt. Die Telefonnummer soll Vertrauen zum Opfer aufbauen (z. B. Polizeirufnummer etc.).
#spoofing #manipulated phone number 

Support fraud
The perpetrator's approach e.g. technically change their real phone number so that it displays a different number. The phone number is meant to build trust with the victim (e.g. police phone number etc.).
#computer problems #techscam 

Tokenized Fraud
If the credit card is stored on the smartphone, this is called credit card virtualisation. The credit card can then be used to pay via Apple Pay, Google Pay, Samsung Pay or other payment systems. If a fraudster manages to virtualise a victim's credit card details on a malicious phone, the fraudster can spend the victim's money to make purchases. Virtualisation requires a one-time two-factor authentication of the victim. Authentication can then be done using the perpetrator's face or fingerprints without the victim having to do anything.
#tokenizedfraud

TRUST IS THE BEGINNING OF EVERYTHING!
WE ARE THE LIGHTHOUSE IN THE STORM!

GET ADVICE NOW

We are there for your questions about your safety.

In addition to our consulting services, we also offer seminars and a certificate course on risk management at our seminar center or individually at your company.

Future Logo colour trans

WE ARE HAPPY TO ADVISE YOU ON YOUR PROJECT
You have a special request or would like to learn more? As a reliable partner, we are happy to be at your side, from consulting to implementation. Whether cyber intelligence, cyber security, crisis management, crisis communication or risk management - we are happy to be your contact.

Future Intelligence Group 

Zentrum-Riedpark
Zürcherstrasse 17
Postfach
CH-8173 Neerach/Zürich

Send mail request

CONTACT FORM REQUEST
Arrange a non-binding consultation now

Future Intelligence Group
en_GB