{"id":2172,"date":"2007-01-17T00:00:00","date_gmt":"2007-01-17T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/01\/17\/2006-e-security-in-vietnam-shaken-by-crimes\/"},"modified":"2021-12-30T11:40:49","modified_gmt":"2021-12-30T11:40:49","slug":"2006-e-security-in-vietnam-shaken-by-crimes","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/01\/17\/2006-e-security-in-vietnam-shaken-by-crimes\/","title":{"rendered":"2006: E-security in Vietnam shaken by crimes"},"content":{"rendered":"<p>In 2006, a series of online attacks were directed toward e-commerce businesses, shattering the young online market in Vietnam.  &#8220;A dark corner in e-security in Vietnam&#8221; was a comment agreed upon by many who attended the conference on violations and crimes in e-commerce organised by the Department of E-Commerce (Ministry of Trade) on November 9, 2006.  According to VNCERT (the Vietnam Computer Emergency Respond Team at the Ministry of Post and Telecommunications), a series of 2006 online attacks seriously threatened e-commerce in Vietnam.  The most notorious incident happened in March 2006 when the e-commerce website of Vietco JSC suffered a severe DDoS attack.  All online services were delayed for a whole month.  Things were so bad that Vietcos director, Mr. Phung Minh Bao, had to publicise the incident on VietNamNet and ask legal authorities to help or the company would go bankrupt.  Though the culprits of the two DDoS attacks were quickly discovered and caught, in September 2006, PeaceSofts e-commerce website chodientu.com became the victim of another DDos attack.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The painful indication of these 2006 attacks is that there seems to be a trend of e-commerce businesses themselves using e-space to launch DDoS attacks or hack websites of their rivals.  Mr. Nguyen Hoa Binh (Director of PeaceSofts chodientu.com), Mr. Phung Minh Bao (VietCo JSC) and Mr. Vu Trung (Director of Nhan Hoa) all said that somebody must be playing foul.<\/p>\n<p>According to VNCERTs report titled &#8220;Increasing Co-operation in Preventing E-Commerce Crimes which was read at the November 9 conference, the most popular unhealthy competition method among Vietnamese e-commerce businesses was to &#8220;hire hackers to destroy rivals operations.  VNCERT warned of 5 common e-commerce crimes: 1 International swindling through emails (phising); 2 Falsifying, transacting and laundering money through credit cards; 3 Developing bot networks to refuse services, send spam emails and pops-up; 4 Attacking e-commerce systems for business and competition reasons; 5 Sending spam emails to Vietnams e-space on a large scale.<\/p>\n<p>Looking ahead to what will be awaiting e-security in 2007, many worry about the prospect of the large-scale online destruction and mushrooming of botnets developed by Vietnamese hackers for commercial reasons.<br \/>\nThese botnets are chiefly engaged in such activities as sending spam emails on a large scale, phising, stealing information, refusing services or laundering money.  In the near future, Vietnamese hackers may catch up with foreign ones in setting up their own ingeniously destructive networks.  It is now unclear how ISPs and responsible authorities will face the new e-security trend in e-commerce in 2007.  But according to Mr. Hoang Ngoc Dieu, an expert on e-commerce solutions in Sydney (Australia), as well as the HVA forums administrator, 2007 will be the threshold year of Vietnamese e-commerce.<\/p>\n<p>http:\/\/english.vietnamnet.vn\/biz\/2007\/01\/654412\/<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2172","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2172","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2172"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2172\/revisions"}],"predecessor-version":[{"id":4659,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2172\/revisions\/4659"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2172"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2172"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2172"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}