Endpoint //

Privacy

3/20/2018
07:00 PM
100%
0%

A Look at Cybercrime's Banal Nature

Cybercrime is becoming a more boring business, a new report shows, and that's a huge problem for victims and law enforcement.

A new study of the black market supporting cybercriminals shows how closely the workings of this underground echoes that of the legitimate business world.

From product reviews and online reputation to free samples and technical support, cybercriminals need the same sort of services used by any consumer. In the criminal world. those tend to require knowledge of the specific URL, a Tor browser, and one or more layers of introduction, but the service economy around criminal hacking is becoming as important as the direct criminal activity it supports, according to the study by security firm Armor.

Criminal activity itself is also evolving into a services sector, with multiple tiers of features and services offerings. Take the Blow-bot botnet, which Armor's report highlighted with one of these multi-tiered offerings. A "seller offered to rent out the Blow-bot botnet, which includes webinject and other capabilities, for either $750 or $1,200 a month depending on whether the renter wanted a fully-featured version. Support was an extra $100 or $150 a month, respectively," the report said.

The rise of malware as a service isn't news, but it's notable because it allows so many non-technical criminals to enter the marketplace. "The barrier to entry for cybercrime remains perilously low, making it that much more important that organizations and individuals focus on security," Armor said in its report.

Armor found a definite pyramid structure in place for valuable personal information such as credit card account data. There are "likely only a handful of major credit card data farmers doing the majority of the data theft," the report said, who then work through a series of wholesalers and distributors that any canned-good manufacturer would recognize as a way to get their wares into the hands of customers.

The ultimate conclusions of the Armor report reflect the utter banality of most cybercrime. Criminal hacking has become a white-collar business with professional practitioners who expect white-collar salaries (and benefits.) The bad news for victims is that these professional criminals and criminal support actors are competent professionals at their chosen tasks. 

On the other hand, there is good news: Recent law-enforcement wins have disrupted the support networks for cybercriminals. Ultimately, though, as Armor warned in its report: "The tools, documents and services threat actors need are readily available, which means big businesses, small organizations and home users alike need to follow security best practices and stay on guard to stay safe."

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for two cybersecurity summits at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the security track here.

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
AnnaEverson
50%
50%
AnnaEverson,
User Rank: Strategist
3/29/2018 | 10:16:32 AM
Re: Typical work days
I am totaly agree with you, nothing to add
StevenG030
50%
50%
StevenG030,
User Rank: Apprentice
3/22/2018 | 6:15:02 PM
Cyber Crime As A Service (CCAAS?)
To your point, software as a service is not just for the good guys.  Highights the need for businesses small and large to take their security seriously, and implement the appropriate people processes and technologie to protect themselves and their customers.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
3/21/2018 | 10:20:28 AM
Typical work days
@Curt: Indeed, I had one analyst tell me how his firm picked up on new cybercriminal outlet activity... They would see malicious activitiy begin around 8am local time for the region and continue for about 6 or 8 or 9 hours every day...for two weeks. Then, that activity started to begin a little later and later in the day.

What they observed: New hires getting comfortable in their surroundings.
What We Talk About When We Talk About Risk
Jack Jones, Chairman, FAIR Institute,  7/11/2018
Major International Airport System Access Sold for $10 on Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  7/11/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14373
PUBLISHED: 2018-07-17
An issue was discovered in LibTIFF 4.0.9. In TIFFFindField in tif_dirinfo.c, the structure tif is being dereferenced without first checking that the structure is not empty and has the requested fields (tif_foundfield). In the call sequences following from the affected library functions (TIFFVGetFiel...
CVE-2018-14374
PUBLISHED: 2018-07-17
An issue was discovered in LibTIFF 4.0.9. A buffer overflow can occur via an empty fmt argument to unixErrorHandler in tif_unix.c, and it can be exploited (at a minimum) via the following high-level library API functions: TIFFClientOpen, TIFFFdOpen, TIFFRawStripSize, TIFFCheckTile, TIFFComputeStrip,...
CVE-2018-14375
PUBLISHED: 2018-07-17
An issue was discovered in LibTIFF 4.0.9. A buffer overflow vulnerability can occur via an invalid or empty tif argument to TIFFRGBAImageOK in tif_getimage.c, and it can be exploited (at a minimum) via the following high-level library API functions: TIFFReadRGBAImage, TIFFRGBAImageOK, and TIFFRGBAIm...
CVE-2018-14378
PUBLISHED: 2018-07-17
An issue was discovered in LibTIFF 4.0.9. A buffer overflow can occur via an invalid or empty tif argument to TIFFWriteBufferSetup in tif_write.c, and it can be exploited (at a minimum) via the following high-level library API function: TIFFWriteTile.
CVE-2018-14363
PUBLISHED: 2018-07-17
An issue was discovered in NeoMutt before 2018-07-16. newsrc.c does not properly restrict '/' characters that may have unsafe interaction with cache pathnames.