Analytics

6/9/2015
06:01 AM
Connect Directly
Twitter
RSS
E-Mail
100%
0%

Cybercrime Can Give Attackers 1,425% Return on Investment

Going rates on the black market show ransomware and carding attack campaign managers have plenty to gain.

While security professionals often find it difficult to prove return on investment, a standard ransomware campaign could earn an attacker a 1,425 percent ROI, according to a report released today by Trustwave.

"We're showing what the motivation for and value of a cybercrime is," says Charles Henderson, vice president of managed security testing at Trustwave. "To my mind, if you're going to defend against cybercrime, you need to understand" the attackers' motivation.

Trustwave's report is based on study of the black market cybercrime economy and direct investigations of 574 data breaches across 15 countries in 2014.

Trustwave calculated the ransomware ROI based on the following:

  • Costs of a ransomware payload (CTB Locker in this example), infection vector (RIG exploit kit, which was most common), camouflaging services (encryption), and traffic (20,000 visitors) totaled $5,900 per month.
  • Earnings for a 30-day campaign, assuming a 10 percent infection rate, a payout rate of 0.5 percent, and a $300 ransom, would total $90,000.
  • That's a profit of $84,100 and a ROI of 1,425 percent.

"The black market is very transparent," says Henderson. "You can look for a good deal ... just as any mercantile or purveyer of goods."

Poorly secured point-of-sale systems, the high black market value of track data, and the quick turnaround on stolen cardholder data have also made the carding business very popular  -- particularly against targets in North America, where EMV adoption is so low.

Overall, 42 percent of the incidents Trustwave investigated were on e-commerce assets, 40 percent on PoS system, and 18 percent on internal networks. In North America, 18 percent were e-commerce, 65 percent PoS, and 17 percent internal networks.

Although 49 percent of breaches did involve theft of PII, track data was targeted even more often, in 63 percent of attacks.

This demand for cardholder data and the ease of getting it has affected the industries that hackers are honing in on. The top three industries targeted in 2014 were retail (43 percent), food and beverage (13 percent), and hospitality (12 percent). Ninety-five percent of the attacks in the food and beverage industry and 65 percent in the hospitality industry were from PoS systems.

Nearly all of the PoS breaches were the result of weak passwords (50 percent) and weak remote access controls (44 percent).

E-commerce compromises, on the other hand, were quite different. While only 8 percent come from weak passwords and 17 percent from weak remote access security, 42 percent result from weak or non-existent input validation and 33 percent from unpatched vulnerabilities. The web server vulnerabilities most popular with opportunistic attackers were the WordPress pingback DDoS (30 percent), cross-site scripting (25 percent), and the ShellShock Bash bug.

Trustwave also examined how different types of financially motivated threat actors make money on cybercrime, distinguishing between targeted attackers and opportunistic attackers.

Targeted attackers choose a specific set of targets, and then find out where the potential victim is vulnerable and how to compromise it. Opportunistic attackers approach things from the opposite direction; they learn about a vulnerability, then look for targets that are vulnerable to it.

Trustwave found that both categories of attackers may go after e-commerce sites, for example, but they'll have different post-exploit purposes.

"I see the opportunistic attackers as the serial entrepreneurs," says Henderson. "Someone who's looking to build any business" as opposed to just an auto shop or technology firm or clothing line. "Very nimble, but not very particular."

Opportunistic attackers tended to monetize their efforts by installing webshells and backdoors and redirecting users for search-engine optimization or installing IRC clients for botnet recruitment, according to the report. In addition to being cybercriminals they are also cybercrime service providers.

Targeted attackers, rather, have a methodology and a business plan that they're committed to, says Henderson.

Targeted attackers tend to go after specific high-value sites and steal payment card data. (Service providers for travel booking sites have become a popular target for this reaon, according to the report.) Attackers then monetize it by selling cardholder data, selling goods purchased with that data, or using money mules to transfer money out of compromised accounts to attacker-owned accounts.

Other findings

Trustwave's scanners also found that 98 percent of applications had vulnerabilities.

"It's both surprising and unsurprising," says Henderon. "Surprising in the sense, that there's a difference in knowing application security isn't where it needs to be and seeing a hard number like that."

Plus, "Password1" was the most common password.

"You would think it would be blacklisted," says Henderson. "Not the case."

Most breaches were detected by third parties -- 58 percent by regularory bodies, card brands and merchant banks, 12 percent by law enforcement, 4 percent by consumers, and 7 percent by other parties.

However, that slim 19 percent of organizations that self-detected breaches discovered and contained them far more quickly than third parties did. The median time from instrusion to containment for externally detected compromises was 154 days; for self-detected compromises just two weeks (14.5 days to be exact).

"The ongoing security programs that include managed security providers, extensive teams in-house, and regular proactive security testing, these are the companies that detect their own intrusion," says Henderson. But those are also the types of companies that tend to prevent intrusions, he says.

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
6/9/2015 | 3:36:16 PM
Ransomware
I recently helped someone who was infected with ransomware. Its difficult to remove and very easy to create a new variation making it extremely profitable. When all your photos are encrypted its a difficult decision to make because you cannot put a price on your memories. But apparently the people who built the ransomware can.
Government Shutdown Brings Certificate Lapse Woes
Curtis Franklin Jr., Senior Editor at Dark Reading,  1/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20735
PUBLISHED: 2019-01-17
** DISPUTED ** An issue was discovered in BMC PATROL Agent through 11.3.01. It was found that the PatrolCli application can allow for lateral movement and escalation of privilege inside a Windows Active Directory environment. It was found that by default the PatrolCli / PATROL Agent application only...
CVE-2019-0624
PUBLISHED: 2019-01-17
A spoofing vulnerability exists when a Skype for Business 2015 server does not properly sanitize a specially crafted request, aka "Skype for Business 2015 Spoofing Vulnerability." This affects Skype.
CVE-2019-0646
PUBLISHED: 2019-01-17
A Cross-site Scripting (XSS) vulnerability exists when Team Foundation Server does not properly sanitize user provided input, aka "Team Foundation Server Cross-site Scripting Vulnerability." This affects Team.
CVE-2019-0647
PUBLISHED: 2019-01-17
An information disclosure vulnerability exists when Team Foundation Server does not properly handle variables marked as secret, aka "Team Foundation Server Information Disclosure Vulnerability." This affects Team.
CVE-2018-20727
PUBLISHED: 2019-01-17
Multiple command injection vulnerabilities in NeDi before 1.7Cp3 allow authenticated users to execute code on the server side via the flt parameter to Nodes-Traffic.php, the dv parameter to Devices-Graph.php, or the tit parameter to drawmap.php.