03:23 PM
Connect Directly

A Comprehensive Look At China's Cybercrime Culture

Trend Micro report offers a full view of espionage and theft perpetrated by Chinese hackers.

By pairing an apathy toward the law and a lot of well-executed ingenuity, Chinese cybercriminals have built a business empire as robust as any enterprise in the legal world. According to a new report out today by Trend Micro's Forward-Looking Threat Research Team, the illegal products and services bubbling up out of the cauldron that is China's cybercrime black market are as robust and mature as they are plentiful and cheap. The result is powering the entire cybercrime economy in China and beyond.

"New hardware and channels have gone beyond being mere proofs of concept (PoCs) to become the working models driving the cybercrime trends in China today," writes report author Lion Gu.

On the channels side, a big example of that is the rise of search engines designed to sift through a mountain of already stolen data stores and offer up criminals specific information for sale. It's essentially online shopping for stolen data -- and it is fueling a powerful cycle of future cybercrime by providing cheap and easy access to information about prospective targets.

"The data leaked underground allows attackers to commit crimes like financial fraud, identity and intellectual property theft, espionage, and even extortion," writes Gu. "Armed with sensitive or potentially damaging information on a politician, for instance, like leaked personal details on an extramarital affair website, a cybercriminal can discredit the target who may be lobbying for the approval of, say, the national cybercrime bill."

Meanwhile, on the hardware front, Chinese advancements in criminal hardware are bringing forward a range of new skimming devices meant to simplify the process of retail theft of card data. This includes POS skimmers, ATM skimmers and pocket skimmers with a raft of conveniently devious features.

"Some of the PoS skimmers sold underground even have an SMS-notification feature. This allows cybercriminals to instantly get their hands on stolen data via SMS every time the tampered devices are used," writes Gu. "Cybercriminals do not even have to physically collect stolen information from installed devices."

The previous examples are just the highlights of a host of dozens of products and services that make up the Chinese black market, which is "as robust as they are unique," the report says. In addition to standards like botnet rental, toolkit access, and bulletproof hosting, the market also offers other remarkable ways the crooks have monetized creative lawlessness. For example, for a little over $7,000, a buyer can get into the list of the Apple App Store's 25 free apps list. And for as little as $80, a criminal can pick up a fake banking site to perpetrate more convincing scams.

"These offerings are available to any enterprising criminal from anywhere in the world," the report says.


Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Why We Need a 'Cleaner Internet'
Darren Anstee, Chief Technology Officer at Arbor Networks,  4/19/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-04-25
GitLab CE & EE 11.2 and later and before 11.5.0-rc12, 11.4.6, and 11.3.10 have Persistent XSS.
PUBLISHED: 2019-04-25
GitLab Community and Enterprise Edition 8.9 and later and before 11.5.0-rc12, 11.4.6, and 11.3.10 has Incorrect Access Control.
PUBLISHED: 2019-04-25
Incorrect Access Control in the Account Access / Password Reset Link in Enterprise before 2019-04-23 allows Unauthorized Attackers to READ/WRITE Customer or Administrator data via a persistent HTTP GET Request Hash Link Replay, as demonstrated by a login-link from the browser history.
PUBLISHED: 2019-04-25
Incorrect Access Control in the Administrative Management Interface in Enterprise before 2019-04-23 allows Authenticated Low-Priv Users to Elevate Privileges to Full Admin Rights via a crafted HTTP PUT Request, as demonstrated by modified JSON data to a /v2/rest/ URI.
PUBLISHED: 2019-04-25
Dell EMC Open Manage System Administrator (OMSA) versions prior to 9.3.0 contain a Directory Traversal Vulnerability. A remote authenticated malicious user with admin privileges could potentially exploit this vulnerability to gain unauthorized access to the file system by exploiting insufficient san...