Endpoint //

Privacy

A Look at Cybercrime's Banal Nature

Cybercrime is becoming a more boring business, a new report shows, and that's a huge problem for victims and law enforcement.

A new study of the black market supporting cybercriminals shows how closely the workings of this underground echoes that of the legitimate business world.

From product reviews and online reputation to free samples and technical support, cybercriminals need the same sort of services used by any consumer. In the criminal world. those tend to require knowledge of the specific URL, a Tor browser, and one or more layers of introduction, but the service economy around criminal hacking is becoming as important as the direct criminal activity it supports, according to the study by security firm Armor.

Criminal activity itself is also evolving into a services sector, with multiple tiers of features and services offerings. Take the Blow-bot botnet, which Armor's report highlighted with one of these multi-tiered offerings. A "seller offered to rent out the Blow-bot botnet, which includes webinject and other capabilities, for either $750 or $1,200 a month depending on whether the renter wanted a fully-featured version. Support was an extra $100 or $150 a month, respectively," the report said.

The rise of malware as a service isn't news, but it's notable because it allows so many non-technical criminals to enter the marketplace. "The barrier to entry for cybercrime remains perilously low, making it that much more important that organizations and individuals focus on security," Armor said in its report.

Armor found a definite pyramid structure in place for valuable personal information such as credit card account data. There are "likely only a handful of major credit card data farmers doing the majority of the data theft," the report said, who then work through a series of wholesalers and distributors that any canned-good manufacturer would recognize as a way to get their wares into the hands of customers.

The ultimate conclusions of the Armor report reflect the utter banality of most cybercrime. Criminal hacking has become a white-collar business with professional practitioners who expect white-collar salaries (and benefits.) The bad news for victims is that these professional criminals and criminal support actors are competent professionals at their chosen tasks. 

On the other hand, there is good news: Recent law-enforcement wins have disrupted the support networks for cybercriminals. Ultimately, though, as Armor warned in its report: "The tools, documents and services threat actors need are readily available, which means big businesses, small organizations and home users alike need to follow security best practices and stay on guard to stay safe."

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for two cybersecurity summits at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the security track here.

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
AnnaEverson
50%
50%
AnnaEverson,
User Rank: Strategist
3/29/2018 | 10:16:32 AM
Re: Typical work days
I am totaly agree with you, nothing to add
StevenG030
50%
50%
StevenG030,
User Rank: Apprentice
3/22/2018 | 6:15:02 PM
Cyber Crime As A Service (CCAAS?)
To your point, software as a service is not just for the good guys.  Highights the need for businesses small and large to take their security seriously, and implement the appropriate people processes and technologie to protect themselves and their customers.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
3/21/2018 | 10:20:28 AM
Typical work days
@Curt: Indeed, I had one analyst tell me how his firm picked up on new cybercriminal outlet activity... They would see malicious activitiy begin around 8am local time for the region and continue for about 6 or 8 or 9 hours every day...for two weeks. Then, that activity started to begin a little later and later in the day.

What they observed: New hires getting comfortable in their surroundings.
Devastating Cyberattack on Email Provider Destroys 18 Years of Data
Jai Vijayan, Freelance writer,  2/12/2019
Up to 100,000 Reported Affected in Landmark White Data Breach
Kelly Sheridan, Staff Editor, Dark Reading,  2/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-7399
PUBLISHED: 2019-02-17
Amazon Fire OS before 5.3.6.4 allows a man-in-the-middle attack against HTTP requests for "Terms of Use" and Privacy pages.
CVE-2019-8392
PUBLISHED: 2019-02-17
An issue was discovered on D-Link DIR-823G devices with firmware 1.02B03. There is incorrect access control allowing remote attackers to enable Guest Wi-Fi via the SetWLanRadioSettings HNAP API to the web service provided by /bin/goahead.
CVE-2019-8394
PUBLISHED: 2019-02-17
Zoho ManageEngine ServiceDesk Plus (SDP) before 10.0 build 10012 allows remote attackers to upload arbitrary files via login page customization.
CVE-2019-8395
PUBLISHED: 2019-02-17
An Insecure Direct Object Reference (IDOR) vulnerability exists in Zoho ManageEngine ServiceDesk Plus (SDP) before 10.0 build 10007 via an attachment to a request.
CVE-2019-8389
PUBLISHED: 2019-02-17
A file-read vulnerability was identified in the Wi-Fi transfer feature of Musicloud 1.6. By default, the application runs a transfer service on port 8080, accessible by everyone on the same Wi-Fi network. An attacker can send the POST parameters downfiles and cur-folder (with a crafted ../ payload) ...