Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV

11/22/2019
06:00 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

Artisans & Commercials Gang Up on Third Parties

Cybersecurity and intelligence firm AdvIntel has reported about a trend it has seen happening in the ransomware arena.

Cybersecurity and intelligence firm AdvIntel, which likes to call itself "boutique," has reported about a trend it has seen happening in the ransomware arena.

Drawing on some previous work it has done on this topic, they draw the overall malware community as consisting of two orthogonally aligned crimeware approaches: artisan and commercial. They find this divide to be very prevalent in the Russian malware community.

Artisans are, according to the report, "talented individuals who can meticulously develop attack frameworks, steadily apply social engineering, and persistently lurk from the periphery to the center. These operations are similar to art, while efforts, time, and investments put into them will only be justified in case there is a powerful buyer who knows the real value of such work."

The commercials just want money with little investment on their part. But the ransomware crowd is smart enough to back with money the actors that, in turn, will make them more money.

Both groups seem to have found a sort of common ground in supply-chain attacks. Supply-chain techniques are complicated, and arise from complicated situations. Spray-and-pay techniques commonly used to disseminate ransomware by commercials may not be able to ascertain which particular target offers them the best chance of reward. And why perform a crime without a realistic chance of payout?

An artisan may know how to get a payload somewhere, but the payload has to pay off handsomely for them to see any benefit for their efforts. There is a self-interested mutual need and dynamic between the artisans and commercials in such a situation.

AdvIntel found specific examples in recent months of attempts at cooperation between the two groups. They found in September and October 2019, Russian-speaking ransomware developers and RaaS affiliate program managers talked to China-based "bc.monster" who may be currently working as an affiliate of at least two RaaS commercial groups.

They also itemize how a Russian-speaking hacker "x444x0" was also a participant of the BURAN RaaS team. The actor obtained access to a segment of a telecommunication network and began navigating through it, escalating the group's privileges, all the while trying to sell them their own access.

Of course, they also note the exceptions. They found that some prefer to accomplish the supply-chain attacks all by themselves. "amiak" a Russian-speaking ransomware collective formed in June 2015 which specializes in targeting corporations, refuses to rely on others, even though third-party attacks and other offensive operations requiring persistency are their ultimate specialization.

A supply-chain attack unites the seemingly ununitable in AdvIntel's view: massive scale-based automated dissemination of ransomware and selectively targeted attacks requiring the persistent presence and protracted recognizance. They also think the unifying trend will persist in the future.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/13/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-14300
PUBLISHED: 2020-07-13
The docker packages version docker-1.13.1-108.git4ef4b30.el7 as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 (https://access.redhat.com/errata/RHBA-2020:0053) included an incorrect version of runc that was missing multiple bug and security fixes. One of the fixes regressed in th...
CVE-2020-14298
PUBLISHED: 2020-07-13
The version of docker as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 advisory included an incorrect version of runc missing the fix for CVE-2019-5736, which was previously fixed via RHSA-2019:0304. This issue could allow a malicious or compromised container to compromise the co...
CVE-2020-15050
PUBLISHED: 2020-07-13
An issue was discovered in the Video Extension in Suprema BioStar 2 before 2.8.2. Remote attackers can read arbitrary files from the server via Directory Traversal.
CVE-2020-10987
PUBLISHED: 2020-07-13
The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.
CVE-2020-10988
PUBLISHED: 2020-07-13
A hard-coded telnet credential in the tenda_login binary of Tenda AC15 AC1900 version 15.03.05.19 allows unauthenticated remote attackers to start a telnetd service on the device.