Vulnerabilities / Threats

1/31/2017
10:15 AM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

How Cybercriminals Turn Employees Into Rogue Insiders

The Dark Web is a growing threat to organizations as hackers recruit insiders with access to corporate networks.

Cybercriminals are ramping up efforts to recruit employees with access to corporate networks. The Dark Web, which promises anonymity to rogue insiders, is driving that trend.

Researchers from IntSights and RedOwl spent two years studying Dark Web forums on recruiting, and working with, insiders. Today they released their findings, in a report entitled "Monetizing the Insider: The Growing Symbiosis of Insiders and the Dark Web."

In those two years, they saw about 1,000 references to insiders in cybercrime forums, with a spike occurring towards the end of 2016. Forum discussions and insider outreach nearly doubled between 2015 and 2016.

"Recruitment of insiders is increasing, and the use of the dark web is the current methodology that malicious actors are using to find insiders," explains researcher Tim Condello, technical account manager and security researcher at RedOwl.

Cybercriminals recruit with the goal of finding insiders to steal data, make illegal trades, or otherwise generate profit. Advanced threat actors look for insiders to place malware within a business' perimeter security. However, sophistication isn't a requirement for success.

"Successful hacking is a mix of tech savviness and domain knowledge," says Condello. "Hackers previously had to have a hybrid of both, or fully understand the domain they were attacking. Now, they can leverage an insider to provide domain expertise to have a successful attack."

Think your business is safe? Think again. All insiders pose a risk, regardless of their seniority or technical ability, experts say. As major data breaches continue to make headlines, people are recognizing the tremendous impact leaked data can have on a business -- and how they can profit from it.

There are three types of people who fall into the "insider" category, says Condello: negligent employees who don't practice good cyber hygiene, disgruntled employees with ill will, and malicious employees who join organizations with the intent to defraud them.

Those who are recruited on the Dark Web know they are protected, as most forums require a selection process. Insiders have to submit information to administrators, who review and verify the information.

"There is an elaborate vetting process before you can access the forum," he explains. "They want to know where you are in the organization, how much access you have, and how timely you can release information."

The growth of insider recruitment is a problem across industries, but it's predominantly affecting financial institutions, notes Condello. Because that's where the money is, cybercriminals know there's a clear line to turning a profit.

This is a growing trend and will continue to threaten businesses. As bad actors learn about attacks that were successful due to domain expertise, and expertise gained by leveraging insider knowledge, they will be motivated to solicit insiders and plan new crimes. A powerful draw will be the quick and easy monetization provided by the Dark Web.

Businesses need to be aware of the types of information being accessed, monitored, and moved inside and outside the organization. The only way to detect, monitor, and manage this type of activity is to implement an insider program.

"The way organizations can protect themselves is by understanding the threat landscape," Condello says. "Landscapes are not just external; they're also internal. Make sure you're building mitigation into external and internal threats."

More businesses are developing insider threat programs, the report found, but there is room for improvement. Eighty percent of security efforts focus on perimeter defenses, and less than half of businesses have budgets for insider threat programs.

Related Content:

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Jack.D
100%
0%
Jack.D,
User Rank: Apprentice
2/1/2017 | 4:36:53 PM
Combating the Insider Threat
It's so much more difficult dealing with the insider than it has been with the traditional threat actor. Before, you could always set access controls on information and that was generally enough. These folks are supposed to have access, everyone else is not.

The insider introduces a new challenge, though. The insider is actually supposed to have access to the information, so now it's a matter of what they did with that information.

A thorough, well-rounded insider program is going to have technology in place that allows your organization to monitor what employees are doing with the information that they have access to. Are they sharing it? Where are they sharing it? Who are they sharing it with?

Obviously, not every employee would be classified as a "high risk" employee, but every employee has some level of risk associated with them and their activities should be monitored to ensure that your company's data and intellectual property are protected.

Jack Doyle
Senior Sales Engineer, Veriato
ChrisB093
50%
50%
ChrisB093,
User Rank: Strategist
2/1/2017 | 5:56:03 AM
Avoid accountabiltiy and non-repudiation issues
Your right, organizaions do need to be more aware of the information being accessed and by who. However only when an organization can accurately identify and verify each authenticated users claimed identity, can they attribute all actions to an individual user and place accountability on network actions. Often the case is that network logins are shared, stolen and generally compromised. Stronger security measures are needed for all users and needs to involve more than just usernames and passwords. Two factor or biometric data offers this additional control but is often complex, expensive and hard to implement for all users. A real alternative does exist in the form of contextual access security. http://www.isdecisions.com/guide-defense-against-compromised-logins/ 
New Free Tool Scans for Chrome Extension Safety
Dark Reading Staff 2/21/2019
Making the Case for a Cybersecurity Moon Shot
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  2/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-9015
PUBLISHED: 2019-02-22
A Path Traversal vulnerability was discovered in MOPCMS through 2018-11-30, leading to deletion of unexpected critical files. The exploitation point is in the "column management" function. The path added to the column is not verified. When a column is deleted by an attacker, the correspond...
CVE-2019-9016
PUBLISHED: 2019-02-22
An XSS vulnerability was discovered in MOPCMS through 2018-11-30. There is persistent XSS that allows remote attackers to inject arbitrary web script or HTML via the form[name] parameter in a mod=column request, as demonstrated by the /mopcms/X0AZgf(index).php?mod=column&ac=list&menuid=28&am...
CVE-2018-20784
PUBLISHED: 2019-02-22
In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq's, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load.
CVE-2019-9003
PUBLISHED: 2019-02-22
In the Linux kernel before 4.20.5, attackers can trigger a drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging for certain simultaneous execution of the code, as demonstrated by a "service ipmievd restart" loop.
CVE-2019-9004
PUBLISHED: 2019-02-22
In Eclipse Wakaama (formerly liblwm2m) 1.0, core/er-coap-13/er-coap-13.c in lwm2mserver in the LWM2M server mishandles invalid options, leading to a memory leak. Processing of a single crafted packet leads to leaking (wasting) 24 bytes of memory. This can lead to termination of the LWM2M server afte...