Cyber Criminals Have Created An Invisible Internet

Online criminals  are creating an 'Invisible Internet' to stop police spying on cyber-crime deals being done on the dark net, research suggests. Instead of trading on marketplaces, criminals have turned to "gated" chat forums, invitation-only communities and encrypted apps, say researchers at Surrey University. 
 
The change could make it hard for law enforcement agencies to spot and trace attacks, they warn. They also found a large increase in attacks aimed at big companies.
 
Hidden Chatter
The study embedded undercover researchers into a wide variety of forums and gated chat forums on the dark net.
The dark net is the part of the internet not accessible to search engines such as Google, and for which people need a special browser to visit. The most well-known dark net is accessed via the Tor browser.
 
Successful efforts by police to infiltrate dark net marketplaces as well as raids that saw many of them closed down, had pushed criminal hackers to adopt more secure ways of communicating, said Dr Mike McGuire, a criminologist from the University of Surrey, who led the project.
 
"It's not as vibrant as it once was because they know the feds are listening and that they will take down markets," he said.
While criminal gangs were still active on those publicly accessible marketplaces, said Dr McGuire, any conversations about targets and tactics were instantly moved to secure apps such as Telegram or separate forums and chat rooms.
 
"It's becoming like an invisible Internet," he told the BBC. "That's going to be worrying for law enforcement." For the study, researchers posed as customers and quizzed hackers about the cost of a wide variety of cyber-attacks, They probed market rates for tailored malware attacks, phishing campaigns, industrial espionage and insider information.
 
Sample costs included:
  • Remote logins for corporate networks $2-$30 (£1.50-£24)
  • Targeted attack on company $4,500
  • Targeted attack on individual $2,000
  • Phishing kits $40
  • Fake Amazon receipts and invoices $52
  • Espionage and insider trading $1,000 - $15,000
The cyber-crime economy that had emerged on the dark net was a mirror to the legitimate industry, said Ian Pratt, co-founder of security firm Bromium that sponsored the research. The cyber-crime economy was diverse and sophisticated, he said, with many hacking gangs specialising in just one aspect of an attack, such as crafting malware, writing convincing phishing emails or setting up sites to grab data from victims.
 
It was also clear, he said, that the hackers could get access to almost any network they desired. "It's not hard to get into corporate networks," he said, adding that the most successful method of winning access was via a well-crafted phishing campaign. Also, adverts and listings for attacks on enterprises had grown by 20% since 2016, suggesting corporates were becoming a lucrative target. A successful phishing attack gave hackers "instant deep access" said Mr Pratt, that they could then build on to either get at saleable data or to thoroughly compromise a target. 
 
The changing nature of the dark net underworld should prompt police to change the way they tackle cyber-crime, said Dr McGuire. 
 
"Law enforcement have a very focused and narrow perception and take down particular groups," he said. "But by taking out specific groups they are not making much of a dent in it."
 
If one group disappeared or was broken up by police another would just move to fill in the gap, he added. "It's like cutting the head off a hydra."
 
BBC:          Bromium
 
You Might Also Read:
 
Cyber Criminals Are Catching Up  With Nation-state Hackers:
 
« Spies Use AI-Generated Faces To Connect With Targets
A New Age of Warfare »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Palo Alto Networks

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate.

CyberScout

CyberScout

Cyberscout delivers the latest cybersecurity education, protection and resolutions services. We also provide swift incident response services around the world.

Exprivia

Exprivia

Exprivia is active in the design, development and integration of IT systems including cyber security.

Jamcracker

Jamcracker

Jamcracker is a cloud services management and cloud governance solutions company, with more than a decade of experience providing industry leading software and services.

AU10TIX

AU10TIX

AU10TIX’s smart forensic-level ID authentication technology links physical and digital identities, meets compliance mandates, and ensures your customers know their trust and safety come first.

MSPAlliance

MSPAlliance

MSPAlliance is the world’s largest industry association and certification body for cloud computing and managed service professionals.

Concentric

Concentric

Concentric Data Risk Monitoring and Protection. Deep Learning to discover, monitor and remediate risks to sensitive data on-premises and in the cloud.

Tangible Security

Tangible Security

Tangible employs the most sophisticated cyber security tools and techniques available to protect our clients’ sensitive data, infrastructure and competitive advantage.

Quintillion Consulting

Quintillion Consulting

Quintillion Consulting is a strategic risk based consulting firm. We help companies safeguard the core business and IT capabilities that deliver competitive advantage.

Fibernet

Fibernet

Fibernet's innovative solutions in the fields of cybersecurity and fiber optics range from telecommunications infrastructure to small business cybersecurity.

WheelHouse IT

WheelHouse IT

WheelHouse IT secures, manages, and advances businesses with innovative, cost-effective IT solutions.

Kubus Hitam

Kubus Hitam

Kubus Hitam are a research-based company focused on cyber security. we strongly believe that innovation and safety are the two keywords for the future business market.

Everfox

Everfox

Everfox (formerly Forcepoint Federal) has been defending the world's most critical data and networks against the most complex cyber threats imaginable for more than 25 years.

Vorlon

Vorlon

Vorlon's agentless patent-pending solution facilitates risk profiling of apps, and provides AI-driven behavioral analytics with response recommendations.

Sacumen

Sacumen

Sacumen is a niche player in the cybersecurity market, solving critical problems for security product companies.

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision-Cyber was founded on the philosophy of state-of-the-art cybersecurity and digital solutions. Our guiding principle is simply that we will provide and secure all your digital needs.