Cyber Criminals Have Created An Invisible Internet

Online criminals  are creating an 'Invisible Internet' to stop police spying on cyber-crime deals being done on the dark net, research suggests. Instead of trading on marketplaces, criminals have turned to "gated" chat forums, invitation-only communities and encrypted apps, say researchers at Surrey University. 
 
The change could make it hard for law enforcement agencies to spot and trace attacks, they warn. They also found a large increase in attacks aimed at big companies.
 
Hidden Chatter
The study embedded undercover researchers into a wide variety of forums and gated chat forums on the dark net.
The dark net is the part of the internet not accessible to search engines such as Google, and for which people need a special browser to visit. The most well-known dark net is accessed via the Tor browser.
 
Successful efforts by police to infiltrate dark net marketplaces as well as raids that saw many of them closed down, had pushed criminal hackers to adopt more secure ways of communicating, said Dr Mike McGuire, a criminologist from the University of Surrey, who led the project.
 
"It's not as vibrant as it once was because they know the feds are listening and that they will take down markets," he said.
While criminal gangs were still active on those publicly accessible marketplaces, said Dr McGuire, any conversations about targets and tactics were instantly moved to secure apps such as Telegram or separate forums and chat rooms.
 
"It's becoming like an invisible Internet," he told the BBC. "That's going to be worrying for law enforcement." For the study, researchers posed as customers and quizzed hackers about the cost of a wide variety of cyber-attacks, They probed market rates for tailored malware attacks, phishing campaigns, industrial espionage and insider information.
 
Sample costs included:
  • Remote logins for corporate networks $2-$30 (£1.50-£24)
  • Targeted attack on company $4,500
  • Targeted attack on individual $2,000
  • Phishing kits $40
  • Fake Amazon receipts and invoices $52
  • Espionage and insider trading $1,000 - $15,000
The cyber-crime economy that had emerged on the dark net was a mirror to the legitimate industry, said Ian Pratt, co-founder of security firm Bromium that sponsored the research. The cyber-crime economy was diverse and sophisticated, he said, with many hacking gangs specialising in just one aspect of an attack, such as crafting malware, writing convincing phishing emails or setting up sites to grab data from victims.
 
It was also clear, he said, that the hackers could get access to almost any network they desired. "It's not hard to get into corporate networks," he said, adding that the most successful method of winning access was via a well-crafted phishing campaign. Also, adverts and listings for attacks on enterprises had grown by 20% since 2016, suggesting corporates were becoming a lucrative target. A successful phishing attack gave hackers "instant deep access" said Mr Pratt, that they could then build on to either get at saleable data or to thoroughly compromise a target. 
 
The changing nature of the dark net underworld should prompt police to change the way they tackle cyber-crime, said Dr McGuire. 
 
"Law enforcement have a very focused and narrow perception and take down particular groups," he said. "But by taking out specific groups they are not making much of a dent in it."
 
If one group disappeared or was broken up by police another would just move to fill in the gap, he added. "It's like cutting the head off a hydra."
 
BBC:          Bromium
 
You Might Also Read:
 
Cyber Criminals Are Catching Up  With Nation-state Hackers:
 
« Spies Use AI-Generated Faces To Connect With Targets
A New Age of Warfare »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cristie Data

Cristie Data

Cristie have been a trusted, innovative and leading edge data storage, backup and virtualisation solutions provider across all sectors of industry for over 40 years.

Telefonica Tech

Telefonica Tech

Telefónica Cyber Security Tech is focused on the prevention, detection and appropriate response to security incidents aimed at protecting your digital services.

enSilo

enSilo

enSilo secures customers data on premise or in the cloud. Regardless of the where the threat comes from, enSilo can protect your data.

The Security Awareness Company (SAC)

The Security Awareness Company (SAC)

The Security Awareness Company provides cyber security awareness training programs for companies of all sizes.

Chainalysis

Chainalysis

Chainalysis provides blockchain analysis software to prevent, detect and investigate cryptocurrency money laundering, fraud and compliance violations.

STM

STM

STM provides system engineering, technical support, project management, technology transfer and logistics support services for the Turkish Armed Forces.

DQM GRC

DQM GRC

DQM GRC are one of the UK's leading providers of data governance, e-privacy and GDPR services, to commercial organisations across all industries in the UK.

AppGuard

AppGuard

AppGuard prevents breaches by blocking applications from performing inappropriate processes using our patented dynamic isolation and inheritance technologies.

ICT Reverse

ICT Reverse

ICT Reverse is one of the UK’s leading, fully accredited providers of ICT asset disposal and secure data erasure.

iosiro

iosiro

iosiro was created to guide companies through securely using blockchain technologies. We help teams launch and manage ICOs, deploy secure dApps, and integrate private networks into business practices.

Meriplex

Meriplex

Meriplex is a Managed Services provider specializing in Intelligent Networks, Cybersecurity and Cloud Communications.

Risk Ledger

Risk Ledger

Risk Ledger is improving the security of the global supply chain ecosystem, reducing the number of data breaches experienced through supply chain attacks by companies and consumers alike.

Phoenix Cybersecurity

Phoenix Cybersecurity

Phoenix Cybersecurity Services and Managed Security Services help clients just like you take full advantage of leading cybersecurity technologies and industry best practices.

Accedian

Accedian

Accedian is a leader in performance analytics and end user experience solutions, dedicated to providing our customers with the ability to assure their digital infrastructure.

Prembly

Prembly

Prembly are a compliance and security infrastructure company.

CYBRI

CYBRI

CYBRI is a cybersecurity company helping businesses detect and remediate mission-critical vulnerabilities before they get exploited by hackers.