Inside The Mind Of Cyber Criminals

There are some common misperceptions that security professionals have about cybercrime and the people who do it.

Information sharing amongst security specialists is crucial; in the eyes of a criminal, no company is unique. As a rule of thumb, perpetrators will initially cast a wide net and move downstream toward the easiest prey. It’s more likely to become a victim via common attack vector, rather than to experience a highly sophisticated and tailored attack.

On the other hand, security specialists should never underestimate the determination of an attacker. Highly valuable and quickly sold on underground information such as payment, healthcare, and personally identifiable records, as well as sensitive M&A information, must be identified as a targeted asset, quarantined, and stored encrypted. 

The actionable contingency plan must be rehearsed and quickly activated in the case of a breach including a clear response strategy if extortion is attempted. Security professionals must be aware of upcoming threats and successful mitigation practices when establishing a robust and secure network, making sure the proper data backups are in place.

What are some common misperceptions that security pros have about cyber-crime and the people who do it?

The common misperception about cyber criminals we often observe is that it is assumed that illicit actors have diverse skills and experience, allowing them to initiate a wide range of attacks, subsequently earning a hefty amount of money as a result. In reality, the current underground has shifted toward mass plug-and-play automated services, offering the opportunity to participate in illicit activities to a broad number of novice members. Recorded Future has recently identified a survey, conducted among members of a closed underground community, revealing that the majority of cyber criminals are earning a mere $1,000 to $3,000 a month, while only 20% are earning significantly larger amounts of $20,000 a month or more.

Who are these criminals? Are they part of established criminal groups or one-man shows?

For the most part, the largest demographic of members participating in underground communities are lone actors with a clean criminal record and without any ties to organised syndicates. These criminals tend to maintain a stable day job while partaking in illegal activities mostly on an occasional basis. Often these actors are introduced to the life of cyber-crime during their early college years and remain active many years to follow.

A separate and significantly more sophisticated cohort are cyber-criminal syndicates which maintain a strict hierarchy, comprised of highly skilled members, each with a very narrow set of responsibilities.

A typical group is controlled by a single mastermind “boss”, a very intelligent and highly educated person, and includes bankers with extensive connections in the financial industry to arrange money laundering and cash out of stolen funds. 

Additionally, forgers are responsible for fake documents and supporting paperwork and professional project managers oversee the technical aspects of operations, software engineers, and skilled hackers. 

Some groups include ex-law enforcement agents responsible for information gathering as well as counter-intelligence operations.

Team members tend to have strong ties in real life and often are respected members of their communities, viewed by many as successful businessmen and entrepreneurs. The group will often have a diversified investment portfolio and maintain a presence in real estate, hospitality, and auto-related businesses.

Cyber-criminal syndicates don’t regard themselves as ordinary street criminals and rarely cross paths with everyday gangsters, preferring to remain in the shadows and avoid unnecessary attention from both law enforcement and local mafia branches.

However, on certain occasions, requiring the involvement of a vast number of “troopers,” often, related to a large cash-out operations, a one-time project can be launched through a chain of intermediaries.

What types of research do you feel are most beneficial for an enterprise security team?

We have to understand no silver bullet will solve every security problem. An effective security perimeter has to include the combination of:

  • Automated tools responsible for identification of unusual behavior.
  • Alerts on known IOCs and TTPs.
  • Intelligence obtained from underground communities.
  • Response procedures and guidelines.

Direct access to deep and dark web is crucial, but for a variety of safety reasons, might not be a viable option. Hidden criminal communities are not very fond of researchers, and in certain situations, an inexperienced researcher can draw unnecessary attention to the company and put it in danger.

In one of the recent cases, a poorly trained researcher has openly inquired about penetration solutions in newly adopted infrastructure which was tested at a limited number of corporate locations, immediately observing a sudden surge of malicious activity.

To avoid this, we would recommend utilising the help of professional threat intelligence providers that operate undercover on a day-to-day basis and are familiar with all of the complex politics of these communities.

Several providers allow users to research deep and dark web sources in a safe and secure manner, without risking the integrity of the organisation.

Companies also must foster internal security teams, ensuring they are capable of discovering relevant and actionable data as well as stimulating the unrestricted environment, providing the opportunity to initiate counter-measures quickly, and minimising the red-tape procedures.

RecorderdFuture:              Cybercrime Inc. Hackers Model Themselves On Big Business:

 

« Irish Law Firms Experience 50% Increase In Cyberattacks
Snowden Loses In Norway »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

F-Response

F-Response

F-Response is a software utility that enables an investigator to conduct live Forensics, Data Recovery, and eDiscovery over an IP network using their tools of choice.

OIC-CERT

OIC-CERT

OIC-CERT is the Computer Emergency Response Team for Organisation of Islamic Cooperation (OIC) member countries.

Appdome

Appdome

Appdome is the industry's first mobile integration as a service company, providing solutions for enterprise mobility and mobile application security.

GraVoc

GraVoc

GraVoc is a technology-consulting firm committed to solving business problems for customers through the development, implementation, & support of technology-based solutions.

Intertrust Technologies

Intertrust Technologies

Intertrust Technologies is a software company specializing in trusted computing products and services.

Innovative Solutions (IS)

Innovative Solutions (IS)

Innovative Solutions is a specialized professional services company delivering Information Security products and solutions for Saudi Arabia and the Gulf region.

Ledger

Ledger

Ledger is a leader in security and infrastructure solutions for cryptocurrencies and blockchain applications using its proprietary technology.

Marvell Technology Group

Marvell Technology Group

Marvell is a semiconductor company providing solutions for storage, processing, networking, security and connectivity.

Telecommunications & Digital Government Regulatory Authority (TDRA) - UAE

Telecommunications & Digital Government Regulatory Authority (TDRA) - UAE

TDRA focuses on regulating the telecommunications sector and enabling government entities in the field of smart transformation. It is responsible for the overall digital infrastructure in the UAE.

Southwest Research Institute (SwRI)

Southwest Research Institute (SwRI)

Southwest Research Institute SwRI are R&D problem solvers providing independent services to government and industry clients. Areas of expertise include Cybersecurity, Intelligent Networks and IoT.

Lockheed Martin

Lockheed Martin

Lockheed Martin deliver full-spectrum cyber capabilities and cyber resilient systems to defense, intelligence community and global security customers.

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce has partnered with Purdue University and Carnegie Mellon University to create the Rolls-Royce Cybersecurity Technology Research Network.

Nagios

Nagios

Nagios is a powerful tool that provides you with instant awareness of your organization’s mission-critical IT infrastructure.

US Cyber Games

US Cyber Games

US Cyber Games is committed to inform and inspire the broader community on ways to develop tomorrow’s cybersecurity workforce.

Eclypses

Eclypses

Eclypses has a disrupting cyber technology, offering organizations an advanced data security solution called MicroToken Exchange (MTE).

IDCARE

IDCARE

IDCARE is Australia and New Zealand’s national identity & cyber support service. Our service is the only one of its type in the world.