Why Aren’t Cyber Criminals Being Brought to Justice?

Cyber criminals are making off with $400 to $500 billion in profits every year, leaving you to wonder why exactly attackers are getting away without being brought to justice.

Businesses of all size have their hands full with the 80 to 90 million cyber attacks that are launched every year. However, with 70% of these attacks going undetected, it shouldn’t come as a surprise that most cyber crime goes unpunished.

The simple answer is that cyber criminals are innovating at a far quicker pace than security professionals can keep up with, according to the Cisco 2015 Mid-Year Report.

Cyber criminals have plenty of tricks up their sleeves for evading cyber defenses, and the only way to cut down on these injustices is for businesses and governmental agencies to implement more proactive cyber security measures.

How exactly are the Attackers Slipping Through Legal Control?

Cyber criminals are ruthless—they’re persistent, sophisticated and entirely capable of outsmarting your network of cyber security applications. There are a number of evasion tools and strategies in the arsenals of skilled attackers that you’ll need to understand if you want to detect and catch these criminals.

Be on the lookout for 3 ways attackers can avoid being caught by you and the legal system:

Proxy Chaining

Cyber criminals are just like you and me: their activity is identified by an IP header. But if that’s the case, why can’t we catch them?

One way that attackers mask their IP address is by using proxy chains. Rather than directly attacking a network, cyber criminals compromise a system of proxy machines, routing their traffic through these computers to create a lengthy list of IP addresses in use.

They can take advantage of limited legal jurisdiction by routing traffic through countries such as Russia and Sweden to make it almost impossible to subpoena the necessary evidence for a court case.

Organisations like the FBI simply don’t have the resources or jurisdiction to track down every IP address for each cyber attack.

Anonymous Web Networks
Another way that cyber criminals can mask their identity is by routing traffic through anonymous web networks like Tor.

Tor can be used to launch the command and control communications necessary to remotely navigate an enterprise network. While the presence of Tor traffic is an obvious red flag for security professionals to check for malicious activity, tracking down the attacker is almost impossible. You can stop the attack, but bringing a Tor user to justice is a tall task.

Malware with Anti-Analysis Functionality
Attackers don’t always have to use command-and-control servers to launch attacks—sometimes delivering sophisticated malware is enough. New malware like Rombertik are coded with a number of anti-analysis functions.

  • When placed in a sandbox, Rombertik writes random bytes of data 960 million times to overwhelm security systems. Rather than “sleeping” like most malware does to avoid detection, Rombertik appears unsuspicious because it remains active.
  • The malware has a self-destruct feature that destroys files and master boot records when detection is imminent.    

Rombertik is a sign of things to come in the cyber security community, as attackers find innovative ways to avoid detection and punishment.
Unfortunately, these are only a few tactics that attackers employ as they launch evasive attacks - and they’ll only grow more sophisticated. It’s time for businesses and governmental agencies to get more proactive and start bringing criminals to justice.

Malware as a service is the product of an increasingly industrialized cyber crime market—and according to FBI Agent Michael Driscolll, it’s controlled by just 100 to 200 major cyber criminals.

Theoretically, if these kingpins are dethroned, cyber security would see a major boost in success.  To that end, governmental agencies around the world have formed the Joint Cybercrime Action Taskforce (J-CAT) to cooperate and bring cyber criminals to justice.

They’ve already seen some success, but what can you do to avoid becoming a victim and watching attackers escape unscathed?

Deceptions Everywhere™ technology has emerged as the proactive solution that individual companies can deploy to catch attackers in the act. You may not be able to bring them to justice yourself—by placing a blanket of illusions over your network, you can deceive attackers and be alerted to their every move with real-time forensics and high fidelity alerts.
Knowing exactly how attackers are moving throughout your network enables you to end the threat, learn more about the attack and provide law enforcement with the information necessary to help prosecute these dangerous cyber criminals.
Don’t you think it’s about time these attackers pay the price for their offenses?  Will you be sharing information will law enforcement?
 
Illusive Networks: http://bit.ly/1RWnmCM

« Data Security – The Trends We Do Not See Coming
FBI's War On Encryption Is Unnecessary »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Gurucul

Gurucul

Gurucul predictive security analytics protects against insider threats, account compromise and data exfiltration on-premises and in the cloud.

CERT.LV

CERT.LV

CERT.LV is the national Computer Emergency Response Team for Latvia.

Phirelight Security Solutions

Phirelight Security Solutions

Phirelight empowers an enterprise to easily understand how their networks behave, while at the same time assessing and managing cyber threats in real time.

Sonda

Sonda

SONDA is the leading systems integrator and IT service provider in Latin America.

EVOLEO Technologies

EVOLEO Technologies

EVOLEO provides engineering services covering a wide range of needs in the electronics design, embedded and systems engineering.

Innosphere Ventures

Innosphere Ventures

Innosphere Ventures is Colorado’s leading science and technology incubator, accelerating the success of high-impact startup and scaleup companies.

Toka Group

Toka Group

Toka empowers government agencies with critical and previously out-of-reach digital forensics, force protection and Intelligence capabilities, tackling the fields' most pressing challenges.

Encova Insurance

Encova Insurance

Encova’s cyber liability coverage protects you and your customers in case of a security breach in your company's data.

Snare

Snare

Snare is a comprehensive set of event monitoring and analysis tools designed to address critical auditing and security requirements.

FTI Consulting

FTI Consulting

FTI Consulting is a global business advisory firm dedicated to helping organizations manage change, mitigate risk and resolve disputes.

Box

Box

Box is the Cloud Content Management company that empowers enterprises to revolutionize how they work by securely connecting their people, information and applications.

Twinstate Technologies

Twinstate Technologies

Twinstate Technologies specializes in cybersecurity, proactive IT, and hosted and on-premise voice solutions.

Foghorn Consulting

Foghorn Consulting

Foghorn can analyze your cloud to enhance performance and security, while reducing costs. Based on AWS’ 6 Pillars, our AWS WAFR Certified Engineers Will Identify Areas of Improvement.

STACK Cybersecurity

STACK Cybersecurity

STACK Cybersecurity serves as a strategic partner, guiding you through the intricate and dynamic cybersecurity landscape.

CompassMSP

CompassMSP

CompassMSP deliver Managed IT and cybersecurity solutions designed to unleash your business's full potential.

Trofi Security

Trofi Security

Trofi Security provides Information Technology and Information Security services to organizations in both the public and private sectors.