Why Aren’t Cyber Criminals Being Brought to Justice?

Cyber criminals are making off with $400 to $500 billion in profits every year, leaving you to wonder why exactly attackers are getting away without being brought to justice.

Businesses of all size have their hands full with the 80 to 90 million cyber attacks that are launched every year. However, with 70% of these attacks going undetected, it shouldn’t come as a surprise that most cyber crime goes unpunished.

The simple answer is that cyber criminals are innovating at a far quicker pace than security professionals can keep up with, according to the Cisco 2015 Mid-Year Report.

Cyber criminals have plenty of tricks up their sleeves for evading cyber defenses, and the only way to cut down on these injustices is for businesses and governmental agencies to implement more proactive cyber security measures.

How exactly are the Attackers Slipping Through Legal Control?

Cyber criminals are ruthless—they’re persistent, sophisticated and entirely capable of outsmarting your network of cyber security applications. There are a number of evasion tools and strategies in the arsenals of skilled attackers that you’ll need to understand if you want to detect and catch these criminals.

Be on the lookout for 3 ways attackers can avoid being caught by you and the legal system:

Proxy Chaining

Cyber criminals are just like you and me: their activity is identified by an IP header. But if that’s the case, why can’t we catch them?

One way that attackers mask their IP address is by using proxy chains. Rather than directly attacking a network, cyber criminals compromise a system of proxy machines, routing their traffic through these computers to create a lengthy list of IP addresses in use.

They can take advantage of limited legal jurisdiction by routing traffic through countries such as Russia and Sweden to make it almost impossible to subpoena the necessary evidence for a court case.

Organisations like the FBI simply don’t have the resources or jurisdiction to track down every IP address for each cyber attack.

Anonymous Web Networks
Another way that cyber criminals can mask their identity is by routing traffic through anonymous web networks like Tor.

Tor can be used to launch the command and control communications necessary to remotely navigate an enterprise network. While the presence of Tor traffic is an obvious red flag for security professionals to check for malicious activity, tracking down the attacker is almost impossible. You can stop the attack, but bringing a Tor user to justice is a tall task.

Malware with Anti-Analysis Functionality
Attackers don’t always have to use command-and-control servers to launch attacks—sometimes delivering sophisticated malware is enough. New malware like Rombertik are coded with a number of anti-analysis functions.

  • When placed in a sandbox, Rombertik writes random bytes of data 960 million times to overwhelm security systems. Rather than “sleeping” like most malware does to avoid detection, Rombertik appears unsuspicious because it remains active.
  • The malware has a self-destruct feature that destroys files and master boot records when detection is imminent.    

Rombertik is a sign of things to come in the cyber security community, as attackers find innovative ways to avoid detection and punishment.
Unfortunately, these are only a few tactics that attackers employ as they launch evasive attacks - and they’ll only grow more sophisticated. It’s time for businesses and governmental agencies to get more proactive and start bringing criminals to justice.

Malware as a service is the product of an increasingly industrialized cyber crime market—and according to FBI Agent Michael Driscolll, it’s controlled by just 100 to 200 major cyber criminals.

Theoretically, if these kingpins are dethroned, cyber security would see a major boost in success.  To that end, governmental agencies around the world have formed the Joint Cybercrime Action Taskforce (J-CAT) to cooperate and bring cyber criminals to justice.

They’ve already seen some success, but what can you do to avoid becoming a victim and watching attackers escape unscathed?

Deceptions Everywhere™ technology has emerged as the proactive solution that individual companies can deploy to catch attackers in the act. You may not be able to bring them to justice yourself—by placing a blanket of illusions over your network, you can deceive attackers and be alerted to their every move with real-time forensics and high fidelity alerts.
Knowing exactly how attackers are moving throughout your network enables you to end the threat, learn more about the attack and provide law enforcement with the information necessary to help prosecute these dangerous cyber criminals.
Don’t you think it’s about time these attackers pay the price for their offenses?  Will you be sharing information will law enforcement?
 
Illusive Networks: http://bit.ly/1RWnmCM

« Data Security – The Trends We Do Not See Coming
FBI's War On Encryption Is Unnecessary »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IOActive

IOActive

IOActive serves as a trusted security advisor to the Global 500 and other progressive enterprises, helping to safeguard their most important assets and improve their overall security posture.

Virus Bulletin

Virus Bulletin

Virus Bulletin is an online security information portal and certification body, providing users with independent intelligence about the latest developments in the global threat landscape.

IT Association of Slovakia (ITAS)

IT Association of Slovakia (ITAS)

ITAS is a professional association of domestic and foreign companies operating in the field of information and communication technologies

J2 Software

J2 Software

J2 Software is a leading African Information Security and ICT business providing information security, governance, risk and compliance solutions.

PeopleSec

PeopleSec

PeopleSec specializes in the human element of cybersecurity with a comprehensive set of services designed to maximize your security by educating your workforce as a whole.

Tech Nation

Tech Nation

Tech Nation is the UK’s first national scaleup programme for the cyber security sector, aimed at ambitious tech companies ready for growth, at home and abroad.

24By7Security

24By7Security

24By7Security are Cybersecurity & Compliance Specialists with extensive hands on experience helping businesses build a defensive IT Infrastructure against all cyber security threats.

Rostelecom

Rostelecom

Rostelecom is Russia’s largest integrated provider of digital services and solutions, covering all market segments including consumer, governmental and private organizations.

Aegis Security

Aegis Security

Aegis Security helps clients to secure their systems against potential threats through pre-emptive measures, such as security assessments, and cutting-edge solutions to security challenges.

Oxford Internet Institute - University of Oxford

Oxford Internet Institute - University of Oxford

The Oxford Internet Institute is a multidisciplinary research and teaching department of the University of Oxford, dedicated to the social science of the Internet.

Menaya

Menaya

Menaya provide Ethical Hackers for leading companies while also providing cyber security solutions to help major infrastructures protect against cyber crime.

Hook Security

Hook Security

Setting a new standard in security awareness. Hook Security is a people-first company that uses psychological security training to help companies create security-aware culture.

Segra

Segra

Segra owns and operates one of the nation’s largest fiber networks and provides best-in-class broadband and data security solutions throughout the Southeast and Mid-Atlantic.

Axians

Axians

Axians supports its customers in their digital transformation journey. We offer ICT solutions and services in areas including Enterprise Networks and Cybersecurity.

ProvenRun

ProvenRun

ProvenRun is a leading provider of trusted software solutions with extensive expertise and an unwavering commitment to security.

Twinstate Technologies

Twinstate Technologies

Twinstate Technologies specializes in cybersecurity, proactive IT, and hosted and on-premise voice solutions.