Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Marketing Tactics Grow More Sophisticated in Cyber Underground

Cybercriminals and the markets they use have changed in 2012, with both tactics for controlling attack campaigns as well as hackers’ marketing and sales strategies getting more sophisticated.

Cybercriminals and the markets they use have changed in 2012, with both tactics for controlling attack campaigns as well as hackers’ marketing and sales strategies getting more sophisticated.

In an interview with SecurityWeekTrend Micro Senior Threat Researcher Loucif Kharouni said that once the ZeuS and SpyEye creators left the scene, researchers have noticed a growing business in offering installation to other cybercriminals who would install ZeuS 2.0.8.9 or 2.1.0.1 for a fee.

Cybercrime Underground“You never get the toolkit by itself, they would provide you the binary to spread too,” he said. “Same thing for SpyEye, the latest version 1.3.48 is one year old now and similar to ZeuS, you would find some guys making the installation for you and provide you the binary. Same thing with Citadel, this is what we call SaaS (software as a service). Toolkit creators and exploit pack creators are now more reluctant to give away their creation.”

The notorious Blackhole kit has also moved towards a SaaS model to avoid any leaks of their code, he said.

“Compare to a toolkit, an exploit pack is just composed of a php file and could easily be manipulated if not protected,” he told SecurityWeek. “Compared to any other exploit pack, Blackhole is well coded, stable and reliable with a good infection rate, due to the latest exploits used and provided in the pack. The creator do not provide the pack itself and instead installs it for you and will protect the php files using the well know ioncube software which is used to encode php files.”

Advertisement. Scroll to continue reading.

This is also beneficial for the customer as they are not spending money on products that will be leaked and made available to everyone for free, he said.

Cybercriminals are also paying more attention to securing their tools and the servers they use, he noted. For example, attackers in Latin America have stopped using hijacked servers to host command and control (C&C) servers, spam tools or malware. Instead, they have begun using their own servers in data centers around the world and are staying off of Google search results by not registering any hostname and only using IP addresses, he blogged.

The time when researchers could find an open server is essentially over, and more and more cybercriminals are providing secure webhosting to other criminals, he wrote.

“Recent take downs and hacks have taught everybody in the underground a lesson,” the researcher blogged. “They now have to be more secure and cautious, protecting their servers against researchers and other criminals. Usually, researchers look for open folders and servers. This is basically looking for accessible folders and/or configuration files and also login shells to gain access to the server and start investigating it.”

To deal with today’s underground, researchers need to develop partnerships with Internet Service Providers (ISPs) for takedown operations and look for new ways to find information, he blogged.

“Security researchers need to adapt and adjust to these new methods and try to find new solutions to track attackers and follow the evolution of their business and operation,” he noted. “Scanning servers and hoping to find open servers isn’t enough anymore. Neither is monitoring forums – these are now used mainly to chat and advertise, but private messages are no longer being used to carry out business. Instead, they are used to exchange instant messaging accounts where the actual transaction is done.”

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Hear from experts as they explore the latest trends, challenges and innovations in Attack Surface Management.

Register

Event: ICS Cybersecurity Conference

The leading industrial cybersecurity conference for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Register

People on the Move

Jill Popelka has been appointed CEO at Darktrace, after serving as COO for three months.

GitHub has appointed Alexis Wales as its new Chief Information Security Officer.

Cybersecurity and intelligence solutions provider Nightwing has appointed Christopher Jones as CTO and CDO.

More People On The Move

Expert Insights