screenshot20160517at9
Security

Cybercriminals are increasingly embracing a sophisticated business-model approach

Cybercriminals can call on an extensive network of specialists for "business" expertise, including people who train and recruit, launder money, and provide escrow services, according to HPE.

The cybercriminal underground includes people who provide human resources functions, like recruiting and background checks, but also specialists who help market and sell exploit kits and compromised data and others who serve as middlemen in anonymous transactions, says The Business of Hacking white paper from Hewlett Packard Enterprise.

Cybercriminals are increasingly taking a business-based approach toward their activities, with some organizations developing in-house training, disaster recovery, and other business functions, and others contracting for those services in the underground marketplace, said Shogo Cottrell, a security strategist with HPE Security. Cybercrime is maturing as a business model, he added.

"They are following the money, in a sense," Cottrell said. Cybercriminals are embracing the "traditional sound business practices of increasing your revenue, reducing your costs, maximizing your profit."

Some criminal hacking businesses offer 24-by-seven telephone support, others offer money-back guarantees on their products, Cottrell said.

These traditional business models, with marketing teams focused on the reputation of the cybercriminal groups, help build up the groups' reputations in the criminal underground, Cottrell said. 

It's hard to maintain trust and a reputation in the cybercriminal community, "given that there's a lot of paranoia and there's a lot of distrust," Cottrell said. With a marketing team, "they can market the things they're doing a put a good face in front of the underground public."

The HPE paper identifies advertising fraud and extortion as types of cybercrime that have high payout potential while requiring relatively little effort and involving low risk to criminals. Hacktivism and credit card fraud are relatively easy and low risk but offer low payout potential.

Organized crime and intellectual property theft, on the other hand, offer large paydays, but can be difficult to pull off and can be risky.

The HPE paper recommends that businesses take several steps to disrupt cybercriminals. Businesses can disrupt hacker profits by using end-to-end encryption on their sensitive data, and by deploying application security tools, the white paper says. 

"Attackers prefer easy targets, so deploying any technologies to harden your assets will have dramatic results," the paper says.

Many businesses suffering breaches still fail to deploy basic security measures, such as patching software and two-factor authentication, Cottrell said. Hackers conduct their own risk analysis on potential targets; if a company looks difficult to attack, they will move on, he said.

Honeypots or deception grids -- realistic duplications of a business' network set up to trap attackers -- can also be effective, HPE said. These duplicated networks are "complex but may represent the future of getting ahead of the attackers and disrupting them," the paper says.

Businesses being attacked by cybercriminals shouldn't rely on government action, however, the paper says. While many countries are enacting harsher punishments for cybercrime, there's an enforcement problem in some parts of the world, the paper notes.

Harsh penalties in some countries are "driving attackers to operate in ... more lenient countries to reduce their risk," HPE says. 

IDG Insider

PREVIOUS ARTICLE

« Motorola details three new Moto G smartphones

NEXT ARTICLE

FCC's 'relentless regulatory assault' threatens cable industry »
author_image
IDG News Service

The IDG News Service is the world's leading daily source of global IT news, commentary and editorial resources. The News Service distributes content to IDG's more than 300 IT publications in more than 60 countries.

  • Mail

Recommended for You

International Women's Day: We've come a long way, but there's still an awfully long way to go

Charlotte Trueman takes a diverse look at today’s tech landscape.

Trump's trade war and the FANG bubble: Good news for Latin America?

Lewis Page gets down to business across global tech

20 Red-Hot, Pre-IPO companies to watch in 2019 B2B tech - Part 1

Martin Veitch's inside track on today’s tech trends

Poll

Do you think your smartphone is making you a workaholic?