{"id":4837,"date":"2015-11-23T17:53:48","date_gmt":"2015-11-23T17:53:48","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=4837"},"modified":"2019-11-15T07:00:34","modified_gmt":"2019-11-15T12:00:34","slug":"russian-cybercrime-underground-doing-business-in-plain-sight","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/russian-cybercrime-underground-doing-business-in-plain-sight\/4837\/","title":{"rendered":"Russian cybercrime underground: doing &#8220;business&#8221; in plain sight"},"content":{"rendered":"<p>The Russian Mafia is a long-standing media staple in the West, portrayed with many\u00a0myths, but reality is possibly surpassing all of them. Russian cybercrime appears to be a formidable adversary for the cybersecurity industry, and a huge problem for businesses and individuals worldwide. Meet Securelist\u2019s new fundamental research: <a href=\"https:\/\/securelist.com\/analysis\/publications\/72782\/russian-financial-cybercrime-how-it-works\/\" target=\"_blank\" rel=\"noopener\">Russian financial cybercrime: how it works<\/a>.<\/p>\n<p><strong>A matter of communication<\/strong><\/p>\n<p>It\u2019s important to note that\u00a0\u201cRussian\u201d means \u201cRussian-speaking\u201d, not specifically \u201coriginating from Russian Federation\u201d: Russian language is actively used throughout many post-Soviet republics, but the Russian-language cybercrime market predominantly consists of citizens of Russia, Ukraine, and the Baltic states.<\/p>\n<p>Securelist says this cybercrime market is well known throughout the world. First, because of frequent media coverage. The second reason Securelist describes as \u201cthe open accessibility of online platforms used by the cybercriminal community for communications, promoting a variety of \u201cservices\u201d and \u201cproducts\u201d and discussing their quality and methods of application, if not for making actual deals.\u201d<\/p>\n<p>In other words, a large number of cybercriminals do their illicit business in the plain sight, then go on to commit financial attacks of various scales and sophistication.<\/p>\n<p><strong>Damage estimates<\/strong><\/p>\n<p>Between 2012 and 2015, law enforcement agencies from a number of different countries, including the United States, Russia, Belarus, Ukraine, and the EU arrested over 160 Russian-speaking cybercriminals, members of various criminal groups. All of those arrested were suspected of being engaged in stealing money using malware; the total estimated damage resulting from their worldwide activity exceeded $790 million. $509 million had been stolen outside the borders of the former Soviet Union. And these are only confirmed losses, the details of which, Securelist says, were obtained by law enforcement authorities during the investigation. In fact, the damage might have been much larger.<\/p>\n<p>Despite this formidable number of arrests the \u201cmarket\u201d is still crowded and very much active.<\/p>\n<p>According to Kaspersky Lab experts, over the last three years Russian-language cybercrime has recruited up to a thousand people. These include people involved in the creation of infrastructure, and writing and distributing malware code to steal money, as well as those who either stole or cashed the stolen money.<\/p>\n<p>According to Kaspersky Lab\u2019s Computer Incidents Investigation Department, there are at least five major cybercriminal groups specializing in financial crimes which have been monitored over the last few years. All of them include 10 to 40 people. At the same time, there are about 20 \u201ccore professionals\u201d who play leading roles in criminal activities that involve the online theft of money and information across the entire cybercriminal underground. So much damage from so few people.<\/p>\n<p><strong>Business activities<\/strong><\/p>\n<p>All in all, cybercrime IS a business, operating by the same patterns \u2013 by offering \u201cproducts\u201d and \u201cservices\u201d, for instance; following the same logic \u2013 maximizing ROI, etc. \u00a0It is totally illicit and very damaging, but it is built on the same principles. Cybercrime groups\u00a0almost openly hire codewriters and system administrators, just like normal businesses. Programmers create and modify malware, while admins perform tasks almost identical to their legit counterpart: implementing the IT infrastructure and maintaining it in working condition.<\/p>\n<p>\u201cCybercriminal system administrators configure management servers, buy abuse-resistant hostings for servers, ensure the availability of tools for anonymous connection to the servers (VPN) and resolve other technical challenges, including the interaction with remote system administrators hired to perform small tasks\u201d, Securelist wrote.<\/p>\n<p>Cybercriminals also\u00a0offer a number of the following \u201cproducts\u201d and \u201cservices\u201d to each other and third parties. Here are primary offerings, highlighted by the Kaspersky Lab researchers:<\/p>\n<p><strong>Products:<\/strong><\/p>\n<ul>\n<li>Software designed to gain unauthorized access to a computer or a mobile device in order to steal data from an infected device or money from a victim\u2019s account (the Trojans);<\/li>\n<li>Software designed to take advantage of vulnerabilities in the software installed on a victim\u2019s computer (exploits);<\/li>\n<li>Databases of stolen credit card data and other valuable information;<\/li>\n<li>Internet traffic (a certain number of visits to a customer-selected site by users with a specific profile.)<\/li>\n<\/ul>\n<p><strong>Services:<\/strong><\/p>\n<ul>\n<li>Spam distribution;<\/li>\n<li>Organization of DDoS attacks (overloading sites with requests in order to make them unavailable to legitimate users);<\/li>\n<li>Testing malware for antivirus detection;<\/li>\n<li>\u201cPacking\u201d of malware (changing malicious software with the help of special software (packers) so that it is not detected by antivirus software);<\/li>\n<li>Renting out exploit packs;<\/li>\n<li>Renting out dedicated servers;<\/li>\n<li>VPN (providing anonymous access to web resources, protection of the data exchange);<\/li>\n<li>Renting out abuse-resistant hosting (hosting that does not respond to complaints about malicious content, and therefore does not disable the server);<\/li>\n<li>Renting out botnets;<\/li>\n<li>Evaluation of the stolen credit card data;<\/li>\n<li>Services to validate the data (fake calls, fake document scans);<\/li>\n<li>Promotion of malicious and advertising sites in search results (Black SEO);<\/li>\n<li>Mediation of transactions for the acquisition of \u201cproducts\u201d and \u201cservices\u201d;<\/li>\n<li>Withdrawal of money and cashing.<\/li>\n<\/ul>\n<p>Altogether these \u201cproducts\u201d and \u201cservices\u201d are bought and sold in various combinations to enable the following types of crime:<\/p>\n<ul>\n<li>DDoS attacks (ordered or carried out for the purpose of extortion);<\/li>\n<li>Theft of personal information and data to access e-money (for the purpose of resale or money theft);<\/li>\n<li>Theft of money from the accounts of banks or other organizations;<\/li>\n<li>Domestic or corporate espionage;<\/li>\n<li>Blocking access to data on the infected computer for the purpose of extortion.<\/li>\n<\/ul>\n<p>Clearly, most of these are business-targeting threats. And this is a very different level of peril, compared to hacking individuals, just as organized crime is more dangerous than random thugs going around solo.<\/p>\n<p>To raise your awareness on Russian cybercrime, kindly proceed to <a href=\"https:\/\/securelist.com\/analysis\/publications\/72782\/russian-financial-cybercrime-how-it-works\/\" target=\"_blank\" rel=\"noopener\">Securelist\u2019s article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Russian Mafia is a long-standing media staple in the West, portrayed with many myths, but reality is possibly surpassing all of them. <\/p>\n","protected":false},"author":209,"featured_media":15526,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[77,614],"class_list":{"0":"post-4837","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-cybercrime","10":"tag-report"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/russian-cybercrime-underground-doing-business-in-plain-sight\/4837\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/russian-cybercrime-underground-doing-business-in-plain-sight\/4837\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/russian-cybercrime-underground-doing-business-in-plain-sight\/4837\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/cybercrime\/","name":"cybercrime"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4837","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=4837"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4837\/revisions"}],"predecessor-version":[{"id":30365,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4837\/revisions\/30365"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15526"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=4837"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=4837"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=4837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}