Hi,
welcome to the next instalment of our "Knowing Your Enemy" blog
series.
This
week we are going to focus on two interlinked threat actors “The Professional”
and the “Money Mule” and what type of vulnerabilities these types of threat actors
are looking to exploit and how.
Firstly,
let’s look at the “Professional”
The
Real-Deal Black Hat
If
a hacker’s hat colour is defined by their intentions, the black hat is
straightforward bad and, in most cases, straightforward professional. The black
hat is the one responsible for that fake tech support call, that un decryptable
ransomware and those harvested banking credentials. The black hat has dedicated
all his life to cybercrime, and it’s safe to say that he knows human psychology
all too well.
Beyond
everything else, nowadays black hats are also businessmen who operate a
business model called malware-as-a-service (MaaS), or the outsourcing of
cybercrime. The worst part is that thanks to MaaS, now every wannabe is welcome
to join cybercrime’s vast family.
Ransomware-as-a-service
(RaaS), particularly, is the worst. Even though not everyone operating a RaaS
scheme is professional enough to deliver a working and sophisticated
encryption, its proliferation demonstrates the enormous income a black hat can
generate. According to security firm Trustwave, a black hat could easily make
$84,000 a month from an investment of $5,900 for the malware they need.
In
2014, Interpol diminished a crime ring operating the Blackshades malware. The
criminals behind it were so sophisticated that they had staff and were handing
out salaries! They even had a marketing director.
This
is not the first case of a cybercrime gang going fully professional. A
real-deal black hat would even hire IT experts for the very same reasons that
legal companies do. A black hat’s supply chain also needs optimization and
propagation.
So, how do these guys operate and how does
traditional penetration testing or IT health check activity usually fail to
highlight the threats and vulnerabilities associated with this type of actor.
Unfortunately, a lot of organisations only see
security testing as a stepping stone for compliance, mandated and usually
unwelcome. A request for a proposal would usually contain a rigid scope of
systems and multiple levels of constraint’s and limitations being placed over
the assessment, that performing a realistic attack simulation is not possible.
In reality, the attack vectors could surface from
multiple areas including through social engineering and phishing assessments,
USB drop’s, physical security, through public facing infrastructure and
applications.
Thoroughly testing all of these areas routinely
would be extremely expensive and time consuming, Fortunately, STAR and red team
methodologies are becoming more and more common in the industry, which allows a
client to have a better understanding of the likely threats facing their
organisation that a Professional threat actor is likely to attempt to exploit.
Therefore, allowing a security test team to perform a
Penetration test across a sampled subset of a limit number of systems is not
going to identify the risks present.
Thoroughly testing all of these areas routinely
would be extremely expensive and time consuming and wouldn’t be feasible for an
organisation to bring in a specialist 3rd party testing company to
do this or a regular basis. Some organisations are realising this and have
started to bring security testing in house and making full and thorough testing part an
internal risk management program.
Although there are issues with this, how do you keep the
internal team’s skill on the cutting edge, can you be sure you have the breadth
of skills and knowledge in a static team.
Star and Red Team testing allows a client to have a
better understanding of the likely threats facing their organisation that a
Professional threat actor is likely to attempt to exploit.
The method adopts a
process of performing a certain level of threat intelligence into the
assessment, with the aim of identifying any likely threats facing the
organisation and focusing the assessment on exploitation of those
vulnerabilities. This can be through any number of attack methodologies and
usually involves the use of custom malware or targeted social engineering
campaigns.
The Bank of England, along with CREST, have also
developed the CBEST program for the financial services industry, which is
essentially a STAR assessment and provides the level of testing required to
pragmatically deal with the real risks facing an organisation.
Looking for a security testing company that
performs Red Teaming or STAR assessments is the way forward for external
security testing. The traditional testing method is still important, especially
for internal systems and annual public facing infrastructure and application
assessments, in order to provide the defence in depth approach needed.
In
order for the “Professional” to be able to generate an income from his illicit
activity, he needs to utilise our second threat actor in this series, “The
Money Mule”
The
Money Mule
No
crime can function without mules, cybercrime included. Mules are the final link
of a successful cybercrime operation. They are the ones making the dirty money
ready-to-use and untraceable. This is often done via internet payments, money
transfers, or online auctions.
Mules
are typically motivated by greed or desperation. They often work from home,
random Internet cafés, or free WiFi hotspots to hide their activities. They are
the ones transforming the profits of Internet-based criminal activity into
untraceable cash.
Money
mules are recruited across the globe and are crucial to money laundering
schemes. In Asia and Australia, they are mostly overseas students, while in
Europe, they are usually retirees.
So
the end result of any successful attack, one that was driven by financial purposes
anyway, would be when a Professional needs to access his illicit gains
involving money mules.
There
really isn’t anything that can be done from a security testing perspective as
this is post compromise activity.
However,
proactively monitoring for potential data leakage and evidence of compromise is
a very important part risk management.
There
is a strong chance that an attack has been successful against your organisation
in some form, but it may not have been apparent to security personnel. This is
where threat intelligence is again vital, as monitoring any evidence of
exploitation of any organisational entity may only be discovered through in
depth analysis of hacker forum’s or dark web resources.
Good
internal protective monitoring is also extremely important in order to remain
informed of any attacks that either have or are currently taking place.
Links
CREST
Conclusion
During this blog series, knowing your enemy, we have had a
look at the different types of threat actors and the relationship that security
testing, as part of a balanced security and risk management program, plays in
assisting with protecting against compromise.
Unfortunately, as with any industry, there are good and
there are not so good security testing organisations out there selling
services. How is an organisation supposed to know who to turn to in order to
provide effective security assurance?
Fortunately, there are companies that are aligned to providing
effective testing services through adopting methodologies, processes and
standards set by organisations such as the CESG CHECK scheme (via the
Tigerscheme and CREST) and the Bank of England’s CBEST scheme for the financial
services industry (CREST), that have these effective and comprehensive testing
standards and methodologies in place.
These companies employ Consultants who are security cleared
to a at least SC level and have been assessed and accredited to the highest
standards of security testing. They can be trusted in order to ethically
replicate the threat actors and provide pragmatic advice and direction on how
to protect yourself against the growing threat landscape.
No comments:
Post a Comment