Cybercriminals are increasingly embracing a sophisticated business-model approach

Criminal hacking groups can employ HR specialists, marketers, and training gurus, HPE says

Cybercriminals can call on an extensive network of specialists for "business" expertise, including people who train and recruit, launder money, and provide escrow services, according to HPE.

The cybercriminal underground includes people who provide human resources functions, like recruiting and background checks, but also specialists who help market and sell exploit kits and compromised data and others who serve as middlemen in anonymous transactions, says The Business of Hacking white paper from Hewlett Packard Enterprise.

Cybercriminals are increasingly taking a business-based approach toward their activities, with some organizations developing in-house training, disaster recovery, and other business functions, and others contracting for those services in the underground marketplace, said Shogo Cottrell, a security strategist with HPE Security. Cybercrime is maturing as a business model, he added.

"They are following the money, in a sense," Cottrell said. Cybercriminals are embracing the "traditional sound business practices of increasing your revenue, reducing your costs, maximizing your profit."

Some criminal hacking businesses offer 24-by-seven telephone support, others offer money-back guarantees on their products, Cottrell said.

These traditional business models, with marketing teams focused on the reputation of the cybercriminal groups, help build up the groups' reputations in the criminal underground, Cottrell said.

It's hard to maintain trust and a reputation in the cybercriminal community, "given that there's a lot of paranoia and there's a lot of distrust," Cottrell said. With a marketing team, "they can market the things they're doing a put a good face in front of the underground public."

The HPE paper identifies advertising fraud and extortion as types of cybercrime that have high payout potential while requiring relatively little effort and involving low risk to criminals. Hacktivism and credit card fraud are relatively easy and low risk but offer low payout potential.

Organized crime and intellectual property theft, on the other hand, offer large paydays, but can be difficult to pull off and can be risky.

The HPE paper recommends that businesses take several steps to disrupt cybercriminals. Businesses can disrupt hacker profits by using end-to-end encryption on their sensitive data, and by deploying application security tools, the white paper says.

"Attackers prefer easy targets, so deploying any technologies to harden your assets will have dramatic results," the paper says.

Many businesses suffering breaches still fail to deploy basic security measures, such as patching software and two-factor authentication, Cottrell said. Hackers conduct their own risk analysis on potential targets; if a company looks difficult to attack, they will move on, he said.

Honeypots or deception grids -- realistic duplications of a business' network set up to trap attackers -- can also be effective, HPE said. These duplicated networks are "complex but may represent the future of getting ahead of the attackers and disrupting them," the paper says.

Businesses being attacked by cybercriminals shouldn't rely on government action, however, the paper says. While many countries are enacting harsher punishments for cybercrime, there's an enforcement problem in some parts of the world, the paper notes.

Harsh penalties in some countries are "driving attackers to operate in ... more lenient countries to reduce their risk," HPE says.

Join the PC World newsletter!

Error: Please check your email address.

Tags cybercrime

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Grant Gross

IDG News Service
Show Comments

Father’s Day Gift Guide

Most Popular Reviews

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?