Connect with us

Hi, what are you looking for?

HEADLINES

The dark side of the dark web

IMAGE CREDIT: PIXABAY.COM

Gone are the days when ransomware was developed and distributed by skilled cybercriminals. Today, anyone can easily build and launch ransomware as there are only two key requirements – bad intent and access to the dark web, a marketplace where malware kits are advertised the way a traditional online retailer promotes regular items like clothes and shoes, according to Sophos.

Users on the dark web are anonymous and protected by a privacy feature baked directly into the Tor browser, which is the browser used to access it. This also means that law enforcement authorities are unable to identify where the websites are, who owns them, who uses them or who to arrest.

The easy access to the dark web is fueling ransomware-as-a-service (RaaS) distribution models, which essentially enable novice cybercriminals to download and use ransomware. As ransomware is cheap to purchase and spread, it also provides a quicker payout than stealing credit card data or personal information.

One of the most recent, successful example is Philadelphia, a ransomware variant that is easy to customize and deploy, and uses common marketing strategies to reach potential customers. Cybercrooks only have to pay once to get an executable that can generate unlimited ransomware samples.

There is even a production-quality intro video on YouTube, explaining the nuts and bolts of the kit and ways to customize the ransomware with a range of feature options. Hence, with ransomware variants like Philadelphia, criminals with limited technical skills, can easily execute high-quality attack campaigns.

Advertisement. Scroll to continue reading.

In fact, there are ransomware variants on the dark web delivered via cloud that offer a host of menu options to guide crooks on how much ransom to charge and the distribution spectrum of the attack.

For a ransomware campaign to succeed, attackers must overcome four main challenges:

  1. Setting up a command-and-control server to communicate with victims
  2. Creating ransomware samples
  3. Sending the samples to victims
  4. Managing the attacks by collating statistical information, checking payment etc

Chester Wisniewski, Principal Research Scientist, Sophos shares tips for enterprises to ensure attackers do not cross these challenges successfully:

  1. Understand underground trends and train employees on how the dark web works
  2. Increase the frequency of security monitoring and reporting in the organisation
  3. Patch early and patch often, even if you’re using an unsupported version of XP, Windows 8 or Windows Server 2003
  4. Be vigilant to recognize if employees or customers are being targeted

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

This marks the company’s first participation in the region’s premier tech event, where it will showcase its groundbreaking cybersecurity solutions to industry leaders, innovators,...

HEADLINES

A report found that the primary way attackers gained initial access to networks (56% of all cases across MDR and IR) was by exploiting...

White Papers

The Department of Information and Communications Technology (DICT) reports that government agencies, academic institutions, and telecommunications companies remain prime targets for cyber criminals, with...

HEADLINES

The exploit, discovered by Kaspersky’s Global Research and Analysis Team (GReAT), required no user interaction beyond clicking a malicious link and demonstrated exceptional technical...

HEADLINES

At the end of 2023, Sophos X-Ops noted a significant increase in ‘remote encryption’ attacks – where ransomware attackers breach a compromised and often...

HEADLINES

With the launch of KATA 7.0, organizations can now benefit from enhanced Network Detection and Response (NDR) capabilities with deeper network visibility, internal threats...

HEADLINES

In 2024, Globe blocked 3,096 child pornography domains or those containing child sexual abuse and exploitation materials (CSAEM), a slight increase from 3,047 domains restricted...

HEADLINES

During a recent webinar on Building Resilience Against Online Scams, hosted by fiber broadband and technology provider Converge ICT Solutions Inc., its Chief Executive...

Advertisement