Connect with us

Hi, what are you looking for?

White Papers

Trend Micro report shows how criminal organizations come to resemble legitimate businesses as they grow

Knowing the size and complexity of a criminal organization can provide critical clues to investigators, such as what types of data to hunt for. Understanding the size of targeted criminal organizations can also allow law enforcers to priorities better which groups should be pursued for maximum impact.

Trend Micro Incorporated  published a new research uncovering the inner workings of cybercrime organizations. The report, Inside the Halls of a Cybercrime Business, examined the operations of small, medium, and large criminal groups. The report details a day in the lives of employees and how they operate within hierarchies that increasingly resemble legitimate businesses as the group expands. 

While small cybercrime groups typically consist of a few members operating under a partnership model — most of whom usually have day jobs on top of their role in the group — employees of larger organizations tend to lead lives similar to corporate workers at legitimate software companies. Large cybercrime organizations tend to have corporate-like departments such as human resources (HR) and information technology (IT), and might even have “employee-of-the-month” recognition programs and performance reviews.

Ian Felipe, Country Manager, Trend Micro Philippines, shares, “The criminal underground is rapidly professionalizing — groups are beginning to mimic legitimate businesses that grow in complexity as their membership and revenue increases. At the same time, many Filipino businesses are grappling with high cyber risk levels and a challenging threat landscape. In a recent survey we conducted, nearly 40% of Filipino IT leaders rated their organization’s cyber risk levels as at the very least high, and nearly half of businesses believe that it is impossible to futureproof their cybersecurity as threats are always changing. To that extent, understanding cybercriminal operations can go a long way in helping to stay ahead of threats and enhance cyber preparedness. This report will aid investigators in the ongoing fight against cybercrime by helping them better understand the entities they are dealing with.”

Using examples where Trend Micro collected the most data from law enforcement and insider information, the report examined three types of cybercrime organizations based on size. 

Advertisement. Scroll to continue reading.

Small criminal businesses (e.g., Counter Anti-Virus service Scan4You):

  • A day in the life of an employee: Members often handle multiple tasks within the group and also have a day job on top of this work
  • Typically, one management layer, 1-5 staff members, and under US$500K in annual turnover
  • Comprise the majority of criminal businesses, often partnering with other criminal entities

Medium-sized criminal businesses (e.g., bulletproof hoster MaxDedi):

  • A day in the life of an employee: Members work full-time for the group, managing various tasks within an eight-hour shift 
  • Typically have two management layers, 6-49 employees, and up to US$50m in annual turnover
  • They usually have a pyramid-style hierarchical structure with a single person in charge

Large criminal business (e.g., ransomware group Conti): 

  • A day in the life of an employee: Members work from home based on a rigid, predictable schedule, and communicate frequently with their line manager about productivity and performance — similar to remote workers at legitimate corporations
  • Typically have three management layers, 50+ staff, and over US$50m in annual turnover
  • Implement effective OPSEC and partner with other criminal organisations
  • Those in charge are seasoned cybercriminals and hire multiple developers, administrators, and penetration testers – including short-term contractors
  • They may have corporate-like departments (e.g., IT, HR) and even run employee programs, such as performance reviews

Knowing the size and complexity of a criminal organization can provide critical clues to investigators, such as what types of data to hunt for. Understanding the size of targeted criminal organizations can also allow law enforcers to priorities better which groups should be pursued for maximum impact.

To read a full copy of the report, visit https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/inside-the-halls-of-a-cybercrime-business.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

Smart and its value brand TNT do not send text messages with clickable links. If you receive one—even if it looks like it’s from...

White Papers

n the Philippines, industry players are taking a more proactive approach to building a security framework for digital resilience.

HEADLINES

This marks the company’s first participation in the region’s premier tech event, where it will showcase its groundbreaking cybersecurity solutions to industry leaders, innovators,...

HEADLINES

A report found that the primary way attackers gained initial access to networks (56% of all cases across MDR and IR) was by exploiting...

White Papers

The Department of Information and Communications Technology (DICT) reports that government agencies, academic institutions, and telecommunications companies remain prime targets for cyber criminals, with...

HEADLINES

The exploit, discovered by Kaspersky’s Global Research and Analysis Team (GReAT), required no user interaction beyond clicking a malicious link and demonstrated exceptional technical...

HEADLINES

At the end of 2023, Sophos X-Ops noted a significant increase in ‘remote encryption’ attacks – where ransomware attackers breach a compromised and often...

HEADLINES

With the launch of KATA 7.0, organizations can now benefit from enhanced Network Detection and Response (NDR) capabilities with deeper network visibility, internal threats...

Advertisement