{"id":3506,"date":"2019-06-05T15:59:59","date_gmt":"2019-06-05T03:59:59","guid":{"rendered":"https:\/\/kinetics.co.nz\/?p=3506"},"modified":"2019-06-05T15:59:59","modified_gmt":"2019-06-05T03:59:59","slug":"cyber-criminals","status":"publish","type":"post","link":"https:\/\/new.kinetics.co.nz\/?p=3506","title":{"rendered":"The alarming business models of cyber-criminals"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.16.1&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h2>Cyber-crime has become big business<\/h2>\n<p><strong>It&#8217;s organised, and the purveyors are shameless in their determination to steal from all of us.<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-3512\" src=\"https:\/\/new.kinetics.co.nz\/wp-content\/uploads\/2019\/04\/GandCrab.jpg\" alt=\"\" width=\"260\" height=\"170\" \/><\/p>\n<p>Heaven only knows where they get their names from.\u00a0 One group we recently became aware of is called &#8216;PINCHY SPIDER&#8217;, and they are doing something called &#8216;Big Game Hunting&#8217;.<\/p>\n<p>Back in <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-crooks-test-a-new-way-to-spread-their-malware\/\" target=\"_blank\" rel=\"noopener\">January 2018, they created a ransomware<\/a>\u00a0toolkit called GandCrab.\u00a0 While most ransomware today spreads through SPAM email, this uses an older technique.\u00a0 It uses an exploit kit to spread, mainly through infecting websites, then taking advantage of vulnerabilities in common software like Internet Explorer, Chrome, Java and Flash.\u00a0 Where it is particularly effective is that it then lies in wait.\u00a0 If it can sense other computers on a local network, then it uses Remote Desktop Protocol\u00a0 (that&#8217;s the same RDP that most of us use for remote access to work) to attack them and spread further.<\/p>\n<p>&nbsp;<\/p>\n<h2>Big Game Hunting<\/h2>\n<p><strong>Now it seems that they have refined their model. \u00a0 <\/strong><\/p>\n<p>They work with &#8216;affiliates&#8217; for a share of the ransom.\u00a0 It&#8217;s reported the PINCHY SPIDER people take 40% of the profits, with the affiliate &#8216;earning&#8217; the rest for what is described a surgical strike.\u00a0 <strong>Yes, they are franchising cyber-crime!<\/strong><strong>\u00a0<\/strong>These affiliates target an organisation, crafting their attacks, refining their knowledge of the target until they succeed.<\/p>\n<p>It seems that once they penetrate the target, they then quietly work laterally to get their evil software onto the machines that will cause the most harm, whether that&#8217;s a server or a set of specific PCs.\u00a0 They want to minimise the trail they leave behind, making it hard for the security software people to find ways to identify their footprints, and they may even manually remove their software from less-valuable machines as they move through the organisation. \u00a0 If they encounter roadblocks, it seems they also manually work through these, removing or disabling all, or part, of your security tools until they can continue spreading their infection.<\/p>\n<p><strong>These are carefully crafted attacks.\u00a0 <\/strong>They reconnoitre their victims and plan their attacks.\u00a0 They sneak around your system until they are ready, then they strike.<\/p>\n<h4>What can you do?<\/h4>\n<ul>\n<li>Firstly, <strong>these exploits only work on machines that have vulnerabilities.<\/strong>\u00a0 Regular patching updates is more important than ever, and systems like<strong> <a href=\"https:\/\/new.kinetics.co.nz\/proactive-it-service-and-support\/\" target=\"_blank\" rel=\"noopener\">KARE <\/a><\/strong>are vital (needs to be our <strong><a href=\"https:\/\/new.kinetics.co.nz\/proactive-it-service-and-support\/\" target=\"_blank\" rel=\"noopener\">Core Fundamentals&#8217; or &#8216;Premium KARE&#8217; plans<\/a><\/strong>) and you need regular reports so you know ALL your devices are protected. \u00a0 This isn&#8217;t infallible though &#8211; vulnerabilities are discovered and fixed all the time, so there is always a risk of a &#8216;zero-day&#8217; exploit where the vulnerability is discovered and used before the updates are available.<\/li>\n<li><strong>Make sure your antivirus and anti-malware is up to date<\/strong> and do <strong>&#8216;<a href=\"https:\/\/new.kinetics.co.nz\/deepscan-antivirus-and-antimalware\/\" target=\"_blank\" rel=\"noopener\">deep scanning<\/a>&#8216;<\/strong>.\u00a0 This can have impacts on your operations depending on the software you use, so it needs to be done carefully.<\/li>\n<li><strong>Apply a <a href=\"https:\/\/new.kinetics.co.nz\/zero-trust-networking-for-real-business\/\" target=\"_blank\" rel=\"noopener\">&#8216;zero-trust<\/a>&#8216; stance to your IT<\/strong>, protecting not just the boarder of your organisation but also within it to reduce the surface area open to an attacker &#8211; creating those obstacles that slow them down or turn them away.<\/li>\n<li><strong>Use a <a href=\"https:\/\/new.kinetics.co.nz\/dodging-dodgy-websites\/\" target=\"_blank\" rel=\"noopener\">URL-Protection service<\/a> <\/strong>to reduce the chances of accidentally opening a compromised (exploited) website.<\/li>\n<li><strong>Use multi-factor authentication<\/strong> to require tokens, commonly approving access from your phone apps, as well as a username and password<\/li>\n<li><strong>Regular back-ups<\/strong>, especially &#8216;air-gapped&#8217; backups where you have regular copies of your data that is physically separate and unplugged from your systems.<\/li>\n<\/ul>\n<p>Unfortunately, none of these steps are fool-proof.\u00a0 They are all layers.\u00a0 For example, even backups are compromised if they are connected to your system and become encrypted themselves.\u00a0 Likewise, if the compromised software doesn&#8217;t activate straightaway, then it might hide, dormant, even on your backups.<\/p>\n<p>However you do need to take all reasonable steps, which is the stance we&#8217;ve taken with our <strong><a href=\"https:\/\/new.kinetics.co.nz\/kare-for-security-s1\/\" target=\"_blank\" rel=\"noopener\">KARE for Security<\/a> s<\/strong>ervice and you need to look at<strong> <a href=\"https:\/\/new.kinetics.co.nz\/three-cyber-insurance-questions-you-need-to-consider\/\" target=\"_blank\" rel=\"noopener\">cyber-insurance<\/a>.<\/strong><\/p>\n<p><strong>If you want to read more:<\/strong><\/p>\n<ul>\n<li><strong><a href=\"https:\/\/cyware.com\/news\/pinchy-spider-adopts-big-game-hunting-to-distribute-gandcrab-7f6ac01a\/\" target=\"_blank\" rel=\"noopener\">CYWare<\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.scmagazine.com\/home\/security-news\/ransomware\/pinchy-spider-goes-big-game-hunting-with-gandcrab\/\" target=\"_blank\" rel=\"noopener\">SCMagazine.Com\u00a0<\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.crowdstrike.com\/blog\/pinchy-spider-adopts-big-game-hunting\/\" target=\"_blank\" rel=\"noopener\">CrowdStrike[\/wow_colorme]<\/a><\/strong><\/li>\n<\/ul>\n<ul>\n<li><strong><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/01\/gandcrab-ransomware-distributed-by-rig-and-grandsoft-exploit-kits\/\" target=\"_blank\" rel=\"noopener\">MalwareBytes[\/wow_colorme]<\/a><\/strong><\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber-crime has become big business It&#8217;s organised, and the purveyors are shameless in their determination to steal from all of us. Heaven only knows where they get their names from.\u00a0 One group we recently became aware of is called &#8216;PINCHY SPIDER&#8217;, and they are doing something called &#8216;Big Game Hunting&#8217;. Back in January 2018, they [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":3512,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"[header2 text=\"Cyber-crime has become big business\" align=\"left\" color=\"#336A40\" margintop=\"\"]\n\n<strong>It's organised, and the purveyors are shameless in their determination to steal from all of us.<\/strong>\n\n<img class=\"alignright wp-image-3512\" src=\"http:\/\/kinetics.co.nz\/wp-content\/uploads\/2019\/04\/GandCrab.jpg\" alt=\"\" width=\"260\" height=\"170\" \/>\n\nHeaven only knows where they get their names from.\u00a0 One group we recently became aware of is called 'PINCHY SPIDER', and they are doing something called 'Big Game Hunting'.\n\nBack in\u00a0\u00a0[wow_colorme]<a href=\"https:\/\/www.zdnet.com\/article\/ransomware-crooks-test-a-new-way-to-spread-their-malware\/\" target=\"_blank\" rel=\"noopener\">January 2018, they created a ransomware[\/wow_colorme]<\/a> toolkit called GandCrab.\u00a0 While most ransomware today spreads through SPAM email, this uses an older technique.\u00a0 It uses an exploit kit to spread, mainly through infecting websites, then taking advantage of vulnerabilities in common software like Internet Explorer, Chrome, Java and Flash.\u00a0 Where it is particularly effective is that it then lies in wait.\u00a0 If it can sense other computers on a local network, then it uses Remote Desktop Protocol\u00a0 (that's the same RDP that most of us use for remote access to work) to attack them and spread further.\n\n[wow_spacing size=\"-20px\"]\n\n[header2 text=\"Big Game Hunting\" align=\"left\" color=\"#336A40\" margintop=\"\"]\n\n[wow_spacing size=\"-10px\"]\n\n<strong>Now it seems that they have refined their model. \u00a0 <\/strong>\n\nThey work with 'affiliates' for a share of the ransom.\u00a0 It's reported the PINCHY SPIDER people take 40% of the profits, with the affiliate 'earning' the rest for what is described a surgical strike.\u00a0 <strong>Yes, they are franchising cyber-crime!<\/strong><strong>\u00a0<\/strong>These affiliates target an organisation, crafting their attacks, refining their knowledge of the target until they succeed.\n\nIt seems that once they penetrate the target, they then quietly work laterally to get their evil software onto the machines that will cause the most harm, whether that's a server or a set of specific PCs.\u00a0 They want to minimise the trail they leave behind, making it hard for the security software people to find ways to identify their footprints, and they may even manually remove their software from less-valuable machines as they move through the organisation. \u00a0 If they encounter roadblocks, it seems they also manually work through these, removing or disabling all, or part, of your security tools until they can continue spreading their infection.\n\n<strong>These are carefully crafted attacks.\u00a0 <\/strong>They reconnoitre their victims and plan their attacks.\u00a0 They sneak around your system until they are ready, then they strike.\n<h4>What can you do?<\/h4>\n<ul>\n \t<li>Firstly, <strong>these exploits only work on machines that have vulnerabilities.<\/strong>\u00a0 Regular patching updates is more important than ever, and systems like<strong> [wow_colorme]<a href=\"http:\/\/kinetics.co.nz\/proactive-network-maintenance\/\" target=\"_blank\" rel=\"noopener\">KARE[\/wow_colorme]<\/a><\/strong> are vital (needs to be our <strong>[wow_colorme]<a href=\"http:\/\/kinetics.co.nz\/proactive-network-maintenance\/\" target=\"_blank\" rel=\"noopener\">Core Fundamentals' or 'Premium KARE' plans[\/wow_colorme]<\/a><\/strong>) and you need regular reports so you know ALL your devices are protected. \u00a0 This isn't infallible though - vulnerabilities are discovered and fixed all the time, so there is always a risk of a 'zero-day' exploit where the vulnerability is discovered and used before the updates are available.<\/li>\n \t<li><strong>Make sure your antivirus and anti-malware is up to date<\/strong> and do <strong>'[wow_colorme]<a href=\"http:\/\/kinetics.co.nz\/deepscan-antivirus-and-antimalware\/\" target=\"_blank\" rel=\"noopener\">deep scanning[\/wow_colorme]<\/a>'<\/strong>.\u00a0 This can have impacts on your operations depending on the software you use, so it needs to be done carefully.<\/li>\n \t<li><strong>Apply a [wow_colorme]<a href=\"http:\/\/kinetics.co.nz\/zero-trust-networking-for-real-business\/\" target=\"_blank\" rel=\"noopener\">'zero-trust<\/a>'[\/wow_colorme] stance to your IT<\/strong>, protecting not just the boarder of your organisation but also within it to reduce the surface area open to an attacker - creating those obstacles that slow them down or turn them away.<\/li>\n \t<li><strong>Use a [wow_colorme]<a href=\"http:\/\/kinetics.co.nz\/dodging-dodgy-websites\/\" target=\"_blank\" rel=\"noopener\">URL-Protection service[\/wow_colorme]<\/a><\/strong> to reduce the chances of accidentally opening a compromised (exploited) website.<\/li>\n \t<li><strong>Use multi-factor authentication<\/strong> to require tokens, commonly approving access from your phone apps, as well as a username and password<\/li>\n \t<li><strong>Regular back-ups<\/strong>, especially 'air-gapped' backups where you have regular copies of your data that is physically separate and unplugged from your systems.<\/li>\n<\/ul>\nUnfortunately, none of these steps are fool-proof.\u00a0 They are all layers.\u00a0 For example, even backups are compromised if they are connected to your system and become encrypted themselves.\u00a0 Likewise, if the compromised software doesn't activate straightaway, then it might hide, dormant, even on your backups.\n\nHowever you do need to take all reasonable steps, which is the stance we've taken with our <strong>[wow_colorme]<a href=\"http:\/\/kinetics.co.nz\/kare-for-security\/\" target=\"_blank\" rel=\"noopener\">KARE for Security[\/wow_colorme]<\/a><\/strong> service and you need to look at<strong> [wow_colorme]<a href=\"http:\/\/kinetics.co.nz\/three-cyber-insurance-questions-you-need-to-consider\/\" target=\"_blank\" rel=\"noopener\">cyber-insurance<\/a>.[\/wow_colorme]<\/strong>\n\n<strong>If you want to read more:<\/strong>\n<ul>\n \t<li><strong>[wow_colorme]<a href=\"https:\/\/cyware.com\/news\/pinchy-spider-adopts-big-game-hunting-to-distribute-gandcrab-7f6ac01a\/\" target=\"_blank\" rel=\"noopener\">CYWare<\/a>[\/wow_colorme]<\/strong><\/li>\n<\/ul>\n<strong>[wow_spacing size=\"-10px\"]<\/strong>\n<ul>\n \t<li><strong>[wow_colorme]<a href=\"https:\/\/www.scmagazine.com\/home\/security-news\/ransomware\/pinchy-spider-goes-big-game-hunting-with-gandcrab\/\" target=\"_blank\" rel=\"noopener\">SCMagazine.Com\u00a0<\/a>[\/wow_colorme]<\/strong><\/li>\n<\/ul>\n<strong>[wow_spacing size=\"-10px\"]<\/strong>\n<ul>\n \t<li><strong>[wow_colorme]<a href=\"https:\/\/www.crowdstrike.com\/blog\/pinchy-spider-adopts-big-game-hunting\/\" target=\"_blank\" rel=\"noopener\">CrowdStrike[\/wow_colorme]<\/a><\/strong><\/li>\n<\/ul>\n<strong>[wow_spacing size=\"-10px\"]<\/strong>\n<ul>\n \t<li><strong>[wow_colorme]<a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/01\/gandcrab-ransomware-distributed-by-rig-and-grandsoft-exploit-kits\/\" target=\"_blank\" rel=\"noopener\">MalwareBytes[\/wow_colorme]<\/a><\/strong><\/li>\n<\/ul>","_et_gb_content_width":"","footnotes":""},"categories":[4],"tags":[],"class_list":["post-3506","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/3506","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3506"}],"version-history":[{"count":0,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/3506\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3506"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3506"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3506"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}