Girl Scouts and OpenText empower future leaders of tomorrow with cyber resilience

The transition to a digital-first world enables us to connect, work and live in a realm where information is available at our fingertips. The children of today will be working in an environment of tomorrow that is shaped by hyperconnectivity. Operating in this...

World Backup Day reminds us all just how precious our data is

Think of all the important files sitting on your computer right now. If your computer crashed tomorrow, would you be able to retrieve your important files? Would your business suffer as a result? As more and more of our daily activities incorporate digital and online...

3 Reasons We Forget Small & Midsized Businesses are Major Targets for Ransomware

The ransomware attacks that make headlines and steer conversations among cybersecurity professionals usually involve major ransoms, huge corporations and notorious hacking groups. Kia Motors, Accenture, Acer, JBS…these companies were some of the largest to be...

How Ransomware Sneaks In

Ransomware has officially made the mainstream. Dramatic headlines announce the latest attacks and news outlets highlight the staggeringly high ransoms businesses pay to retrieve their stolen data. And it’s no wonder why – ransomware attacks are on the rise and the...

An MSP and SMB guide to disaster preparation, recovery and remediation

Introduction It’s important for a business to be prepared with an exercised business continuity and disaster recovery (BC/DR) plan plan before its hit with ransomware so that it can resume operations as quickly as possible. Key steps and solutions should be followed...

Podcast: Cyber resilience in a remote work world

The global pandemic that began to send us packing from our offices in March of last year upended our established way of working overnight. We’re still feeling the effects. Many office workers have yet to return to the office in the volumes they worked in pre-pandemic....

5 Tips to get Better Efficacy out of Your IT Security Stack

If you’re an admin, service provider, security executive, or are otherwise affiliated with the world of IT solutions, then you know that one of the biggest challenges to overcome is efficacy. Especially in terms of cybersecurity, efficacy is something of an amorphous...

How Cryptocurrency and Cybercrime Trends Influence One Another

Typically, when cryptocurrency values change, one would expect to see changes in crypto-related cybercrime. In particular, trends in Bitcoin values tend to be the bellwether you can use to predict how other currencies’ values will shift, and there are usually...

DIY SIP-based TDoS tool/number validity checker offered for sale

By Dancho Danchev

Over the past year, we observed an increase in publicly available managed TDoS (Telephony Denial of Service) services. We attribute this increase to the achieved ‘malicious economies of scale’ on behalf of the cybercriminals operating them, as well as the overall availability of proprietary/public DIY phone ring/SMS-based TDoS tools.

What are cybercriminals up to in terms of TDoS attack tools? Let’s take a peek inside a recently released DIY SIP-based (Session Initiation Protocol) flood tool, which also has the capacity to validate any given set of phone numbers.

More details: read more…

DIY Russian mobile number harvesting tool spotted in the wild

By Dancho Danchev

Earlier this year we profiled a newly released mobile/phone number harvesting application, a common tool in the arsenal of mobile spammers, as well as vendors of mobile spam services. Since the practice is an inseparable part of the mobile spamming process, cybercriminals continue periodically releasing new mobile number harvesting applications, update their features, but most interestingly, continue exclusively targeting Russian users.

In this post, I’ll profile yet another DIY mobile number harvesting tool available on the underground marketplace since 2011, and emphasize on its most recent (2013) updated feature, namely, the use of proxies.

More details: read more…

A peek inside a (cracked) commercially available RAT (Remote Access Tool)

By Dancho Danchev

In an attempt to add an additional layer of legitimacy to their malicious software, cybercriminals sometimes simply reposition them as Remote Access Tools, also known as R.A.Ts. What they seem to be forgetting is that no legitimate Remote Access Tool would possess any spreading capabilities, plus, has the capacity to handle tens of thousands of hosts at the same time, or possesses built-in password stealing capabilities. Due to the nature of these programs, they have also become known as Remote Access (or Admin) Trojans.

Pitched by its author as a Remote Access Tool, the DIY (do it yourself) malware that I’ll profile in this post is currently cracked, and available for both novice, and experienced cybercriminals to take advantage of at selected cybercrime-friendly communities.

More details:

The first time we came across the underground market ad promoting the availability of the DIY malware was in June 2012 and offered for sale for $1,000. Then in October 2012, a cracked and fully working version of the DIY malware leaked on multiple cybercrime-friendly communities, potentially undermining the monetization attempted by its author.

The Web/Client based release has numerous features, presented in a point-and-click fashion, potentially empowering novice cybercriminals with a versatile set of online spying capabilities. Let’s go through some screenshots to demonstrate the capabilities of this particular (cracked) underground market release.

Sample screenshot of the DIY Web/Client based malware:

Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit

Sample screenshot of the DIY Web/Client based malware:

Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_01

Sample screenshot of the DIY Web/Client based malware:

Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_02

Sample screenshot of the DIY Web/Client based malware:

Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_03

Sample screenshot of the DIY Web/Client based malware:

Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_04

Sample screenshot of the DIY Web/Client based malware:

Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_05

Sample screenshot of the DIY Web/Client based malware:

Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_06

Sample screenshot of the DIY Web/Client based malware:

Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_07

Sample screenshot of the DIY Web/Client based malware:

Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_08

Sample screenshot of the DIY Web/Client based malware:

Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_09

Sample screenshot of the DIY Web/Client based malware:

Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_10

Sample screenshot of the DIY Web/Client based malware:

Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_11

Sample screenshot of the DIY Web/Client based malware:

Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_12

Sample screenshot of the DIY Web/Client based malware:

Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_13

Sample screenshot of the DIY Web/Client based malware:

Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_14

Sample screenshot of the DIY Web/Client based malware:

Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_15

Sample screenshot of the DIY Web/Client based malware:

commercial_private_rat_remote_access_tool_trojan_horse_malware_rootkit_16

Sample screenshot of the DIY Web/Client based malware:

commercial_private_rat_remote_access_tool_trojan_horse_malware_rootkit_17

Sample screenshot of the DIY Web/Client based malware:

commercial_private_rat_remote_access_tool_trojan_horse_malware_rootkit_18

Sample screenshot of the DIY Web/Client based malware:

commercial_private_rat_remote_access_tool_trojan_horse_malware_rootkit_19

Sample screenshot of the DIY Web/Client based malware:

Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_20

Cracked malware releases either cease to exist since the cybercriminal behind them has failed to monetize his release in the initial phrase, continue being developed as private releases, or become adopted by novice cybercriminals taking advantage of today’s managed malware crypting services to ensure that the actual payload remains undetected before it is distributed to the intended target(s).

We’ll continue monitoring the development of this RAT software/DIY malware, in particular, whether or not its developer will continue working on it, now that there are leaked versions of it available online.

You can find more about Dancho Danchev at his LinkedIn Profile. You can also follow him on Twitter.

How mobile spammers verify the validity of harvested phone numbers – part two

Just as we anticipated earlier this year in our “How mobile spammers verify the validity of harvested phone number” post, mobile spammers and cybercriminals in general will continue ensuring that QA (Quality Assurance) is applied to their upcoming campaigns. This is done in an attempt to both successfully reach a wider audience and to charge a higher price for a verified database of mobile numbers.

In this post I’ll profile yet another commercially available phone/mobile number verification tool that’s exclusively supporting Huawei 3G USB modems.

More details: read more…

Cybercriminals offer spam-friendly SMTP servers for rent

In times when modern cybercriminals take advantage of the built-in SMTP engines in their malware platforms, as well as efficient and systematic abuse of Web-based email service providers for mass mailing fraudulent or malicious campaigns, others seem to be interested in the resurrection of an outdated, but still highly effective way to send spam, namely, through spam-friendly SMTP servers.

In this post, I’ll profile a recently posted underground market ad for spam-friendly SMTP servers, offered for sale for $30 on a monthly basis.

More details: read more…

American Airlines ‘You can download your ticket’ themed emails lead to malware

By Dancho Danchev

Cybercriminals are currently spamvertising tens of thousands of emails impersonating American Airlines in an attempt to trick its customers into thinking that they’ve received a download link for their E-ticket. Once they download and execute the malicious attachment, their PCs automatically join the botnet operated by the cybercriminal/gang of cybercriminals behind the campaign.

More details:

read more…

BitCoin Jackers Ask: “What’s in Your Wallet?”

By Adam McNeil

BitCoinJacker-StealMeMoney

With all the recent media coverage and extreme changes of the BitCoin value, it should come as no surprise that malware authors are trying to capitalize on the trends.  These people attempt to make money on all sorts of digital transactions and it’s probably a safe bet to expect their rapid expansion into the up-and-coming Digital Currency market.

The Webroot Threat Research Department has already seen many malware campaigns targeting BitCoin users.  The recent explosion (and subsequent implosion) of the BitCoin value has expedited the need for custom compiled BitCoin harvesters and the malware authors are happy to abide.

More details: read more…

A peek inside a ‘life cycle aware’ underground market ad for a private keylogger

By Dancho Danchev

What’s greed to some cybercriminals, is profit maximization to others, especially in times when we’re witnessing the maturing state of the modern cybercrime ‘enterprise’. Many enter this vibrant marketplace as vendors without really realizing that, thanks to the increasing transparency within the cybercrime ecosystem, their basic and valued added services will be directly benchmarked against a competing vendor, sometime rendering their unique value proposition completely irrelevant. Others will take a different approach by releasing a ‘life cycle aware’ underground market ad and will still manage to generate some revenue, as well as secure a decent number of customers in the long-term.

In this post, I’ll profile a ‘life cycle aware’ underground market ad for a private keylogger, relying on a limited number of licenses for its business model.

More details:

read more…

Spamvertised ‘Your order for helicopter for the weekend’ themed emails lead to malware

Cybercriminals are currently mass mailing tens of thousands of emails, in an attempt to trick users into thinking that the order for their “air transportation services has been accepted and processed”. In reality though, once users execute the malicious attachments, their PCs will automatically become part of the botnet managed by the malicious actors.

More details: read more…

DIY Skype ring flooder offered for sale

Thanks to the ease of generating a botnet, in 2013, stolen accounting data on a mass scale is a no longer a hot underground item, it’s a commodity, one that’s being offered by virtually all participants in the cybercrime ecosystem.

What happens once a Skype account gets compromised? There are several possible scenarios. The cybercriminals that (automatically) compromised it will either use the Skype credit for their own purposes, start spreading malware to the friends/colleagues of the compromised victim, or feed the accounting data into their arsenal of tools and tactics for launching TDoS (Telephony Denial of Service) services.

In this post, I’ll profile a novice cybercriminal’s underground market proposition, consisting of a DIY Skype ring flooder+training+a small amount of credit on a Skype account available in the package, and emphasize on why this particular release will never gain any market share, compared to the sophisticated and publicly available managed services.

More details:

read more…

A peek inside the ‘Zerokit/0kit/ring0 bundle’ bootkit

In a diversified underground marketplace, where multiple market players interact with one another on a daily basis, there are the “me too” developers, and the true “innovators” whose releases have the potential to cause widespread damage, ultimately resulting in huge financial losses internationally.

In this post, I’ll profile one such underground market release known as as “Zerokit, 0kit or the ring0 bundle” bootkit which was originally advertised at a popular invite-only/vetted cybercrime-friendly community back in 2011. I’ll emphasize on its core features, offer an inside peek into its administration panel, and discuss the novel “licensing” scheme used by its author, namely, to offer access to the bootkit in exchange for tens of thousands of malware-infected hosts on a monthly basis.

More details:

read more…

Cybercriminals selling valid ‘business card’ data of company executives across multiple verticals

Over the last couple of years, the industry’s and the media’s attention has been shifting from mass widespread malware campaigns to targeted attacks most commonly targeting human rights organizations, governments and the military, also known as advanced persistent threats (APTs).

In this post, I’ll profile a recently spotted underground market advertisement, which basically offers a Microsoft Access file of data belonging to executives within major companies such as Audi, Ralph Lauren, Bentley, Breitling, Porsche, Avito, Marc Jacobs, Ralph Lauren, Live Nation, Societe Generale, Bloomberg, Technip, Carlsberg, Coca-Cola, etc., obtained primarily through valid business cards.

More details: read more…