Skip to content
info@johnstek.com Corporate HQ: Coral Gables, FL, USA +1.786.375.9020 Latin American HQ: Asuncion, Paraguay +595.213.277.395
Search:
Search
JohnsTek
Strategic Technology Engineering
JohnsTekJohnsTek
  • About
  • Products & Services
  • Cyber Risk
    • Managed Security Services Provider (MSSP)
    • Cyber Risk Management Solution
  • Markets
    • Commercial
    • Government
  • Resource Center
  • Contact
  • About
  • Products & Services
  • Cyber Risk
    • Managed Security Services Provider (MSSP)
    • Cyber Risk Management Solution
  • Markets
    • Commercial
    • Government
  • Resource Center
  • Contact

Criminal Hacker Organizations Offer Great Customer Service

You are here:
  1. Home
  2. Blog
  3. Criminal Hacker Organizations Offer Great…
Mar262018
BlogCyberSecurityCybersecurity

Date/Time of Report – 2018-22-3 14:30

APT/Vector Name – Criminal Hacker Organizations, Ransomware-as-a-service (RaaS), Malware-as-a-service (MaaS)

Examples – Raas; Cerber, Satan, Hostman, Flux, Atom – MaaS; WannaCry

Purpose/Target – Financial remuneration, intellectual challenges, vengeance against certain organizations, alleviation of boredom, and social gains

Method – Most commonly spear-phishing

Source – First seen from Russia over a decade ago, now worldwide global organizations

APT/Vector Intelligence Summary – Criminal Hacker Organizations consist of three levels; developers, distributers, and buyers. In some cases, developers are elite malware engineers and in other cases developers are simply following client demands unaware their code will end up being used for malicious purposes. Distributers sell these malware services on the dark web. Distributors market their products in hacker forums on the dark web advertising the customizable features and user friendliness of their offerings. Buyers can be disgruntled employees, or criminals looking to achieve financial gain, however the U.S. Government has become the biggest buyer of hacking tools and uses them primarily to infiltrate computer networks overseas. Malware services can be purchased for as little as $45, they come with user friendly interfaces where you can customize and deploy your attack and even comes with metric interfaces where buyers can track their “success.” Companies like Facebook pay a minimum of $500 if hackers are able to penetrate their systems so we also find instances where malware is purchased and used to claim those rewards.

References

www.blog.barkly.com

resources.infosecinstitute.com

Analyst Notes – Preventing the loading of malware and ransomware starts with educating employees especially on email safety.

Remediation/Avoidance Recommendation – Pre-execution; antivirus, email filtering, URL blocking, whitelisting. Runtime; runtime malware defense. Damage; incident detection, malware removal, backups. Runtime malware defense (such as Barkly) is a program running in real time which detects and blocks behaviors rather than file signatures allowing them to stop newly created ransomware that has never been seen before.

 

Please contact us for more information!

Author:  Scott A. Johnston and Brooke Price
Scott A. Johnston is the President and Founder of JohnsTek, Incorporated.
Brooke Price is a Cybersecurity Analyst in the JohnsTek Miami Security Operations Center.
www.johnstek.com
@JOHNSTEK (Twitter)
Categories: Blog, CyberSecurityBy Scott JohnstonMarch 26, 2018
Tags: Cyber Risk ManagementCybersecurityHackerJohnsTekVulnerability Assessment

Author: Scott Johnston

https://johnstek.com

Post navigation

PreviousPrevious post:Fancy Bear Russian Cyber Attacks On the USNextNext post:BlackTDS Malvertisements On The Rise

Related posts

CyberShield
Stay Secure During the Holiday Season!
December 13, 2020
Cafe Photo
Data Protection In Cafes And Restaurants
February 10, 2019
JohnsTek Capability Statement 2019
February 9, 2019
EOC_ops
Five Things Local Governments Can Do Now To Prepare For Disaster Response
January 11, 2019
Cyber_Pentagon_Transparent
Five Things You Can Do Now To Implement Or Improve Cybersecurity
January 8, 2019
IBM_JohnsTek
JohnsTek Partners with IBM Security!
November 19, 2018
Shortcuts
  • About Us
  • Offerings
  • Products & Services
  • Commercial
  • Government
  • Privacy
  • Terms
JohnsTek News
  • CyberShield
    Stay Secure During the Holiday Season!
    December 13, 2020
  • Cafe Photo
    Data Protection In Cafes And Restaurants
    February 10, 2019
  • JohnsTek Capability Statement 2019
    February 9, 2019
Security Alerts
  • Alert Dispatch 23JUN17 ~ By JohnsTek
    June 23, 2017
  • Alert Dispatch 5JUN17 ~ By JohnsTek
    June 5, 2017
  • Alert Dispatch 18MAY17 ~ By JohnsTek
    May 18, 2017
Intel Brief
  • The Intel Brief 02OCT17 ~ By JohnsTek
    September 28, 2017
  • The Intel Brief 16AUG17 ~ By JohnsTek
    August 16, 2017
  • The Intel Brief 16JUN17 ~ By JohnsTek
    June 16, 2017
Press Releases
  • JohnsTek Capability Statement 2019
    February 9, 2019
  • IBM_JohnsTek
    JohnsTek Partners with IBM Security!
    November 19, 2018
  • Veterans Day
    JOHNSTEK WISHES YOU A HAPPY VETERAN’S DAY!
    November 10, 2017
Copyright © 2022 JohnsTek | All Rights Reserved.
  • About Us
  • Offerings
  • Products & Services
  • Commercial
  • Government
  • Privacy
  • Terms
Footer