By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: Instead of sophisticated attacks, cyber criminals are turning to hacking as a service
Share
Font ResizerAa
TechgoonduTechgoondu
Font ResizerAa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Enterprise > Instead of sophisticated attacks, cyber criminals are turning to hacking as a service
EnterpriseInternet

Instead of sophisticated attacks, cyber criminals are turning to hacking as a service

Alfred Siew
Last updated: August 11, 2017 at 5:53 PM
Alfred Siew
Published: August 11, 2017
5 Min Read
PHOTO: Pexels via Creative Commons

The idea of a sophisticated cyber attack, with careful planning and targeting, has captured the imagination of many organisations now seeking to ward off these online threats.

However, the chances of being hit by a more “regular” attack that makes use of common hacks that are sold in the seamier corners of the Web may be higher, argues Chester
Wisniewski, principal research scientist of cyber security firm Sophos.

Instead of developing or buying an expensive and high-profile exploit that may be swiftly fixed with a patch, he said, many cyber criminals are turning to “hacking as a service”, which lets them customise malware to penetrate victims’ systems using social engineering.

In 2016, many cyber criminals used booby trapped videos or flaws in browsers to attack a victim. This year, they are looking to send an e-mail to a potential victim to hoodwink him into clicking on a link or attachment, thus unwittingly opening up his PC.

“In other words, they trick the victim to open up his own PC, instead of trying to find a flaw in it,” said Wisniewski. This means better returns on investment for criminals, he added, because social engineering is something hard to guard against.

For example, a human resource manager might be sent an e-mail with an actual resume attached, only that it also includes a macro that he might allow to run and open his PC to remote access.

“Why would a criminal pay for US$50,000 for an exploit and it only works for a week? Social engineering is more successful and it’s free,” said Wisniewski.

Another reason for the heightened threat is how well organised the cyber criminal enterprise is today, he noted.

On the Dark Web, a criminal could hire a writer to draft an e-mail that mimicks a legitimate one. A graphic artist can design a website replicating a bank’s, while a translator can help get the message across in the right language to target wealthy consumers around the world.

Finally, there might be a spammer who can deliver the malware-loaded e-mails to actual targets. Some service providers even guarantee that the e-mails will be opened or they will help send another bunch for you – for free, said Wisniewski, who frequently visits such sites for his research.

Another big development is how easy it is for criminals to get in the game. There are now “ransomware as a service” tools that they can buy and start targeting victims with, he added.

Showing Techgoondu one such tool at a recent interview, he demonstrated how a criminal can set the ransom (in Bitcoins), select the encryption method (only disrupt part of a file instead of entire hard drives to save time), encrypt certain file types and even set varying prices for victims from different regions.

Funnily enough, the ransomware tool has a warning to not run the compiled malware program on one’s own computer, so as to avoid being the first unwitting victim.

“Once they have the file, the criminal then gets the spammers to send it out to people and wait to get paid,” said Wisniewski.

Are things going to be more difficult for organisations, especially after the widespread impact of the WannaCry and Petya ransomware of late? Wisniewski believes the good guys have won some important battles.

For example, two major Dark Web marketplaces were taken down last month, disrupting the trade in malware and services, among other criminal enterprises. Arrests have also been made after high-profile attacks, including ones connected to the Mira botnet last year and Yahoo hack earlier.

And it is harder to attack software, said Wisniewski, because of the efforts in recent years by Microsoft, Apple and Google to plug many loopholes that are found.

“Attacking software is too hard so now criminals have turned to attacking people,” he added. “To defend ourselves, we need to know that security is everyone’s job.”

Dell: Robots and drones to drive the cloud market in next decade
Property salesperson to be charged for unsolicited telemarketing messages
A good GenAI chatbot depends on good data structure: Accenture
Thoughts on Blogout ’09
10 things enterprises should know about Windows 10
TAGGED:Chester Wisniewskicyber securityransomwareransomware as a serviceSophos

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link Print
Avatar photo
ByAlfred Siew
Follow:
Alfred is a writer, speaker and media instructor who has covered the telecom, media and technology scene for more than 20 years. Previously the technology correspondent for The Straits Times, he now edits the Techgoondu.com blog and runs his own technology and media consultancy.
Previous Article Most users are willing to pay more for 5G: Gartner
Next Article Top in broadband speeds now, Singapore has moved from laggard to leader
Leave a Comment

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

FacebookLike
XFollow

Latest News

Scammers are so successful they even accidentally scam themselves now
Cybersecurity Internet
June 10, 2025
Doom: The Dark Ages review: Future fantastic demon slaying
Gaming
June 10, 2025
Plaud NotePin review: Note-taking made easy with AI
Internet Mobile
June 9, 2025
Can smart grocery carts, biometric payments boost retailers like FairPrice?
Enterprise Internet
June 6, 2025

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
© 2024 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact
Follow Us!
Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Username or Email Address
    Password

    Lost your password?