Jeremys
Essential
- Joined
- 28.09.20
- Messages
- 75
- Reaction score
- 238
- Points
- 18
BlackBerry esperts spoke about the development of the "cybercrime as a service" scheme.
Modern cyberattacks are so well prepared that their methods are used by the authorities of some countries, according to BlackBerry.
In their report, experts warn about the emergence of "cybercrime-as-a-service" schemes, thanks to which government hackers can work with third-party groups in the implementation of various types of campaigns. Such campaigns typically involve phishing and the introduction of malicious software into target networks.
As a result, hackers receive a financial reward, and the authorities of the customer country receive the data of interest or access to the hacked networks. Since hackers use their own infrastructure and methods to conduct a malicious campaign, it is extremely difficult to link such an attack to the customer country.
"The thoughtfulness, complexity, and anonymity of the cybercrime — as-a-service scheme allows the authorities of individual countries to cover themselves with contractors," says the BlackBerry report.
The researchers noted a number of cyber operations of this order — for example, Bahamut. These attacks make it clear how technically sophisticated modern malicious campaigns have become. Recall that in Bahamut, criminals used social engineering, phishing, custom malware, and zero-day vulnerabilities.
Modern cyberattacks are so well prepared that their methods are used by the authorities of some countries, according to BlackBerry.
In their report, experts warn about the emergence of "cybercrime-as-a-service" schemes, thanks to which government hackers can work with third-party groups in the implementation of various types of campaigns. Such campaigns typically involve phishing and the introduction of malicious software into target networks.
As a result, hackers receive a financial reward, and the authorities of the customer country receive the data of interest or access to the hacked networks. Since hackers use their own infrastructure and methods to conduct a malicious campaign, it is extremely difficult to link such an attack to the customer country.
"The thoughtfulness, complexity, and anonymity of the cybercrime — as-a-service scheme allows the authorities of individual countries to cover themselves with contractors," says the BlackBerry report.
The researchers noted a number of cyber operations of this order — for example, Bahamut. These attacks make it clear how technically sophisticated modern malicious campaigns have become. Recall that in Bahamut, criminals used social engineering, phishing, custom malware, and zero-day vulnerabilities.