Otto
Advanced
- Joined
- 22.09.20
- Messages
- 104
- Reaction score
- 423
- Points
- 63
BlackBerry experts talked about the development of the "cybercrime as a service" scheme.
Modern cyberattacks are so well prepared that their methods are used by the authorities of some countries, BlackBerry said.
In their report, experts warn of the emergence of cybercrime-as-a-service schemes, thanks to which government hackers can work with third-party groups in the implementation of various kinds of campaigns. Such campaigns typically include phishing and malware injection into targeted networks.
As a result, hackers receive financial rewards, and the authorities of the customer country receive data of interest or access to hacked networks. Since hackers use their own infrastructure and methods to conduct a malicious campaign, it is extremely difficult to associate such an attack with a customer country.
“The sophistication, complexity and anonymity of the cybercrime as a service scheme allows the authorities of certain countries to hide behind contractors,” reads the BlackBerry report.
Researchers have noted a number of cyber operations of this order - for example, Bahamut. These attacks make it clear how technically sophisticated today's attacker campaigns have become. Recall that in Bahamut, criminals used social engineering, phishing, custom malware, and zero-day vulnerabilities.
Modern cyberattacks are so well prepared that their methods are used by the authorities of some countries, BlackBerry said.
In their report, experts warn of the emergence of cybercrime-as-a-service schemes, thanks to which government hackers can work with third-party groups in the implementation of various kinds of campaigns. Such campaigns typically include phishing and malware injection into targeted networks.
As a result, hackers receive financial rewards, and the authorities of the customer country receive data of interest or access to hacked networks. Since hackers use their own infrastructure and methods to conduct a malicious campaign, it is extremely difficult to associate such an attack with a customer country.
“The sophistication, complexity and anonymity of the cybercrime as a service scheme allows the authorities of certain countries to hide behind contractors,” reads the BlackBerry report.
Researchers have noted a number of cyber operations of this order - for example, Bahamut. These attacks make it clear how technically sophisticated today's attacker campaigns have become. Recall that in Bahamut, criminals used social engineering, phishing, custom malware, and zero-day vulnerabilities.