Cyber Criminals and the Business Insider

Cyber Crime Business Insider

You’re on the morning train on the way to work and take a look at the guy next to you. He’s clean-cut, wearing a crisp suit and holding a leather briefcase just like dozens of others. Just another worker headed to the office, right?. Yes, but not in the way you think he is. That person is going to work but rather than creating reports and spreadsheets, he’s part of a criminal ring dedicated to breaking into corporate networks to steal data and money. Hackers are no longer basement-dwelling weirdos as they are portrayed in Hollywood productions. They’re business people.

Hackers have grown increasingly organized and sophisticated as the years have passed. The reason for this is simple: there are millions of dollars available to them. Thousands of businesses do not have the capital or employee resources to adequately protect sensitive information and make easy marks for enterprising people with computer skills and questionable moral compasses. Like any business, criminals have evolved their practices to promote growth and capitalize on new opportunities.

Black Collar Jobs

cyber criminals

Like any corporation, continuous improvements are made to further successful operations and strengthen results by investing capital. Hackers have done just so. Within the last year, cyber criminals have pocketed more than $24 million dollars from ransomware alone. This is just the beginning. Hackers have used their ill-gotten gains to create livable wages and recruit others to strengthen their operations. One could even call them entrepreneurs, as they are straightforwardly organizing and operating large-scale organizations analogous to those of the corporate world. And with any entrepreneur that sees his or her business going well, they open the opportunity for someone else to jump on the bandwagon. In fact, entrepreneurial hackers have become so successful that they are franchising their ransomware businesses to any wanna-be hacker ready to compromise their values for some quick cash.

In the past, ransomware attacks could point to one cybercriminal doing all the work themselves from building the software to setting up infrastructure to executing the attack. But just as any business evolves, ransomware operations have too, there’s a criminal carrying out each duty essential to a planned attack.

It begins with the ransomware developers, the masterminds behind the Malware itself. They are the builders in the ransomware world that design and create a plethora of attacks ranging from the malware itself to malvertising exploit kits.

Then comes the ransomware operators whose job it is to make sure the malware is downloaded by unsuspecting users. These cybercriminals hackers are the ones who facilitate the attack and lurk around businesses, creating lists of targeted victims and, once ready, inflict their particular brand of devastation. But their duties don’t stop there. They’re also customer service reps.

Everyone knows that with every good business, strong customer service and marketing is key. When businesses learn that they are the victims of a ransomware attack, they have a lot of questions. What happened? How do I pay you? How do I get my files back? Ransomware operators provide victims with a “customer-service line” that can guide them through the entire extortion process. This line quickly guides the victim through the steps necessary to get access to their files back, after paying a “modest” fee of course. The reasoning is simple: by making the process relatively pain-free, hackers improve their chances of getting their victims to pay. In fact, the average ransomware payment is roughly $300 which is not a high barrier for most businesses to clear. What’s a day’s worth of your time worth?

From Anarchy to Structure

The professionalization, franchising and systemization of ransomware activities has given each hacker the ability to focus on and hone their specific trade. As a result, attacks are more effective and targeted than ever before and businesses need to take data protection seriously. While it’s typically used to describe musicians or actors, it’s possible that the hacker community has sold out. The anarchists of yesteryear may have retired their brightly colored mohawks, but they’re being replaced by modern-day professionals that are business people just like you and I.

By Todd O’Boyle

David Fletcher Blown Image
Twitbook.png
Disaster Recovery Plan.png
Data Bed.png
Ray Meiring
Proposal Management Software Benefits Amid the COVID-19 pandemic-induced supply chain and market challenges, 2021 started to course correct, allowing many companies to resume business operations. As a result, request for proposals (RFPs), sales proposals, and ...
The all-new Stellar Repair for MS SQL – an Efficient Tool to Fix SQL Database Corruption
Efficient Tool to Fix SQL Database Corruption SQL database corruption is not uncommon. There are many reasons for SQL database corruption, such as virus infection, bugs in the SQL Server, errors during updates, abrupt system ...
Bi Tools
BI Tools For Data Scientists Many data scientists prefer to use open-source framework to code scripts; after all, it’s something they already trust to work. Business intelligence tools like Qlik Sense, Power BI, or Tableau, ...
Damian Ng
3 Cloud Modernization Challenges There’s no denying that migrating to the cloud unlocks multiple benefits for organizations looking to modernize their IT infrastructure. However, the journey to truly unlock the benefits of the cloud and ...
Sofia Jaramillo
Augmented Reality in Architecture Augmented reality (AR) is a growing field of study and application in the world of architecture. This useful tool can help us visualize architectural designs by superimposing them onto real-world scenes ...
  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.