{"id":864,"date":"2021-08-04T09:23:00","date_gmt":"2021-08-04T09:23:00","guid":{"rendered":"https:\/\/dev.cryptoloc.au\/?p=864"},"modified":"2023-10-03T06:19:54","modified_gmt":"2023-10-03T06:19:54","slug":"the-new-cartels-whos-behind-the-rise-in-cyber-crime","status":"publish","type":"post","link":"https:\/\/127.0.0.1\/the-new-cartels-whos-behind-the-rise-in-cyber-crime\/","title":{"rendered":"The new cartels: Who\u2019s behind the rise in cyber crime?"},"content":{"rendered":"\n
Forget the Hollywood stereotype of the lone hacker living in his mother\u2019s basement and plotting his revenge against the world. Today\u2019s cyber criminals are organised, sophisticated and sometimes state-sponsored. <\/strong><\/p>\n\n\n\n US officials have confirmed the world\u2019s worst kept secret \u2013 that hackers tied to the Chinese government were responsible for the massive Microsoft Exchange hack earlier this year, thought to be one of the largest cyber attacks in history. <\/p>\n\n\n\n Hackers contracted by China\u2019s Ministry of State Security are believed to have gained access to the email systems of tens of thousands of private users and public entities, including schools, hospitals and city councils. <\/p>\n\n\n\n Microsoft blamed the attack<\/a> on state-sponsored hackers operating out of China at the time, but it\u2019s taken until now for the US and its global allies \u2013 including Australia, the UK and the EU \u2013 to formally accuse and publicly condemn China for the attacks. <\/p>\n\n\n\n Of course, the Microsoft Exchange breach is just part of a recent uptick in cyber crime, which has seen a 200 per cent increase<\/a> in reports of ransomware to the Australian Cyber Security Centre in recent months. <\/p>\n\n\n\n So how did cyber crime become such serious business, and who\u2019s behind the malware that\u2019s enabling it?<\/p>\n\n\n\n Ransomware \u2013 a form of malware that encrypts the victim\u2019s files, enabling the attacker to demand a ransom for their return \u2013 has come a long way since the early days of the AIDS Trojan in 1989. <\/p>\n\n\n\n The first known instance of ransomware, the AIDS Trojan hid files on the user\u2019s hard drive and only encrypted their names, not the files themselves. It displayed a message demanding a payment of US$189 to the \u2018PC Cyborg Corporation\u2019 in return for the repair tool \u2013 which was actually completely unnecessary, because the decryption key could be extracted from the code of the Trojan itself. <\/p>\n\n\n\n Hackers tied to the Chinese government were responsible for the massive Microsoft Exchange hack earlier this year.<\/p>\n\n\n\n Dr Joseph Popp was identified as the author of the AIDS Trojan and charged with blackmail. A Harvard-trained evolutionary biologist who collaborated with the AMREF Flying Doctors and consulted for the WHO in Kenya, Popp had actually organised a conference for the Global AIDS Program the same year he created the AIDS Trojan, and later promised to donate the profits from the AIDS Trojan to fund actual AIDS research. (He was ultimately declared mentally unfit to stand trial.) <\/p>\n\n\n\n Much like low-rise jeans, trucker hats and velour tracksuits, it wasn\u2019t until the early-to-mid 2000s that ransomware really began to take hold. Trojans known as GPCode, TROJ.RANSOM.A, Archiveus, Krotten, Cryzip, and MayArchive began using more sophisticated encryption schemes \u2013 by June 2008, GPCode was using a 1024-bit RSA public key, which would have taken computers at the time roughly two million years to crack. <\/p>\n\n\n\n The decentralised and anonymous nature of Bitcoin made the digital currency an instant favourite with cyber criminals, which led to the creators of CryptoLocker (no relation) collecting roughly US$27 million with their ransomware. A string of copycat variants with names like CryptoLocker 2.0 and CryptoBlocker followed, all with roughly the same MO \u2013 the victim would have three days to pay a bitcoin ransom, or the files would be deleted. <\/p>\n\n\n\n These early ransomware techniques all relied on the desire of victims to get their files back to motivate them to pay the ransom. But the current ransomware technique du jour<\/em>, \u2018double extortion\u2019, puts a twist on the formula. In a double extortion attack, the criminals don\u2019t just encrypt the victim\u2019s data, but they also copy it to a server of their own. <\/p>\n\n\n\n That way, even once the victim pays the ransom to decrypt the data, the criminals still have their copy, and can demand a second ransom \u2013 a double extortion, if you will \u2013 by threatening to leak it publicly. <\/p>\n\n\n\n Ransomware group REvil were the first to use the double extortion tactic in June 2020, when they began auctioning off data stolen from a Canadian agricultural production company<\/a> that refused to meet their ransom demands. But since then, a number of ransomware groups have adopted the tactic. <\/p>\n\n\n\n Particular ransomware strains have traditionally been associated with particular ransomware groups, who would dissolve after a few big scores and then re-emerge with a new name. <\/p>\n\n\n\n But now, according to a recent report by cyber risk analytics provider CyberCube<\/a>, these groups have evolved into cyber \u2018cartels\u2019 that operate much like the mafia, collaborating as affiliates to infiltrate their targets\u2019 networks. They share resources, pass on stolen data and attack information, and have even developed a Ransomware-as-a-Service model, sharing their wares with lone scammers in return for a slice of their profits. <\/p>\n\n\n\n Under the Ransomware-as-a-Service model, newcomers to the ransomware scene don\u2019t need to have the know-how to develop their own malware, so even the most technically challenged cyber criminal can get amongst it. They\u2019re not likely to pull off big scores on their own, but the relatively small amounts they extort from individuals add up \u2013 a new Australian Institute of Criminology report<\/a> estimated the total annual economic impact of cyber crime at $3.5 billion in Australia alone, with $1.9 billion lost by individual victims. <\/p>\n\n\n\n High-profile cyber gangs include: <\/p>\n\n\n\n Cyber gangs are one thing \u2013 but it now appears that at least some of these gangs are on the payroll of rogue governments, and operating at their behest.<\/p>\n\n\n\n The United States took the unprecedented step of formally attributing the Microsoft Exchange attack to hackers affiliated with China\u2019s Ministry of State Security this month, and charging four Chinese nationals \u2013 three security officials and one contract hacker \u2013 for their role in it. <\/p>\n\n\n\n Pulling no punches, US Secretary of State Anthony Blinken directly accused China of fostering an ecosystem of criminal contract hackers to carry out state-sponsored activities and extort businesses for their own financial gain. <\/p>\n\n\n\n \u201cThese contract hackers cost governments and businesses billions of dollars in stolen intellectual property, ransom payments, and cyber security mitigation efforts, all while the Ministry of State Security had them on its payroll,\u201d Blinken said. <\/p>\n\n\n\n The US was joined by allies Australia<\/a>, Canada, Japan, the United Kingdom, New Zealand and the European Union in calling out the Chinese government.<\/p>\n\n\n\n The working theory is that hackers working at the behest of Chinese intelligence learned about Microsoft\u2019s vulnerability in early January. When they learned that Microsoft intended to patch or close the vulnerability shortly, they shared it with other China-based groups, helping them hack Microsoft like a sinister version of Clippy the Office Assistant. This effectively escalated the attack from your typical espionage operation to a smash-and-grab raid. <\/p>\n\n\n\n US Secretary of State Anthony Blinken directly accused China of fostering an ecosystem of criminal contract hackers.<\/p>\n\n\n\n By the time Microsoft closed the vulnerability in March, about a quarter of a million email systems around the world had been exposed, and at least 30,000 had been compromised, including schools, hospitals, cities and pharmacies. <\/p>\n\n\n\n According to a memo released by the White House, hackers linked to China are still \u201caggressively\u201d targeting US and allied defence and semiconductor firms, as well as medical institutions and universities, with the intent of stealing their data. <\/p>\n\n\n\n This isn\u2019t the first time China has been linked to these sorts of shenanigans. Australia\u2019s decision to name and shame China comes after Prime Minister Scott Morrison warned<\/a> that a state-based actor was behind a series of cyber raids on hospitals, councils and state-owned utilities in June 2020 \u2013 but although Australian security agencies believed China was behind those attacks, Morrison stopped short of identifying them then. <\/p>\n\n\n\n One nation that\u2019s probably happy to see China under the spotlight is Russia, which has tended to get the most attention for these types of attacks. DarkSide, the group that extorted a US$4.4 million ransom from the Colonial Pipeline Company in the US, is believed to be based in Russia<\/a>, although it\u2019s unclear if they\u2019re actually state-sponsored or if Russia simply serves as a \u2018safe haven<\/a>\u2019 for hackers. <\/p>\n\n\n\n Russian hackers are generally considered to have a looser connection to official Russian intelligence agencies than their Chinese counterparts, although sanctions were recently placed on Russia<\/a> for the infamous \u2018Sunburst\u2019 attack on US software company SolarWinds. <\/p>\n\n\n\n The attack affected thousands of governmental and private organisations around the world, and while its full impact is yet to be calculated, it\u2019s been reported to have cost cyber insurance firms at least US$90 million<\/a>. <\/p>\n\n\n\n While China and Russia get the bulk of the publicity, they\u2019re far from the only governments to have been involved in malicious cyber activity. But when nations are involved, the line between cyber crime (bad) and espionage (good?) often becomes murky. <\/p>\n\n\n\n After being accused of cyber crime by most of the free world, China responded with an official statement that called the US \u201cthe world champion of malicious cyber attacks\u201d. <\/p>\n\n\n\n \u201cIt is well known that the US has engaged in unscrupulous, massive and indiscriminate eavesdropping on many countries, including its allies,\u201d the statement read. <\/p>\n\n\n\n \u201cAustralia also has a poor record, including monitoring the mobile phone of the president of its biggest neighbour country<\/a>, not to mention acting as an accomplice for the US\u2019 eavesdropping activities under the framework of the Five Eyes alliance<\/a>. <\/p>\n\n\n\n \u201cWhat the Australian government has done is extremely hypocritical, like a thief crying \u2018stop the thief\u2019,\u201d the statement continued.<\/p>\n\n\n\n At roughly the same time that the US accused China of the Microsoft Exchange attack, a new investigation dubbed \u201cthe Pegasus Project<\/a>\u201d revealed the extent of Israeli technology firm NSO Group\u2019s involvement in targeting thousands of heads of state, activists, journalists and dissidents around the world. <\/p>\n\n\n\n Their Pegasus spyware, which is licensed to foreign governments by the Israeli Ministry of Defence, is said to have enabled human rights violations on a global scale, including the murder of reporter Jamal Kashoggi by agents of the Saudi government with a bone saw in the Saudi Arabian consulate \u2013 a scenario that sounds like a cross between Clue and Cards Against Humanity.<\/p>\n\n\n\n Pegasus infects iPhones and Android devices, allowing operators to extract messages, photos and emails, record calls and secretly activate microphones and cameras. <\/p>\n\n\n\n Of course, you don\u2019t have to be a head of state, a CEO or a crusading reporter to be concerned about cyber crime. The purpose of these attacks is to steal data \u2013 and if you\u2019ve ever been a customer or a client of a targeted organisation, then that includes your<\/em> data. <\/p>\n\n\n\n For instance, the intent of the Microsoft Exchange attack might have been to gather intelligence, but there was little rhyme or reason to who was targeted. The method was simply to hack as many people and organisations as possible in a short time frame and make sense of the data later. <\/p>\n\n\n\n So while Xi Jinping may not harbour a personal vendetta against you, the collateral damage of an attack like this could see your personal data and private records leaked for the world to see, leaving you open to identity theft, phishing attacks, or worse. <\/p>\n\n\n\n The rise in cyber crime, then, is everyone\u2019s<\/em> problem \u2013 no matter who turns out to be behind it. Forget the Hollywood stereotype of the lone hacker living in his mother\u2019s basement and plotting his revenge against the world. Today\u2019s cyber criminals are organised, sophisticated and sometimes state-sponsored. US officials have confirmed the world\u2019s worst kept secret \u2013 that hackers tied to the Chinese government were responsible for the massive Microsoft Exchange hack earlier […]<\/p>\n","protected":false},"author":3,"featured_media":1126,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/864"}],"collection":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/comments?post=864"}],"version-history":[{"count":2,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/864\/revisions"}],"predecessor-version":[{"id":1140,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/864\/revisions\/1140"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/media\/1126"}],"wp:attachment":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/media?parent=864"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/categories?post=864"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/tags?post=864"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}The rise of ransomware<\/h3>\n\n\n\n
Gangs of New Dork <\/h3>\n\n\n\n
\n
Rogue nations <\/h3>\n\n\n\n
Recognised by Forbes as one of the 20 Best Cybersecurity Startups to Watch in 2020, Cryptoloc has developed the world\u2019s strongest encryption technology and the world\u2019s safest cybersecurity platform, ensuring clients have complete control over their data. For more information, visit <\/em>cryptoloc.com<\/em><\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"