Results 1 to 20 of 112

Thread: Malware & other nasty IT / cyber things

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    Last posting that I find critical as I and my company have moved into this research area over the last year and it is massive...especially on the botnet side of the Deep Net.....AND how those botnets are being tied into the Russian hacking and information war with the West....if these botnets are not pushing info war messaging...then they are into spamming...phishing and DDoS attacks.....and then back to info warfare messaging....depending on need and end user tasking's....

    Security firm Flashpoint published an interesting paper titled, "Cybercrime Economy: An Analysis of Cybercriminal Communication Strategies" about cybercriminal communications of threat actors.

    A recent research by the threat intelligence firm Flashpoint has uncovered how malicious threat actors communicate to share information between them.
    The research has found out that there is a growing economy in the cybercriminals communications, more than just information sharing it has formed an ecosystem in which the failures, successes, planning and procedures to beat the organization’s countermeasures are shared as well as the planning of attacks.
    The research points out that Cybercriminal Communications use a variety of software alongside with the access to communities in the deep and dark web. This is done in order to carry out cross domain organization for commit crimes like phishing, credit card fraud, spam, and every sort of attack that pass through the corporations’ filters and defenses.

    The reason for the use of this software to communicate is too make it to difficult law enforcement agencies to track the activities in the community’s forums as well as to give privacy to the user since most of these programs have cryptographic functions or protocols operating in its core. The software also allows a user to enter random, aleatory or even fraudulent information about the user which makes it more difficult, in determining who the user is.
    On the other hand, one other reason for doing so is the payment required to maintain a forum, which in many cases can represent a difficultly for cybercriminals. The use of communications programs is free of charge and anyone can download them.
    The study was carried out by monitoring underground communities where the users often invited other members to discuss the planning outside the underground forum. It was analyzed 80 instant messengers applications and protocols, of which at least five were more used.
    Privacy is implemented in these applications, like PGP an algorithm of encryption. The secure communication of user’s difficulty authorities to gain access to the content shared between the users. Without knowing the encryption key that has generated the codification for the session.
    The most used programs by cybercriminals are ICQ, Skype, Jaber, Quiet Internet Pager, Pretty Good Privacy, Pidgin, PSI and AOL Instant Messenger (AIM).
    The report shows that the use of Cybercriminal Communications#is different among communities of different languages, below are reported “Language Group Specific Findings” for Russians we have the following situation:
    1. Jabber (28.3%) 2. Skype (24.26) 3. ICQ (18.74%) 4. Telegram (16.39%) 5. WhatsApp (3.93%) 6. PGP (3.79%) 7. Viber (3.01%) 8. Signal (1.58%)
    while for the Chinese we have the following distribution in 2016: 1. QQ (63.33%) 2. WeChat (35.58%) 3. Skype (0.44%) 4. WhatsApp (0.22%) 5. Jabber (0.31%) 6. PGP (0.13%) 7. ICQ (0.1%) 8. AOL Instant Messenger (0.08%)
    “Cybercriminals can choose from a wide variety of platforms to conduct their peer-to-peer (P2P) communications.” states the report. “This choice is typically influenced by a combination of factors, which can include:
    Ease of use
    Country and/or Language
    Security and/or anonymity concerns
    Sources:
    http://www.securityweek.com/many-cyb...ications-study
    http://www.ibtimes.co.uk/skype-whats...online-1617822
    http://www.itnews.com/article/319083...r-and-icq.html
    http://www.infoworld.com/article/319...ver-skype.html
    https://www.flashpoint-intel.com/blo...on-strategies/
    BTW...Jabber was the preferred chat of choice for the US Army intel side for years....
    Attached Images Attached Images
    Last edited by OUTLAW 09; 04-22-2017 at 08:30 AM.

Similar Threads

  1. Russo-Ukraine War 2016 (April-June)
    By davidbfpo in forum Europe
    Replies: 1088
    Last Post: 07-01-2016, 08:44 PM
  2. Leadership of Cyber Warriors: Enduring Principles and New Directions
    By SWJ Blog in forum Media, Information & Cyber Warriors
    Replies: 0
    Last Post: 07-11-2011, 02:41 PM
  3. USAF Cyber Command (catch all)
    By selil in forum Media, Information & Cyber Warriors
    Replies: 150
    Last Post: 03-15-2011, 09:50 PM
  4. Replies: 51
    Last Post: 01-08-2011, 07:42 PM
  5. Question 5: Cyber space (oh you know I had to ask at least one of these)
    By selil in forum TRADOC Senior Leaders Conference
    Replies: 7
    Last Post: 08-14-2009, 03:27 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •