Knowing how cybercriminals think – a key factor in modern security strategies

Knowing how cybercriminals think – a key factor in modern security strategies

Working in groups, cybercriminals are becoming better organized and more specialized. Yaroslav Rosomakho, Field CTO at Netskope, recommends a strategy based on learning, collaboration, innovation and cloud security to stop them.

Yaroslav Rosomakho, Field CTO at Netskope

While the C-suite is becoming increasingly aware of the threats bad cyber actors pose, many still harbor an antiquated impression of cybercriminals. We imagine hooded ‘hackers’, working alone in a basement, and of course, the stock image that accompanies the vast majority of media articles about cyberattacks depicts just this.

The reality today is that many threat actors are not rogue operators; they work as part of sophisticated and organized groups, collaborating with other groups within a wider ecosystem of specialists. These groups build significant financial resources over time, derived from the proceeds of commercially-driven attacks, or gathered as payment from states sponsoring or directly commissioning their activities. They use these resources to improve their subsequent attacks, paying for infrastructure or even bribing their targets’ employees to help gain initial entry.

Knowing how these attack groups work is not only interesting, but it also provides invaluable intelligence that can help organizations strengthen their security posture. Knowing what motivates the attackers, how they think and work, and what they are ultimately looking to achieve provides an advantage in front-line defense, strategy planning and – when the worst happens – incident handling.

1) Cybercriminals work collaboratively, which enables them to become specialists

A shopping expedition on the Dark Web will turn up individuals or teams touting their ability in specific elements of the attack kill chain. There are teams who are all about password spraying, others who are entry specialists, yet more who will manage a ransomware attack for any ‘client’ who pays.

They come together in attack groups that evolve regularly, each time adjusting agreed group ethics and approach to reflect internal debate and power struggles. What can we learn from this? Aside from the importance of threat intelligence to keep abreast of trends and live threats, we can learn that collaboration is powerful.

If security teams network and information share – and are prepared to work with the competition in the best interests of everyone – then we too can be nimble, well informed and prepared. And this collaboration is essential within the organization too.

Too often security tools are disconnected from one another and fail to provide the security team with the holistic view necessary to detect a multi-vectored attack kill chain. In order to disrupt highly organized attacks, security teams need to ensure their security tools are tightly integrated and can share relevant intelligence, such as indicators of compromise, in real-time.

2) Malicious actors use cloud infrastructure for their attacks

They do this for a couple of different reasons. Cloud infrastructure is inherently agile; attackers can spin up their infrastructure quickly and inexpensively – then dismantle and start again if their operation is compromised.

They are also drawn to the fact that – by using the very same cloud services as the organizations they are targeting. Traditional security cannot even differentiate between the vital components of Microsoft Office 365, such as instances of Microsoft Teams that the organization has sanctioned, and third-party accounts… so if they are attacking from the cloud they are ‘wolves in sheep’s clothing’ and can often easily walk-through open ports.

What can we learn from this? Embrace cloud security both for its scalability and cost advantage, and because that way your security is much better placed to spot an attack. Apply a Zero Trust approach not only to network access, but also to cloud security and data protection.

3) Bad actors innovate

Many organizations see innovation as being inherently risky – and there are doubtless new risk exposures when you try new things – but the opposite is also true. If your systems, tools and practices are not up to date, then the cybercriminals that are targeting you will run rings around your defense.

Bad actors are always changing their approach and business model; ransomware wasn’t a thing a few years ago and while it now dominates security discussions the attackers are already evolving away from the original ‘pay to unlock the data’ approach into new forms of nuisance, such as threats of public exposure. As we gain some distance and evaluate the first half of 2022 retrospectively, there’s a good chance we will find a complete swing from ransomware to attacks prioritizing disruption, reflecting changed motivations aligning with geo-politics. In the face of this innovation, we cannot stand still in defense.

Keep up to date on trends in attack methodology, and try to think ahead and identify the opportunity before your attacker does so you can cut it off. This might mean simply improving hygiene around patch management, or it could be proactively building better visibility over the ‘mystery corners’ of your IT real estate.

4) Attackers are well funded

I mentioned earlier that there are a few different sources of income for cybercriminals. Some attackers are tactically funded through ransomware wins, or with shops on the Dark Web selling data war-chests or specialist attack services. Others undertake regular ‘salaried’ jobs for nation-states, but everyone behind enemy lines has a clear understanding of the link between money and results.

I recommend that it’s well worth helping your stakeholders understand the funding behind the attackers you are defending against. Even a teenage boy carrying out attacks from their garage is not working for nothing. Attacks are big business.

5) Most attackers are opportunistic.

Everything I have said so far paints a picture of highly calculating and very focused attackers, but the reality is that most are incredibly opportunistic.  They often find their victims by simply scouting for easy opportunities. The learning here is: don’t be the easy hit. Keep your windows and doors shut and, in all probability, the attackers will find an easier target to go after.

The vast majority are not after your organization but after your money. To avoid being hit by these ones you just have to avoid being the easiest target, so good security hygiene is key. There is really no point spending a fortune on expensive firewalls and VPNs if your employees are leaving Google Docs and AWS buckets open in the cloud.

Browse our latest issue

LATAM English

View Magazine Archive