CIO Influence
CIO Influence News Networking Security

Thriving Access as a Service Cybercrime Market Fuels Ransomware Attacks

Thriving Access as a Service Cybercrime Market Fuels Ransomware Attacks
Trend Micro Research highlights the importance of securing enterprise credentials

Trend Micro Incorporated, a global cybersecurity leader, released new research detailing the murky cybercrime supply chain behind much of the recent surge in ransomware attacks. Demand has increased so much over the past two years that many cybercriminal markets now have their own “Access-as-a-Service” sections.

“Media and corporate cybersecurity attention have been focused only on the ransomware payload when we need to focus first on mitigating the activity of initial access brokers,” said David Sancho, senior threat researcher for Trend Micro. “Incident responders often need to investigate two or more overlapping attack chains to identify the root cause of a ransomware attack, which often complicates the overall IR process. Teams could get ahead of this issue by monitoring for activity by Access Brokers who steal and sell enterprise network access – essentially cutting off the supply for ransomware actors.”

The research is based on an analysis of over 900 access broker listings from January through August 2021 across multiple English and Russian language-based cybercrime forums.PREDICTIONS SERIES 2022

Top iTechnology Security News: TitanHQ Launch SpamTitan Plus to Combat Zero-Day Email Phishing Attacks

Education was the most frequently featured sector, accounting for 36% of advertisements—more than triple the second and third most targeted industries, manufacturing, and professional services, which both account for 11%.

The report reveals three main types of access brokers:

  • Opportunistic sellers who are focused on making a quick profit and don’t spend all their time on access.
  • Dedicated brokers are sophisticated and skilled hackers who offer access to a range of different companies. Their services are often used by smaller ransomware affiliates and groups.
  • Online shops that offer RDP and VPN credentials. These dedicated shops only guarantee access to a single machine rather than an entire network or organization. However, they represent a simple, automated way for cybercriminals with lower skill sets to purchase access. They can even search by location, ISP, operating system, port number, admin rights, or company name.

Most access broker offerings involve a simple set of credentials that may have been sourced from: Previous breaches and password hash breaking; compromised bot computers; vulnerability exploitation on VPN gateways, web servers, etc.; or one-off opportunistic attacks.

Prices vary depending on the type of access (single machine or entire network/corporation), annual revenue of the company, and how much extra work the buyer needs to do. Although RDP access can be obtained for as little as $10, the average price for admin credentials into a business is around $8,500. However, prices can reach up to $100,000.

Trend Micro recommends the following strategies for defenders:

  • Monitor for public breaches
  • Trigger a password reset for all users if you suspect corporate credentials might be breached
  • Set up Multi-Factor Authentication (MFA)
  • Monitor user behavior
  • Watch the DMZ and assume internet-facing services like VPN, webmail and web servers are under constant attack
  • Implement network segmentation and micro-segmentation
  • Deploy best practice password policies
  • Implement some form of Zero Trust architecture

Top iTechnology AIOps News: CloudCover Secures Patent Approval for Groundbreaking Cybersecurity Insurance Utilizing Blockchain, a First for the Cyber Insurance Industry

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

Lookout Named a Visionary in 2022 Gartner Magic Quadrant for Security Service Edge

CIO Influence News Desk

Appvance Unleashes AIQ 5.0, Featuring Generative AI V3

PR Newswire

Egnyte Expands its Multicloud Content Governance Ecosystem

CIO Influence News Desk

Leave a Comment