Cybercrime services expand, researchers find


Cybercrime services expand, researchers find

Warwick Ashford

Cybercrime services are ramping up to provide one-stop-shops to meet demand from fraudsters, according to researchers from security firm Trusteer.

While services such as anti-virus (AV) checkers, malware encryption and malware distribution have existed for several years, researchers are seeing more one-stop services appear.

In addition to infection services, at least one group is providing polymorphic encryption and anti-virus checking in a single package.

“Some malware services such as AV checking and encryption are becoming a commodity, driving cybercriminals to consolidate services to stay competitive and introduce new offerings,” said Amit Klein, chief technology officer at Trusteer.

The effectiveness of these services is proven by the fact that malware is poorly detected by AV software, he said.

An MRG Effitas Online Banking Security Test released in June 2011 found that the average AV detection rate for Zeus malware was less than 40% in 2010.

This is because AV detection mechanisms are primarily file signature-based, which assumes it can keep pace with new malware because introducing new malware variants with additional functionality takes time and effort.

But, said Klein, cybercriminals are using encryption services that can change a file's signature without changing the underlining code functionality, and AV checkers, which scan malware files with the up-to-date versions of the most common AV tools, are used to ensure encryption is indeed successfully evading detection.

Finally, to complete the process, he said, infection services take care of distribution either by creating a botnet of hosts that could be infected at will or by inserting exploit code to sites and routing victims to these sites to infect them using drive-by-downloads.

Email Alerts

Register now to receive IT-related news, guides and more, delivered to your inbox.
By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

COMMENTS powered by Disqus  //  Commenting policy