Easily accessible plug-and-play malware and ransomware attacks in dark web markets have enabled even the least-skilled cybercriminals to launch sophisticated operations, VentureBeat reports.
HP Wolf Security researchers examined more than 35 million cybercrime marketplace and forum postings and found that malware is often bundled with malware-as-a-service, mentoring services, and tutorials, with 76% of malware and 91% of exploits being sold for lower than $10. The study also showed that darknet Tor websites only had an average lifespan of 55 days, with cybercriminals establishing methods that would make them recognizable on other sites.
Easier access to malware may prompt more sophisticated and efficient attacks, with threat actors poised to conduct more severed data-denial attacks and increasingly target IoT, according to HP Senior Malware Analyst Alex Holland.
Such threats should prompt organizations to implement patch management and multi-factor authentication, attack surface mitigation, and incident response planning, as well as engage in increased real-time intelligence with other organizations, Holland added.
As part of its latest attacks discovered in June, Tropic Tropper exploited several known Microsoft Exchange Server and Adobe ColdFusion vulnerabilities to distribute an updated China Chopper web shell on a server hosting the Umbraco open-source content management system.
More than 50 Alibaba-hosted command-and-control servers have been leveraged to facilitate the distribution of the backdoor, which impersonates the Java, bash, sshd, SQLite, and edr-agent utilities.
Angola and the Democratic Republic of Congo, which is a new Intellexa client, may have leveraged new Predator infrastructure to enable spyware staging and exploitation, according to an analysis from Recorded Future's Insikt Group.