fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Hackers Ask Only $1,500 For Access To Breached Company Networks

Hackers Ask Only $1,500 For Access To Breached Company Networks

The number of offers for network access and their median prices on the public posts on hacker forums dropped in the final quarter of last year but the statistics fail to reflect the real size of the initial access market.

Data from threat intelligence firm Kela indicates that many of the deals actually closed behind closed doors, a trend shaped over the past months.

Deceptively small offer

According to the company, over 240 offers to sell initial network access occurred in public conversations on three underground forums. A quarter of these came with no price tag, a clear indication of transactions being done in private conversations.

However, this number does not include an offer for access to more than 500 .gov and .edu networks (auctioned for 25 bitcoins) and another one for access to a Chinese electronics maker (asked 150 bitcoins). Neither of them appeared to have been closed due to the insanely high prices.

For $1,500-$2,000, a buyer could get domain admin to a medium-sized company with a few hundred employees. However, the average price in Q4 was $6,684, an increase from the $4,960 that Kela saw in September 2020.

The cumulative sum for all the offers that Kela observed during the period was $1,209,880. Of this, peddlers reported in open conversations closing deals worth just $133,900, which represents only 14% of the entire network offer seen by the company.

Also Read: What Do 4 Messaging Apps Get From You? Read The iOS Privacy App Labels

Private dealings

Compared to previous data collected in September, this is 23% lower. This does not paint an accurate picture of the scale of trading initial network access, though. As Kela mentions, getting a true sense of how large this market is “depends only on brokers and their will to specify sold accesses or not.”

Month over month, Q4 2020 saw around 80 network accesses while in the previous period the number was higher at 108, accounting for a 25% gap that was likely caused by brokers moving the talks with middlemen or buyers to private channels to avoid the eyes of researchers.

“This hypothesis is based on the fact that many initial access brokers commonly write to contact them privately in order to receive information about other accesses that they’re willing to sell. While such behavior always existed, there is a more recent trend that emerged these past couple of months – brokers often offer a bunch of accesses in one thread and request from potential buyers to contact them privately to get the whole list” – Kela

Alternatively, as is the case in the ransomware business, some initial access peddlers announce the type of access they had to attract partners and become affiliates working for a percentage.

Offers like the one above are not rare. In another one, a broker said they had had “70 Citrix accesses from Tier 1 countries,” to suggest profitable targets.

While both new and old initial access brokers posted their offers in Q4 2020, Kela says that some prominent actors switched to private dealings, and announced a valuable, expensive offer only occasionally.

One of these actors that were very active over the summer, listed only two offers in October and December: $35,000 for access to a government entity and $20,000 for a school district in the U.S.

This behavior is common with brokers that found regular buyers that passed on some offers. Therefore, they turned to the public side of the forum to close the deal.

Mostly RDP, VPN, RCE access

As for the access provided, at the top of the list are remote desktop (RDP), VPN-based, remote code execution exploits, and Citrix products. These make more than 45% of all types.

Among the less common access types, Kela threat intelligence analyst Victoria Kivilevich found DX NetOps and DX Spectrum network monitoring and fault management software belonging to a company that operated an airport.

Also Read: Key PDPA Amendments 2019/2020 You Should Know

Since it can manage the entire IT infrastructure, it could be used for lateral movement to compromise the entire network. Access through this software was sold within four days.

The most expensive accesses (going to over $100,000) that Kela saw in Q4 2020 referred to both public and private entities in the U.S., Australia, Mexico, India, and Europe.

Victims included IT companies – most likely managed services providers that enabled access to their clients, telecommunications companies, ISPs, government entities, and a large oil and gas company.

Some of the victims were compromised some time after the initial access offer, as is the case of Mexico’s National Insurance and Surety Commission, advertised on two forums for at least $70,000. In early December, LockBit ransomware encrypted their computers.

Network access peddlers continue to fuel cyberattacks of all sorts, with ransomware being at the top of the list. Among the most active of them are:

  • Crasty – mainly offers Citrix/RDWeb accesses to Australian, French, US organizations, as well as companies from other countries, many of them are universities
  • pshmm – selling RMM accesses mostly to US companies running Zoho’s ManageEngine Desktop Central
  • drumrlu / 3lv4n: provides multiple accesses, claiming to also compromise the VMware ESXi software of affected organizations
  • Barf: typically sells RDP type of access with user privileges to companies from France, US, Brazil, Spain, Italy, and Germany
  • 7h0rf1nn: usually offers RCE and webshells in the networks of compromised companies from education, telecommunications, financial, insurance, and sports sectors

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us