Organized cybercrime has taken advantage of the opportunities offered by the Internet. In recent years, their operations have become so sophisticated that they have launched large-scale attacks on large corporations and launched grim online campaigns that caused millions of dollars in damage.
Here are the top five cybercrimes that have made headlines.
1. Cobalt cybercrime gang
This cybercrime force is behind the Carbanak and Cobalt malware attacks, which targeted 100 financial institutions in more than 40 countries around the world. Their complex cyber-campaigns against numerous banks allowed these criminals to steal more than $ 11 million per robbery.
It caused the financial industry more than $ 1 billion in cumulative losses.
A typical cobalt attack infiltrated banking institutions by sending spearfishing emails with malicious attachments to bank employees. After downloading, the criminals got into the infected computer and were able to break into the internal banking network. They spent months on infected networks researching the bank’s operations and workflows.
It became even gloomier as they began to infiltrate the servers that control the ATMs. During the last robbery – called a “jackpot” – ATMs were instructed to distribute cash remotely at a specified time at predetermined locations where a money mule was waiting to collect money.
The alleged champion was arrested in 2018, although experts now believe the rest of the members continued where he stopped after seeing similar attacks on numerous other banks shortly after his arrest.
The group, which some believe is linked to North Korea, is behind attacks by several institutions and organizations. The best known was the Sony Pictures breach in 2014 and the grim campaign that affected the UK NHS (National Health Service) WannaCry cyber attack.
Sony Pictures is leaking
During the infamous Sony Pictures leak, employees were shocked to find that their corporate network had been hacked. Hackers stole terabytes of confidential information, deleted some files and threatened to leak the data if Sony refused the hackers ’claims.
The nets were out of date and workers had to use boards. A few days later, hackers began leaking stolen confidential information to the press.
WannaCry Ransomware Attack
The Lazarus group is also believed to be behind the 2017 WannaCry Ransomware attack, which affected nearly a quarter of a million computers in 150 countries. It created a number of companies and organizations, including the UK NHS. It was the biggest attack the NHS has ever experienced.
WannaCry brought the health care system to a standstill for many days, caused more than six thousand appointments to be canceled and cost the NHS an estimated $ 100 million.
3. MageCart Syndicate
This large e-commerce hacking syndicate, made up of different groups under one big umbrella, became known to have stolen customer and credit card information.
To this end, a software format was developed, malware that hijacked the payment systems of e-commerce sites and stored credit card information.
Over the years, MageCart groups have targeted thousands of e-commerce sites as well as other websites where users typically provide their credit card information. For example, in 2018, British Airways suffered a massive data breach by the MageCart Group. The attack compromises the personal and financial information of 380,000 customers. But the attack on the airline was just the tip of the iceberg.
A massive MageCart digital card peeling campaign also targeted a hardware store in Newegg a few days after the British Airways attack. MageCart is also believed to be behind the Ticketmaster attack, which compromises 40,000 customer data.
4. Paha Corp
The name of the group itself leaves no doubt that they are causing problems, problems worth millions of dollars. This international cybercrime, whose members are based in Russia, uses a variety of malware to attack all types of institutions, including the school district in Pennsylvania.
Most of their targets are organizations in Europe and the United States, and they have managed to avoid arrests for years. Evil Corp has become known for the insidious Dridex banking trojan, which allowed a cybercrime team to collect credentials from hundreds of banks and financial institutions in 40 countries.
During the Dridex highlight, Evil Corp managed to steal an estimated $ 100 million.
They are such brazen videos of alleged leaders with their supercars and sublime lifestyle went viral last year. And while the U.S. government has already formally accused them in December 2019, many experts believe it will be difficult to get their founders to sue in the United States.
The prosecution also did not prevent the group. In fact, a number of recent attacks on small and medium-sized U.S. companies during 2020 have been merged with Evil Corp.. This includes a plan discovered by Symantec in June 2020 to attack dozens of U.S. companies. Eight Fortune 500 companies were targeted using a new type of ransomware called WastedLocker.
This international cybercrime network is behind the threatening GozNym malware, a powerful Trojan hybrid that was created to avoid detecting security solutions.
GozNym, considered a double-headed monster, is a hybrid of Nymaim and Gozi malware. Malicious fusion allowed malware to sneak into a customer’s computer through malicious email attachments or links. From there, the malware remained virtually undetected and waited for the user to log in to the bank account.
From there, login information was collected, funds were stolen and removed through U.S. and foreign banks, and then laundered. The attack affected more than 41,000 computers and robbed account holders of a total of about $ 100 million.
Organized cybercrime groups
These international cybercrime groups model their operations and business models according to legitimate business organizations. So much so that security analysts claim to be training new members, utilizing collaboration tools and even service contracts they use between the “experts” they hire.
Most, such as the GozNym Group, have a director like the CEO who recruits project managers dark network. These project managers are the experts responsible for every part of the attack.
Take the GozNym gang, which had coding “experts” to hone the ability of their malware to evade security solutions, a separate distribution team and another group of experts took over the control of bank accounts. They also hired money mules or money launderers who received the funds and redistributed them to gang members abroad.
Such organization and precision have allowed these groups to infiltrate the most established organizations, causing enormous damage and stealing millions of dollars.
Understanding their actions is one of the most important steps in overcoming the fight against cybercrime. Experts hope that by investigating, they may prevent attacks before they occur.
With so many users switching to online banking, it’s no wonder hackers are looking for login information. What may be surprising are the lengths of hackers that allow …