Criminal hacking groups can employ HR specialists, marketers, and training gurus, HPE says Cybercriminals can call on an extensive network of specialists for “business” expertise, including people who train and recruit, launder money, and provide escrow services, according to HPE.The cybercriminal underground includes people who provide human resources functions, like recruiting and background checks, but also specialists who help market and sell exploit kits and compromised data and others who serve as middlemen in anonymous transactions, says The Business of Hacking white paper from Hewlett Packard Enterprise.Cybercriminals are increasingly taking a business-based approach toward their activities, with some organizations developing in-house training, disaster recovery, and other business functions, and others contracting for those services in the underground marketplace, said Shogo Cottrell, a security strategist with HPE Security. Cybercrime is maturing as a business model, he added.“They are following the money, in a sense,” Cottrell said. Cybercriminals are embracing the “traditional sound business practices of increasing your revenue, reducing your costs, maximizing your profit.” Some criminal hacking businesses offer 24-by-seven telephone support, others offer money-back guarantees on their products, Cottrell said.These traditional business models, with marketing teams focused on the reputation of the cybercriminal groups, help build up the groups’ reputations in the criminal underground, Cottrell said. It’s hard to maintain trust and a reputation in the cybercriminal community, “given that there’s a lot of paranoia and there’s a lot of distrust,” Cottrell said. With a marketing team, “they can market the things they’re doing a put a good face in front of the underground public.”The HPE paper identifies advertising fraud and extortion as types of cybercrime that have high payout potential while requiring relatively little effort and involving low risk to criminals. Hacktivism and credit card fraud are relatively easy and low risk but offer low payout potential.Organized crime and intellectual property theft, on the other hand, offer large paydays, but can be difficult to pull off and can be risky.The HPE paper recommends that businesses take several steps to disrupt cybercriminals. Businesses can disrupt hacker profits by using end-to-end encryption on their sensitive data, and by deploying application security tools, the white paper says. “Attackers prefer easy targets, so deploying any technologies to harden your assets will have dramatic results,” the paper says.Many businesses suffering breaches still fail to deploy basic security measures, such as patching software and two-factor authentication, Cottrell said. Hackers conduct their own risk analysis on potential targets; if a company looks difficult to attack, they will move on, he said. Honeypots or deception grids — realistic duplications of a business’ network set up to trap attackers — can also be effective, HPE said. These duplicated networks are “complex but may represent the future of getting ahead of the attackers and disrupting them,” the paper says.Businesses being attacked by cybercriminals shouldn’t rely on government action, however, the paper says. While many countries are enacting harsher punishments for cybercrime, there’s an enforcement problem in some parts of the world, the paper notes.Harsh penalties in some countries are “driving attackers to operate in … more lenient countries to reduce their risk,” HPE says. Related content news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Advanced Persistent Threats Advanced Persistent Threats brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities feature Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem. By Chris Hughes Sep 21, 2023 8 mins Zero Trust Threat and Vulnerability Management Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe