A look into the cybercriminal underground

August 2014 Information Security

Places in the Internet where cybercriminals converge to sell and buy different products and services exist. Instead of creating their own attack tools from scratch, they can instead purchase what they need from peers who offer competitive prices. Like any other market, the laws of supply and demand dictate prices and feature offerings. But what’s more interesting to note is that recently, prices have been going down.

Over the years, Trend Micro has been keeping tabs on major developments in the cybercriminal underground. Constant monitoring of cybercriminal activities for years has allowed it to gather intelligence to characterise the more advanced markets seen so far and come up with comprehensive lists of offerings in them.

In the Russian cybercriminal underground market’s case, the huge demand for credit card credentials drives prices up. Then again, incidents such as the massive breaches involving popular retailers a few months ago, which increased the supply of such credentials, drive prices down.

Unlike legitimate business-people, however, cybercriminals need to keep their identities secret and, as much as possible, hide all traces of their “business” transactions. Factors like this make real-time transactions almost impossible to do in the underground market. That said, business dealings in cybercriminal underground markets are much slower than in the legitimate business world.

Extracted from its latest report, Trend Micro offers some insight into the Russian cyber underground.

Quick facts

* Established in 2004, the Russian underground market was the first to offer crimeware to cybercriminals.

* Russian underground forums are growing. The most popular ones like verified.su and ploy.org have at least 20 000 unique members to date.

* To ensure their safety in underground forums, buyers and sellers use escrows, third parties who test the sellers’ products and services, and check the buyers’ ability to pay. In return for their services, they get 2-15% of the sales price.

* The prices of products and services available in the Russian underground have gone down over the years due to automation.

* Boutique or specialised offerings remain expensive because of the skill and knowledge required in their development. These offerings characterise the Russian underground market.

* Traffic-related products and services are the most-sought-after goods in the Russian cybercriminal underground market and so fetch the highest prices.

Russian underground offerings

Products

1. Credit card credentials (per card) – see Table 1.

2. Scanned documents – see Table 2.

3. Trojans

* Disguised as legitimate programs or apps, can be used as spyware designed to steal user data, or key loggers that track victims’ keystrokes.

* Stolen data like ICQ passwords, contact lists, confidential documents, and bank account numbers can be used or sold for other malicious purposes.

* ZeuS and SpyEye – 2011 price: US$120 and US$500, respectively; 2013 price: FREE.

* Phoenix Trojan – 2011 price: US$500; 2013 price: US$0-35.

4. Exploit kits

* Insert code to vulnerable programs then download and execute malicious code – 2011 price: US$700-1,000; 2013 price: FREE.

* Exploits bundles – special scripts that combine several exploits; often encrypted to avoid detection. There are two kinds:

1. Intelligent – determines a victim’s browser and OS version then downloads the appropriate exploits.

2. Unintelligent – downloads all exploits in a bundle regardless of the victim’s browser version.

* Cross-site scripting (XSS) exploit – uses vulnerable servers to force a browser to execute malicious scripts when a victim visits an infected website. XSS attacks expose a victim’s data, making him prone to identity theft and data loss. There are two kinds of XSS exploits:

1. Active – automatically executes malicious code.

2. Passive – requires a victim’s participation, usually through social engineering.

5. Rootkits

* Hide any evidence (e.g., processes) of a malicious software’s presence in a computer.

6. Traffic

* The stream of visitors to a website; an increase in traffic increases a site’s SEO ranking.

* Business traffic from Australia, the United States, the United Kingdom, Germany, and Italy are most in demand.

* As of 2013, 1000 installations are sold for US$50-130 in the United States, US$40-170 in Europe, and US$90-200 in Asia.

7. Crypters

* Conceal infected files or malware from security software using crypter stubs, which decrypt encrypted pieces of malicious code.

* Static crypters – decrypt a file and only produce one specific output file; sold with add-ons; 2011 price: US$30-80; 2013 price: US$10-30.

* Polymorphic crypters – decrypt a file and produce several output files; 2011 price: US$100; 2013 price: US$65.

Services:

8. Dedicated-server-hosting services

* A dedicated server is one that can be rented for various dedicated purposes like acting as a C&C server or a drop zone for malicious files.

* Comprise the most in-demand products in the Russian underground.

* Low- to high-end server hosting – 2011 price: US$160-450; 2013 price: US$50-190.

9. Proxy-server-hosting services

* A proxy server is an intermediate computer that serves as proxy or mediator between a computer and the Internet. It is used to keep a hacker’s anonymity.

10. VPN-server-hosting services

* Encrypt all incoming and outgoing traffic to and from a computer.

* Average price – 2011: US$22; 2013: US$15.

11. Pay-per-install services

* Pay-per-install is a business model where customers pay the service provider to distribute their malicious files through hosting sites.

* PPI services are often offered based on the target country.

12. Denial-of-service (DoS) attack services

* Using specially crafted bots or botnets, DoS attacks paralyse websites or computers: 1-hour DDoS attack – 2011 price: US$4-10; 2013 price: US$2-60. 24-hour DDoS attack – 2011 price: US$30-70; 2013 price: US$13-200.

13. Spamming services

* Allow mass distribution of messages via email, instant-messaging (IM), social networks, or SMS.

* Spam can either be themed, which have a specific target audience, or unthemed, which don’t. See Table 3.

14. Flooding services

* Flooding is a routing technique used for DoS attacks to bring down a network service: Email (per 10 000 messages) – 2011 price: US$30; 2013 price: US$2.

15. Malware checking against security software services:

* Allow cybercriminals to check if their malicious files are detected by popular security products.

* Scan4You.net is one of the more popular anti-malware-checking service providers: 2011 price: US$50; 2013 price: US$30.

16. Social-engineering and account-hacking services:

* Account-hacking services are heavily advertised in the Russian underground. The most common targets are email and social media accounts.

* Brute-forcing services involve guessing someone’s password using automated programs, the most popular of which are Brutus and Hydra.

* Account hacking via social engineering services involve cybercriminals guessing the answer to an account’s secret question. See Table 4.

For more information, download the research paper: http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-russian-underground-revisited.pdf





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security
Cyberattackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Multiple IoT devices targeted
Information Security Residential Estate (Industry)
Mirai remains one of the top threats to IoT in 2025 due to widespread exploitation of weak login credentials and unpatched vulnerabilities, enabling large-scale botnets for DDoS attacks, data theft and other malicious activities.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Sophos launches advisory services to deliver proactive cybersecurity resilience
Information Security News & Events
Sophos has launched a suite of penetration testing and application security services, designed to identify gaps in organisations’ security programs, which is informed by Sophos X-Ops Threat Intelligence and delivered by world-class experts.

Read more...
Kaspersky highlights biometric and signature risks
Information Security News & Events
AI has elevated phishing into a highly personalised threat. Large language models enable attackers to craft convincing emails, messages and websites that mimic legitimate sources, eliminating grammatical errors that once exposed scams.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...
Stronger cloud protection
Kaspersky Information Security Products & Solutions
Kaspersky has announced the release of an enhanced version of its Kaspersky Cloud Workload Security, delivering advanced protection for hybrid and multi-cloud environments.

Read more...
AttackIQ enters South Africa with key appointment
Information Security News & Events
AttackIQ, a provider of continuous security validation and exposure management, has announced its entry into the South African market with the appointment of Luke Cifarelli as its country manager.

Read more...
Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.