A look into the cybercriminal underground

August 2014 Information Security

Places in the Internet where cybercriminals converge to sell and buy different products and services exist. Instead of creating their own attack tools from scratch, they can instead purchase what they need from peers who offer competitive prices. Like any other market, the laws of supply and demand dictate prices and feature offerings. But what’s more interesting to note is that recently, prices have been going down.

Over the years, Trend Micro has been keeping tabs on major developments in the cybercriminal underground. Constant monitoring of cybercriminal activities for years has allowed it to gather intelligence to characterise the more advanced markets seen so far and come up with comprehensive lists of offerings in them.

In the Russian cybercriminal underground market’s case, the huge demand for credit card credentials drives prices up. Then again, incidents such as the massive breaches involving popular retailers a few months ago, which increased the supply of such credentials, drive prices down.

Unlike legitimate business-people, however, cybercriminals need to keep their identities secret and, as much as possible, hide all traces of their “business” transactions. Factors like this make real-time transactions almost impossible to do in the underground market. That said, business dealings in cybercriminal underground markets are much slower than in the legitimate business world.

Extracted from its latest report, Trend Micro offers some insight into the Russian cyber underground.

Quick facts

* Established in 2004, the Russian underground market was the first to offer crimeware to cybercriminals.

* Russian underground forums are growing. The most popular ones like verified.su and ploy.org have at least 20 000 unique members to date.

* To ensure their safety in underground forums, buyers and sellers use escrows, third parties who test the sellers’ products and services, and check the buyers’ ability to pay. In return for their services, they get 2-15% of the sales price.

* The prices of products and services available in the Russian underground have gone down over the years due to automation.

* Boutique or specialised offerings remain expensive because of the skill and knowledge required in their development. These offerings characterise the Russian underground market.

* Traffic-related products and services are the most-sought-after goods in the Russian cybercriminal underground market and so fetch the highest prices.

Russian underground offerings

Products

1. Credit card credentials (per card) – see Table 1.

2. Scanned documents – see Table 2.

3. Trojans

* Disguised as legitimate programs or apps, can be used as spyware designed to steal user data, or key loggers that track victims’ keystrokes.

* Stolen data like ICQ passwords, contact lists, confidential documents, and bank account numbers can be used or sold for other malicious purposes.

* ZeuS and SpyEye – 2011 price: US$120 and US$500, respectively; 2013 price: FREE.

* Phoenix Trojan – 2011 price: US$500; 2013 price: US$0-35.

4. Exploit kits

* Insert code to vulnerable programs then download and execute malicious code – 2011 price: US$700-1,000; 2013 price: FREE.

* Exploits bundles – special scripts that combine several exploits; often encrypted to avoid detection. There are two kinds:

1. Intelligent – determines a victim’s browser and OS version then downloads the appropriate exploits.

2. Unintelligent – downloads all exploits in a bundle regardless of the victim’s browser version.

* Cross-site scripting (XSS) exploit – uses vulnerable servers to force a browser to execute malicious scripts when a victim visits an infected website. XSS attacks expose a victim’s data, making him prone to identity theft and data loss. There are two kinds of XSS exploits:

1. Active – automatically executes malicious code.

2. Passive – requires a victim’s participation, usually through social engineering.

5. Rootkits

* Hide any evidence (e.g., processes) of a malicious software’s presence in a computer.

6. Traffic

* The stream of visitors to a website; an increase in traffic increases a site’s SEO ranking.

* Business traffic from Australia, the United States, the United Kingdom, Germany, and Italy are most in demand.

* As of 2013, 1000 installations are sold for US$50-130 in the United States, US$40-170 in Europe, and US$90-200 in Asia.

7. Crypters

* Conceal infected files or malware from security software using crypter stubs, which decrypt encrypted pieces of malicious code.

* Static crypters – decrypt a file and only produce one specific output file; sold with add-ons; 2011 price: US$30-80; 2013 price: US$10-30.

* Polymorphic crypters – decrypt a file and produce several output files; 2011 price: US$100; 2013 price: US$65.

Services:

8. Dedicated-server-hosting services

* A dedicated server is one that can be rented for various dedicated purposes like acting as a C&C server or a drop zone for malicious files.

* Comprise the most in-demand products in the Russian underground.

* Low- to high-end server hosting – 2011 price: US$160-450; 2013 price: US$50-190.

9. Proxy-server-hosting services

* A proxy server is an intermediate computer that serves as proxy or mediator between a computer and the Internet. It is used to keep a hacker’s anonymity.

10. VPN-server-hosting services

* Encrypt all incoming and outgoing traffic to and from a computer.

* Average price – 2011: US$22; 2013: US$15.

11. Pay-per-install services

* Pay-per-install is a business model where customers pay the service provider to distribute their malicious files through hosting sites.

* PPI services are often offered based on the target country.

12. Denial-of-service (DoS) attack services

* Using specially crafted bots or botnets, DoS attacks paralyse websites or computers: 1-hour DDoS attack – 2011 price: US$4-10; 2013 price: US$2-60. 24-hour DDoS attack – 2011 price: US$30-70; 2013 price: US$13-200.

13. Spamming services

* Allow mass distribution of messages via email, instant-messaging (IM), social networks, or SMS.

* Spam can either be themed, which have a specific target audience, or unthemed, which don’t. See Table 3.

14. Flooding services

* Flooding is a routing technique used for DoS attacks to bring down a network service: Email (per 10 000 messages) – 2011 price: US$30; 2013 price: US$2.

15. Malware checking against security software services:

* Allow cybercriminals to check if their malicious files are detected by popular security products.

* Scan4You.net is one of the more popular anti-malware-checking service providers: 2011 price: US$50; 2013 price: US$30.

16. Social-engineering and account-hacking services:

* Account-hacking services are heavily advertised in the Russian underground. The most common targets are email and social media accounts.

* Brute-forcing services involve guessing someone’s password using automated programs, the most popular of which are Brutus and Hydra.

* Account hacking via social engineering services involve cybercriminals guessing the answer to an account’s secret question. See Table 4.

For more information, download the research paper: http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-russian-underground-revisited.pdf





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Check Point launches open, vendor-neutral MDR services
Information Security News & Events Products & Solutions
New Check Point MDR 360° and MXDR 360° offerings deliver 24/7 managed continuous threat monitoring protection across endpoints, cloud and network environments with built-in identity threat detection and 160+ integrations across hybrid, multi-vendor environments.

Read more...
Credential theft surges in South Africa
NEC XON Information Security
NEC XON issues a critical cybersecurity warning about the dual threat of massive credential theft and AI-powered cyberattacks sweeping across the region, with an increasing number of incidents and evolving threat tactics.

Read more...
Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.