Page 97 - Cyber Defense eMagazine August 2023
P. 97

The Business of Cybercrime

            When you think about cybercrime, you really should think of it like you would any other business. CL0P
            is best known  as a “ransomware-as-a-service”  provider,  helping  other threat actors  create and  deploy
            their own ransomware campaigns. The end goal is almost always money, and in MOVEit’s case, CL0P
            sought an undisclosed  amount  of money to prevent the distribution  of the victim organization’s  private
            data.  And  like  any  growing  business,  CL0P  has  diversified  its  offerings  to  include  complementary
            capabilities such as access to a dedicated botnet as well as direct access to compromised networks as
            a means to mint future victims (and revenue).

            Every action a threat actor like CL0P carries out is intentional, including widely publicizing and threatening
            the potential  disclosure  of the  sensitive  information  it now  controls  through  its ransomware  capability.
            The group’s intention is to create additional urgency in the hopes of forcing the affected company to act
            quickly or suffer further embarrassment  or even operational impact as more details are released.



            Mitigating Ransomware Attacks

            It’s no easy feat to protect a supply chain against determined threat actors who own a growing toolbox of
            potential  weapons,  including ransomware.  These threat actors  may even work harder  than vendors to
            identify and leverage zero-day vulnerabilities, because your data is their payday. In a sense, companies
            need to take a cue from groups like CL0P and understand how these cybercrime enterprises operate.

            Since  most  attackers  rely  heavily  on  their  own  supply  chains,  one  of  the  best  defenses  is  to  seek,
            understand,  and  document  potential  bottlenecks  in  these  adversarial  supply  chains  -  this  information
            represents low-hanging fruit where you (or the managed security provider who protects you) can gain the
            biggest  bang  for  the  buck.  For  example,  how  does  a  typical  ransomware  attack  arrive  into  a  victim’s
            environment?  How does an infected  laptop communicate  back to the threat actor with its status? How
            does a threat actor ultimately monetize its efforts? These are all questions  that may be addressed with
            skill sets on your extended team like threat intelligence and incident response, and technology solutions
            such as network-based threat detection and response. To disrupt this chain, one needs to hone in on the
            adversary’s business model and use it against them, much as we see in the martial art of jiu-jitsu.

            Unfortunately  for many companies,  the approach  after a ransomware  attack is to focus on the primary
            vulnerability,  remedy it, and then go back to business as usual. In the case of MOVEit, there were new
            and  previously  unannounced  vulnerabilities  still  being  announced  more  than  six  weeks  after  the  first
            vulnerability’s public announcement. It’s critical that affected companies remain proactive; where there is
            one vulnerability, there are frequently others.

            While companies should move forward with improved security measures to enhance the documentation,
            monitoring and protection of their own supply chains, enlisting external help is almost always a suitable
            option.  Not  only  can  these  externally-based  defenders  help  respond  to  or  even  prevent  ransomware
            attacks, they may also be explicitly involved in the takedown of threat actors. In January 2023, the U.S.
            Department  of  Justice  announced  it  had disrupted  the  actions  of  the  ransomware-as-a-service  group
            Hive,  which  had  targeted  more  than  1,500  victims.  The  disruption  indicates  that  these  groups  aren’t






            Cyber Defense eMagazine – August 2023 Edition                                                                                                                                                                                                               97
            Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.
   92   93   94   95   96   97   98   99   100   101   102