Page 68 - Cyber Defense eMagazine October 2023
P. 68

model allows the group to concentrate on just one stage of the cyber-attack chain rather than trying to
            manage every step, selling access and tools to other groups who want to take advantage of it. This model
            made it easier for researchers to obtain malicious code to understand how it works. But it sometimes
            makes it harder for them to identify which group has conducted which crime because multiple groups use
            Hive’s code.

            In just a few years, Hive has undoubtedly become one of the most dangerous cybercrime gangs on the
            planet. One cyber security firm ranked it the second most successful in 2022 after LockBit. Known for its
            aggressiveness and frequent attacks, its members work hard to evolve their tactics, techniques and
            procedures (TTPs) to keep security experts from blocking its objectives.

            Naturally, few crime groups declare how much money they make, and most organizations that have
            suffered from ransomware attacks don’t like to state how much they have paid out. The FBI believes the
            Hive  has  already  targeted  more  than  1,300  companies  around  the  globe,  helping  it  to  bring  in
            approximately US$100 million in ransom payments to date.




            Conclusion

            Magnetic tape was first used for data storage in 1951, and the first gigabyte capacity hard disk drive was
            introduced in 1980. Along the transition from tape to digital storage, criminals began to trade in their
            pistols for programmers as a less physical method for stealing money. In 1988, a 23-year-old Cornell
            University  graduate  student  named  Robert  Tappan  Morris  unleashed  the  first  documented  denial  of
            service hack dubbed the “Morris Worm.” According to FBI.gov, “At around 8:30 p.m. on November 2,
            1988, a maliciously clever program was unleashed on the Internet from a computer at the Massachusetts
            Institute of Technology (MIT).” Before the invention of the World Wide Web, the Morris Worm targeted
            connected computers across the U.S., including Harvard, Princeton, Stanford, Johns Hopkins, NASA,
            and the Lawrence Livermore National Laboratory.

            The business of stealing your business has leaped from the pages of fiction to the frightening reality of
            every corporation and educational institution worldwide. Routine cyber security protection is no match for
            today’s well-organized and funded bad actors. These shadow organizations will continue to exploit the
            code and even patches used in every part of the business.

            Hacker  organizations  are  growing  too  quickly  and  too  smart,  outpacing  many  IT  staff  in knowledge,
            technique,  and  passion.  Companies  need  to  augment  their  in-house  cybersecurity  skills  with  expert
            Virtual CISOs, cloud security services, and incident response preparedness. Third-party cybersecurity
            experts have unique insights into the latest hacking techniques and are prepared to identify and respond
            accordingly.  Invest  in  expert  cybersecurity  help—because  hacking  organizations  are  outpacing  your
            budget, knowledge, and desire.











            Cyber Defense eMagazine – October 2023 Edition                                                                                                                                                                                                          68
            Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.
   63   64   65   66   67   68   69   70   71   72   73