Cybercrime supply chain: Fueling the rise in ransomware
Trend Micro released a research detailing the murky cybercrime supply chain behind much of the recent surge in ransomware attacks. Demand has increased so much over the past two years that many cybercriminal markets now have their own “Access-as-a-Service” sections.
“Media and corporate cybersecurity attention have been focused only on the ransomware payload when we need to focus first on mitigating the activity of initial access brokers,” said David Sancho, senior threat researcher for Trend Micro.
“Incident responders often need to investigate two or more overlapping attack chains to identify the root cause of a ransomware attack, which often complicates the overall IR process. Teams could get ahead of this issue by monitoring for activity by access brokers who steal and sell enterprise network access – essentially cutting off the supply for ransomware actors.”
The research is based on an analysis of over 900 access broker listings from January through August 2021 across multiple English and Russian language-based cybercrime forums.
Education was the most frequently featured sector, accounting for 36% of advertisements—more than triple the second and third most targeted industries, manufacturing, and professional services, which both account for 11%.
Three main types of access brokers
- Opportunistic sellers who are focused on making a quick profit and don’t spend all their time on access.
- Dedicated brokers are sophisticated and skilled hackers who offer access to a range of different companies. Their services are often used by smaller ransomware affiliates and groups.
- Online shops that offer RDP and VPN credentials. These dedicated shops only guarantee access to a single machine rather than an entire network or organization. However, they represent a simple, automated way for cybercriminals with lower skill sets to purchase access. They can even search by location, ISP, operating system, port number, admin rights, or company name.
Most access broker offerings involve a simple set of credentials that may have been sourced from: Previous breaches and password hash breaking; compromised bot computers; vulnerability exploitation on VPN gateways, web servers, etc.; or one-off opportunistic attacks.
Prices vary depending on the type of access (single machine or entire network/corporation), annual revenue of the company, and how much extra work the buyer needs to do. Although RDP access can be obtained for as little as $10, the average price for admin credentials into a business is around $8,500. However, prices can reach up to $100,000.
Recommended strategies for defenders
- Monitor for public breaches
- Trigger a password reset for all users if you suspect corporate credentials might be breached
- Set up Multi-Factor Authentication (MFA)
- Monitor user behavior
- Watch the DMZ and assume internet-facing services like VPN, webmail and web servers are under constant attack
- Implement network segmentation and micro-segmentation
- Deploy best practice password policies
- Implement some form of zero trust architecture