Categories: News

Trend Micro Research Finds Both On-Premise and Cloud-based Servers Compromised by Criminal Underground

Understanding the infrastructure behind cybercrime helps detect and stop operations

HONG KONG, CHINA – Media OutReach – September 2, 2020 – Trend Micro
Incorporated
(TYO: 4704; TSE: 4704),
the
leader in cloud security, today released research that states organizations’
on-premise and cloud-based servers are compromised, abused and rented out as
part of a sophisticated criminal monetization lifecycle.

The findings come from the second of a three-part report series
looking at how the underground hosting market operates. The findings show that
cryptocurrency mining activity should be the indicator for IT security teams to
be on high alert.

While cryptomining may not cause disruption or financial losses
on its own, mining software is usually deployed to monetize compromised servers
that are sitting idle while criminals plot larger money-making schemes. These
include exfiltrating valuable data, selling server access for further abuse, or
preparing for a targeted ransomware attack. Any servers found to contain
cryptominers should be flagged for immediate remediation and investigation.

“From dedicated bulletproof hosting to anonymizing
services, domain name provision and compromised legitimate assets, the cybercriminal
underground boasts a sophisticated range of infrastructure offerings to support
monetization campaigns of all types,” said Bob
McArdle
, director of forward-looking threat research for Trend Micro.
“Our goal is to raise awareness and understanding of cybercriminal
infrastructure to help law enforcement agencies, customers and other
researchers block avenues for cybercrime and drive costs up for threat
actors.”

The report lists the main underground hosting services available
today, providing technical details of how they work and how criminals use them
to run their businesses. This includes a detailed description of the typical
lifecycle of a compromised server, from initial compromise to final attack.

Cloud servers are particularly exposed to compromise and use in
underground hosting infrastructure as they may be lacking the protection of
their on-premises equivalents.

McArdle continued, “Compromised legitimate corporate assets
can be infiltrated and abused whether on-premise or in the cloud. A good rule
of thumb is that whatever is most exposed is most likely to be exploited.”

Cybercriminals might look to exploit vulnerabilities in server
software, use brute-force attacks to compromise credentials, or steal logins
and deploy malware via phishing attacks. They may even target infrastructure
management software (cloud API keys), which allows them to create new instances
of virtual machines or supply resources.

Once compromised, these cloud server assets could be sold on underground
forums, dedicated marketplaces and even social networks for use in a range of
attacks.

The report also covers emerging trends for underground
infrastructure services, including abuse of telephony services and satellite
infrastructure, and “parasitic” computing for rent including hidden
RDP and VNC.

To read the report, please visit: https://www.trendmicro.com/vinfo/hk/security/news/cybercrime-and-digital-threats/commodified-cybercrime-infrastructure-exploring-the-underground-services-market-for-cybercriminals 

About Trend Micro

Trend Micro, a global leader in cybersecurity,
helps make the world safe for exchanging digital information. Leveraging over
30 years of security expertise, global threat research, and continuous
innovation, Trend Micro enables resilience for businesses, governments, and
consumers with connected solutions across cloud workloads, endpoints, email,
IIoT, and networks. Our XGen™ security strategy powers our solutions with a
cross-generational blend of threat-defense techniques that are optimized for
key environments and leverage shared threat intelligence for better, faster
protection. With over 6,700 employees in 65 countries, and the world’s most
advanced global threat research and intelligence, Trend Micro enables
organizations to secure their connected world www.trendmicro.com.hk.

Miscw.com

Recent Posts

Verdantis Appoints Kumar Gaurav Gupta as Chief Executive Officer

PRINCETON, N.J.--(BUSINESS WIRE)--Verdantis, a pioneering leader in AI-powered data solutions, proudly announces the appointment of…

31 mins ago

Galaxy Macau, The World-class Luxury Integrated Resort Comes to the “Experience Macao Roadshow in Jakarta”

Providing Exclusive and Unique Experiences to Indonesian Tourists MACAU SAR - Media OutReach Newswire -…

32 mins ago

SK hynix and HLDS Jointly Developed Tube T31 and Haechi H02 Win Red Dot Design Award and Exhibit at COMPUTEX

SEOUL, South Korea--(BUSINESS WIRE)--Leading semiconductor company SK hynix today announced that its stick-type SSD, the…

1 hour ago

NADclinic and Bontac Bio-Engineering (Shenzhen) Co., Ltd Announce Strategic Partnership to Evolve the Future of Global Wellness Through the Power of NAD+

LONDON--(BUSINESS WIRE)--NADclinic Group and Bontac Bio-Engineering (Shenzhen) Co., Ltd have officially entered into a dynamic…

2 hours ago

Drug Farm Announces IND Clearance by U.S. FDA Enabling Phase 1b Initiation for ALPK1 Selective Kinase Inhibitor, DF-003 in ROSAH Syndrome Patients

GUILFORD, Conn. & SHANGHAI--(BUSINESS WIRE)--Drug Farm announced today the U.S. Food and Drug Administration (FDA)…

2 hours ago

LiveSpo Pharma Emerges as Vietnam’s Pioneer at Vitafoods Europe 2024

Unveiling Groundbreaking Research and Product Development to Reduce Antibiotic Use in Digestive and Respiratory Care…

2 hours ago