Avoid Hiring a Cybercriminal: understand motivations & thoroughly vet employees

tumblr_inline_nrknepOgcp1ttxud9_1280.png

After a FireEye intern was found selling his own custom RAT on a dark web forum, industry experts re-emphasize the importance of understanding cybercrime and how to hire the right people

The “Darkode” online crime forum bust spanned 20 countries and led to the charges, arrests and searches of 70 suspected forum members.

While all the indicted individuals allegedly participated in illegal activities, one man received particular attention. Morgan Culbertson, a 20-year-old and current FireEye intern with two stints at the company on his resume, was arrested in association with the forum. During his time at the cybersecurity firm, Culbertson spent his days not only working on a dedicated “intern project,” for which FireEye hires the students, but also allegedly running a successful, darker side business.
Culbertson is said to be the creator behind and seller of the notorious “Dendroid” Android remote access tool (RAT), which he advertised on Darkode for $300. Its source code fetched far more, with a price of $65,000, Forbes indicated. 

FireEye immediately revoked all access to its building and systems when it found out about the arrest, the company said in a statement to SCMagazine.com.

But even still, experts note that Culbertson's work at FireEye likely assisted in the creation of his successful RAT by giving him a peek into the defense's side.  However, they also say the two are not directly correlated. Making the move over to “the dark side” requires more than a nagging interest; it's a mix of desire for compensation, recognition and the pursuit of intellectual happiness, Katie Moussouris, chief policy officer at HackerOne told SCMagazine.com.
“The Culbertson news doesn't surprise me at all,” Moussouris said. “Everybody's got a mix of motivations and different ways their moral compass may point. It might point in the same way that yours does or it might point in a different direction.”
And given Culbertson's age, his compass will likely change. Long-term consequences aren't exactly top of mind for a 20-year-old, Joe Nedelec, an assistant professor in criminology at the University of Cincinnati, said during an interview with SCMagazine.com. “[The more I study cybercrime] the more I've seen that there's this real witches brew of young people with immense talent and a great temptation to go over to areas of the dark web and try it out,” Nedelec said. Add in a perceived notion of anonymity, and really, the desire to explore, create and sell doesn't seem too harmful to a cybercriminal's future, he said.
“He's creating security software at FireEye to fight people like himself, and that can only make his malware better,” Nedelec said. “But really, I think that there's a personality thing going on here. These guys have so much confidence in their skills to remain anonymous online that they can sort of drift into that area of criminality, such as on the dark web.”
SC Magazine: http://bit.ly/1HUx3el

 

 

« Automobile Industry Gears Up For Cyber-Threat
Internet of Things: A Mass Surveillance Infrastructure »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

SealPath

SealPath

SealPath enables companies to protect and control their documents wherever they are: In their PC, in their corporate network, on a partner’s network, in the cloud.

Mako Group

Mako Group

The Mako Group specializes in protection - providing security through auditing, testing, and assessments. And, we do it all with the highest quality standards possible.

Allegro Software

Allegro Software

Allegro provide secure software for the Internet of Things.

Norwegian Center for Information Security (NorSIS)

Norwegian Center for Information Security (NorSIS)

NorSIS) is an independent organization that works to increase knowledge and understanding of information security for businesses and individuals.

QA

QA

QA is a leading IT training provider in the UK with over 1,500 courses covering all areas of IT including Cyber Security.

Austrian Trust Circle

Austrian Trust Circle

Austrian Trust Circle is an initiative of CERT.at and the Austrian Federal Chancellery and consists of Security Information Exchanges in the areas of the strategic information infrastructure.

DataNumen

DataNumen

The fundamental mission of DataNumen is to recover as much data from inadvertent data disasters as possible.

UST

UST

UST is a global provider of digital technology and transformation, IT services and solutions including managed security services.

Input Output (IOHK)

Input Output (IOHK)

IOHK is one of the world's pre-eminent blockchain infrastructure research and engineering companies.

BlueAlly

BlueAlly

BlueAlly helps clients scale, optimize, and manage their IT resources to reach their business goals.

Alpha Omega Integration

Alpha Omega Integration

Alpha Omega creates new possibilities through intelligent end-to-end mission-focused government IT solutions.

Cybervergent

Cybervergent

Cybervergent (formerly Infoprive) are a leading cybersecurity technology company in Africa. We provide cybersecurity guidance and solutions that help protect your business.

CyberCure

CyberCure

CyberCure provide specialised roles and services to manage your organisations cybersecurity requirements and professional advisory services in governance, risk and compliance.

Frenos

Frenos

The Frenos Platform helps enterprises understand their most probable attack paths while highlighting the most effective risk mitigations to deter and defend against today’s adversaries.

Convergint

Convergint

Convergint is a service-based systems integrator working alongside a global network of partners and manufacturers to deliver a range of solutions including cybersecurity.

Upwind Security

Upwind Security

Upwind delivers comprehensive cloud security, precisely when and where it’s most critical.