Why Aren’t Cyber Criminals Being Brought to Justice?

Cyber criminals are making off with $400 to $500 billion in profits every year, leaving you to wonder why exactly attackers are getting away without being brought to justice.

Businesses of all size have their hands full with the 80 to 90 million cyber attacks that are launched every year. However, with 70% of these attacks going undetected, it shouldn’t come as a surprise that most cyber crime goes unpunished.

The simple answer is that cyber criminals are innovating at a far quicker pace than security professionals can keep up with, according to the Cisco 2015 Mid-Year Report.

Cyber criminals have plenty of tricks up their sleeves for evading cyber defenses, and the only way to cut down on these injustices is for businesses and governmental agencies to implement more proactive cyber security measures.

How exactly are the Attackers Slipping Through Legal Control?

Cyber criminals are ruthless—they’re persistent, sophisticated and entirely capable of outsmarting your network of cyber security applications. There are a number of evasion tools and strategies in the arsenals of skilled attackers that you’ll need to understand if you want to detect and catch these criminals.

Be on the lookout for 3 ways attackers can avoid being caught by you and the legal system:

Proxy Chaining

Cyber criminals are just like you and me: their activity is identified by an IP header. But if that’s the case, why can’t we catch them?

One way that attackers mask their IP address is by using proxy chains. Rather than directly attacking a network, cyber criminals compromise a system of proxy machines, routing their traffic through these computers to create a lengthy list of IP addresses in use.

They can take advantage of limited legal jurisdiction by routing traffic through countries such as Russia and Sweden to make it almost impossible to subpoena the necessary evidence for a court case.

Organisations like the FBI simply don’t have the resources or jurisdiction to track down every IP address for each cyber attack.

Anonymous Web Networks
Another way that cyber criminals can mask their identity is by routing traffic through anonymous web networks like Tor.

Tor can be used to launch the command and control communications necessary to remotely navigate an enterprise network. While the presence of Tor traffic is an obvious red flag for security professionals to check for malicious activity, tracking down the attacker is almost impossible. You can stop the attack, but bringing a Tor user to justice is a tall task.

Malware with Anti-Analysis Functionality
Attackers don’t always have to use command-and-control servers to launch attacks—sometimes delivering sophisticated malware is enough. New malware like Rombertik are coded with a number of anti-analysis functions.

  • When placed in a sandbox, Rombertik writes random bytes of data 960 million times to overwhelm security systems. Rather than “sleeping” like most malware does to avoid detection, Rombertik appears unsuspicious because it remains active.
  • The malware has a self-destruct feature that destroys files and master boot records when detection is imminent.    

Rombertik is a sign of things to come in the cyber security community, as attackers find innovative ways to avoid detection and punishment.
Unfortunately, these are only a few tactics that attackers employ as they launch evasive attacks - and they’ll only grow more sophisticated. It’s time for businesses and governmental agencies to get more proactive and start bringing criminals to justice.

Malware as a service is the product of an increasingly industrialized cyber crime market—and according to FBI Agent Michael Driscolll, it’s controlled by just 100 to 200 major cyber criminals.

Theoretically, if these kingpins are dethroned, cyber security would see a major boost in success.  To that end, governmental agencies around the world have formed the Joint Cybercrime Action Taskforce (J-CAT) to cooperate and bring cyber criminals to justice.

They’ve already seen some success, but what can you do to avoid becoming a victim and watching attackers escape unscathed?

Deceptions Everywhere™ technology has emerged as the proactive solution that individual companies can deploy to catch attackers in the act. You may not be able to bring them to justice yourself—by placing a blanket of illusions over your network, you can deceive attackers and be alerted to their every move with real-time forensics and high fidelity alerts.
Knowing exactly how attackers are moving throughout your network enables you to end the threat, learn more about the attack and provide law enforcement with the information necessary to help prosecute these dangerous cyber criminals.
Don’t you think it’s about time these attackers pay the price for their offenses?  Will you be sharing information will law enforcement?
 
Illusive Networks: http://bit.ly/1RWnmCM

« Data Security – The Trends We Do Not See Coming
FBI's War On Encryption Is Unnecessary »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Synology

Synology

Synology provides high-performance, reliable, and secure Network Attached Storage (NAS) products.

Brit

Brit

Brit PLC is a market-leading global specialty insurer and reinsurer, focused on underwriting complex risks including cyber, privacy and technology.

Digital Detective

Digital Detective

Digital Detective offer a range of products and services for digital forensic analysis and advanced data recovery.

Sepior

Sepior

Our vision is to make Sepior the leading provider of cloud-encryption software in the world.

DCIT

DCIT

DCIT is a specialist in providing comprehensive consulting and auditing services in the field of information technology, PROVYS development software and security system AuditSquare.

Upstream Security

Upstream Security

Upstream Security is the first cloud-based cyber-security solution that protects the technologies and applications of connected and autonomous vehicles.

Aptible

Aptible

Aptible is a Platform as a Service (PaaS) that gives startups everything developers need to launch and scale apps and databases that are secure, reliable, and compliant.

Intuity

Intuity

The Intuity suite of services provides companies with a complete awareness of their security status and helps them in an efficient, efficient and sustainable improvement process.

IT Security Jobs

IT Security Jobs

IT Security Jobs is a dedicated portal for everything related to IT professionals looking for IT Security jobs.

Absolute IT Asset Disposals

Absolute IT Asset Disposals

Absolute IT Asset Disposals is an IT asset disposal (ITAD) company providing safe and secure recycling of IT assets.

Right-Hand Cybersecurity

Right-Hand Cybersecurity

Right-Hand Cybersecurity empowers businesses to monitor, measure and mitigate employee induced cyber risks in real-time.

BlastWave

BlastWave

BlastWave deliver Operational Technology Cybersecurity solutions that minimize the available attack surface and protect against the rising tide of AI-powered cyber attacks.

Whitaker Brothers

Whitaker Brothers

Whitaker Brothers data destruction equipment can be found in 115 countries and every single continent in the world, from major military organizations to small offices.

Apex

Apex

We aspire to make the AI revolution run faster, securely, for the benefit of all. We are purposely built for the new AI era and are creating capabilities to safely enable AI.

E-CQURITY (ECQ)

E-CQURITY (ECQ)

ECQ is a network security company offering offensive security services and solutions focused on active offensive and defensive positioning.

Layer 8 Security

Layer 8 Security

Layer 8 Security is a cybersecurity advisory, consulting, and technical services firm that arms businesses with practical compliance, risk management, and security program strategies.