Cybercriminals are getting more devious than ever

security
OpenVPN-protokollet - därför är det så bra (Image credit: Shutterstock)

Cybercriminals are getting more devious than ever, a new report from BlackBerry argues, claiming that they’re optimizing their infrastructure, sharing resources, and creatively taking advantage of the transition to cloud, to steal identities and wreak ultimate havoc among small and medium-sized businesses.

“Criminals are working out how to target us better. The infrastructure of the cyber underground has evolved so they can deliver more timely and personalized deceptions to the public,” said Eric Milam, Vice President of Research and Intelligence, BlackBerry. 

“This infrastructure has also incubated a criminal shared economy, with threat groups sharing and outsourcing malware allowing for attacks to happen at scale. In fact, some of the biggest cyber incidents of 2021 look to have been the result of this outsourcing.”

TechRadar needs you!

We're looking at how our readers use VPNs with different devices so we can improve our content and offer better advice. This survey shouldn't take more than 60 seconds of your time. Thank you for taking part.

>> Click here to start the survey in a new window <<

Teamwork makes the ransomware work

According to the report, small businesses continue being “an epicenter” for cybercriminal focus. Today, SMBs are looking at more than 11 cyberthreats per endpoint each day, a figure which will most likely only grow, in the future, “as cybercriminals adopt collaborative mindsets”.

In fact, one of the biggest attacks to happen in 2021 shows just how collaborative they can be. In multiple incidents, BlackBerry found threat actors leaving behind playbook text files, with IP addresses and other information. The company surmised that ransomware builders and ransomware operators often aren’t the same people.

Furthermore, threat actors are taking advantage of the digital transformation, and the ease of use provided by cloud computing, to distribute malware. The majority the payloads hosted on public clouds are “highly malleable”, BlackBerry states, meaning they can be cheaply customized. 

“This trend was especially prevalent in North America, where local hosting of vicious payloads including Cobalt Strike surged,” it says.

To keep up with the times and ensure the general safety of their operations, businesses are advised to adopt the zero-trust strategy, BlackBerry concludes. The Biden Administration recently rolled out its Zero Trust strategy, and widely adopting the new approach to security is “imperative” across all sectors, BlackBerry added.

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
ransomware avast
“Every organization is vulnerable” - ransomware dominates security threats in 2024, so how can your business stay safe?
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
An image of network security icons for a network encircling a digital blue earth.
Why effective cybersecurity is a team effort
A deepfake image being created on a computer.
AI deepfakes estimated to cause $40 billion in losses by 2027
Best email services: image of email with one unread message alert
Over 400 million unwanted and malicious emails were received by businesses in 2024
ransomware avast
AI is helping hackers get access to systems quicker than ever before
Latest in Security
ransomware avast
Ransomware attacks are costing Government offices a month of downtime on average
Lock on Laptop Screen
Data breach at Pennsylvania education union potentially exposes 500,000 victims
Data leak
Top collectibles site leaks personal data of nearly a million users
Spyware
Stalkerware data breach potentially hits over 2 million users, including thousands of Apple devices
An American flag flying outside the US Capitol building against a blue sky
Five Eyes "cannot replace US intel in Ukraine", claims former US Cyber Command Chief
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Criminals are using a virtual hard disk image file to host and distribute dangerous malware
Latest in News
Apple iPhone 16 Pro Max REVIEW
The latest batch of leaked iPhone 17 dummy units appear to show where glass meets metal on the new designs
Hornet swings their weapon in mid air
Hollow Knight: Silksong could potentially launch this year and I reckon it could be a great game for an Xbox handheld
ransomware avast
Ransomware attacks are costing Government offices a month of downtime on average
Cassian looking at someone off-camera from a TIE fighter cockpit in Andor season 2
Star Wars: Andor creator is taking a stance against AI by canceling plans to release its scripts, and I completely get why
Nintendo x Seattle Mariners partnership
The Nintendo Switch 2 logo will be featured on the Seattle Mariners' baseball jerseys this season
Apple iPhone 16 Pro Max Review
Siri's chances to beat ChatGPT just got a whole lot better