Moodle | WebMail | Library | Contact Us|

New Report Uncovers Inner Workings of the Cybercriminal Economy

New Report Uncovers Inner Workings of the Cybercriminal Economy

Security-Assessment-heder

Hewlett Packard Enterprise published the reportĀ “The Business of Hacking”, that looks at the adversary value chain as driving force in cybercrime and provides actionable insights to improve enterprise defences.

The profile of typical cyber attackers — and the interconnected nature of their underground economy — have evolved dramatically in the last several years. Adversaries are increasingly leveraging sophisticated management principles in the creation and expansion of their operations to ultimately increase their impact and financial profits, which are both core motivations for nearly all attack groups today. Enterprises can use this inside knowledge against the attackers to disrupt the organizational structure and mitigate their risks.

The research delivers an in-depth analysis of the motivations behind the attacks adversaries choose to pursue, and the ‘value chain’ illegal organisations have established to expand their reach and maximise profits. Based on this insight, the report also provides actionable recommendations for enterprises to mitigate risk through disruption of these adversary groups.

“Organisations that think of cybersecurity as purely another checkbox to mark, often do not leverage the value in high fidelity cybersecurity intelligence,” said Andrzej Kawalec,Ā Head of HPE Security Research and Chief Technology Officer,Ā HPE Security Services. “This report gives us a unique perspective on how our adversaries operate and how we can disrupt them at each step of their criminal value chain.”

 

The Attackers’ ‘Value Chain’

Today’s adversaries often create a formalized operating model and ‘value chain’ that is very similar to legitimate businesses in structure, and delivers greater ROI for the cybercriminal organization throughout the attack lifecycle. If enterprise-level security leaders, regulators and law enforcement are to disrupt the attackers’ organization, they must first understand every step in the value chain of this underground economy.

Ā Critical elements to the attackers’ value chain models typically include:

Human Resources ManagementĀ – includesĀ recruiting, vetting and paying the supporting ‘staff’ needed to deliver onĀ specific attack requirements; the skills-based training and education ofĀ attackers also falls within this category.

OperationsĀ – the ‘management team’ thatĀ ensures the smooth flow of information and funds throughout the attackĀ lifecycle; this group will actively seek to reduce costs and maximize ROIĀ at every step.

Technical DevelopmentĀ – theĀ front-line ‘workers’ providing the technical expertise required to performĀ any given attack, including research, vulnerability exploitation,Ā automation, and more.

Marketing and SalesĀ – these teamsĀ ensure that the attack group’s reputation in the underground marketplaceĀ is strong and the illicit products are both known and trusted among theĀ target audience of potential buyers.

Outbound LogisticsĀ – thisĀ encompasses both the people and systems responsible for deliveringĀ purchased goods to a buyer, be it large batches of stolen credit cardĀ data, medical records, intellectual property or otherwise.

“Cybercriminals are highly professional, have robust funding, and are working together to launch concentrated attacks,” said Chris Christiansen, Program Vice President, Security Products and Services, IDC. “The HPE Business of Hacking Report offers key insight for legitimate organizations to better disrupt adversaries and mitigate risks by understanding how they are operating and maximizing profits.”

 

Download the full report here

 

EIMF will organize two seminars in June on Cyber Security

Managing Cyber Security on the 22-23 June – Learn moreĀ 

Online Investigations for Non-Technical Audiences on the 24 June – Learn MoreĀ 



Days
Hours
Minutes
Seconds

Limited Availability

05 June 2025

Corporate Governance Today: Trends and Challenges

Hosted by the EIMF and the Chartered Governance Institute

Engage with 20+ leading experts and earn 6 CPD units in Financial Regulation.

Get Inspired by Our Head of Accounting

Think. Choose. Grow.

Not sure if it’s right for you? Let’s talk.

Days
Hours
Minutes
Seconds

limited time

PAIR UP AND SAVE

BUY ONE, GET ONE FREE

Short Self-Paced Online Courses

Days
Hours
Minutes
Seconds

Limited time

New Year, new you

10% discount on All Courses

Discount Coupon: NYNY10

Valid until 31 Jan 2025 23:59

EIMF's Christmas Advent Calendar

Unwrap the Gift of Knowledge this Festive Season!

Register now to receive a valuable educational resource each day and be automatically entered into our Grand Christmas Draw on 24th December –Ā Don’t miss out!

Days
Hours
Minutes
Seconds

Limited time

black friday has arrived

up to 40% discount

On Our Self-Paced eLearning Courses

Days
Hours
Minutes
Seconds

Limited Availability

17 October 2024

Regulatory & AFC Compliance Conference

Hosted by the ACAMS Cyprus Chapter and the EIMF.

Engage with 17 leading experts, explore 12 critical areas, earn 6 CPD units in Financial Regulation, gain 4 ACAMS credits, and receive a Certificate of Participation.

Celebrate 9 Years with EIMF

EIMF Has Assisted 6,000+ Professionals Get Certified

Ā 

Ready for your next professional certification? Choose from 9 self-paced eLearning courses and enjoy a 30% discount!

*complete your purchase before 21 April 2024

Starts 20 February 2024

Master in Governance,
Risk & Compliance

Accredited by the CyQAA, our GRC programme empowers you to navigate complex regulations, manage risks, and fortify governance structures. Dive into a dynamic learning experience that ensures ethical operations, regulatory compliance, and risk reduction.

āœ… Explore Scholarships & Financial Aid āœ… Discover the Match Funding Scheme