您的浏览器禁用了JavaScript(一种计算机语言,用以实现您与网页的交互),请解除该禁用,或者联系我们。[SpyCloud]:Cybercrime Analytics - 发现报告
当前位置:首页/行业研究/报告详情/

Cybercrime Analytics

2023-11-29-SpyCloudZ***
Cybercrime Analytics

CYBERCRIMEANALYTICS TheNewWayToDisruptCybercrime CYBERCRIMEANALYTICS1 ADAPTINGTOTHENEWREALITYOFCYBERCRIME henitcomestoconfrontingthenewrealityofcybercrime,theoptimalwaytobridgethegapbetween cybercrimeandcybersecurityisaccessingthesame informationthatcriminalshave–distilledintoonlythemostactionabledataforyour specificenterprise. ACTINGSWIFTLYONWHATCRIMINALSKNOWABOUTYOURBUSINESSANDYOURCUSTOMERSISNOWTHEONLYWAYTOBEATCRIMINALSATTHEIROWNGAME. Despiteincreasingbudgetsforcybersecurityandfraudpreventionandthewidespreaduseofthreatintelplatforms,securitymonitoringtools,EDR,phishingdetection,andanti-fraudsignals,90%oforganizationswereaffectedbyransomwarelastyear. Criminalsspreadmalwarelikewildfire,identityfraudcontinuesitsupwardtrajectory,anddatabreachesremainatnear-recordlevels–andthat’sjustwhatwecantrack.Manysecurityandfraudprofessionalsbelievethescaleofcybercrimeismuchmorethanwhat’saccountedforinourmodelstoday,andhasthepotentialtodestabilizemarketsandevensocietyasawhole. Theextremegrowthincybercrimerequiresanewapproach.It’snolongerenoughtogatherintelligencetounderstandabroadthreatlandscape.Withoutrelevant,actionableanswersaboutwhatdatacriminalsareusingnowtotargetabusinessanditscustomers,securityandanti-fraudteamsareflyingblind. Enterprisesmustchooseapartnerthatcandynamicallyandcontinuallysurfacetheseinsightsfromthecriminalundergroundwithspeedandactionabilityattheforefront.TheonlyanswerisapartnerofferingCybercrimeAnalytics. ThispaperdefinesCybercrimeAnalyticsandwhythisapproachisdisplacingtraditionalthreatintelligence,howitisadditivetoanti-fraudtechnologies,anditsusecasesandbenefitsindetail. CYBERCRIMEANALYTICS2 CybercrimeAnalytics WHATISCYBERCRIMEANALYTICS? >>> AutomatedAnalytics thatDriveActionfromCybercrimeData It’sthemostadvantageousapproachtodisruptingthecycleofcybercrimebecauseitenablesfaster,moreconfidentactionbasedondeepknowledgeaboutuserexposureinthecriminalunderground.Itrequiresconstantaggregationandlinkageofbillionsofdatapointsaffectingmillionsofonlinepersonas,resultingindistilledinsightsthatcanbeeasilyconsumedincommonsecurityandanti-fraudtoolstodriveremediation. CybercrimeAnalyticscanonlybeaccomplishedwithascalableenginethatcollects,processes,enriches,andanalyzestheoutputsofcybercrime.Those‘outputs’arethestolenassetsfromthird-partydatabreaches,malwarevictimlogs,andothersourcesthataretradedandsoldonthedarknet–datarangingfromusernames,passwords,andsessioncookiestosensitivePIIlikeIPaddresses,physicaladdresses,financialinformation,passportdata,driverslicenses,andsocialsecurityornationalIDnumbers.Comprisingmorethan200datatypes,it’severythingthatmakesupaperson’sdigitalidentitythathasbeenleakedinabreachorexfiltratedfromaninfostealer-infecteddevice.Thescaleismassive,andasaresult,linkageisrequiredtomakesenseofit,andtomakeitusefulfortheteamswhoneedit. CLEAR ACTIVEWEBSESSIONS APPROVE TRANSACTIONS RE-SECUREVULNERABLE ACCOUNTS FLAG POTENTIALSYNTHETICIDENTITIES Butthedataisn’tpackagedinawaythat’simmediatelyusefultoanyone–notevencriminals.Onedatabreachcouldbe100,000files.It’sspreadacrossraw,unstructuredformatsthatrequireprocessingandtimetomakeituseful,sospeedisanessentialpartoftheequation.It’saracetoseewhocanactonthedatafirst:enterprisesorattackers. SpyCloudputsahugeemphasisonspeedwhenitcomestorecapturingthesecybercrimeelementsfromthedeepestlayersofthedarknet(asclosetowheretheoriginalcrimeoccurred)–aswellasaddingvalueateverystage.Theresultinginsightsarerelevant,correlated,andmachine-readable–tyingdisparatebreaches,malwareinfections,affectedapplications,andidentitydatatogetherforindividualsacrosstheirentireonlineidentity. CYBERCRIMEANALYTICS3 WHAT DO CYBERCRIMEANALYTICS REVEAL ANDWHAT CANBEMADEASARESULT? 4 CYBERCRIMEANALYTICS MALWAREDETECTED CREDENTIALSANDSESSIONCOOKIESEXPOSED 3UNIQUEEMAILADDRESSES @ PLAINTEXTPASSWORDS EXPOSED 50%PASSWORDREUSE LASTEXPOSED24DAYSAGO FINANCIALDATAEXPOSED LEAKEDIN1BREACH MEETJON Here’shishighriskprofileaccordingtoSpyCloud’sCybercrimeAnalytics. ACROSS8BREACHESAND1MALWAREINFECTION,WE’VELINKEDJON’SEXPOSEDDATATODETERMINE: Hehas3uniqueemailaddresses. Hisplaintextpasswordshavebeenexposed(andincludedin2combolists,whichputhisaccountsatriskofcredentialstuffing). Hereusesthesamepasswordacrossmultipleaccounts,workandpersonal(50%reuse). Heusedamalware-infectedpersonal/unmanageddevice1monthagotologintocriticalworkforceapplicationsincludingacoderepository,chat,andprojectmanagementsoftware–exposingbothcredentialsandsessioncookiesfortheseservices. HissensitivePII,includinghiscreditcardnumber,wasleakedin1breach.Thelasttimeweingestedhisidentitydatawas24daysago. CYBERCRIMEANALYTICS5 TAKINGACTIONONCYBERCRIMEANALYTICS ArmedwiththesameinsightsaboutJon’sexposure,securityoperationsandfraudpreventionteamscanenhancetheirdecisioninginthefollowingways: THESECOPSTEAMATJON’SEMPLOYER ConsiderJonanunwittinginsiderthreat,exposingthebusinesstoriskofaccounttakeoverorworse–ransomware. ReachouttocoordinatePost-InfectionRemediationofJon’smalware-infectedpersonaldevice,recommendingananti-virussolution,thenresettin

你可能感兴趣

hot

Uncovering IoT Threats in the Cybercrime Underground

信息技术
趋势科技公司2019-09-10
hot

Cost of Cybercrime Study | 9th Annual

信息技术
埃森哲2019-03-06
hot

Cybercrime and the Deep Web

信息技术
趋势科技公司2016-03-01