Think Like A Criminal
Think Like A Criminal
INTRODUCTION
Cybercriminals are a diverse lot, yet you can spot some patterns and motives
across the group. For victims, be they businesses or individuals, the outcome of
an encounter can usually be quantified—some sort of loss has occurred. From
here, you can start to understand the cybercriminal’s motives. The degree of
loss can suggest the motive and operating capability of the cybercriminal, but
the type of attack must also be considered.
You can identify the operating capabilities of cybercriminals fairly easily—you simply
need to answer the question, “How did the crime occur?” This information is readily
available from security research firms—in some cases provided with excruciating
technical detail—and the court documents from cybercriminals who have been
brought to justice or indicted. But this is only half of the information we need to “think
like a cybercriminal.” The other piece of information is far more elusive—motivation.
If we want to understand the criminal mindset, then answering, “Why did the
cybercrime occur?” might be more pertinent. In the examples we’ll provide later,
especially in the case of an “affiliated actor” (a group or organization that conducts
a cybercrime and is known to the business or victim), the motivation can potentially
be easily identified. In the cases of a “non-affiliated actor” (a group or organization
that conducts a cybercrime and is unknown to the business or victim), the motivation
for the cybercrime may be harder to pinpoint. In either case, we have to consider the
result of the crime.
If the cyberattack results in monetary gain for the criminals, we can assume that
the fraud, identity theft, extortion, blackmail, unauthorized financial transactions, or
ransomware payload was perpetrated for profit. However, while many focus on the
hacked party as the victim, few give any thought to the ultimate destination of the
“You can identify the
illicit gains. That money could end up going to fund a terrorist group (Cyber Caliphate),
bypass currency controls for a sanctioned country (Lazarus Group), or bankroll a vast operating capabilities
criminal enterprise (Carbanak group). of cybercriminals fairly
easily—you simply need to
In the case of a cyberattack conducted for the purposes of espionage or stealing
intellectual property, the motivations of the cybercriminals could encompass a answer the question...”
whole spectrum. These could range from advanced persistent threat (APT) groups
known to be affiliated with the cyberwarfare capabilities of many nation states, or
the cyberattack could be the result of third-party cybercriminal mercenaries hired
by a rival organization. In the case of espionage and intellectual property theft, the
potential motivations (and culprits) are vast.
solarwindsmsp.com 2
EBOOK | THINK LIKE A CYBERCRIMINAL
There is, of course, a third type of cyberattack—an attack that seeks to damage,
degrade, or destroy an organization and comes with no warning or demand from
cybercriminals. From the victim’s perspective, they are frequently not targeted for
the attacks and are unfortunately part of the resulting collateral damage of a larger
attack. WannaCry, NotPetya, and BadRabbit are examples of global cyberattacks
that resulted in business losses. These occurred because of a self-propagating
cyberweapon that led to a rapidly spreading cyberattack. Thus, there is the potential
to be a victim from a random cybercrime as a cost of being online.
In order to understand the cybercriminal mindset, it helps to break the attacks into
two categories based on visibility, and then map them to the relationship of the actor
to the victim’s business.
CATEGORIES OF ATTACKS
.................................................................................................................................
TYPES OF PERPETRATORS
solarwindsmsp.com 3
EBOOK | THINK LIKE A CYBERCRIMINAL
Broadly speaking, the cause of an “insider” high-visibility attack is, at its core,
a dispute or perceived indignity to the attacker perpetrated by the company or
management. Examples include Dariusz J. Prugar, who systematically destroyed
an Internet Service Provider and in part contributed to the company’s demise,
and James Cornish, an information technology employee at Shionogi who
deleted virtual servers and hosts causing $800,000 in losses2,3. Both criminals
used this common “dispute” theme to try to justify their actions. In the last two
cases mentioned, almost no operational security was practiced before and during
the cyberattacks. It is as if these individuals wanted to get caught for the ability to tell
their story to a sentencing judge.
solarwindsmsp.com 4
EBOOK | THINK LIKE A CYBERCRIMINAL
Despite the best efforts of a continued and coordinated world-wide law enforcement
effort, high-visibility ransomware attacks are growing at an alarming rate. Global
ransomware damages are predicted to exceed $5 billion in 2017, according to an
extensive and in-depth look at ransomware from the Barkly Blog10.
solarwindsmsp.com 5
Global ransomware
damages are predicted to
exceed $5 billion in 2017
Barkly Blog
EBOOK | THINK LIKE A CYBERCRIMINAL
Chief among these tactics is the business email compromise (BEC), a cybercriminal
attack that uses social engineering to yield the illicit transfer of funds. Arrests and
prosecutions for the perpetrators of this type of attack have been frustratingly
slow, given that IC3 statistics identify BEC in the number-one loss position, with a
cybercrime payday of over £360 million in 2016—and over 12,000 US victims. With
numbers like these, law enforcement engaged.
The criminal complaint identifies the use of a sophisticated malware tool called
“Sakula,” which was delivered to targeted endpoints by a compromised third-party
website that victims visited frequently. This is known as a “waterhole attack.” Yu
Pingan used an Adobe® Flash® exploit and several zero-day exploits to attack
any workstation that visited these compromised websites. On several occasions,
intercepted communications warn him to “not draw the attention of the FBI.”
solarwindsmsp.com 7
EBOOK | THINK LIKE A CYBERCRIMINAL
Given the sophisticated tactics, tools, and procedures of the low-visibility attacks of
an actor who wants to remain undetected in a successfully compromised network,
the current state of detection provides a long period of time for the complete
exploitation and exfiltration of information from that network. According to the 2016
Ponemon Institute Cost of Data Breach Study, “the mean time to identify this [type of]
data breach is 201 days15.”
One example of this sort of cybercrime is the allegations against Bo Zhang. The
felony charges from 2012 allege Bo stole Federal Reserve Bank computer code, but
the available information says little about what he did with that code after he stole it.
What’s interesting is that the code issue had little to do with his ultimate guilty plea.
The press release and indictment allege far more serious crimes despite the $9.5 During his guilty plea
million spent “developing the code” for the Federal Reserve Bank. As the press release today, Zhang admitted
from the US Justice Department read: that between 2011 and
During his guilty plea today, Zhang admitted that between 2011 and 2012, he submitted 2012, he submitted
fraudulent documentation to immigration authorities to help foreign nationals obtain visas fraudulent documentation
to enter and work in the United States. Zhang falsely represented to immigration authorities
to immigration authorities
that certain foreign nationals worked full-time for his computer-training business. At least
to help foreign nationals
one individual fraudulently obtained a visa in connection with Zhang’s offense16.
obtain visas to enter and
The obscure and factually ambiguous story of Bo Zhang strikes a contrast with the
work in the United States.
legal saga of Sergey Aleynikov, who must once again defend the allegation that he
stole high-speed trading code from Goldman Sachs® with the intention of bringing
the code to a new startup17. Aleynikov’s legal journey included a conviction, an appeal
that overturned the conviction, and a recent appeal that reinstated the original
conviction. With eight million dollars in legal bills and potentially four years in prison,
Sergey faces an uncertain future.
solarwindsmsp.com 8
EBOOK | THINK LIKE A CYBERCRIMINAL
are a host of other laws applicable to illegal activity derived from cybercrime activities, threat that’s out there, I think, is
exploitation, and a host of other internet and internet-facilitated crimes. Retired US Admiral
Michael Mullen
Retired US Admiral, Michael Mullen once asserted, “The single biggest existential
threat that’s out there, I think, is cyber18.” Many feel this quote was overblown and
represented a general angst about cyberattacks. However, the most important aspect
of cybercrime is this—for every cyberattack, there is someone who can end up in
handcuffs. Make sure to report all cybercrimes to help prevent future attacks and
protect potential victims.
solarwindsmsp.com 9
EBOOK | THINK LIKE A CYBERCRIMINAL
1. “Former Employee of Transcontinental Railroad Company Found Guilty of Damaging Ex-Employer’s Computer
Network,” United States Department of Justice. https://www.justice.gov/usao-mn/pr/former-employee-
transcontinental-railroad-company-found-guilty-damaging-ex-employer-s (accessed November 2017)
2. “New York Man Sentenced for Computer Hacking that Shut Down Internet Service Provider,” US Department of
Justice. https://www.justice.gov/usao-mdpa/pr/new-york-man-sentenced-computer-hacking-shut-down-internet-
service-provider (accessed November 2017)
3. “Former Shionogi Employee Sentenced to Federal Prison for Hack Attack on Company Computer Servers,” US
Department of Justice. https://www.justice.gov/archive/usao/nj/Press/files/Cornish,%20Jason%20Sentencing%20
News%20Release.html (accessed November 2017)
4. “Enterprise Phishing Susceptibility and Resliency Report,” PhishMe. https://phishme.com/enterprise-phishing-
susceptibility-report (accessed November 2017)
5. “ 2016 Q1 Malware Report,” PhishMe. https://phishme.com/project/phishme-q1-2016-malware-review (accessed
November 2017)
6. “Avalance Network Dismantled in International Cyber Operation,” US Department of Justice.
https://www.justice.gov/opa/pr/avalanche-network-dismantled-international-cyber-operation
(accessed November 2017)
7. “ ’Avalanche’ Network Dismantled in International Cyber Operation,” Europol. https://www.europol.europa.eu/
newsroom/news/%E2%80%98avalanche%E2%80%99-network-dismantled-in-international-cyber-operation
(accessed November 2017)
8. “ Police Make Arrests in ‘Unprecedented’ Cybercrime Crackdown,” CBS News. https://www.cbsnews.com/news/
cybercrime-takedown-police-make-arrests (accessed November 2017)
9. “Police Make 5 Arrests in ‘Unprecedented” Cybercrime Takedown,” The Enterprise.
http://www.enterprisenews.com/news/20161201/police-make-5-arrests-in-unprecedented-cybercrime-takedown
(accessed November 2017)
10. “ Must-Know Ransomware Statistics 2017,” Barkly. https://blog.barkly.com/ransomware-statistics-2017 (accessed
November 2017).
11. “2016 Internet Crime Report,” IC3. https://pdf.ic3.gov/2016_IC3Report.pdf (accessed November 2017)
12. “ Lithuanian Man Arrested for Theft of Over $100 Million in Fraudulent Email Compromise Scheme Against
Multinational Internet Companies,” US Department of Justice. https://www.justice.gov/usao-sdny/pr/lithuanian-
man-arrested-theft-over-100-million-fraudulent-email-compromise-scheme (accessed November 2017)
13. “United States of America v Yu Pingan,” Politico. https://www.politico.com/f/?id=0000015e-161b-df04-a5df-
963f36840001 (accessed November 2017)
14. “2016 Cost of Data Breach Study: Global Analysis,” IBM and Ponemon Institute.
https://www-01.ibm.com/marketing/iwm/dre/signup?source=mrs-form-1995&S_
PKG=ov49542&ce=ISM0484&ct=SWG&cmp=IBMSocial&cm=h&cr=Security&ccy=US&&cm_mc_
uid=17909256714515099347148&cm_mc_sid_50200000=1509934714&cm_mc_sid_52640000=1509934714
(accessed November 2017)
15. “ Computer Programmer Pleads Guilty in Manhattan Federal Court to Stealing Proprietary Code from the Federal
Reserve Bank of New York and to Engaging in Immigration Fraud,” US Department of Justice.
https://www.justice.gov/archive/usao/nys/pressreleases/May12/zhangboplea.html (accessed November 2017)
16. “ Ex-Goldman Programmer’s Code Theft Conviction Revived by New York Court,” Reuters.
https://www.reuters.com/article/goldman-sachs-aleynikov/ex-goldman-programmers-code-theft-conviction-
revived-by-ny-court-idUSL1N1FE5OB (accessed November 2017)
17. “ The Existential Angst of America’s Top Generals,” The FP Group. http://foreignpolicy.com/2015/08/04/the-
existential-angst-of-americas-top-generals-threat-inflation-islamic-state (accessed November 2017)
© 2017 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd. All Rights Reserved.
The SolarWinds and SolarWinds MSP trademarks are the exclusive property of SolarWinds MSP Canada ULC, SolarWinds MSP UK Ltd. or its
affiliates and may be registered or pending registration with the U.S. Patent and Trademark Office and in other countries. All other SolarWinds
MSP and SolarWinds trademarks, service marks, and logos may be common law marks or are registered or pending registration. All other
trademarks mentioned herein are used for identification purposes only and are trademarks (and may be registered trademarks) of their
respective companies.