Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Deloitte Puts the Spotlight on the Cost of Cyber-Crime Operations in New Threat Study

It Doesn’t Matter Who Is Doing It, Find out How It’s Getting Done

In an effort to expose and clarify the cost challenge of cyber criminals, Deloitte’s cyber risk services practice released today a threat study titled, “Black Market Ecosystem: Estimating the cost of ownership.” The study reinforces that attackers can execute a cyber attack for as little as $34 per month compared to the extraordinarily high impact and associated expense, thousands to millions of dollars, incurred by a victimized organization that needs to remediate and recover from it.

The study looks at cyber-crime from a business perspective using the most common and popular hacking tools, services and enablers, and seeks to answer questions such as:

  • What are the most commonly used tools and services sold on underground markets?
  • What are the average estimated costs of these tools and services?
  • Which tools are required to operate real world criminal businesses?
  • What are the estimated operating costs of various cyber-criminal businesses?

“If you haven’t noticed, criminals don’t file tax returns. And while challenging, it’s still important to be able to review and compare these criminal businesses to help identify which exploits are the most affordable and lucrative for them to pursue — both from a cost of entry and routine operations standpoint,” said Keith Brogan, managed threat services leader for Deloitte cyber risk services, and managing director with Deloitte & Touche LLP. “There’s a definite correlation to the investment level in terms of a sum cost. You have to spend money to make money even as a criminal.”

Read More: Interview with Jesse Wolfersberger, Chief Data Officer at Maritz Motivation Solutions

Deloitte estimates that some common criminal businesses can be operated for as little as $34 month and could return $25,000, while others may routinely require nearly $3,800 a month and could return up to $1 million per month. For example, phish kits continue to be the overall most affordable approach both in terms of low estimate and average cost, while banking trojans are costlier, on average. A multiple payload campaign, unsurprisingly, is potentially the most expensive criminal business modeled in the study. For every category of criminal, a product almost certainly exists which caters to their needs. The cost of these products does not necessarily correlate to the skill level of the threat actors who purchase them. Regardless, all are extraordinarily low cost compared to the resulting impact to the compromised organization.

Related Posts
1 of 40,365

The ingenuity of cyber-criminals practically guarantees that there are always exceptions to the findings, but organizations need to have some level of understanding as to how these incidents are occurring to effectively shift their cybersecurity posture. The impact of a cyberattack as experienced by the compromised organization is, in many ways, intangible and more difficult to quantify. This includes costs associated with loss of intellectual property (IP) or contracts, operational disruption, credit rating impact, or damage to the value of a trade name. Still, in dollars and cents, it is widely reported that the cost of a data breach is upwards of $4 million to an organization with the potential to cost hundreds of millions even billions of dollars in long-term resulting impact. The ratio of low cost to high impact and ease of access for the adversary, will continue to attract the novice criminal to the sophisticated attacker.

Read More: Interview with Yoav Degani, Founder and CEO, VoiceSense

“In the realm of cyber everywhere, companies will only continue to introduce more digital innovations, which will require them to also continuously adopt and adapt cybersecurity measures commensurate with the growing threats they’ll face,” said Andrew Morrison, strategy, defense and response leader for Deloitte cyber risk services and principal with Deloitte & Touche LLP. “Cyberattacks are inevitable but the extent of their damage is not. Organizational transformation is needed to reprioritize and refocus investments on mitigating likely outcomes, based on a broad understanding of attackers’ motives and the ability to anticipate high-impact scenarios.”

Read More: Jumpstart 2019: Interview with Rich Kahn, CEO and Co-Founder, Anura

The overall takeaway is that organizations should be monitoring with well-developed and well-defined use-cases driven by priority-based threat intelligence, and knowledge of the underground economy. Continuous monitoring can allow them to better detect and prevent malicious activity within the enterprise environment. Monitoring and tuning security controls based on tactics, techniques and procedures (TTPs) derived from threat intelligence — rather than atomic indicators — can have a direct impact on the underground market by forcing threat actors to reinvent their operations from scratch, which can take significant amounts of time, effort and money; and ultimately challenge the adversary’s cost-benefit scenario.

As part of Deloitte Risk and Financial Advisory‘s cyber risk services practice, threat intelligence and analytics solutions help organizations build and mature their threat intelligence capabilities by incorporating proactive insights into the cyber threat management ecosystem. Cyber adversaries exploit the unprecedented complexity and reality of today’s cyber everywhere environment. The ability to detect attacks is not a purely technical effort. It requires continuous awareness of threats on the horizon and the ability to distill vast amounts of data into practical, actionable insights for both business and technical teams. Deloitte’s cyber risk services practice helps organizations lead in a complex cyber landscape, navigate the risks and opportunities, and disrupt with innovative technologies to emerge stronger and more secure.

Read More: Introducing Project Verte: Unlocking the Potential of Community and Technology in Ecommerce

7 Comments
  1. Copper scrap assessment says

    Copper scrap management Copper recycling Metal reclaiming Yard
    Copper cable export documentation, Metal reprocessing and recycling, Domestic copper scrap market

  2. Metal utilization Ferrous material Iron recovery process

    Ferrous material recycling best practices, Iron scrap reclamation facilities, Metal compaction services

  3. Thank you for sharing your info. I truly appreciate your efforts and I am waiting for your next post thank you once again.

  4. Do you mind if I quote a couple of your posts as long as I provide credit and sources back to your webpage? My website is in the very same area of interest as yours and my visitors would truly benefit from a lot of the information you present here. Please let me know if this alright with you. Regards!

  5. Heya i’m for the first time here. I came across this board and I find It truly useful & it helped me out a lot. I hope to give something back and help others like you helped me.

  6. What i do not realize is actually how you’re now not really a lot more smartly-favored than you may be right now. You are so intelligent. You realize therefore significantly in terms of this topic, produced me individually believe it from numerous various angles. Its like men and women aren’t fascinated unless it’s something to accomplish with Lady gaga! Your own stuffs great. Always deal with it up!

  7. One of the leading academic and scientific-research centers of the Belarus. There are 12 Faculties at the University, 2 scientific and research institutes. Higher education in 35 specialities of the 1st degree of education and 22 specialities.

Leave A Reply

Your email address will not be published.