Nichts verkörpert die Entwicklung der digitalen Verbrechen ganz wie Crimeware-as-a-Service. Jahre zuvor, schlechte Schauspieler preyed auf ahnungslose Nutzer von vor allem auf ihre technischen Geschick unter Berufung. Sicher, sie konnten ihre Techniken im IRC-Foren teilen, but it was ultimately up to the individual attacker to code and debug their malicious programs. No one was going to do it for them.
Heute, malware developers are still out there. But not every attacker is a programmer. There are some bad actors with low levels of technical expertise. Those individuals would much rather help distribute someone else’s program… just as long as they get to keep some of the spoils of their attack campaigns.
That preference has given rise to crimeware-as-a-service, a model under which anyone can purchase a license to a digital attack tool. Those programs often come with a web interface that allows affiliates to customize their campaigns’ targets and pretexts. At the conclusion of each license period, the license-holders get to keep a share of the profits, whereas a fraction also goes to the original developer. Some licenses expire after just 30 Tage. Others last a lifetime.
Scamming as a Service
The security community has seen crimeware-as-a-service take the form of Ransomware und Remote Access Trojaner (RATs). It’s now come across another iteration of the underground affiliate model: Scam in a Box.
Scam in a Box refers to a service through which criminals with low technical expertise can purchase the infrastructure, Fehlerbehebung, and maintenance necessary to perpetrate a convincing scam online. Beispielsweise, one service called Inboundpopaps says it provides “Anwendungen,” “registry cleaners,” und “anti-virus packages.” to increase inbound calls.
The long and short of it? William Tsing of Malwarebytes erklärt:
Pretty cut and dry. ‘We provide malicious software for fraudulent purposes.’ Also notice the admission that PUPs and tech support scams go hand in hand. For more on this connection, see Pieter’s post hier. Inboundpopaps is considerably more slick than most scams on the market, and even attempts to limit traffic to real, paying customers.
Inboundpopaps offers several different products to buyers. One service called “Smart Pack” helps criminals create their own “Antivirus, blue screen pop up calls,” Mit anderen Worten, customers can use the offering to create their own tech support scam.
Smart Pack comes with an app, a redirecting portal, and even pay-per-click (PPC) training on the use of proper keywords and geolocation.
Another service, “Installarex,” is software that mimics a registry cleaner. But that’s not really what it is. It’s actually a screen locker that activates 72 hours after installation.
50 percent of the service’s cost is due at the time of purchase, while the rest comes after delivery and before training. Once that amount is paid, criminals can do whatever they want with it. That includes “Installieren[ing] the software if you are taking inbound calls and not able make sale on which calls.”
Deutlich, the developers have thought out how Smart Pack, Installarex, and their other services can be bundled together.
Last but not least is App Market. Tsing weighs in on the product:
…[Die]e see offers for fake mobile apps, along with training on how to sneak them into assorted app stores. This is intriguing as mobile tech support scams aren’t extremely common. Leider, as much as we’d love to “Ask For Price”, that link simply reloads the page. The blurb for windows lockers quotes the monthly maintenance as 2000 IND per month, which equates to about $30 USD. Given that price is for one of the more resource intensive scams, one might presume the others are even cheaper.
Scam in a Box solutions like those offered by Inboundpopaps make it easy for criminals with low levels of technical expertise to perpetrate a scam. Infolge, it would be foolish of us to think scams will be going away anytime soon. Which is why users need to protect themselves against some of the most common scams. They can do so by installing an ad-blocker and by downloading legitimate software directly from vendors’ sites and not from sketchy third-party marketplaces.
Anmerkung der Redaktion:
Von Zeit zu Zeit, SensorsTechForum Features Gäste Artikel von Cyber-Sicherheit und infosec Führer und Enthusiasten wie diesem Beitrag. Die Meinungen in dieser Bewertung der Beiträge zum Ausdruck, jedoch, denen der mitwirkenden Autoren sind vollständig, und nicht über die in der SensorsTechForum reflektieren.