logo
The Uber of the underworld

The Uber of the underworld

Mint4 days ago
EVERYTHING'S POSSIBLE at Harrods, proclaims the website of Britain's glitziest department store. Alas, on May 1st this universe of possibilities included an attempted cyber-attack that forced the company to restrict internet access at its sites, it said. The attempted intrusion came just days after hackers took down computer systems at Marks & Spencer (M&S), a supermarket and clothing retailer which says the disruptions will cost it some £300m ($405m). These breaches, which also hit the Co-op supermarket chain, were more than just costly cyber-attacks. They are worrying examples of how crime is evolving beyond simple street thuggery, or even the work of small groups of clever hackers, into a global service economy where anyone with cryptocurrency can buy the tools to paralyse a multinational corporation.
One of the chief suspects in the attacks on Britain's high street is the hacker collective Scattered Spider, according to Britain's National Crime Agency, which investigates serious and organised crime. Scattered Spider is not a traditional, hierarchical mafia. Instead it is a fluid network of young hackers who may never meet in person, yet can co-ordinate devastating attacks across continents. They are thought to have used DragonForce, a ransomware-as-a-service platform that gives criminals the software to carry out attacks in which they encrypt the victim's data or otherwise block their access to computer systems until a ransom is paid.
Just as Uber upended the taxi industry and Airbnb reshaped the hotel business, the criminal underworld is undergoing its own digital revolution. Criminals who might once have committed crimes themselves are now becoming service providers in a vast underground marketplace. This new service model 'is evolving at a rate that we've never previously seen", says John Wojcik of the United Nations Office on Drugs and Crime (UNODC).
The exact cost of cybercrime cannot be known, since much of it happens in the shadows and victims of ransomware attacks may be reluctant to report the crimes. Sometimes this is out of fear that doing so will harm their reputation among customers or that it could result in them being fined under data-protection laws.
Nevertheless, it is clear that the scale is staggering, with billions, possibly trillions, of dollars in economic costs each year. The low end of the range comes from tallies of reported crimes by law-enforcement agencies. The FBI said it received reports of direct losses of $16.6bn in 2024, a 33% increase over 2023. Adding in unreported losses and wider economic costs leads to bigger numbers. Britain puts its current annual losses at more than £27bn (based on old data). The European Commission reckons that the worldwide costs of cybercrime were €5.5trn ($6.5trn) in 2021.
Though estimates of the full cost differ, almost all studies suggest that cybercrime is booming. One reason is the emergence of DragonForce and other similar providers of plug-and-play hacking kits, which give even unskilled criminals the ability to launch ransomware attacks. This dramatically lowers the barriers for newcomers, who no longer have to write their own malicious malware. Moreover, a wider ecosystem of criminal services is developing. This allows hackers to buy, rather than steal, the personal data they need to identify potential victims or to work out how to launder ransom payments. Many of these services are accessed through online forums or messaging apps, such as Telegram, and are often paid for with cryptocurrency.
Hackers who develop ransomware use a variety of business models from selling the basic code, which sometimes costs as little as $2,000, to ransomware-as-a-service. Under the service model a client (or affiliate) gets access to a web portal that lets them customise the ransomware. Some groups also provide a communications portal, through which their clients can negotiate anonymously with their victims. In exchange for these services they take a share of the profits. Market forces and competition have pushed these down to around 10-20% from around 30-40% a few years ago.
Keeping secrets
This new modular model is not easily thwarted by law-enforcement officials. When cybercrime operates through countless providers, shutting down one node barely dents the system. In 2023 Scattered Spider attacked Caesars Entertainment and MGM Resorts International, two American casino operators, yet the FBI struggled to dismantle the network.
Criminal business models are also evolving. DragonForce uses a double extortion method. The service both steals a copy of its victim's data and also encrypts it on the victim's computer system. Thus it can demand two separate ransoms: one to unscramble the data and another to delete the stolen copy. Firms that refuse to pay face the threat that their data will be leaked to other cyber-criminals.
The targeting of large retailers such as M&S, Co-op and Harrods is not random: these sorts of firms house troves of customer data. After Scattered Spider's attacks on the British retailers, Google warned on May 21st that the group is turning its attention to American retailers.
The sorts of personal information big retailers hold—names, email addresses, credit-card details, shopping habits, even browsing histories that reveal personal interests—are the backbone of modern retailing. These data are among cybercrime's most valuable commodities. With this information criminals can craft more convincing phishing attacks (emails that impersonate legitimate companies in order to trick people into divulging passwords or financial information), launch targeted malware attacks and commit fraud. Underground markets, hosted on messaging apps or on the dark web, now serve as trading hubs where vendors sell stolen credit-card details, bank records and other confidential data. Beyond hacking large retailers, criminals who specialise in stealing and selling data also target banks, investment firms and other financial companies for information about wealthy clients and other profitable targets.
Increasingly, criminals use information-stealing malware, often distributed through phishing emails or malicious ads, that infects computers and smartphones. This malware harvests browsing history, saved passwords (including from internet banking), chat logs, cryptocurrency-wallet details and other personal content. Among these password-stealers are RedLine Infostealer, which has been used to infiltrate major corporations, and META Infostealer (not to be confused with the company that runs Facebook). They are distributed through a decentralised malware-as-a-service model in which cybercriminals either buy a lifetime licence for $900 or subscribe to use it at a cost of $150 a month, according to a criminal complaint filed by America's Department of Justice before a court in Texas in 2022. One cyber-security expert now reckons that the cost of a lifetime licence has increased to $10,000.
Adding fuel to the fire is artificial intelligence (AI), which has already transformed two common types of cybercrime: producing malware and conducting phishing attacks. In the past, gangs would have needed experts with advanced coding skills to write malware or to tailor it to specific targets, tasks that are easily done by generative AI. 'What might have previously taken an advanced criminal group weeks to figure out is now available to any criminal in minutes," says Jeff Sims of Infoblox, a security firm.
AI also allows criminals to produce convincing, well-written phishing messages (often in languages that are not their own). These are more likely to succeed in deceiving victims, especially when combined with stolen data. Crime syndicates, for example Chinese groups operating out of South-East Asia, are using AI to translate scripts for romance scams, fake job offers or fraudulent investments, letting them target victims around the world.
Paying the bounty
Law-enforcement agencies have tended to focus on trying to shut down or disrupt the providers of ransomware. In late May an operation by European and North American agencies dismantled an extensive network and issued arrest warrants for 20 people. Yet the continued growth in this sort of crime suggests that enforcement is failing, leading to more draconian proposals. Britain plans to outlaw payment of ransoms by public-sector bodies and operators of critical infrastructure, hoping this will make them less attractive as targets. Those not subject to this ban would still have to report ransomware attacks to the authorities, which would allow law-enforcement officials to block ransom payments. Yet legal experts fret this will not stop cyberattacks (since hackers may still get customer data that they can sell) nor protect companies, which could collapse if they cannot regain control of their data.
If nothing else, the dilemma over how to deter the new breed of cybercriminals highlights how one of the world's fastest-growing criminal threats come not from armed gangsters, but from geeks writing and selling code in the burgeoning underworld of the criminal gig economy.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

The Uber of the underworld
The Uber of the underworld

Mint

time4 days ago

  • Mint

The Uber of the underworld

EVERYTHING'S POSSIBLE at Harrods, proclaims the website of Britain's glitziest department store. Alas, on May 1st this universe of possibilities included an attempted cyber-attack that forced the company to restrict internet access at its sites, it said. The attempted intrusion came just days after hackers took down computer systems at Marks & Spencer (M&S), a supermarket and clothing retailer which says the disruptions will cost it some £300m ($405m). These breaches, which also hit the Co-op supermarket chain, were more than just costly cyber-attacks. They are worrying examples of how crime is evolving beyond simple street thuggery, or even the work of small groups of clever hackers, into a global service economy where anyone with cryptocurrency can buy the tools to paralyse a multinational corporation. One of the chief suspects in the attacks on Britain's high street is the hacker collective Scattered Spider, according to Britain's National Crime Agency, which investigates serious and organised crime. Scattered Spider is not a traditional, hierarchical mafia. Instead it is a fluid network of young hackers who may never meet in person, yet can co-ordinate devastating attacks across continents. They are thought to have used DragonForce, a ransomware-as-a-service platform that gives criminals the software to carry out attacks in which they encrypt the victim's data or otherwise block their access to computer systems until a ransom is paid. Just as Uber upended the taxi industry and Airbnb reshaped the hotel business, the criminal underworld is undergoing its own digital revolution. Criminals who might once have committed crimes themselves are now becoming service providers in a vast underground marketplace. This new service model 'is evolving at a rate that we've never previously seen", says John Wojcik of the United Nations Office on Drugs and Crime (UNODC). The exact cost of cybercrime cannot be known, since much of it happens in the shadows and victims of ransomware attacks may be reluctant to report the crimes. Sometimes this is out of fear that doing so will harm their reputation among customers or that it could result in them being fined under data-protection laws. Nevertheless, it is clear that the scale is staggering, with billions, possibly trillions, of dollars in economic costs each year. The low end of the range comes from tallies of reported crimes by law-enforcement agencies. The FBI said it received reports of direct losses of $16.6bn in 2024, a 33% increase over 2023. Adding in unreported losses and wider economic costs leads to bigger numbers. Britain puts its current annual losses at more than £27bn (based on old data). The European Commission reckons that the worldwide costs of cybercrime were €5.5trn ($6.5trn) in 2021. Though estimates of the full cost differ, almost all studies suggest that cybercrime is booming. One reason is the emergence of DragonForce and other similar providers of plug-and-play hacking kits, which give even unskilled criminals the ability to launch ransomware attacks. This dramatically lowers the barriers for newcomers, who no longer have to write their own malicious malware. Moreover, a wider ecosystem of criminal services is developing. This allows hackers to buy, rather than steal, the personal data they need to identify potential victims or to work out how to launder ransom payments. Many of these services are accessed through online forums or messaging apps, such as Telegram, and are often paid for with cryptocurrency. Hackers who develop ransomware use a variety of business models from selling the basic code, which sometimes costs as little as $2,000, to ransomware-as-a-service. Under the service model a client (or affiliate) gets access to a web portal that lets them customise the ransomware. Some groups also provide a communications portal, through which their clients can negotiate anonymously with their victims. In exchange for these services they take a share of the profits. Market forces and competition have pushed these down to around 10-20% from around 30-40% a few years ago. Keeping secrets This new modular model is not easily thwarted by law-enforcement officials. When cybercrime operates through countless providers, shutting down one node barely dents the system. In 2023 Scattered Spider attacked Caesars Entertainment and MGM Resorts International, two American casino operators, yet the FBI struggled to dismantle the network. Criminal business models are also evolving. DragonForce uses a double extortion method. The service both steals a copy of its victim's data and also encrypts it on the victim's computer system. Thus it can demand two separate ransoms: one to unscramble the data and another to delete the stolen copy. Firms that refuse to pay face the threat that their data will be leaked to other cyber-criminals. The targeting of large retailers such as M&S, Co-op and Harrods is not random: these sorts of firms house troves of customer data. After Scattered Spider's attacks on the British retailers, Google warned on May 21st that the group is turning its attention to American retailers. The sorts of personal information big retailers hold—names, email addresses, credit-card details, shopping habits, even browsing histories that reveal personal interests—are the backbone of modern retailing. These data are among cybercrime's most valuable commodities. With this information criminals can craft more convincing phishing attacks (emails that impersonate legitimate companies in order to trick people into divulging passwords or financial information), launch targeted malware attacks and commit fraud. Underground markets, hosted on messaging apps or on the dark web, now serve as trading hubs where vendors sell stolen credit-card details, bank records and other confidential data. Beyond hacking large retailers, criminals who specialise in stealing and selling data also target banks, investment firms and other financial companies for information about wealthy clients and other profitable targets. Increasingly, criminals use information-stealing malware, often distributed through phishing emails or malicious ads, that infects computers and smartphones. This malware harvests browsing history, saved passwords (including from internet banking), chat logs, cryptocurrency-wallet details and other personal content. Among these password-stealers are RedLine Infostealer, which has been used to infiltrate major corporations, and META Infostealer (not to be confused with the company that runs Facebook). They are distributed through a decentralised malware-as-a-service model in which cybercriminals either buy a lifetime licence for $900 or subscribe to use it at a cost of $150 a month, according to a criminal complaint filed by America's Department of Justice before a court in Texas in 2022. One cyber-security expert now reckons that the cost of a lifetime licence has increased to $10,000. Adding fuel to the fire is artificial intelligence (AI), which has already transformed two common types of cybercrime: producing malware and conducting phishing attacks. In the past, gangs would have needed experts with advanced coding skills to write malware or to tailor it to specific targets, tasks that are easily done by generative AI. 'What might have previously taken an advanced criminal group weeks to figure out is now available to any criminal in minutes," says Jeff Sims of Infoblox, a security firm. AI also allows criminals to produce convincing, well-written phishing messages (often in languages that are not their own). These are more likely to succeed in deceiving victims, especially when combined with stolen data. Crime syndicates, for example Chinese groups operating out of South-East Asia, are using AI to translate scripts for romance scams, fake job offers or fraudulent investments, letting them target victims around the world. Paying the bounty Law-enforcement agencies have tended to focus on trying to shut down or disrupt the providers of ransomware. In late May an operation by European and North American agencies dismantled an extensive network and issued arrest warrants for 20 people. Yet the continued growth in this sort of crime suggests that enforcement is failing, leading to more draconian proposals. Britain plans to outlaw payment of ransoms by public-sector bodies and operators of critical infrastructure, hoping this will make them less attractive as targets. Those not subject to this ban would still have to report ransomware attacks to the authorities, which would allow law-enforcement officials to block ransom payments. Yet legal experts fret this will not stop cyberattacks (since hackers may still get customer data that they can sell) nor protect companies, which could collapse if they cannot regain control of their data. If nothing else, the dilemma over how to deter the new breed of cybercriminals highlights how one of the world's fastest-growing criminal threats come not from armed gangsters, but from geeks writing and selling code in the burgeoning underworld of the criminal gig economy.

UK's Next lifts profit outlook as warm weather, M&S disruption boost trade
UK's Next lifts profit outlook as warm weather, M&S disruption boost trade

Time of India

time7 days ago

  • Time of India

UK's Next lifts profit outlook as warm weather, M&S disruption boost trade

British clothing retailer Next raised its annual profit outlook for the third time in five months as it reported better-than-expected second-quarter sales, benefiting from warm weather and disruption at cyberattack-hit rival Marks & Spencer. Next has around 460 stores in the UK and Ireland and an online presence in over 70 countries selling the Next brand and more than 700 other brands. With the United Kingdom accounting for around 80% of its sales, it is often considered a useful gauge of how British consumers are faring. It said on Thursday full-price sales in the 13 weeks to July 26 rose 10.5% versus last year - ahead of guidance of 6.5% and compared to growth of 11.4% in the first quarter. Sales overperformed against Next's expectations in both the UK and overseas, it said. The retailer said UK sales growth of 7.8% was largely due to better than expected weather and "trading disruption at a major competitor", which it did not name. However, Next's second quarter overlapped a period where M&S stopped taking online clothing orders following a cyberattack which has cost it 300 million pounds ($398 million) in profit. Industry data has shown Next to be a beneficiary of M&S' woes, along with Zara and H&M. Next said international sales grew a faster than expected 26.4% mainly because its digital marketing proved more effective than anticipated. Though Next raised its guidance for second half full price sales growth to 4.5% from 3.5% previously, it remained cautious for the period. It expects UK employment opportunities to continue to diminish, with the effects of April's employer tax increases continuing to filter through into the economy. "We believe that this will increasingly dampen consumer spending as the year progresses," it said. Reflecting that caution, Next shares were flat on Thursday, having risen 29% in 2025 so far. "Next is cautious about the second half of the year, but the company has a good track record of under-promising and over-delivering," Zoe Gillespie, wealth manager at RBC Brewin Dolphin, said. Next raised its forecast for year to January 2026 pretax profit by 25 million pounds to 1.105 billion pounds. Profit topped 1 billion pounds for the first time in 2024/25. On Wednesday, Next bought the brand rights to maternity retailer Seraphine.

Ransomware groups are blurring the line between cybercrime and ‘hacktivism'
Ransomware groups are blurring the line between cybercrime and ‘hacktivism'

Time of India

time31-07-2025

  • Time of India

Ransomware groups are blurring the line between cybercrime and ‘hacktivism'

Ransomware is evolving from profit-driven attacks to political tools, targeting countries like India and the US, according to a report by Akamai. These hybrid groups are mixing financial crime with political messaging, blurring the line between them, making it harder for authorities to stop them. India, in particular, is facing rising attacks, highlighting the need for stronger cyber defences. Tired of too many ads? Remove Ads Tired of too many ads? Remove Ads Tired of too many ads? Remove Ads Cybercriminals are now using ransomware not only to make money but also to spread political propaganda , according to a new report by cybersecurity and cloud computing company its State of the Internet 2025 report, Akamai shows how some ransomware groups are acting more like hacktivists — hackers who attack systems to support a political or social or RaaS groups with hacktivist motivations are using ransom payments to fund campaigns to advance their ideologies.'We are seeing actors like DragonForce and KillSec blend ideology with extortion, turning ransomware into a weapon of disruption rather than just a tool for profit. This fusion of hacktivism and RaaS blurs attribution and complicates response,' Reuben Koh, director of security technology and strategy, Asia-Pacific & Japan, Akamai, told of the biggest hacktivist groups is Malaysia-based DragonForce. The group focuses especially on disrupting systems in India and Israel. It has launched major ransomware attacks across other countries as well, including the UK and the United group, Stormous, has attacked big companies such as soft drink manufacturer Coca-Cola and Barbie doll maker Mattel, and often leaves ransom notes in Arabic. It targets countries seen as unfriendly to Russia or aligned with Western interests, including France, Spain, the US, and there is KillSec, which began its attacks in October 2023. It supports pro-Russian political ideas and mainly targets the government and healthcare sectors. KillSec has shown a particular interest in targeting Asian countries such as India and Bangladesh, as well as other countries, including the United which started as a political hacktivist group in 2024, also began using ransomware to attack critical systems in NATO-aligned (North Atlantic Treaty Organisation) countries. It started using ransomware for retaliation against adversaries of Russia or India, and often targets report also cited data from eCrime Threat and Risk Intelligence Services, which shows that Asia was a major target for ransomware attacks. In 2024, India experienced 17 attacks on its financial institutions, surpassing the UK's 16 and Canada's these figures are still far lower than the 151 attacks reported in the US last year.'India's growing geopolitical relevance and digital infrastructure make it a high-value target for hybrid ransomware groups, said Koh. 'This highlights the urgent need for resilient, intelligence-led cyber defences across Indian enterprises and critical infrastructure that can adapt to the ever-changing threat landscape and adversaries.'Since 2022, FBI decryption keys have helped victims in the US avoid over $800 million in ransom payments. Decryption protects sensitive data like financial records and personal information, by keeping it secure yet are banning ransom payments to threat actors, since paying doesn't guarantee data recovery. Meanwhile, cyber insurance providers are incentivising organisations to strengthen security programs and offering their negotiating skills to lower ransomware payments.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store