Cyberwarfare, Espionage & Extortion Issue #4: w/e 9th February 2024

“He who fights with monsters might take care lest he thereby become a monster. And if you gaze for long into an abyss, the abyss gazes also into you.” ― Friedrich Nietzsche, Beyond Good and Evil

Cyberwarfare, Espionage & Extortion Issue #4: w/e 9th February 2024
  • ApateWeb: An Evasive Large-Scale Scareware and PUP Delivery Campaign - Attackers craft deceptive emails to lure victims into clicking on their campaign URLs and embed JavaScript into website pages that redirect traffic to their content. ApateWeb has a complex infrastructure with a multilayered system that includes a series of intermediate redirections between the entry point and delivery of the final malicious payload.
    A group using a centralized infrastructure largely controls the entry point by tracking victims before forwarding traffic to the next layer of this campaign. This group also uses evasive tactics like cloaking malicious content and abusing wildcard DNS in an attempt to prevent defenders from detecting their campaign.
    We observed a spike in ApateWeb activity since August 2022, though the campaign has been active throughout 2022, 2023 and 2024 so far. The impact of this campaign on internet users could be large, since several hundred attacker-controlled websites have remained in Tranco’s top 1 million website ranking list.

  • Anonymous Collective Reveals New Referral Program for Privacy Shield VPN and CloudStorm DDoS Services - In a recent development on the dark web, the Anonymous Collective hacker group has introduced a referral program for its Privacy Shield VPN and CloudStorm DDoS services. The group is offering a complimentary plan to individuals who successfully refer clients making purchases from their VPN and DDoS offerings.

    The announcement emblazoned with the trademark CLOUDSTORM DDOS EST.2024, signifies a step forward in incentivizing the group’s clientele. The referral program spans both the Privacy Shield VPN and CloudStorm DDoS services, aiming to reward those who bring new customers into the fold.

  • AnyDesk Initiates Extensive Credentials Reset Following Cyberattack - AnyDesk was hit by a cyberattack that compromised its production systems, the company said Friday in a blog post.

    The company said it immediately responded to the attack, which did not involve ransomware, by revoking and replacing an array of security certificates. AnyDesk did not say when or how it became aware of the attack and did not immediately respond to requests for comment.

    “We have revoked all security-related certificates and systems have been remediated or replaced where necessary,” AnyDesk said in the blog post. “We will be revoking the previous code signing certificate for our binaries shortly and have already started replacing it with a new one.”


Insight

The Sinister Rise of Deepfake Porn

A Digital Pandemic of Unprecedented Violation

In the murky depths of the digital world, a chilling phenomenon is unfolding with catastrophic implications: deepfake pornography. This nefarious use of cutting-edge technology, capable of grafting faces onto pornographic videos with terrifying accuracy, is not just a gross invasion of privacy—it's becoming a weapon of extortion and espionage, shattering lives and threatening the very fabric of societal trust and security. 

A shadowy corner of the internet, known as 4Chan, has become the stage for a disturbing display of digital witch-hunting. Here, anonymous users orchestrate vile campaigns against women daring to stand in court, weaponizing deepfake technology to create explicit content in a bid to intimidate, discredit, and silence them. This act of digital assault seeks not only to humiliate but also to annihilate the credibility and dignity of those involved. 

Parallel to this, a breach within the ranks of the U.S. Army has exposed a similar, sinister trend. Investigations have unearthed private Facebook groups where soldiers, betraying the camaraderie of the uniform, share non-consensual, nude images of fellow service members. Among these, deepfakes sow confusion and mistrust, eroding the foundation of respect and integrity upon which the military is built.  

Grim Reality

I was contacted by Sarah (not her real name), a 28-year-old marketing executive, who discovered her face seamlessly integrated into explicit adult content online. The deepfake videos, indistinguishable from reality, shattered her sense of security, leading to public humiliation, emotional trauma, and professional repercussions. 

What makes Sarah's story chilling is its ordinariness. Deepfake technology, once the preserve of experts, is now easily accessible, enabling perpetrators to create realistic pornographic content featuring anyone with an online presence. The impact is devastating: victims, often women, find themselves battling mental health issues, social stigma, and a digital footprint that's nearly impossible to erase. 

What happened to Sarah is a stark reminder of the pervasive threat posed by deepfake technology. It's not just a violation of privacy; it's a form of digital violence that demands immediate attention and action. 

The Bigger Picture

The convergence of deepfake pornography with extortion and espionage opens a new, dark chapter in cybercrime. Cyber predators and geopolitical adversaries now possess the ultimate tool of manipulation, wielding the power to fabricate reality, coerce innocent victims into surrendering sensitive information, or manipulate their actions from the shadows. The implications are harrowing, extending beyond personal anguish to pose stark threats to national security and corporate secrets, where a single deepfake could trigger international crises or corporate meltdowns. 

Fighting Back

Confronting this digital scourge demands an arsenal of countermeasures. Legal systems worldwide are scrambling to adapt, making strides to criminalize the creation and dissemination of non-consensual deepfakes. Yet, the anonymity of the cyber realm and the relentless pace of technological innovation render these efforts akin to a high-stakes game of whack-a-mole. 

Experts are calling for a revolution in detection technology and a societal awakening to digital literacy, arming the public against the deceit of deepfakes. Social media giants and online forums are under pressure to become vigilant gatekeepers, purging their platforms of this toxic content and collaborating with law enforcement to bring digital offenders to justice. 

The battle lines are drawn in this new war for digital decency and security. The unfolding saga of deepfake pornography, from the vile corners of 4Chan to the compromised confidentiality within the military, illustrates a grim reality: in the age of deepfakes, the truth is more vulnerable than ever, and the fight to protect it needs all of us to step up. 


Scammers Corner

FBI Issues Alert on Tech Support Scams Using Couriers to Exploit Seniors

In a significant development, the Federal Bureau of Investigation (FBI) has issued a warning about an alarming trend in tech support and government impersonation scams. According to the FBI, criminals are increasingly employing courier services to physically collect money and valuables from unsuspecting victims, many of whom are senior citizens. 

This public service announcement comes in the wake of a worrying increase in reports of scammers instructing victims to sell their valuables, including cash or precious metals like gold or silver. "The FBI is warning the public about scammers instructing victims, many of whom are senior citizens, to liquidate their assets into cash and/or buy gold, silver, or other precious metals to protect their funds," the FBI stated in a press release. "Criminals then arrange for couriers to meet the victims in person to pick up the cash or precious metals." 

How It Works: The Pressure Campaign

The scheme operates by tricking victims into believing they are in urgent need of tech support or are dealing with government officials. Once trust is established, the criminals persuade their targets to convert their assets into easily transferable formats. The use of couriers adds a worrying new dimension to these scams, making them more direct and personal. 

Authorities are particularly concerned about the impact on senior citizens, who are often the primary targets of such fraudulent schemes. The combination of high-pressure tactics and the physical presence of a courier can be particularly intimidating for older individuals, making them more susceptible to these scams. 

Defense: Check and Verify

The FBI's warning serves as a crucial reminder for the public to remain vigilant against such deceptive practices. Individuals are advised to be cautious of unsolicited tech support offers or unexpected government contacts demanding payment or asset liquidation. 

In light of this disconcerting trend, the FBI urges everyone, especially those with elderly family members or friends, to remain vigilant. If you or someone you know is approached with a request to exchange or hand over assets for safekeeping, take a moment to pause and verify the legitimacy of the request. Remember, legitimate tech support or government entities will never ask for payment or financial transactions via unsolicited emails or calls. It's crucial to keep open lines of communication with vulnerable individuals, educating them about such scams, and reminding them to seek assistance before responding to such requests. Together, by staying alert and informed, we can build a community defense against these unscrupulous schemes and protect our most susceptible loved ones from falling prey to these predators. 


The Deep Dive

The Dark Turn of Cybercrime: Drainer-as-a-Service Unleashes a New Era of Digital Destruction 

Understanding DaaS

In the shadowy corners of the internet, a sinister trend is gaining momentum, threatening to propel cybercrime into unprecedented territories of chaos and conflict. Dubbed "Drainer-as-a-Service" (DaaS), this malevolent innovation is not just pilfering the digital coffers of the cryptocurrency world but is ominously morphing into a formidable weapon of cyberwarfare, espionage, and ruthless extortion. 

Drainer-as-a-Service (DaaS) is a malicious service model that has emerged in the cybercrime ecosystem, enabling users to illicitly drain or siphon off digital assets, particularly cryptocurrencies, from victims' wallets. This service leverages vulnerabilities within blockchain applications, smart contracts, or cryptocurrency wallets to unauthorizedly transfer assets to the attacker’s control. DaaS operates on a subscription or pay-per-use basis, making sophisticated hacking tools accessible to a broader audience without requiring extensive technical knowledge. 

At its core, DaaS provides a toolkit or platform that automates the process of exploiting these vulnerabilities. Users of the service can simply input target details or select from a range of attack vectors provided by the service. The platform then executes the attack, draining funds from the digital wallets of unsuspecting victims. This service may also include features like anonymizing the stolen assets, making it harder for law enforcement to trace the illicit transactions. 

A Pandora's Box of Cyber Threats 

Drainer-as-a-Service represents a significant evolution in the cybercrime landscape, democratizing access to complex hacking techniques. It poses a formidable threat not only to individual cryptocurrency holders but also to businesses and DeFi platforms.  

As the digital underworld continues to evolve, DaaS is emerging/has emerged as a harrowing testament to the democratization of cybercrime. Offering a nefarious suite of tools that enable even the most novice of hackers to siphon off cryptocurrency with alarming ease, the service is a chilling harbinger of how sophisticated cyberattacks are becoming more accessible to the masses. "Drainer-as-a-Service isn't just a threat; it's a grim blueprint for digital anarchy," warns Elena Moreno, a seasoned cybersecurity analyst at Digital Shield Institute. 

Beyond Theft: A Spectrum of Digital Terror 

The rise of DaaS highlights the ongoing struggle between cybercriminals exploiting new technologies for illicit gain and cybersecurity professionals working to protect digital assets and maintain trust in the blockchain ecosystem. 

The implications of DaaS stretch far beyond mere financial fraud. Armed with the capability to exploit vulnerabilities with surgical precision, these platforms are a goldmine for cyber mercenaries and rogue nations. "Imagine weaponizing DaaS to breach and paralyze critical infrastructure, or to infiltrate secure networks and pilfer state secrets," Moreno posits, outlining a dystopian vision where digital warfare is waged silently, yet devastatingly, across global cyber frontiers. 

Espionage and Extortion: The New Norm 

As if torn from the plot of a cyber thriller, DaaS platforms are morphing into conduits for sinister espionage activities, allowing shadowy figures to extract sensitive information and wield it as a tool of power and persuasion. Moreover, the specter of extortion looms large, with attackers holding digital assets hostage, demanding ransoms to avert catastrophe or keep damning data from being exposed. 

A Call to Arms 

Confronting the hydra of DaaS demands more than mere technological countermeasures; it calls for a global crusade against the burgeoning cybercrime economy that feeds this beast. International cooperation, innovative defense mechanisms, and a vigilant public are the triad of forces necessary to combat this menace. "The battlefield has shifted to the digital realm, and the fight against Drainer-as-a-Service is a fight for our very way of life," Moreno asserts, underscoring the urgency of a unified response. 

As a new, dark, chapter dawns over the digital age, the emergence of Drainer-as-a-Service is a stark reminder that in the war for the web, the stakes have never been higher. With the potential to escalate from a tool of larceny to a lever of geopolitical leverage, DaaS stands as a grim testament to the evolving challenge of securing our interconnected world against the shadows that seek to disrupt and dominate it. 


And Finally ….

This week in the realm of cybercrime, espionage, and extortion, several significant events have unfolded: 

  • The U.S. Government launched a decisive strike against a botnet operated by the People's Republic of China, known as "Volt Typhoon." This botnet utilized hijacked small office/home office (SOHO) routers within the U.S. to mask further hacking activities against critical infrastructure organizations. The operation, which took place in December 2023, successfully removed malware from infected routers and implemented measures to prevent reinfection​​. 
  • An ongoing Chinese hacking campaign targeting U.S. critical infrastructure has been active for approximately five years. American and allied intelligence agencies have highlighted the sophisticated nature of these attacks, underscoring the persistent threat posed by these advanced groups of hackers​​. 
  • Interpol recently announced the results of Operation Synergia, a concerted effort to combat the "clear growth, escalation, and professionalization of transnational cybercrime." This operation led to the arrest of 31 individuals and the dismantling of numerous malicious servers across 55 countries. The operation targeted various forms of cybercrime, including phishing, banking malware, and ransomware, and received support from multiple private sector entities​​. 

These incidents highlight the global and interconnected nature of cyber threats and the ongoing efforts by international law enforcement and intelligence agencies to counter these challenges. The collaboration between countries and the private sector is crucial in safeguarding the digital landscape and protecting critical infrastructure from sophisticated and evolving cyber threats. 

So, please join us for next week’s Valentine edition (for those of you who celebrate!) when we’ll be discussing cryptocurrency scams (the gift that keeps on giving for fraud fighters), and a Special Insight Report which links up our three worlds of Cyberwarfare, Espionage and Extortion. 


Thanks for reading Cyberwarfare, Espionage & Extortion! Subscribe for free to receive new posts and support my work.

Follow My Socials

- Computercrime on LinkedIn
- X (formerly Twitter)
- That Fraud Guy on Mastodon
- Read my stuff on Dark Reading