Interpol: Dark web hacking tools are fuelling cybercrime

"It's so easy to find tools," warns Interpol's head of cyber strategy

Hacking tools made readily available through dark web markets are making cyber crime as a service increasingly popular, according to Interpol's head of cyber strategy.

Cyber security professionals have warned of an increasing number of malware authors and hackers who, rather than attacking victims themselves, are instead acting as cyber arms dealers, selling toolkits that can be used by anyone to launch cyber attacks on targets. 

Because this allows even non-technical users to mount attacks, researchers have noticed a marked rise in the number of cyber attacks being carried out, Christophe Durand told IT Pro. "Definitively, we have a proliferation of attacks thanks to the availability of tools," he said.

"It's so easy, especially for basic attacks. It's so easy to find tools, to find RATs, to find everything you need. I'm a father - I'm sometimes afraid of what my children could do if they came across these kind of tools."

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

While these tools are often sold to would-be hackers by their creators, many (such as the source code behind the Mirai botnet) are being given away free of charge. Durand theorised that this could be a tactic used by advanced cyber criminals to throw investigators off their scent.

"They tend to use zero-day techniques in order to be efficient in their business, and afterwards, when they understand that maybe they were up to a point that it could be easy for us to identify them - because it's a very specific attack, usually - that's when they decide to share and to spread the techniques, even the tools, for free sometimes."

Unfortunately, Durand also pointed out that operating on a cyber crime as a service model is something that hackers are likely to continue doing.

"It's something that is still very promising for criminals," he said. "It's something that is quite natural for them, to be organised in different silos, in a way - money laundering, attack, social engineering and so on and so forth - because every part of this activity requires very specific skills."

Interpol has been working with law enforcement bodies in member countries in order to tackle cyber crime. The organisation offers training for police in areas like digital forensics, emerging technologies and burgeoning cyber crime tactics.

"Obviously, we can't train every police officer around the world, but what we aim to do is train the trainers," Durand said. "We are currently defining a curriculum for cyber crime investigators, and we are providing training to our membership."

Advertisement - Article continues below

It also participates in initiatives like the No More Ransom scheme, a public-private partnership to make decryption keys for ransomware widely available.

Think tank Reform suggested last month that police forces should be authorised to remove officers who lack the necessary digital skills to tackle cyber crime, and Durand acknowledged that the digital skills gap is an area that police are struggling with as much as private companies.

"It's also a question of a generation gap, because many people in charge of police activities are people who are not from the generation which is used to being connected all the time," he said.

He compared it to the change in policing brought about by the invention of the motor car around a century ago: when automobiles became common, hardly any police officers knew how to drive, but they quickly had to learn. In many countries, it's now compulsory to possess a driver's license when applying to join the police.

"I think that we need... in the future... this kind of basic knowledge," he said.

Featured Resources

Digital Risk Report 2020

A global view into the impact of digital transformation on risk and security management

Download now

6 ways your business could suffer if you don’t backup Office 365

Office 365 makes it easy to lose valuable data regularly, unpredictably, unintentionally, and for good

Download now

Get the best out of your workforce

7 steps to unleashing their true potential with robotic process automation

Download now

8 digital best practices for IT professionals

Don't leave anything to chance when going digital

Download now
Advertisement

Recommended

Visit/malware/33080/hackers-abuse-linkedin-dms-to-plant-malware
malware

Hackers abuse LinkedIn DMs to plant malware

25 Feb 2019
Visit/security/malware/28083/the-five-best-free-malware-removal-tools
Security

Best free malware removal tools 2019

23 Dec 2019
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/mobile/28299/how-to-use-chromecast-without-wi-fi
Mobile

How to use Chromecast without Wi-Fi

5 Feb 2020
Visit/security/cyber-security/354827/mcafee-researchers-trick-tesla-autopilot-with-a-strip-of-tape
cyber security

McAfee researchers trick Tesla autopilot with a strip of tape

21 Feb 2020
Visit/operating-systems/27717/how-to-fix-a-stuck-windows-10-update
operating systems

How to fix a stuck Windows 10 update

12 Feb 2020
Visit/security/34616/the-top-ten-password-cracking-techniques-used-by-hackers
Security

The top ten password-cracking techniques used by hackers

10 Feb 2020