Interpol: Dark web hacking tools are fuelling cybercrime

"It's so easy to find tools," warns Interpol's head of cyber strategy

Hacking tools made readily available through dark web markets are making cyber crime as a service increasingly popular, according to Interpol's head of cyber strategy.

Cyber security professionals have warned of an increasing number of malware authors and hackers who, rather than attacking victims themselves, are instead acting as cyber arms dealers, selling toolkits that can be used by anyone to launch cyber attacks on targets. 

Advertisement - Article continues below

Because this allows even non-technical users to mount attacks, researchers have noticed a marked rise in the number of cyber attacks being carried out, Christophe Durand told IT Pro. "Definitively, we have a proliferation of attacks thanks to the availability of tools," he said.

"It's so easy, especially for basic attacks. It's so easy to find tools, to find RATs, to find everything you need. I'm a father - I'm sometimes afraid of what my children could do if they came across these kind of tools."

While these tools are often sold to would-be hackers by their creators, many (such as the source code behind the Mirai botnet) are being given away free of charge. Durand theorised that this could be a tactic used by advanced cyber criminals to throw investigators off their scent.

Advertisement
Advertisement - Article continues below

"They tend to use zero-day techniques in order to be efficient in their business, and afterwards, when they understand that maybe they were up to a point that it could be easy for us to identify them - because it's a very specific attack, usually - that's when they decide to share and to spread the techniques, even the tools, for free sometimes."

Advertisement - Article continues below

Unfortunately, Durand also pointed out that operating on a cyber crime as a service model is something that hackers are likely to continue doing.

"It's something that is still very promising for criminals," he said. "It's something that is quite natural for them, to be organised in different silos, in a way - money laundering, attack, social engineering and so on and so forth - because every part of this activity requires very specific skills."

Interpol has been working with law enforcement bodies in member countries in order to tackle cyber crime. The organisation offers training for police in areas like digital forensics, emerging technologies and burgeoning cyber crime tactics.

"Obviously, we can't train every police officer around the world, but what we aim to do is train the trainers," Durand said. "We are currently defining a curriculum for cyber crime investigators, and we are providing training to our membership."

Advertisement - Article continues below

It also participates in initiatives like the No More Ransom scheme, a public-private partnership to make decryption keys for ransomware widely available.

Think tank Reform suggested last month that police forces should be authorised to remove officers who lack the necessary digital skills to tackle cyber crime, and Durand acknowledged that the digital skills gap is an area that police are struggling with as much as private companies.

"It's also a question of a generation gap, because many people in charge of police activities are people who are not from the generation which is used to being connected all the time," he said.

He compared it to the change in policing brought about by the invention of the motor car around a century ago: when automobiles became common, hardly any police officers knew how to drive, but they quickly had to learn. In many countries, it's now compulsory to possess a driver's license when applying to join the police.

"I think that we need... in the future... this kind of basic knowledge," he said.

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now
Advertisement
Advertisement

Recommended

Visit/security/malware/355093/evasive-malware-threats-are-surging
malware

Evasive malware threats doubled in 2019

24 Mar 2020
Visit/security/355013/10-quick-tips-to-identifying-phishing-emails
Security

10 quick tips to identifying phishing emails

16 Mar 2020
Visit/business-strategy/mergers-and-acquisitions/354941/panda-security-to-be-acquired-by-watchguard
mergers and acquisitions

Panda Security to be acquired by WatchGuard

9 Mar 2020
Visit/security/malware/28083/the-five-best-free-malware-removal-tools
Security

Best free malware removal tools 2019

2 Mar 2020

Most Popular

Visit/infrastructure/server-storage/355118/hpe-warns-of-critical-bug-that-destroys-ssds-after-40000-hours
Server & storage

HPE warns of 'critical' bug that destroys SSDs after 40,000 hours

26 Mar 2020
Visit/software/video-conferencing/355138/zoom-beaming-ios-user-data-to-facebook-for-targeted-ads
video conferencing

Zoom beams iOS user data to Facebook for targeted ads

27 Mar 2020
Visit/software/355113/companies-offering-free-software-to-fight-covid-19
Software

These are the companies offering free software during the coronavirus crisis

25 Mar 2020
Visit/mobile/mobile-phones/355088/apple-lifts-iphone-purchase-restrictions
Mobile Phones

Apple lifts iPhone purchase restrictions

23 Mar 2020