Disrupting the Gateway Services to Cybercrime

Welcome to the Precious Metals Bug Forums

Welcome to the PMBug forums - a watering hole for folks interested in gold, silver, precious metals, sound money, investing, market and economic news, central bank monetary policies, politics and more. You can visit the forum page to see the list of forum nodes (categories/rooms) for topics.

Why not register an account and join the discussions? When you register an account and log in, you may enjoy additional benefits including no Google ads, market data/charts, access to trade/barter with the community and much more. Registering an account is free - you have nothing to lose!

pmbug

Your Host
Administrator
Benefactor
Messages
14,417
Reaction score
4,547
Points
268
Location
Texas
United-States
Arkose Labs, the global leader in bot management and online account security, today announced that threat intelligence from the company was provided to support Microsoft in the disruption of an alleged threat actor group that built viable cybercrime-as-a-service (CaaS) businesses. Dubbed Storm-1152 by Microsoft, the group bilked enterprises and consumers globally out of millions of dollars.

Cybercrime-as-a-service is a model where adversaries with superior technical, developer skills build attack tools, like automated bots, to sell to other fraudsters who may not be as technically adept, increasing the opportunity and reach for cybercrime and fraud. CaaS businesses encourage and enable more people to commit fraud at a volume and velocity that can overwhelm even experienced internal security operation center (SOC) teams. CaaS is in part responsible for the 167 percent increase in bot attacks this year, according to Arkose Labs’ latest threat landscape analysis.

“Storm-1152 is a formidable foe established with the sole purpose of making money by empowering adversaries to commit complex attacks,” said Kevin Gosschalk, founder and CEO, Arkose Labs. “The group is distinguished by the fact that it built its CaaS business in the light of day versus on the dark web. Storm-1152 operated as a typical internet going-concern, providing training for its tools and even offering full customer support. In reality, Storm-1152 was an unlocked gateway to serious fraud.”

The group’s CaaS business initially sold fraudsters ready-made, rote solver services for CAPTCHAs, which are the most effective security technology solutions to distinguish malicious bot attacks from genuine human consumers’ activities. Storm-1152 promoted that its solvers could bypass any type of CAPTCHA, enabling fraudsters to abuse the online environments of Microsoft and enterprises in other industries. It later pivoted its business model, deploying bots to register phony Microsoft accounts using fictitious usernames and then selling the fake accounts in bulk to other fraudsters so that they could use the accounts for a wide variety of online attacks, like phishing, malware, romance scams, in-product abuse, etc. Storm-1152 earned millions of dollars through these illicit activities, which are predicate offenses to financial crimes like money laundering.

The Arkose Cyber Threat Intelligence Research (ACTIR) unit first detected Storm-1152 in August 2021, pinpointing its whereabouts to Vietnam. “I’m incredibly proud of our threat intelligence team,” said Arkose Labs Chief Customer Officer Patrice Boffa. “ACTIR observed anomalies in Microsoft account-creation traffic, including the creation of accounts at a scale so large, fast, and efficient that it could have only been carried out through automated, machine-learning technology versus human actions. ACTIR then collaborated with our product team to enhance our solutions to run up Storm-1152’s attack effort, thus the cost.”

“No disruption is a one and done,” said Amy Hogan-Burney, Associate General Counsel, Cybersecurity Policy & Protection. “While today’s legal action will impact Storm-1152’s operations, we expect other threat actors will adapt their techniques as a result.

Going after cybercrime therefore requires persistence, collaboration and ongoing vigilance to disrupt new malicious infrastructure.”


A federal judge has ordered three internet service providers to block multiple websites developed by the group Storm-1152, which is alleged to be the top creator and seller of fraudulent Microsoft accounts.
...
Three defendants are named in the restraining order: Duong Dinh Tu, Linh Van Nguyễn (also known as Nguyễn Van Linh), and Tai Van Nguyen, all based out of Vietnam. Microsoft said the three lead Storm-1152's operations and that they operated and wrote the code for the illicit websites, published detailed step-by-step instructions on how to use their products via video tutorials and provided chat services to assist those using their fraudulent services.
...
Microsoft said it has asked law enforcement authorities to conduct a criminal investigation.

In his findings related to the leaders of Storm-1152, U.S. District Judge Paul Engelmayer said there was "good cause" to believe that the defendants had engaged in eight criminal practices, including racketeering and trademark infringement. That justified the order to take down four websites: 1stcaptcha.com, anycaptcha.com, nonecaptcha.com, and hotmailbox.me, according to Engelmayer.

The court ordered VeriSign and Identity Digital, the managers and operators of the .com and .me registries, to reregister the fraudulent domains to be under Microsoft's control. The court also ordered Cloudflare, the service provider for the fraudulent websites, to preserve evidence related to the case, disable computers serving the fraudulent websites, and prevent the defendants from registering additional domains.
...
Microsoft has identified multiple groups engaged in ransomware, data theft and extortion that have used Storm-1152 accounts, including Scattered Spider (also known as Octo Tempest), the group behind the ransomware attack against MGM Resorts and financial-sector targets.
...


A few cockroaches getting squashed. More will likely replace them.
 
Back
Top Bottom