Головна We are in the media Russian-speaking hackers have performed 58% of the world's cyberattacks. How the Eastern European Hacking Market Works
'
01 November 2021
Russian-speaking hackers have performed 58% of the world’s cyberattacks. How the Eastern European Hacking Market Works

According to Netscout estimates for 2020, more than 26 thousand cyberattacks occur every day globally. That is, 18 attacks per minute. IBM and the Ponemon Institute have determined that the global average financial cost of data loss in 2020 reached $1 trillion.

Eastern European, or Russian-speaking cybercriminals as experts call them, rightfully occupy the first positions in the global hacking market. According to a Microsoft study, between July 2020 and June 2021, Russian-speaking groups performed 58% of all global cyberattacks. The United States government identifies Russian-speaking hacker groups as a separate type of threat. And the leadership of the State Special Communications Service of Ukraine claims that more than 90% of all cyberattacks in Ukraine were carried out by Russian-speaking hackers.

Confidential Information Hunters

They are accused of cyberattacks on the White House. They stole confidential documents from the Democratic National Committee and US government agencies. Their name is CozyDuke. This group has been operating since 2008, specializing in cyber espionage and theft of state secrets. CozyDuke is well organized and has access to cutting-edge technology. Their main goal is the public sector. Cybercriminals create malware on their own and often use alternative methods of executing code in their attacks. As a result, typical cyber defense tools are often powerless against CozyDuke attacks.

Phishers

You may not have heard of the TA505, however, it is possible that your data or electronic devices have long been under their control. For the first time, the activities of the group were identified in 2014, but experts note that TA505 is existing since 2006. Phishing is considered a favorite tool of cybercriminals. The victims of TA505 are mainly large businesses and industrial enterprises. A characteristic feature of the group is that they purposefully avoid attacks on the territory of Ukraine, the Baltic States, and the CIS.

Old-timers

The first mention of this group dates back to 1997. In 2008, they launched an attack on the central leadership of the US armed forces and still remain one of the most dangerous groups in the world. They are called Turla. Cybercriminals use various types of malicious software, hack web servers, create new attack algorithms and network worms on their own, and what is most important, they are still in the shadows today. Turla focuses its activities on the territory of Central Asia, Ukraine, the Baltic States and the CIS. However, they are also credited with attacks on NATO, various embassies and government structures of the countries of the Middle East.

Hacking services

There are different services on the hacker market that provide services for cracking pages, carrying out various attacks, and developing malicious software. FS Group analysts have calculated how much the most popular cybercrime services in the Eastern European Darkweb market cost.

Source: Forbes

Схожі новини
In 2021, 18,000 new cyber vulnerabilities were discovered, most of them at Microsoft products. Which ones are used by hackers and how to protect your business
14 December 2021
In 2021, 18,000 new cyber vulnerabilities were discovered, most of them at Microsoft products. Which ones are used by hackers and how to protect your business
Детальніше
Hackers have stolen $1.1 billion in cryptocurrency in the third quarter of 2021. How to keep in safe crypto funds and account anonymity
18 November 2021
Hackers have stolen $1.1 billion in cryptocurrency in the third quarter of 2021. How to keep in safe crypto funds and account anonymity
Детальніше

Like many other companies, FSG uses cookie technology on its websites to improve your user experience, as well as for the correct operation of the website.

If you agree to the use of all cookies on this site, click the Ok button. To learn more about cookie technology, its benefits and how FSG uses it, check out our Privacy Policy.