Now Reading
How Cybercriminals Target Victims: Report Cites Top Information Resources

How Cybercriminals Target Victims: Report Cites Top Information Resources

Advertised sites are not endorsed by us. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
by Elliot MarasSeptember 19, 2016

Cybercriminals, whose attacks cost organizations millions of dollars a year, do extensive research on their targets. They gather organizational and personal information before deciding which vulnerabilities to exploit.

SurfWatch Labs, a security consultancy, has released a report on research resources cybercriminals use. The purpose of the report is to provide organizations a tool to prevent cyber attacks. The report includes an overview of information resources cybercriminals use to target the victims. Knowing about these resources can help organizations defend against cyber attacks.

Adam Meyer

Adam Meyer

The majority of threat awareness training is taking place in medium to large sized businesses, according to Adam Meyer, SurfWatch Labs’ chief security strategist. “However, much of this training is geared toward protecting the employer and less about employees protecting themselves and their personal lives, even though some would transfer over and provide benefit to the employer,” Meyer told

Lack Of Public Awareness

“Many organizations, and individuals for that matter, do not know their ‘level of presence’ out there,” he said. “They don’t know what their true exposure to cyber threats is, and therefore are not making fully informed risk decisions. We all use technology every day in our lives and have become completely dependent on it, but we don’t place much effort in trying to live a cyber safe lifestyle. A well-rounded cyber safety awareness program is one of the cheapest and most impactful efforts you can do to combat cyber crime, yet is the least utilized,” he said.


SurfWatch Labs searches the public Internet and the Dark Web to gather information about criminal activity.

The company’s website offers an example of a Dark Web screen shot showing where an organization’s stolen credit cards are for sale. The screen shot shows bank identification numbers corresponding to credit cards, searchable location information that makes it easy for criminals to evade conventional fraud detection, multiple base names that indicate batches of stolen card information, and a number indicating how many cards are for sale.

Criminals Use Security Websites

One takeaway from the report is that websites that appear to be intended to help protect people from cyber attack are actually resources for cyber attackers.

Most tools can be used for both positive and negative purposes with the only difference being the intent of the individual, Meyer said.

Asked if SurfWatch could also serve as a resource for cyber criminals, Meyers was adamant that it cannot. “No, our core resources are not publicly available and the information we do share is only shared with the organization who is entitled to it,” he said.

Top Three Public Resources

The top three public web sources criminals use for gathering information are, and companies’ own individual websites., launched in 2009 by John Matherly, has become the top site cyber criminals use. It constantly scans the Internet to find what is accessible publicly. The report dubs Shodan as the “Google for the Internet of Things (IoT).”

Shodan, which calls itself a search engine for security, has expanded from a list of ports and IPs to maps indicating where devices are located. It includes screenshots from unsecured servers, workstations and webcams.


The website notes that it has servers worldwide scanning the Internet to provide the latest Internet intelligence. “Who buys Smart TVs? Which countries are building the most wind farms? What companies are affected by Heartbleed?” the site advertises.

Shodan also allows organizations to keep track of all of the computers in their network that are directly accessible on the Internet. It provides a public API that allows access to all of Shodan’s data. Integrations are available for Chrome, Firefox, Nmap, FOCA, Metasploit, Maltego and many more.

Matherly’s original focus was problems associated with connected hard goods like thermostats and refrigerators, the report noted. He expanded the focus to open computer systems, industrial control systems, unsecured cameras and other things.

Shodan demonstrates the seriousness of the risk associated with putting information online. There is not much online that can be hidden from Shodan. Organizations must find a way to protect any information that goes online if they don’t want Shodan to find it.

VirusTotal presents itself as a free service that analyzes suspicious URLs and helps detect malware. The reality is that it helps malicious actors test their wares. Attackers upload new malware to test it against at least 56 anti-virus vendors to find out how their new malware will be detected.


The time frame for detecting malware is short, so it has to be used rapidly. Otherwise, the criminals would be testing a new “obfuscating” tool to hide a known malware from being detected for use in future campaigns.

The website states that anyone can send a suspicious file and receive a report with antivirus scanner results. In exchange, antivirus companies receive new malware samples to improve protections for their users. It claims to be an ecosystem where everyone works together to improve Internet security.

VirusTotal saves metadata from the files it analyzes. A user can view the IP history of the domain to get the current WHOIS, but VirusTotal will also provide a list each time it detects something malicious on the site, in addition to all samples that tried to communicate with the domain.

What About Your Own Site?

The best way for an attacker to learn about a target is from their own website. Most company websites include information about officers and key employees, such as names, email addresses, pictures, LinkedIn profiles and more.

SurfWatch noted word documents, PDFs and powerpoint presentations include metadata that has additional information about companies, including software versions of the program used to create these documents.

Google searches reveal more information about a company that many people are not aware of.


Top Dark Web Sources

The top three dark web sources are AlphaBay Market and Forum, TheRealDealMarket and HANSA Market.

AlphaBay has become the most popular Dark Web market, providing tens of thousands of things for sale, including stolen credentials, drugs, fraudulent items, bank account logins, personal information about individuals, hacking tools and more. Launched by “alpha01” in 2014, it mimics Amazon and eBay in its organization. Users purchase items anonymously using bitcoin.

Criminals access AlphaBay with the Tor browser. Since the Tor browser is available to anyone, legitimate parties can also see what is for sale.

The AlphaBay Market website claims to be the largest Darknet Market, four times larger than its closest competitor, with more than 120,000 listings. The website includes an easy-to-understand overview of how the Dark Web works, including the Tor browser, which is used to access the Dark Web.


It notes that the government is monitoring people who download Tor, but it adds that one can get around this problem by using a VPN. It encourages users to visit a site for such VPNs:

By visiting the website, users are invited to sign up for a newsletter that provides information on how to remain anonymous online to hide Dark Web activities.

The site notes Tor has some issues with exit nodes, and that someone who has access to all nodes in the chain can track a user. The best approach is to pair Tor with a VPN that keeps no logs.

TheRealDeal Market

TheRealDeal, launched in 2015, focuses on selling code and exploits. Law enforcement in July of 2015 arrested some of the founders in operations against the Dark Web forums. The site shut down for a few months before relaunching in December of 2015.


TheRealDeal made news after selling user credentials from healthcare databases, as well as Yahoo, LinkedIn and MySpace. The site also offers source code, zero-day vulnerabilities and other items. Legitimate parties will gain insight into the types of tools and information that cyber criminals use.

While TheRealDeal Market site has reportedly relaunched, it is hard to access. Another website, deepdotweb, has a section on how to sign up for TheRealDeal Market.

On Sept. 17, deepdotweb noted that TheRealDeal’s evolution code (or at least a large portion of it) was bought from a hacking forum, but lacked some major parts. It noted the site would be providing free vendor accounts for 24 to 48 hours.

Deepdotweb, for its part, includes a lot of information about how to secure anonymity on the Dark Web. It notes that law enforcement is actively scrutinizing Dark Web users. There is a lot of information on finding the best VPN to ensure anonymity. There is even a chart ranking and comparing VPNs. There is also a list of 23 Dark Web sites that rates the sites and gives information on registration requirements, active warnings, security issues and more.

HANSA Market

HANSA Market resembles an eBay for illicit goods and was created to improve Dark Web users’ security in response to the numerous exit scams. It claims that its multi-signature escrow payment process protects against theft.


HANSA vendors offer tools and information, but pirated products are the most common, including video games, software, movies and credentials for related accounts.

Top Public Payload Destinations

Public payload destinations are places from which malware is sent to end users. The three main avenues are social media, email and “malvertising.”


Source: SurfWatch Labs Data

Social media provides the greatest avenue cyber criminals use for reaching victims. Malicious “shortened URLs” target Twitter’s text limitation. Malicious Facebook apps attract people looking to add a new application using Facebook as their login tool. Social media also gives a lot of information about people and provides attackers avenues for approaching targets.

Email Spearphishing

Email spearphishing remains the leading tool for attacking victims. A phishing attack succeeds by getting one recipient out of a thousand to click a link or download a file. Nearly every major attack this year has come from spearphishing.

To protect against spear-phishing, boundary protection is required at a minimum. The only mitigation is ongoing education. Organizational policies that restrict the use of email addresses when signing up for public services will reduce an organization’s chances of falling victim to a spearphising attack.


Cyber criminals typically use malicious ads, “malvertising,” to spread malware. They often use a third party advertising network to exploit software vulnerabilities. Malvertising works because it usually appears to be legitimate and it targets victims based on their interests.


The advertising provider network is massive, making it easy for attackers to inject their malware into ads without being traced.

The Fessleak campaign, exposed last year, utilized “burner” domains that expired after eight hours.

The Fessleak attacks exploited zero-day vulnerabilities in Adobe’s Flash Player, according to Attackers spread it from an advertising network that managed ad groups on popular websites. Initially, the ransomware was sent through an exploit kit. Researchers also found an instance of the malware served via a real-time ad-bidding network, which sent the malware.

After Microsoft patched the escalation flaw in Windows systems, the hackers stopped using file-less infections and switched to zero-day exploits.

Helpful Tips

Blacklists of malicious domains are helpful tools in preventing malware. Organizations should update these lists often and automatically.

Organizations should update their software as often as possible since malware campaigns exploit known vulnerabilities in common software.

Users should also restrict the use of scripts in browsers to prevent malware from running in the first place, although this tactic is not foolproof.

Also read: Phishing malware claims 10,000 Facebook victims

Awareness Remains An Issue

“Sadly, many organizations are only relying on general cyber crime news to keep abreast on what’s going on out there because that resource is easy, and generally free to consume,” Meyer said. “As one step beyond that, an organization might also join an industry Information Sharing and Analysis Center (ISAC) where they will receive industry specific threat information of a general nature for an annual fee.

“A third and I would say the top tier step, is for the organization to resource a full-scale intelligence capability that will look at the specifics of threat capabilities, opportunities and intent and most importantly how those threats can impact the organization specifically and paint a picture of what the organization needs to do to mitigate the threat.”

Will Regulation Help?

“While more organizational regulation isn’t always the best solution in most cases, there is an increase in regulatory oversight for cyber security efforts than just a few years ago. and I see this as a positive step,” Meyer said. “Regulators still have a long ways to go in maturing what value-added, practical steps organizations need to take to meet these regulations but at least there is an effort to enforce accountability in the right places.”


“While organizations have progressed in deploying technologies that help protect general public users, they have only done so because the market was a forcing factor due to fallout from breaches and regulatory action,” he said. “Unfortunately, too many organizations still continue to operate with heads in the sand. Additionally, the general public user is also very naïve in how they use technology and how much of their personal lives they expose on a daily basis. More education for cyber safety is needed both at the organizational level as well as for the individual.”

Images from Shutterstock and iStock/Dimitrios Stefanidis.

Advertised sites are not endorsed by us. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
What's your reaction?
Love it
Hate it