If anything in this world is certain, it’s that the financial cybercrime landscape is constantly changing and evolving. IBM X-Force research has been tracking malware trends around the world, and in a new report, examined the cybercrime shifts of 2017 and what financial institutions can expect to see in 2018. Last year saw the rise of new cybergangs and the demise of others, proving that only the fittest and most sophisticated survive in the dog-eat-dog world of organized cybercrime.
Survival of the Fittest
Rising awareness and the increasing effectiveness of banking controls mean that less sophisticated malware operators and smaller cybercriminal operations that rely on commercial codes are on their way out. Those with limited skills are simply unable to keep up with technological advances in banking security, especially in terms of machine learning and artificial intelligence.
Within that context, 2017 saw several notable exits of crime gangs that just couldn’t keep up. The Shifu Trojan, which emerged in Japan in 2015, departed from the scene this year after researchers noticed that its operators were using webinjections purchased from underground vendors. This outsourcing of code indicated that the group did not have its own developers and likely was not connected enough to operate globally.
Another banking Trojan, IcedID, which just emerged in the past year, is already reducing its activity. Its reliance on the Emotet group as a distributor suggests that the gang is not planning to spread aggressively or launch wider campaigns.
Read the X-Force research report: Cybercrime Shifts of 2017 and What to Expect in 2018
Organized Cybercrime Evolves
In 2017, Gozi activity outpaced that of Zeus Trojan variants for the first time. The group behind Gozi is considered a cybercrime-as-a-service operation, with links to an increasing number of actors across different geographical hubs. This new dominance proves that cybercrime is further evolving in the direction of organized, businesslike gangs.
Complex cybercrime organizations, such as those operating the Dridex and TrickBot Trojans, can employ dozens of people and include orchestration of the entire supply chain. These gangs target high-value marks, such as banks and their customers, all over the globe.
Sophisticated coding is another indication of a highly organized cybergang. As security technologies continue to improve in 2018, malware codes will need to constantly evolve to evade detection. To keep their attacks concealed, cybergangs such as Dridex, GootKit, TrickBot and IcedID use complex redirection attacks. Others, such as Client Maximus, which is currently targeting Brazil, use stealthy delivery tactics.
Big Wins for Law Enforcement in 2017
One encouraging trend is the number of malware exits that came about due to the efforts of law enforcement. Key members of the Neverquest, GozNym and Andromeda operations were successfully arrested in the past year. This likely influenced each of the gangs to disband or reduce operations. Europol’s takedown of the Avalanche cybercrime infrastructure in late 2016 also had significant impact on malware gang exits in 2017.
Malware Trends to Watch in 2018
Financial cybercrime is not expected to slow down in 2018. Rather, it is becoming the business of elite groups, evolving further toward complex, organized operations. Financial malware is already adopting ideas from high-profile attacks while cybercriminal groups increase their focus on high-value business targets and bank heists.
The IBM X-Force team is following all these malware trends. To learn more, read the new research report, “Cybercrime Shifts of 2017 and What to Expect in 2018.”
Product Marketing Manager