Cost of conducting APT campaigns is dramatically dropping

Speaking at Kaspersky Lab’s Industry Analyst Summit Costin Raiu, revealed that the cost for APT campaign is dramatically dropping.

The cost of developing advanced malware has fallen dramatically malicious code like Stuxnet and Flame are today economically more affordable. It has been estimated that the expense for the development of a cyber weapon like Stuxnet,or for a sophisticated spyware like Duqu, is collapsed from $100 million to just $10,000.

Speaking at Kaspersky Lab’s Industry Analyst Summit Costin Raiu, head of global research and analysis at Kaspersky, revealed that cost for Stuxnet design was nearly $100 million.

 

 

The dropping for the cost represents an element of serious concerns for cyber security experts because it is lowering the barrier to entry to the global cyber-arms race.

“The cost of entry for APT is decreasing,” “We’re going to see more surgical strikes and critical infrastructure attacks.”said Costin Raiu

Behind those malware even more sophisticated there are groups of hackers, also identified with terms like APT or advanced persistent threats, which work for governments or are part of their cyber unit.

APT are typically involved in cyber attacks on high-value targets, including government organization, financial institutions, critical infrastructure and defense contractors.

In the past the financial effort necessary to sustain APT was impressive, I remember an interesting analysis proposed by the popular hacker Charlie Miller on the cost for the design of a cyber weapon, he estimated an involvement of 592 people and an investment of $45.9 mil in annual salary with an average annual salary $77,534.

The cost is totally different from the $10,000 hypothesized for  the realization of the IceFog malware which was discovered last year and that hit US energy companies with a Java Backdoor.

According to experts at Kaspersky the Javafog backdoor could indicate that the Icefog mercenaries were running a US-specific operation, according the analysis on the backdoor used the team was preparing a long-term cyber espionage campaign.

“The focus on the US targets associated with the only known Javafog C&C could indicate a US-specific operation run by the Icefog attackers; one that was planned to take longer than usual, such as, for instance, long-term collection of intelligence on the target,” “This brings another dimension to the Icefog gang’s operations, which appear to be more diverse than initially thought.” reported the Kaspersky report.

While Icefog campaign probably required an investment of no more than $10,000, the NetTraveler APT campaign likely cost about $500,000, that is nothing compared to the 100$ dollars for Stuxnet.

“If you’re thinking that’s a lot of money, it’s not,” “It’s the cost of several missiles.”

Icefog is special because it indicates a new trend of cyber mercenaries, maybe five to ten people that are highly skilled,” “They knew what documents they wanted to steal from each machine and they spent only a few minutes on each machine.”Raiu said. 

Raiu has no doubts lowering of the costs associated to APT campaigns will cause a significant increase in the number of dangerous cyber attacks let’s wait for further revelation on the last APT offensive dubbed “The Mask“.

Pierluigi Paganini

(Security Affairs –  APT, state-sponsored hacking)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

18 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

19 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

24 hours ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.