• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Allianz Life data breach exposed the data of most of its 1.4M customers

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 55

 | 

Security Affairs newsletter Round 534 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Law enforcement operations seized BlackSuit ransomware gang’s darknet sites

 | 

Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme

 | 

Operation CargoTalon targets Russia’s aerospace with EAGLET malware,

 | 

Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access

 | 

Koske, a new AI-Generated Linux malware appears in the threat landscape

 | 

Mitel patches critical MiVoice MX-ONE Auth bypass flaw

 | 

Coyote malware is first-ever malware abusing Windows UI Automation

 | 

SonicWall fixed critical flaw in SMA 100 devices exploited in Overstep malware attacks

 | 

DSPM & AI Are Booming: $17.87B and $4.8T Markets by 2033

 | 

Stealth backdoor found in WordPress mu-Plugins folder

 | 

U.S. CISA adds CrushFTP, Google Chromium, and SysAid flaws to its Known Exploited Vulnerabilities catalog

 | 

U.S. CISA urges FCEB agencies to fix two Microsoft SharePoint flaws immediately and added them to its Known Exploited Vulnerabilities catalog

 | 

Sophos fixed two critical Sophos Firewall vulnerabilities

 | 

French Authorities confirm XSS.is admin arrested in Ukraine

 | 

Microsoft linked attacks on SharePoint flaws to China-nexus actors

 | 

Cisco confirms active exploitation of ISE and ISE-PIC flaws

 | 

SharePoint under fire: new ToolShell attacks target enterprises

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Security
  • Cyber security, Questions and Answers with the expert

Cyber security, Questions and Answers with the expert

Pierluigi Paganini December 16, 2013

Interview with the security experts Andrey Komarov and Dan Clements of IntelCrawler to analyze significant evolutions in the cyber-threat landscape.

Today I desire to propose an interview with Andrey Komarov, CEO of IntelCrawler and Dan Clements, President of IntelCrawler. IntelCrawler is a multi-tier intelligence aggregator, which gathers information and cyber prints from a starting big data pool of over 3, 000, 000, 000 IPv4 and over 200, 000, 000 domain names, which are scanned for analytics and dissemination to drill down to a desired result. 

I prepared for them a series of answers and questions to analyze significant evolutions in the cyber-threat landscape:

Which are the most concerning cyber threats for private businesses and government organizations?

Avoiding talking about usual and standard things, of course, the most dangerous and annoying is the emergence of fundamentally new vulnerabilities in critical applications and systems. “Zero day” vulnerabilities market is developing every day and taking the shape of a part of the future cyber warfare market, as it is still in the process of formation. Neither consumers in the face of government or companies, nor vendors are not ready for such kind of threat, which makes mitigation actions very complicated.

Which are the industries most exposed to cyber attacks and why?

Just imagine, what would be interesting for you, if your main interests were money and information? It is two main reasons of all past and today’s cyber attacks in the world. First of all, it is all related to profitable commercial business, such as private banking and industrial sector, ending with government infrastructures, which relates to state sponsored attacks. It is true, as cyber offensive approaches displace “old school”, such as signal intelligence, as it is much cheaper and easier in the 21st century. The role of information takes new forms, making the computer communications as a battlefield of modern cyber warfare.

Which are the factors that most of all have influenced the design of malicious code in the last year (e.g. P2P communication protocols, advanced evasion techniques, hiding C&C in Tor networks)

Malware coders are interested in hiding of the communications between the infected host and C&C, that’s why the stable trend is to create or to use alternative means of communications. That’s why, there were lots of new kinds of samples, which used C&C in TOR or I2P, which was really exotic for the first time, but then became one of the standards for the cybercriminals.

Which is the role of the intelligence in the fight to the cybercrime?

The role of e-crime intelligence is huge, as sometimes only timely notification about planned threat can help to prevent cyberattack or fraud. There are some difficulties in this niche as well, such as the heterogeneity of geographies cyber criminals live, the languages they speak, opportunity of deep infiltration in Underground communities, gathering information on the real identity of the criminals in the age ofanonimity and impersonality and etc., all these aspects forcing us to organize systematical monitoring of several the most important regions, such as Asian segment, former USSR, risky EU-based countries, such as Romania, and use a large network of trusted sources. Software protection ways can’t help on 100%, that’s why human resources and intelligence are one of the most important additional elements.

Malware and Internet of things, what to expect in the next months?

First of all, new variants of mobile malware, as it will be one of the most actual for the nearest future, because of global “mobilezation”. Secondly, new kinds of online-banking trojans and the appearance of medication of POS/ATM malicious code, as “skimming” becomes too expensive and risky. Thirdly, hacking and surveillance will damage your privacy more and more, as it is inseparable.

Does it exist a marked distinction between cybercrime and state-sponsored hacking?

Yes, as state-sponsored hacking has more specifics. Interesting fact, that firstly cybercriminality creates the trend for further state-sponsored hacking, governments copy its actions and explore the methods and means they use in that or this country, as it is really different. Just compare, Chinese hackers and Latin American hackers, absolutely different style of intrusions, fundamentally different approaches on malicious code, as Chinese stuff is more sophisticated, because of great experience and scientific potential across the whole country.

Which are the governments most active in cyberspace?

You should be very cautions talking about exact governments in cyber world, because it is still not very transparent. Good example, we have detected the C&C placed in Morocco, but the owners of the botnets who were behind using email accounts registered on GMX.DE. Another is when the malware after reverse engineering and unpacking had strings written in Hebrew, but hosted in Latvia. Despite these facts, the leaders of this industry certainly are: China, USA, Russia, Germany, France, UK, UAE and Saudi Arabia and Israel.

Do you think it is possible a major cyber attack against a government network or a critical infrastructure in the next year?

Yes, as it is one of the today’s main interests of bad actors, doesn’t matter state sponsored or general criminals.

Cyber security

Do you think it is possible that a Stuxnet like malware is already operating on the Internet? 

You never know, but I think that the topic of embedded systems backdooring or malware distribution under PLC/RTU/SCADA is still very actual. And was not deleted from the plans of the intelligence community.
Dan Clements – IntelCrawler President, former Cardcops president, one of the first cybercrime intelligence company, which worked with major banks in the US on compromised data recovery. Possibly, Dan will add the right words, if it will be needed. No need to write too much about us, and honestly saying, don’t post any photos if possible, as we are a bit more private 🙂

Andrey Komarov – IntelCrawler CEO, author of OWASP SCADA Security Project. Expert in critical infrastructure protection (CIP) and SCADA security assessment. Responsible for cyber intelligence and e-crime intelligence topics in the company, as well as for R&D on Big Data and IPv4/IPv6 address space research.

Pierluigi Paganini

(Security Affairs –  Cyber security)


facebook linkedin twitter

China Chinese hackers critical infrastructure cyber warfare Cybercrime France Hacking I2P IntelCrawler Intelligence Internet of Things Komarov malware market P2P Private banking Russia SCADA security state-sponsored hacking stuxnet UAE underground

you might also like

Pierluigi Paganini July 26, 2025
Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme
Read more
Pierluigi Paganini July 25, 2025
Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Allianz Life data breach exposed the data of most of its 1.4M customers

    Data Breach / July 27, 2025

    SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 55

    Malware / July 27, 2025

    Security Affairs newsletter Round 534 by Pierluigi Paganini – INTERNATIONAL EDITION

    Breaking News / July 27, 2025

    Law enforcement operations seized BlackSuit ransomware gang’s darknet sites

    Cyber Crime / July 26, 2025

    Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme

    Intelligence / July 26, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT