Phone : +91 95 8290 7788 | Email : sales@itmonteur.net

Register & Request Quote | Submit Support Ticket

Home » Cyber Security News » Databases, access and carding: study reveals top cybercrime trends on the Indian dark web – ET CISO

Databases, access and carding: study reveals top cybercrime trends on the Indian dark web – ET CISO

Databases, access and carding: study reveals top cybercrime trends on the Indian dark web – ET CISO

https://etimg.etb2bimg.com/thumb/msid-116673699,imgsize-13556,width-1200,height=765,overlay-etciso/corporate/databases-access-and-carding-study-reveals-top-cybercrime-trends-on-the-indian-dark-web.jpg

Databases, access and carding — the most popular queries on the Indian dark web have become common knowledge Cybercriminals on the Indian dark web are most interested in databases, access to company infrastructure and bank card data. This is stated in a study by Positive Technologies, dedicated to the market of criminal cyber services in India.

A study of advertisements on the dark web showed that hackers are mainly interested in databases (42% of messages), access to company systems (23%) and carding — advertisements for the sale of bank card data (10%). What is interesting is that not all of this data is put up for sale: Positive Technologies experts note that most databases (66%) are distributed on the dark web for free. This is explained by the activity of hacktivists in India and the activities of extortionists who post confidential data in the public domain if the victim refuses to pay the ransom for it.

More often than not, the attackers’ focus is on data from scientific and educational institutions, financial institutions, as well as government agencies and trade. Purchase requests most often concern financial sector databases and, in total, purchase announcements occupy 5% of the region’s dark web. The cost of databases in 40% of announcements does not exceed $ 1,000. The vulnerability and insecurity of such data can be considered a serious problem for the country’s infrastructure, the study says. For example, a cyberattack on just one major Indian electronics manufacturer in April 2024 led to the loss of 7.5 million instances of personal customer data. In general, India is in the top 3 countries in terms of the number of dark web announcements related to database leaks.

The second most popular topic on the shadow market for cyber services is access to resources – 23% of announcements concern this topic. Here, supply exceeds demand – the portion of announcements for the purchase of access amounts to 1%. “This may indicate that the market for access to Indian company resources contains a sufficient number of offers, and cybercriminals can choose a suitable option from the existing ones,” comments Positive Technologies analyst, Anastasia Chursina. “We have also recorded the share of free distribution of access to company infrastructure at 20%. This trend is associated with the activity of hacktivists against the backdrop of geopolitical conflicts.” Access to the infrastructure of the Indian trade, financial institutions and service sector is offered for sale on the dark web. According to the study, more than 60% of all access can be purchased for less than $ 1,000, and such a low cost makes it easier for cybercriminals to gain initial access to the infrastructure of companies. More costly access to financial institutions is also offered for sale. For example, access to an Indian bank with administrator rights and the ability to connect to internal portals, servers for working with ATMs and mobile applications is offered for sale at $ 70,000 and above. As for the nature of access, every second ad contains an option to connect to the company’s resources via RDP (29%) or VPN (23%) protocols. Hackers obtain these accesses by infecting devices with stealers, Positive Technologies observes. Access to content management systems such as Magento and WordPress also accounts for a significant percentage (22%).Carding accounts for 10% of the criminal cyber services market. Offers on this topic contain bank card data (date and card number, card expiry date, CVV code), cardholder data, as well as their residential address, phone number and email. Leakage of such data is dangerous because attackers use it in fraudulent schemes with subsequent withdrawal of funds. However, on the Indian shadow market, carding is not valued very highly – data sets are sold, on average, for $500 per 100 units of bank card data.

Low cost of access and free distribution of personal data can provoke an increase in attacks on companies and government agencies of the country. What is more, it is certainly worth strengthening the protection of educational organisations, which are now an easy target for attackers. Positive Technologies recommends that organisations build comprehensive protection based on the principles of effective cybersecurity. From this point of view, a combination of SIEM and XDR class solutions is suitable for analysing security events. The MaxPatrol O2 metaproduct will help with effective monitoring and detection of threats in the infrastructure. Modern tools – new-generation NGFW firewalls, WAF and NTA class solutions, the MaxPatrol VM vulnerability management system – should be included in the protection systems. Given the prevalence of stealers and ransomware in cyberattacks on Indian infrastructure, the use of sandboxes for the timely detection of various types of malware should not be neglected.

Disclaimer: The views expressed are solely of the author and ETCISO does not necessarily subscribe to it. ETCISO shall not be responsible for any damage caused to any person/organization directly or indirectly.

  • Published On Dec 26, 2024 at 11:58 AM IST

Join the community of 2M+ industry professionals

Subscribe to our newsletter to get latest insights & analysis.

Download ETCISO App

  • Get Realtime updates
  • Save your favourite articles


Scan to download App

Information Security - InfoSec - Cyber Security - Firewall Providers Company in India

 

 

 

 

 

 

 

 

 

 

 

 

What is Firewall? A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.

 

Secure your network at the gateway against threats such as intrusions, Viruses, Spyware, Worms, Trojans, Adware, Keyloggers, Malicious Mobile Code (MMC), and other dangerous applications for total protection in a convenient, affordable subscription-based service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services. Stateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols.

 

Firewall Firm is an IT Monteur Firewall Company provides Managed Firewall Support, Firewall providers , Firewall Security Service Provider, Network Security Services, Firewall Solutions India , New Delhi - India's capital territory , Mumbai - Bombay , Kolkata - Calcutta , Chennai - Madras , Bangaluru - Bangalore , Bhubaneswar, Ahmedabad, Hyderabad, Pune, Surat, Jaipur, Firewall Service Providers in India

Sales Number : +91 95 8290 7788 | Support Number : +91 94 8585 7788
Sales Email : sales@itmonteur.net | Support Email : support@itmonteur.net

Register & Request Quote | Submit Support Ticket