exterior.network

(?:info|cyber)sec, programming, and science fiction. Thoughts are my own. Ideas are my own. Nothing here represents my employer.

19 March 2023

Enterprise Cyber Fraud

by wolfshirts

Common Cyber Fraud

There are many types of cyber fraud this post looks at common automation tactics. When we think of cyber fraud, we often think of the human element, phishing, malware, smishing, whaling, etc. We don’t usually stop to think about the automated side of things.

Often large enterprises will run up against a mixture of these attacks:

Damage Done

These attacks can do damage to a companies reputation, and they can do damage to the bottom line. Infra spend on automation can be significant. Creating accounts can require SMS validation creating massive charges. Supply shortages in addition to re-sale of goods can lead to extreme price gouging.

Scraping alone can run up infrastructure costs substantially and amplify the effect of a human mistake. The damage comes in constant compute costs to cover the scraping, and the cost of a mistake. Frequently this is listing a product at below the expected price or free, leaving data available where it shouldn’t be, or draft posts of private information. This can also lead to additional infrastructure discovery.

Automated purchasing is often done in large amounts and leads to supply shortage, and a massive mark up on the product.

Detection

Most large companies have some sort of automation problem and are simply unaware of it.

Mitigation:

Mitigation is going to be incredibly dependant upon a large number of factors. The common thought process is the best mitigations increase difficult, which increase time and spend. The more you can get your attackers to spend, or the more difficult it is to automate against your resources, the more likely they are to move to a softer target.

This is true to a point.

If you are in an industry that sees massive resale values out of the automation your attackers have likely already created an ecosystem around selling automation tooling that works against your enterprise. Once these actors are stuck in it’s incredibly difficult to disaude them. They will be accruing large amounts of money from SaaS that defeats your mitigations, and likely living on it. For example https://www.capsolver.com/. This is a persistent group selling work arounds to mitigations.

If you are in an industry that controls valuable infrastructure, you will likely not be able to easily disuade attackers. If what you have is a juicy enough target, they will continue to push. In some cases they will be sponsored by nation states, in others they will be sponsored by organized crime.

Both of the above will require a very forward and iterative security posture. The more changes you can make at once, the better. The more you can add complexity the better. Expect mitigations to be overcome in novel ways.

AI mitigations might be defeated by an attacker generating so much bad traffic on the endpoint that the AI thinks that this is the correct way to use the endpoint, and it stops mitigating the endpoint. Aggregate detections and mitigations can take time to aggregate the various data points they need. An attacker may discover this and resort to large burst attacks which are faster than your defenses work. Attackers may pivot to other endpoints, or discover other weaknesses in your org allowing them to continue their attack, but without your mitigations in place.

tags: botting - automation - threat - retro