Cybercrime continues to evolve, with specialists offering an ever-increasing array of niche capabilities, ranging from attack techniques and infrastructure to related research and sales services, warns security firm Trend Micro.
"You're actually getting bespoke functions within these niche entities, so you'll have an R&D function, you'll have a sales engine, you'll have a support function, and it's getting to the point where you can even have a dashboard, seeing how well your botnet is doing - so you can see where they're going," says Bharat Mistry, a UK-based cybersecurity consultant with Trend Micro. "They're actually collaborating in a way that most enterprises could ... dream about but never achieve."
In an interview recorded at Infosecurity Europe, Mistry also details:
- The relative risk posed by targeted attacks, versus zero-day malware;
- Why traditional malware - such as the Dyre banking Trojan - remains a top treat;
- Changes in the cybercrime ecosystem that are making it more difficult to stop new attacks.
Mistry is a cybersecurity consultant with Trend Micro. He formerly worked as a security technologist at HP Enterprise Security Services, as well as a consultant and design specialist for Kcom, Siemens Network Systems and Alcatel Network Systems.