Are Ransomware Gangs Recruiting Pen Testers to Boost Cyber Attacks?

In a concerning development in the world of cybercrime, ransomware gangs have turned to recruiting penetration testers, commonly known as pen testers, to improve the effectiveness of their attacks. This trend has been brought to light by the findings of Cato Network’s Cato Cyber Threats Research Lab (CTRL) in their Q3 2024 Cato CTRL SASE Threat Report. Renowned ransomware groups like Apos, Lynx, and Rabbit Hole have been actively seeking skilled pen testers to join their ranks. This marks a significant evolution in ransomware-as-a-service (RaaS) and highlights their meticulous and detailed recruitment strategies.

The New Role of Pen Testers in Cybercrime

From Protectors to Attackers

Traditionally, penetration testers have played a vital role in cybersecurity by identifying vulnerabilities in systems and helping organizations secure their infrastructure. However, recent findings show that ransomware gangs are now hiring these skilled professionals not to protect but to target systems more effectively. According to Etay Maor, Chief Security Strategist at Cato Networks, this shift signifies a major evolution in the RaaS ecosystem, as cybercriminals now employ specialized expertise typically reserved for defending against attacks. This change in strategy indicates a more sophisticated approach in executing ransomware operations, increasing the threat landscape for potential victims.

The discovery of job listings on the Russian Anonymous Marketplace (RAMP) further confirms the lengths to which these cybercriminal groups are willing to go to obtain the expertise they need. By leveraging the skills of pen testers, ransomware gangs can identify and exploit vulnerabilities with greater precision, making their attacks more potent and difficult to fend off. These developments underscore the growing complexity and professionalization within the cybercrime industry, posing significant challenges for cybersecurity professionals and organizations worldwide.

Increasing Accessibility and Lowering Barriers in Cybercrime

Ransomware Source Codes for Purchase

The accessibility and lowering barriers to entry within cybercrime is another alarming trend highlighted in the Cato CTRL SASE Threat Report. Ransomware source codes are increasingly available for purchase on the dark web, making it easier for aspiring cybercriminals to launch their attacks without extensive technical knowledge. For instance, locker source code can be found for a price of $45,000. This availability significantly reduces the effort and expertise required to develop ransomware, democratizing access to powerful cyber weapons.

Additionally, the rise of AI has further facilitated these crimes by lowering the entry threshold. AI tools can automate tasks and provide step-by-step guides, empowering even novice hackers to carry out sophisticated attacks. A notable example from the report involves a user named ‘eloncrypto’ who was discovered selling a builder for MAKOP ransomware, a variant of the PHOBOS ransomware. This trend of increasing accessibility means that a broader range of individuals can engage in cybercriminal activities, exacerbating the threat landscape for all digital users.

Shadow AI and Data Privacy Risks

Another critical finding from the report is the emergence of Shadow AI, where employees bypass formal processes to adopt AI solutions. This practice poses significant data privacy risks. The Cato CTRL SASE Threat Report tracked ten AI applications and associated security threats, with data privacy emerging as the primary concern. Shadow AI can lead to unvetted applications being used within organizations, potentially exposing sensitive data to unauthorized access and misuse.

The increasing use of AI without proper oversight highlights the necessity for organizations to implement stringent policies and monitoring mechanisms to govern AI adoption. Failing to do so could lead to severe consequences, including data breaches and regulatory penalties. As organizations continue to integrate AI into their operations, addressing the risks associated with Shadow AI becomes imperative to ensuring data privacy and overall security.

The Critical Importance of TLS Inspection

Underutilization of TLS in Organizations

Transport Layer Security (TLS) is a crucial security protocol designed to encrypt data transmitted over the internet. However, the Cato CTRL SASE Threat Report reveals that only 45% of organizations enable TLS inspection, a practice essential for decrypting, inspecting, and re-encrypting traffic. This process helps prevent threat actors from leveraging TLS traffic to evade detection. Without comprehensive TLS inspection, organizations are vulnerable to hidden threats that can infiltrate their networks undetected.

The report highlights numerous attempts to exploit Common Vulnerabilities and Exposures (CVEs) such as Log4j, SolarWinds, and ConnectWise that were blocked in TLS traffic. This finding underscores the urgent need for organizations to prioritize TLS inspection in their cybersecurity strategies. While enabling TLS inspection may require additional resources and investment, its benefits in detecting and mitigating cyber threats far outweigh the costs. Organizations must recognize the critical role of TLS inspection in safeguarding their networks against increasingly sophisticated attacks.

The Path Forward for Cybersecurity

In a concerning cybercrime trend, ransomware gangs are now recruiting penetration testers, also known as pen testers, to boost the effectiveness of their attacks. This alarming development was revealed in Cato Network’s Cato Cyber Threats Research Lab (CTRL) Q3 2024 Cato CTRL SASE Threat Report. Noteworthy ransomware groups such as Apos, Lynx, and Rabbit Hole are actively seeking skilled pen testers to fortify their operations. This shift represents a notable evolution in ransomware-as-a-service (RaaS) and underscores the gangs’ meticulous recruitment strategies aimed at enhancing their malicious campaigns. By enlisting pen testers, ransomware organizations aim to leverage these experts’ deep understanding of network vulnerabilities and security measures. This move allows them to craft more sophisticated and penetrating attacks, posing a growing threat to cybersecurity efforts. The recruitment of pen testers by these groups highlights the increasing professionalism and organization within the cybercriminal underworld, making it imperative for businesses and cybersecurity professionals to stay vigilant and adapt to these emerging threats.

Explore more

Agentic AI Redefines the Software Development Lifecycle

The quiet hum of servers executing tasks once performed by entire teams of developers now underpins the modern software engineering landscape, signaling a fundamental and irreversible shift in how digital products are conceived and built. The emergence of Agentic AI Workflows represents a significant advancement in the software development sector, moving far beyond the simple code-completion tools of the past.

Is AI Creating a Hidden DevOps Crisis?

The sophisticated artificial intelligence that powers real-time recommendations and autonomous systems is placing an unprecedented strain on the very DevOps foundations built to support it, revealing a silent but escalating crisis. As organizations race to deploy increasingly complex AI and machine learning models, they are discovering that the conventional, component-focused practices that served them well in the past are fundamentally

Agentic AI in Banking – Review

The vast majority of a bank’s operational costs are hidden within complex, multi-step workflows that have long resisted traditional automation efforts, a challenge now being met by a new generation of intelligent systems. Agentic and multiagent Artificial Intelligence represent a significant advancement in the banking sector, poised to fundamentally reshape operations. This review will explore the evolution of this technology,

Cooling Job Market Requires a New Talent Strategy

The once-frenzied rhythm of the American job market has slowed to a quiet, steady hum, signaling a profound and lasting transformation that demands an entirely new approach to organizational leadership and talent management. For human resources leaders accustomed to the high-stakes war for talent, the current landscape presents a different, more subtle challenge. The cooldown is not a momentary pause

What If You Hired for Potential, Not Pedigree?

In an increasingly dynamic business landscape, the long-standing practice of using traditional credentials like university degrees and linear career histories as primary hiring benchmarks is proving to be a fundamentally flawed predictor of job success. A more powerful and predictive model is rapidly gaining momentum, one that shifts the focus from a candidate’s past pedigree to their present capabilities and