{"id":31211,"date":"2021-05-27T17:23:58","date_gmt":"2021-05-27T23:23:58","guid":{"rendered":"https://www.webroot.com/blog/?p=31211"},"modified":"2023-10-10T11:54:18","modified_gmt":"2023-10-10T17:54:18","slug":"an-inside-look-at-cybercrime-as-a-service","status":"publish","type":"post","link":"https://www.webroot.com/blog/2021\/05\/27\/an-inside-look-at-cybercrime-as-a-service\/","title":{"rendered":"An Inside Look at Cybercrime-as-a-Service"},"content":{"rendered":"\n<p>You\u2019ve likely heard of software-as-a-service (SaaS), infrastructure-as-a-service (IaaS), and numerous other \u201cas-a-service\u201d platforms that help support the modern business world. What you may not know is that cybercriminals often use the same business concepts and service models in their own organizations as regular, non-criminal enterprises; i.e., the same practices the majority of their intended victims use.<br><br>As senior threat research analyst Kelvin Murray explains to Joe Panettieri, editor of Channel E2E and MSSP alert, in our most recent Hacker Files podcast, cybercrime-as-a-service \u201cessentially follows the same path as most as-a-service things in business.\u201d He goes on to explain, \u201cIf you were a small company in 2002 and needed to set up email, you\u2019d set up a mail server, a mail relay, mail clients, and you might hire an email admin. And then you might have to set up things like spam filters yourself. People like Microsoft figured out that they could just provide all of [these services] from a web page and rent it out to companies and take all the hassle out of companies\u2019 hands.\u201d That\u2019s the as-a-service model in a nutshell.<br><br>According to Kelvin, a very similar thing happened in the cybercriminal space. Effectively, talented criminals who\u2019ve written successful malicious code have begun renting access to their own cybercrime \u201csolutions\u201d to lower-level criminals who either don\u2019t have the resources or know-how to design, write, and execute cyberattacks on their own.<br><br>Of course, the people providing the so-called service don\u2019t do so out of any goodness in their hearts; they do it for a cut (sometimes a significant one) of any profits made in an attack that uses their code.<\/p>\n\n\n\n<p>Hear more about the evolution of cybercrime-as-a-service in the full podcast. Be sure to check out other discussions and recordings in our <a href=\"https:\/\/www.webroot.com\/us\/en\/business\/resources\/podcasts\">Cybersecurity Sound Studio<\/a>.<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>You\u2019ve likely heard of software-as-a-service (SaaS), infrastructure-as-a-service (IaaS), and numerous other \u201cas-a-service\u201d platforms that help support the modern business world. What you may not know is that cybercriminals often use the same business concepts and service models in their own organizations as regular, non-criminal enterprises; i.e., the same practices the majority of their intended victims [&hellip;]<\/p>\n","protected":false},"author":151,"featured_media":31213,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[3943,5137,4273,7073,3493,8585,3713,20123,3947,16951],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/31211"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/151"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=31211"}],"version-history":[{"count":3,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/31211\/revisions"}],"predecessor-version":[{"id":32151,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/31211\/revisions\/32151"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/31213"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=31211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=31211"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=31211"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=31211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}