Heimdal Security Blog

Heimdal® Launches Broad Investigation into Russian Cybercrime Trend

Heimdal® has recently launched an ample investigation into the Russia-linked cybercrime wave. Based on the data gathered from internal and external sources, Heimdal® has discovered that the phenomenon is expanding, both in magnitude and frequency. This article will showcase our SOC team’s discoveries, delineate methodology, and propose actionable strategies that will aid organizations to counter this rising trend.

Background and investigative methodology

To further substantiate the claims set forth by this article, we have deemed it necessary to provide some background. Below you will find a list of publications that have covered the topic.

The Outcome of the Investigation

The methodology used to make our assessment is as follows. Prompted by the gathered intel, we have amassed a list of malicious domain detections going back to early 2021. Event log triage allowed us to conclude that between March 2021 and October 2022, over 600,000 Russian TLDs were created. There’s no evidence to suggest that all detected TLDs were or are used for malicious purposes. Given the high volume, we hypothesize that the non-malicious domains may simply be used as a backup in case of detection. Another working theory is that these ‘inactive’ TLDs could become the foundation of a botnet.

For the purpose of this article, we have eliminated all inactive domains from statistical churning, and, going forward, we will focus solely on the domains with positive hits (i.e., overt intention). Further data investigation revealed that only 1283 of the detected Russian TLDs were associated with malicious activity (i.e., 0.18% prevalence rate when sequencing active vs. inactive domains). Between January 2021 and late October 2022, over 8,000 cyberattacks have been carried out from the domains, at an average of circa 6.35 attacks per day. IP-based domain tracking returned no results as the threat actor has gone to great lengths to minimize the online footprint.

Upon reviewing the final numbers and factoring in variables such as temporal spread, intent, and the number of times a specific domain was used to stage an attack, we can only conclude that Russian-based attack domains are increasing exponentially. Our computations show a 167% year-over-year increase in .ru TLDs, a statement corroborated by the data obtained from clear web sources (i.e. see above section). The investigation is ongoing and we will provide you with updates as soon as they become available. In addition to the data discussed throughout this article, we’ve also annexed the associated graphs (see below).

MoM Increase for 2021

 

MoM Increase for 2022

Cybersecurity Advice and Conclusions

As the conflict between Russia and Ukraine trudges on, we can expect more threat groups to show up and leave their mark on the cyber world. The numbers provided by Heimdal®’s SOC team prove that   the threat is real, with no indications of cessation or slowing down.  As mentioned in the section about background and methodology,   only a small fraction of the detected domains were used to stage cyberattacks against undisclosed targets.  Concerning the bulk, we can assume that they are either backup domains,     that can be used in case the primary one is compromised or that the threat actors may be spawning them in order to create a botnet.

To conclude this article, we have enclosed several pieces of cybersecurity advice which you can use in order to increase the efficiency of your defense strategy.

If you liked this article, follow us on LinkedInTwitterFacebookYoutube, and Instagram for more cybersecurity news and topics.