{"id":19614,"date":"2021-10-14T23:45:13","date_gmt":"2021-10-14T23:45:13","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=19614"},"modified":"2021-11-19T02:43:10","modified_gmt":"2021-11-19T02:43:10","slug":"becoming-a-cybercriminal-keeps-getting-easier","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/","title":{"rendered":"Becoming a Cybercriminal Keeps Getting Easier"},"content":{"rendered":"<p><a href=\"https:\/\/www.esecurityplanet.com\/threats\/zero-day-threat\/\">Zero-day vulnerabilities<\/a> are no longer exclusively for elite hackers. There are now automated scripts available on GitHub so even novice hackers can explore these previously unknown security flaws.<\/p>\n<p>That was one of the insights in the HP Wolf Security Threat Insights Report released today.<\/p>\n<p>The report noted that the average time for a business to apply, test and fully deploy patches with the proper checks is 97 days, creating a large window for newly discovered vulnerabilities to be exploited.<\/p>\n<h2 role=\"presentation\">Anatomy of a Zero-day Exploit<\/h2>\n<p>The HP Wolf report noted that exploits of a Windows zero-day vulnerability (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-40444\">CVE-2021-40444<\/a>) were automated and shared on GitHub just three days after the first exploit last month.<\/p>\n<p>The vulnerability allowed for remote code execution through the MSHTML browser engine (Internet Explorer is based on this engine) using Microsoft Office documents. If the user didn&#8217;t open a document in read-only mode (the safe mode), macros were enabled, releasing <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a>.<\/p>\n<p>While the read-only mode was a way to mitigate the attack, the exploit could also compromise a device through the File Explorer&#8217;s preview pane, taking the threat to the next level.<\/p>\n<p>These attacks are generally used to install backdoors on infected devices and sell access to <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">ransomware<\/a> groups and other threat actors. Along with the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/\">ransomware as a service<\/a> (RaaS) trend, the barrier to entry is becoming very low for hackers, and that&#8217;s bad news for those charged with defending corporate networks.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/ransomware-removal-and-recovery-services\/\">Best Ransomware Removal and Recovery Services<\/a><\/p>\n<h2 role=\"presentation\">Legitimate Cloud Providers Used as Hosts<\/h2>\n<p>Microsoft OneDrive is a file hosting service and synchronization service. Microsoft includes the service by default in most of its products, making it easier for files hosted on the platform to pass <a href=\"https:\/\/www.esecurityplanet.com\/applications\/whitelisting-vs-blacklisting-which-is-better\/\">whitelisting<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/products\/intrusion-detection-and-prevention-systems\/\">intrusion detection<\/a> tests.<\/p>\n<p>Researchers found the Remcos Remote Access Trojan (RAT) used in a recent GuLoader campaign on OneDrive. They also discovered various malware families being hosted on the Discord social media platform.<\/p>\n<p>The RAT is particularly insidious as it doesn&#8217;t appear in the list of active programs and processes. It does not slow down the computer or delete files. The goal is to remain undetected to exfiltrate data, which is helpful for <a href=\"https:\/\/www.esecurityplanet.com\/threats\/advanced-persistent-threat\/\">advanced threat actors<\/a>, for example.<\/p>\n<p>Normally, the best security advice, in this case, would be to avoid downloading files from untrustworthy sources, but OneDrive and Discord are legitimate platforms. Cloud platforms take down those accounts quickly, but the hackers don&#8217;t care. They only need a few hours to conduct their operations.<\/p>\n<h2 role=\"presentation\">Email Attachments the Primary Vector<\/h2>\n<p>In its report, the Wolf team revealed that 89% of malware detected was delivered via email. As soon as the victims open the email attachments, it deploys the malware. Attackers use that entry to steal credentials for business accounts or crypto wallets.<\/p>\n<p>Other noteworthy stats include:<\/p>\n<ul>\n<li>The most common attachments used to deliver malware are archive files (38% \u2013 up from 17.26% last quarter), Word documents (23%), spreadsheets (17%), and executable files (16%)<\/li>\n<li>The most common <a href=\"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/\">phishing<\/a> lures are &#8220;order&#8221;, &#8220;payment&#8221;, &#8220;new&#8221;, &#8220;quotation&#8221; and &#8220;request&#8221;<\/li>\n<li>12% of email malware isolated had bypassed at least one gateway scanner, a common email defense tool<\/li>\n<\/ul>\n<p>Hackers constantly innovate, replacing the script or file type they use every few months and building <a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-hackers-use-payloads-to-take-over-your-machine\/\">payloads<\/a> with languages with lower detection rates, such as JavaScript or HTA (HTML documents).<\/p>\n<p>The objective is not to use cutting-edge technologies but to fool detection tools and land in employee inboxes to maximize the chances to compromise the system and potentially spread to other systems.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/\">How DMARC Can Protect Against Ransomware<\/a><\/p>\n<h2 role=\"presentation\">Detection Alone Not Sufficient<\/h2>\n<p>According to Ian Pratt, HP&#8217;s Global Head of Security for Personal Systems, the threat landscape is too dynamic to rely on detection alone.<\/p>\n<p>&#8220;Organizations must take a layered approach to <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">endpoint security<\/a>, following <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">zero trust<\/a> principles to contain and isolate the most common attack vectors like email, browsers, and downloads,&#8221; Pratt said. &#8220;This will eliminate the attack surface for whole classes of threats while giving organizations the breathing room needed to coordinate <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">patch<\/a> cycles securely without disrupting services.&#8221;<\/p>\n<p>Zero trust is the opposite of implicit trust. Instead of assuming that everything is safe in the network, it assumes breaches and explicitly verifies potential vectors and endpoints. It ensures the least privileged access to minimize hackers&#8217; opportunities.<\/p>\n<p>A false impression of safety can contribute to attacks. Having detection and monitoring tools is reassuring, but they&#8217;re hardly bulletproof.<\/p>\n<p>The speed of threat actors and the willingness to hide undetected are troubling long-term trends. Threat actors want to outpace the response of automated tools and forensic teams. They make further efforts to cover their tracks and destroy evidence, making their attacks even harder to detect and trace.<\/p>\n\n\n<div id=\"ta-campaign-widget-66d704d514448-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d704d514448\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d704d514448\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d704d514448\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d704d514448\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d704d514448\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d704d514448\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Zero-day vulnerabilities are no longer exclusively for elite hackers. There are now automated scripts available on GitHub so even novice hackers can explore these previously unknown security flaws. That was one of the insights in the HP Wolf Security Threat Insights Report released today. The report noted that the average time for a business to [&hellip;]<\/p>\n","protected":false},"author":267,"featured_media":19617,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15,16],"tags":[18145],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[379],"class_list":["post-19614","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","category-trends","tag-cyber-threats-2","b2b_audience-awareness-and-consideration","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Becoming a Cybercriminal Keeps Getting Easier | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Between automated scripts on GitHub and ransomware as a service, even novice hackers can do big damage these days.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Becoming a Cybercriminal Keeps Getting Easier | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Between automated scripts on GitHub and ransomware as a service, even novice hackers can do big damage these days.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-14T23:45:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-19T02:43:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/hacker2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"780\" \/>\n\t<meta property=\"og:image:height\" content=\"585\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Julien Maury\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julien Maury\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/\"},\"author\":{\"name\":\"Julien Maury\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\"},\"headline\":\"Becoming a Cybercriminal Keeps Getting Easier\",\"datePublished\":\"2021-10-14T23:45:13+00:00\",\"dateModified\":\"2021-11-19T02:43:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/\"},\"wordCount\":777,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/hacker2.png\",\"keywords\":[\"cyber threats\"],\"articleSection\":[\"Threats\",\"Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/\",\"name\":\"Becoming a Cybercriminal Keeps Getting Easier | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/hacker2.png\",\"datePublished\":\"2021-10-14T23:45:13+00:00\",\"dateModified\":\"2021-11-19T02:43:10+00:00\",\"description\":\"Between automated scripts on GitHub and ransomware as a service, even novice hackers can do big damage these days.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/hacker2.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/hacker2.png\",\"width\":780,\"height\":585},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Becoming a Cybercriminal Keeps Getting Easier\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\",\"name\":\"Julien Maury\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"caption\":\"Julien Maury\"},\"description\":\"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jmaury\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Becoming a Cybercriminal Keeps Getting Easier | eSecurity Planet","description":"Between automated scripts on GitHub and ransomware as a service, even novice hackers can do big damage these days.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/","og_locale":"en_US","og_type":"article","og_title":"Becoming a Cybercriminal Keeps Getting Easier | eSecurity Planet","og_description":"Between automated scripts on GitHub and ransomware as a service, even novice hackers can do big damage these days.","og_url":"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/","og_site_name":"eSecurity Planet","article_published_time":"2021-10-14T23:45:13+00:00","article_modified_time":"2021-11-19T02:43:10+00:00","og_image":[{"width":780,"height":585,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/hacker2.png","type":"image\/png"}],"author":"Julien Maury","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Julien Maury","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/"},"author":{"name":"Julien Maury","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a"},"headline":"Becoming a Cybercriminal Keeps Getting Easier","datePublished":"2021-10-14T23:45:13+00:00","dateModified":"2021-11-19T02:43:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/"},"wordCount":777,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/hacker2.png","keywords":["cyber threats"],"articleSection":["Threats","Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/","url":"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/","name":"Becoming a Cybercriminal Keeps Getting Easier | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/hacker2.png","datePublished":"2021-10-14T23:45:13+00:00","dateModified":"2021-11-19T02:43:10+00:00","description":"Between automated scripts on GitHub and ransomware as a service, even novice hackers can do big damage these days.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/hacker2.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/hacker2.png","width":780,"height":585},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Becoming a Cybercriminal Keeps Getting Easier"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a","name":"Julien Maury","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","caption":"Julien Maury"},"description":"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.","url":"https:\/\/www.esecurityplanet.com\/author\/jmaury\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19614"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/267"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=19614"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19614\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/19617"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=19614"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=19614"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=19614"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=19614"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=19614"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=19614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}