Fighting Cybercrime in 2024
This presentation outlines the evolution of cybercrime and the strategic response by French law enforcement agencies, specifically the Gendarmerie. It details the shift from traditional organized crime to decentralized ecosystems and the necessity of international cooperation, data sharing, and proactive infrastructure disruption. The talk highlights the importance of public-private partnerships in dismantling botnets and addressing emerging threats like AI-driven scams.
Beyond the Botnet: Why Modern Cybercrime is an Ecosystem, Not a Hierarchy
TLDR: Modern cybercrime has shifted from rigid, hierarchical structures to fluid, decentralized ecosystems where specialized actors trade services like malware-as-a-service and automated phishing platforms. This evolution demands that researchers and defenders stop chasing individual "bosses" and instead focus on disrupting the underlying infrastructure and data-sharing channels. By leveraging cross-border joint investigation teams and public-private partnerships, we can force attackers to burn their infrastructure faster than they can rebuild it.
Traditional models of organized crime, where a single kingpin directs a clear chain of command, are largely obsolete in the current threat landscape. The reality today is an ecosystem of specialized service providers. One group develops the initial access vector, another manages the command-and-control infrastructure, and a third handles the monetization of stolen data. This modularity makes the entire operation incredibly resilient. If law enforcement takes down one server or arrests one affiliate, the ecosystem simply routes around the damage.
The Shift to Decentralized Ecosystems
When we look at the evolution of threats like LockBit, we see this ecosystem in action. It is not just about the ransomware binary itself. It is about the affiliate program, the leak sites, the negotiation portals, and the automated infrastructure that allows these groups to scale.
For a researcher or a pentester, this means the "target" is no longer a single entity. It is a network of dependencies. When we analyze these groups, we are looking at how they use platforms like Telegram or Jabber to coordinate, how they use cryptocurrencies to obfuscate their financial trails, and how they move their infrastructure across borders to evade jurisdiction. The technical challenge is that these actors are constantly migrating. They might be using a specific set of C2 servers this week, but they have the automation in place to spin up a completely new environment the moment they detect an investigation.
The Data-Driven Response
Law enforcement agencies are finally catching up by adopting the same modular, data-driven approach. The key is not just the arrest; it is the disruption of the data flow. When we can access the backend of a phishing platform or a botnet command center, we gain access to the logs, the victim lists, and the affiliate communications.
This is where the OWASP Automated Threats to Web Applications project becomes highly relevant for our work. Many of these criminal ecosystems rely on automated scraping, credential stuffing, and account takeover techniques that mirror the very threats we test against during our engagements. By understanding the mechanics of how these botnets communicate with their masters, we can develop better detection signatures and, more importantly, better disruption strategies.
For example, the use of AI-driven tools like WormGPT or similar LLM-based interfaces for generating convincing phishing lures is a force multiplier for these groups. It allows them to lower the barrier to entry for less skilled affiliates. As testers, we need to be incorporating these AI-generated artifacts into our social engineering simulations to see how well our clients' email filtering and user awareness training hold up against high-quality, automated content.
Why Cooperation is the Only Real Patch
Disrupting these groups requires a level of cooperation that was unheard of a decade ago. We are seeing more success when we bridge the gap between the private sector and law enforcement. When a security company identifies a new C2 infrastructure, that information needs to move to the relevant authorities immediately.
This is not about "reporting" in the traditional sense. It is about building a shared intelligence picture. If we can provide law enforcement with the specific technical indicators—the hosting providers, the domain registration patterns, the specific API endpoints used by the malware—they can use their legal tools to seize that infrastructure.
The goal is to make the cost of operation higher than the potential profit. If an attacker has to spend three days rebuilding their infrastructure because we successfully identified and disrupted their previous setup, we have won a significant battle.
What This Means for Your Next Engagement
When you are on a red team engagement or conducting a penetration test, stop looking only for the high-severity RCE. Start looking for the infrastructure that supports the attack. How is the payload being delivered? Where is the C2 traffic going? Can you identify the underlying service provider?
If you find a phishing page, don't just flag it as "phishing." Analyze the source code. Is it using a known kit? Does it have a specific pattern in its directory structure? These are the breadcrumbs that, when shared with the right partners, lead to the dismantling of the entire ecosystem.
We are in a race against automation. The criminals are using it to scale their attacks, and we must use it to scale our defenses. Keep digging into the infrastructure, keep sharing your findings with the community, and keep pushing for better, faster, and more collaborative disruption. The next time you find a piece of infrastructure, ask yourself how you can make it as expensive as possible for the attacker to replace it.
Target Technologies
Up Next From This Conference

BestFit: Unveiling Hidden Transformers in Windows ANSI

Wi-Fi Calling: Revealing Downgrade Attacks and Not-so-private Private Keys

The CVSS Deception: How We've Been Misled on Vulnerability Severity
Similar Talks

Inside the FBI's Secret Encrypted Phone Company 'Anom'

Kill List: Hacking an Assassination Site on the Dark Web

