SINCON 2021 Conference — An Exposé of the Criminal Underground — by Aaron Aubrey Ng
SINCON 2021 Conference — BizComm Talk
Day 2 (06 Nov 2021) 12.00pm—1.00pm @ Open Stage
An Exposé of the Criminal Underground
eCrime continues to dominate the threat landscape and this phenomenon is only made possible with a prolific and vibrant Criminal Underground. From malware developers to money mules, this vast and interconnected criminal ecosystem fulfils a wide range of functions in support of Big Game Hunting (BGH) Ransomware Operations. Notable to the past year is the increasingly pivotal role that Access Brokers play in the eCrime Ecosystem, supporting a variety of eCrime Adversaries, including the most prolific Ransomware Operators, with initial access into their target environments. Throughout 2020 and 2021, eCrime Adversaries continued to innovate and evolve their business models. The majority of BGH Ransomware operators have now adopted the threat of data leaks alongside data encryption as a means to extract payment from victims. Many of them have also established dedicated leak sites (DLSs) as a forum to publicise victim details and release the stolen data. The emergence of Ransomware-as-a-Service substantively lowered the barrier of entry for novice criminals which leads to the acceleration of eCrime. This talk strives to take a deep dive into these recent threat trends associated with Criminal Underground and offer the audience useful insights to better defend their organisations against the spectre of eCrime.
About Aaron Aubrey Ng
Aaron Aubrey Ng serves as Strategic Threat Advisor at Crowdstrike. He is responsible for CrowdStrike’s Threat Intelligence business across Asia-Pacific. Prior to his current role, Aaron was an Intelligence Consultant at Recorded Future. He was responsible for the design and implementation of threat Intelligence strategies for the public and private sectors across Asia-Pacific.
Aaron got his start in Security and Threat Intelligence in the Singapore Armed Forces as a Military Intelligence Officer. He concluded 12 years of Active Duty in 2019 and has served in multiple command appointments in classified Intelligence units, and garnered staff experience in the areas of strategic planning and policy development. In his penultimate tour of duty, Aaron was instrumental in establishing the Defence Cyber Organisation (DCO), which is akin to Singapore’s Cyber Command.