4 min read

Trust in the Shadows

Trust in the Shadows
Honor among thieves? Masks are still required though. ;)

In an era dominated by digital interactions, trust is the fragile thread that holds our technological society together. Without it, systems collapse, relationships falter, and progress stalls. Yet, paradoxically, even the darkest corners of the digital world — cybercrime — require trust to function. This irony highlights the intrinsic value of trust not just in lawful society but also among those who exploit its vulnerabilities. 

This exploration will delve into the role of trust in cybercrime, shedding light on the surprising ways cybercriminals and their victims rely on it. We’ll examine the logistical challenges of building and maintaining trust within illicit operations, consider the absurdity of a fictional criminal enterprise like Evilco* pursuing SOC 2 Type II or ISO 27001 certification, and critique how these standards may inadvertently enable such organizations. Ultimately, we’ll confront the unsettling realization that trust transcends ethical boundaries, raising questions about how we safeguard it in a world constantly teetering between order and chaos. 

*All entities within this post are fictitious. Any similarity to actual entities, including your current employer, is purely coincidental and should be viewed as an internal cry for help.

The Fragile Web of Trust in Cybercrime

Trust, for most of us normies, is a cornerstone of civilized life. We trust banks to protect our money, hospitals to guard our medical records, and governments to secure our tax money borders. However, trust is no less critical for cybercriminal organizations, where betrayal can mean arrest, financial ruin, or even death.

The Victim-Criminal Contract

Let’s start with the most ironic manifestation of trust: the relationship between ransomware attackers and their victims. Imagine this scenario: your organization has been locked out of critical systems. A shadowy group demands payment in exchange for a decryption key. While fear, coercion, and desperation play significant roles, so does trust.

For victims to pay, they must believe the criminals will deliver the promised decryption key. They must also trust that the criminals will not sell or misuse their data after the payment. Without this implicit trust, victims might be less inclined to engage, opting instead for data recovery attempts or involving law enforcement.

Ransomware gangs have been known to cultivate trust by honoring their promises. Groups like Conti or REvil have, in the past, operated "help desks" to guide victims through the payment and decryption processes, ensuring their files are restored promptly. DarkSide, another ransomware organization most commonly known for the Colonial Pipeline incident, operated with a "corporate-like" approach that emphasized professionalism. Even to the point of having a "code of ethics" that included avoiding hospitals and schools. This bizarre reputation management underscores how trust is a commodity even in criminal markets.

Trust Among Thieves

Trust is equally vital within the criminal ecosystem itself. Cybercrime is rarely a solo endeavor; it’s a complex web of actors, from malware developers and botnet operators to money launderers and "initial access brokers" who sell compromised credentials to the highest bidder.

Consider how a ransomware affiliate program works. A developer creates the ransomware, while affiliates distribute it and share profits. For this partnership to succeed, both parties must trust one another. The developer needs assurance that the affiliates won't run off with the ransom, and affiliates need to trust they’ll receive a functional decryption key and their share of the profits.

Trust also extends to the dark web marketplaces where tools, exploits, and data are bought and sold. These platforms often employ escrow services, reviews, and reputation systems to facilitate transactions. Without these mechanisms, the entire underground economy would collapse under the weight of deceit.

Evilco and the Pursuit of Certification

Now, let’s entertain a darkly comedic thought experiment: what if a criminal organization like Evilco pursued SOC 2 Type II or ISO 27001 certification?

Why Would Evilco Bother?

At first glance, this idea seems absurd. These certifications are frameworks for ensuring information security within legitimate organizations. Yet, for Evilco, pursuing such standards could serve two purposes: operational efficiency and trust-building.

  1. Operational Efficiency: Cybercriminal organizations, like any business, must manage risk, ensure continuity, and protect their operations from rivals and law enforcement. Adopting structured security practices could help Evilco mitigate these threats.
  2. Trust-Building: Certifications could be leveraged as a marketing tool. Imagine Evilco advertising its "ISO 27001-certified ransomware platform," reassuring affiliates and victims alike of its reliability and professionalism.

The Ethical Vacuum of Certifications

Here’s the chilling part: these certifications focus exclusively on processes and controls. They don’t account for the ethical implications of an organization's activities. As long as Evilco followed the prescribed guidelines—conducted regular audits, implemented access controls, and ensured data integrity—it could theoretically achieve certification, regardless of its criminal intent.

This ethical blind spot highlights a fundamental flaw in these frameworks: they are agnostic about the morality of the entities they certify.

How Certifications Could Strengthen Cybercrime

If Evilco were to achieve certification, the benefits could extend far beyond the viral PR they would assuredly be granted from attention hungry news networks.

  1. Enhanced Reputation: Certification could lend Evilco an air of legitimacy, making it easier to recruit skilled hackers and negotiate with affiliates.
  2. Improved Victim Trust: Victims might be more willing to pay ransoms, confident in Evilco’s “certified” commitment to honoring agreements.
  3. Operational Resilience: By adhering to structured security practices, Evilco could better protect itself from law enforcement, rival gangs, and insider threats.
  4. Competitive Edge: Certification could set Evilco apart from other criminal organizations, a real market differentiator that positions it as a "premium" service provider in the underworld.

The Uncomfortable Truth About Trust

This exploration forces us to confront a troubling reality: trust, as a concept, is ethically neutral. It can be weaponized as easily as it can be nurtured. This duality raises difficult questions for society.

  1. How do we design systems that foster trust while preventing its abuse?
  2. Should certification bodies incorporate ethical considerations into their frameworks? If so, how?
  3. What safeguards can we implement to ensure trust mechanisms are not exploited by malicious actors?

The answers are neither simple nor comforting. As digital technology continues to evolve, so too will the tactics of those who seek to exploit it.

Conclusion: A Call to Action

Trust is the lifeblood of society, but it is also a vulnerability. Cybercriminals like Evilco remind us that trust is not inherently good or bad—it is simply a tool, one that can be wielded for any purpose.

As cybersecurity professionals, policymakers, and citizens, we must recognize this duality. We must demand greater accountability from certification bodies, advocate for systems that prioritize ethical integrity, and remain vigilant against those who would weaponize trust for harm.

In the end, the fight for trust is the fight for the soul of our digital society. Whether we win or lose will depend on our willingness to confront these uncomfortable truths and act decisively.