Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Hacker Underground: How Markets for Cyber-Tools, Stolen Data Work

    By
    Chris Preimesberger
    -
    April 15, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Hacker Underground: How Markets for Cyber-Tools, Stolen Data Work

      1 - Hacker Underground: How Markets for Cyber-Tools, Stolen Data Work

      by Chris Preimesberger

      2Storefronts and Bazaars

      2 - Storefronts and Bazaars

      Like other forms of e-commerce, many data records, exploit kits and goods are bought and sold from storefronts—which can encompass everything from instant-messaging chat channels and forums to sophisticated stores. RAND found that some organizations can reach 70,000 to 80,000 people, with a global footprint that brings in hundreds of millions of dollars.

      3Service Economy

      3 - Service Economy

      Not only goods, but criminal services are available for purchase, RAND found. These tools, sold on the black market as traditional software or leased like any other managed service, can help enable the most unskilled hackers to launch fairly elaborate and advanced attacks. For example, RAND found botnets, which can be used to launch a distributed denial-of-service (DDoS) attack, are sold for as low as $50 for a 24-hour attack.

      4Rules of Criminal Law

      4 - Rules of Criminal Law

      There is indeed honor among thieves. Many parts of the cyber black market are well-structured, policed and have rules like a constitution, according to RAND. In addition, those who scam others are regularly banned or otherwise pushed off the market.

      5Education and Training

      5 - Education and Training

      RAND identified widely available tools and resources on the black market that teach criminals how to hack, including instructions for exploit kits and where to buy credit cards. This access to training has accelerated sophistication and a broader set of roles and has helped facilitate entry into the hacker economy.

      6Anonymous Currencies Favored

      6 - Anonymous Currencies Favored

      Transactions in the cyber black markets are often conducted by means of digital currencies. Bitcoin, Pecunix, AlertPay, PPcoin, Litecoin, Feathercoin and Bitcoin extensions such as Zerocoin are a few of the currencies used. RAND found many criminal sites are starting to accept only cryptocurrencies due to their anonymity and security characteristics.

      7Diversity of Attacks Among Cultures

      7 - Diversity of Attacks Among Cultures

      Cyber-criminals from China, Latin America and Eastern Europe, according to RAND, are typically known for quantity in malware attacks, while those from Russia tend to be thought of as the leader in quality. RAND also found areas of expertise and focus among cyber-criminals from different countries. Many Vietnamese cyber-criminals, for example, focus on e-commerce hacks. Cyber-criminals from Russia, Romania, Lithuania and Ukraine focus on financial institutions. Many Chinese cyber-criminals specialize in intellectual property. U.S.-based cyber-criminals primarily target U.S.-based systems and, more specifically, financial systems.

      8Hierarchal Society

      8 - Hierarchal Society

      Much like a legitimate business, it takes connections and relationships to move up the (cyber) food chain, the study found. Getting to the top requires personal connections, but those at the top are making the lion’s share of the money.

      9Criminals Among Even the Bad Guys

      9 - Criminals Among Even the Bad Guys

      Even the criminal cyber black market has criminals. Known as “rippers,” these bad guys do not provide the goods or services they claim they will provide.

      10Social Media, a Hot Commodity

      10 - Social Media, a Hot Commodity

      Twitter accounts are generally worth more on the black market when compared with the average cost of a credit card record. This is potentially due to the oversaturation of cards following the recent mega data breaches and the ability to use social media accounts for follow-on attacks.

      11Gray Markets Growing

      11 - Gray Markets Growing

      There are currently gray markets where zero-day vulnerabilities are bought and sold for sky-high prices to governments and other private actors. RAND found that zero-day prices range from a few thousand dollars to $300,000, depending on the severity of the vulnerability, the complexity of the exploit and how long the vulnerability remains undisclosed.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×