Cybercrime black market

7:01:00 PM
Cybercrime black market -

Do you know that a European credit card is more valuable on the black market cybercrime than North America? Do you know that Twitter is one of the favorite tools of hackers communication that animate the small world of parallel cybercrime?
This is what we learn in the latest report on the markets of cybercrime tools and data Stolen funded Juniper Networks and launched by RAND, a nonprofit entity, specializing in analyzingis and research.

This study provides very dense development and operation of the average cybercrime. There is now a real structured market with its different levels, go-between, networks. The study evaluates the cyber black market as consisting of 70% of single individuals or small groups, 20% of people who are part of criminal organizations, 5% of cyber terrorists, 4% "sponsored by a state players" and only 1% of hacktivists, but no member of Anonymous.
Rand report estimated 10-20% difficult to find expert players and about 25% of real experts. "This limited proportion is related to the emergence in recent years of the easiest tools such as botnets now available for different uses such as mining tools to the negation of the types of services ... for attack price much lower, ranging from $ 50 to several thousand dollars, "according to the size of the botnet necessary to carry out the attack."

Furthermore, cybercriminals do not hesitate to communicate, even opening some online stores where customers can adapt its market and generally with currencies like Bitcoin. the customer and the seller may even be invited to share an account with a webmail to share information without sending e-mail, but the recording of their communications into a single project which will then be destroyed.
the most competent pirates are increasingly cautious with intermediaries who stood between them and the candidates and specialize in specific areas: banking information, personal health information, etc ...

do you have any idea of ​​the value of the stolen data may have: data on a freshly stolen card can be worth between 20 and $ 45 per unit. Curiously, access to the Twitter account can be as juicy as some bank accounts data, because it is potentially provide access to data more.

The highest rates are concentrated on so-called zero-day vulnerabilities, say software defects are not corrected. It can reach several thousand dollars for a flaw in a small-scale program and almost a million dollars if the security problem is serious and affects a great operating system. The average is between 0 and 300 thousand dollars, according to this study

Some dark sides in this market :. Critical evaluation flaws also encourages players such as Google, to increase the rewards for the pirates who report previously unknown vulnerabilities.
This cybercrime black market will continue to evolve as a classic economic market. Rand defines some trends related to changing needs, the reliability of the current players, a wider public access, some hackers get more specialized and the market's ability to adapt to a changing world (ie the Arab Spring in Egypt had a reducing effect of providing stolen credit cards ...)

the future of this market seems thriving, according to Rand, facilitated by the proliferation of connected devices - with people being hyper and power of social media and mobile phones, will be. increasingly targeted

to prevent cybercrime, opt for a VPN service today :. VPN encrypts your Internet connections and private preserves the sites you visit and the information that you leave on these sites

Any information you send will go directly into your secure virtual tunnel. With the service VPN, you can easily direct your traffic from one of 50 countries available. Your computer and your mobile phone or tablet to connect to the Internet from any of these countries and no one can intercept your online business. You will be able to download all the content you want and even access blocked sites without any problems. Changing your IP simply by the service VPN is one of the most important steps to surf the Internet safely and anonymously.

Previous
Next Post »
0 Komentar