Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Monday, 6 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Report high lights black market sophistication

by The Gurus
March 25, 2014
in Editor's News
Share on FacebookShare on Twitter

Criminal black markets are complex and mirror free markets in their unprecedented levels of maturity and growth.
 
According to a report by RAND and Juniper, the black markets have significant levels of economic sophistication, reliability, accessibility and resilience in the products, distribution channels and actors involved.
 
The report claimed that the black markets are growing in size and complexity and the hacker market has emerged as a playground of financially driven, highly organised and sophisticated groups. “Understanding this market in its entirety is complicated by the fact that it is geographically spread out, diverse, segmented, and usually hidden under the cloak of darknets, anonymisation and cryptographic features,” the report said.
 
“What can be surmised from interviews with expert observers is that the hacker market poses a formidable challenge and an increasing threat to businesses, governments, and individuals operating in the digital world.”
 
It said that there there has been a steady increase in the availability of goods and services offered, from stolen records and exploit kits to “stolen-to-order” goods, such as intellectual property and zero-day vulnerabilities, while prices for credit cards are falling because the market is flooded with records, and botnets and DDoS capabilities are cheaper because so many more options are available.
 
The report found botnets, which can be used to launch a Distributed Denial of Service (DDoS) attack, are sold for as low as $50 for a 24-hour attack, while transactions are often conducted in digital currencies.
 
Also, RAND found many parts of the cyber black market are well structured, policed and have rules like a constitution. In addition, those who scam others are regularly banned or otherwise pushed off the market while “rippers”, who offer services but do not deliver, are common.
 
RAND found some organisations can reach 70 to 80,000 people, with a global footprint that brings in hundreds of millions of dollars.
 
Nawaf Bitar, senior vice president and general manager of the security business at Juniper Networks, said: “The security industry, government and legal communities must come together to establish new norms for how companies can more vigorously defend themselves against cyber-attacks. We must address the root cause behind the accelerated maturation of the cyber-crime market – the very economics that drive its success.
 
“By disrupting the economics of hacking we can break the value chains that drive successful attacks. We must never lose the moral high ground, however, so we cannot go on the offensive and hack back, but we can no longer remain passive. By using forms of active defense such as intrusion deception we can identify, thwart and frustrate attackers.”
 
Charles Sweeney, CEO of Bloxx, said: “There can sometimes be the misconception that hackers are amateurs, simply out to ‘have a bit of fun.’ This report smashes that illusion into a million little pieces and brings home the harsh reality by demonstrating just how well organised and connected cyber criminals are.
 
They run their enterprises like high performing businesses, constantly innovating and looking for new exploits. And unlike many of the major economies around the world, theirs is one that is booming. We say this time and time again, but businesses absolutely cannot afford to be complacent because complacency is what fuels this underground online economy.”

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Microsoft issue emergency fix for RTF zero-day

Next Post

The end is nigh for Windows XP

Recent News

safe

Will Emphasising App Security Lead to More App Installs?

February 6, 2023
Phone with app store open

$400,000 Fine for Stalkerware App Developer

February 6, 2023
london-skyline-canary-wharf

Ransomware attack halts London trading

February 3, 2023
Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

February 2, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information