来源类型 | Research Reports
|
规范类型 | 报告
|
ISBN | 9780833087119
|
来源ID | RR-610-JNI
|
| Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar |
| Lillian Ablon; Martin C. Libicki; Andrea A. Golay
|
发表日期 | 2014
|
出版年 | 2014
|
页码 | 82
|
语种 | 英语
|
结论 |
The Hacking Community and Cyber Black Markets Are Growing and Maturing- The cyber black market has evolved from a varied landscape of discrete, ad hoc individuals into a network of highly organized groups, often connected with traditional crime groups (e.g., drug cartels, mafias, terrorist cells) and nation-states.
- The cyber black market does not differ much from a traditional market or other typical criminal enterprises; participants communicate through various channels, place their orders, and get products.
- Its evolution mirrors the normal evolution of markets with both innovation and growth.
- For many, the cyber black market can be more profitable than the illegal drug trade.
These Cyber Black Markets Respond to Outside Forces- As suspicion and "paranoia" spike because of an increase in recent takedowns, more transactions move to darknets; stronger vetting takes place; and greater encryption, obfuscation, and anonymization techniques are employed, restricting access to the most sophisticated parts of the black market.
- The proliferation of as-a-service and point-and-click interfaces lowers the cost to enter the market.
- Law enforcement efforts are improving as more individuals are technologically savvy; suspects are going after bigger targets, and thus are attracting more attention; and more crimes involve a digital component, giving law enforcement more opportunities to encounter crime in cyberspace.
- Still, the cyber black market remains resilient and is growing at an accelerated pace, continually getting more creative and innovative as defenses get stronger, law enforcement gets more sophisticated, and new exploitable technologies and connections appear in the world.
- Products can be highly customized, and players tend to be extremely specialized.
|
摘要 |
- Explore how computer security and defense companies could shift their approaches to thwarting attackers and attacks.
- Explore how bug bounty programs or better pay and incentives from legitimate companies might shift transactions and talent off the illicit markets into legitimate business operations.
- Explore the costs and benefits of establishing fake credit card shops, fake forums, and sites to increase the number and quality of arrests, and otherwise tarnish the reputation of black markets.
- Explore the ramifications of hacking back, or including an offensive component within law enforcement that denies, degrades, or disrupts black-market business operations.
- Explore the options for banks or merchants to buy back their customers' stolen data.
- Explore the effects of implementing mandates for encryption on point-of-sale terminals, safer and stronger storage of passwords and user credentials, worldwide implementation of chips and PINs, and regular checks of websites to prevent common vulnerabilities put a dent in the black market, or enforce significant changes to how the market operates.
- Explore how to apply lessons learned from the black market for drugs or arms merchants to the black market for cybercrime.
- Determine whether it is more effective for law enforcement to go after the small number of top-tier operators or the lower- or open-tier participants.
- Examine whether governments and law enforcement worldwide could work together to prosecute and extradite when appropriate, and coordinate for physical arrests and indictments.
|
主题 | Computer Viruses
; Critical Infrastructure Protection
; Cyber and Data Sciences
; Cybercrime
; Cybersecurity
; Databases and Data Collection
; Analysis
; and Processing
; Health Information Privacy
; Information Privacy
; The Internet
; Law Enforcement
; Markets
|
URL | https://www.rand.org/pubs/research_reports/RR610.html
|
来源智库 | RAND Corporation (United States)
|
资源类型 | 智库出版物
|
条目标识符 | http://119.78.100.153/handle/2XGU8XDN/107766
|
推荐引用方式 GB/T 7714 |
Lillian Ablon,Martin C. Libicki,Andrea A. Golay. Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar. 2014.
|