G2TT
来源类型Research Reports
规范类型报告
ISBN9780833087119
来源IDRR-610-JNI
Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
Lillian Ablon; Martin C. Libicki; Andrea A. Golay
发表日期2014
出版年2014
页码82
语种英语
结论

The Hacking Community and Cyber Black Markets Are Growing and Maturing

  • The cyber black market has evolved from a varied landscape of discrete, ad hoc individuals into a network of highly organized groups, often connected with traditional crime groups (e.g., drug cartels, mafias, terrorist cells) and nation-states.
  • The cyber black market does not differ much from a traditional market or other typical criminal enterprises; participants communicate through various channels, place their orders, and get products.
  • Its evolution mirrors the normal evolution of markets with both innovation and growth.
  • For many, the cyber black market can be more profitable than the illegal drug trade.

These Cyber Black Markets Respond to Outside Forces

  • As suspicion and "paranoia" spike because of an increase in recent takedowns, more transactions move to darknets; stronger vetting takes place; and greater encryption, obfuscation, and anonymization techniques are employed, restricting access to the most sophisticated parts of the black market.
  • The proliferation of as-a-service and point-and-click interfaces lowers the cost to enter the market.
  • Law enforcement efforts are improving as more individuals are technologically savvy; suspects are going after bigger targets, and thus are attracting more attention; and more crimes involve a digital component, giving law enforcement more opportunities to encounter crime in cyberspace.
  • Still, the cyber black market remains resilient and is growing at an accelerated pace, continually getting more creative and innovative as defenses get stronger, law enforcement gets more sophisticated, and new exploitable technologies and connections appear in the world.
  • Products can be highly customized, and players tend to be extremely specialized.
摘要
  • Explore how computer security and defense companies could shift their approaches to thwarting attackers and attacks.
  • Explore how bug bounty programs or better pay and incentives from legitimate companies might shift transactions and talent off the illicit markets into legitimate business operations.
  • Explore the costs and benefits of establishing fake credit card shops, fake forums, and sites to increase the number and quality of arrests, and otherwise tarnish the reputation of black markets.
  • Explore the ramifications of hacking back, or including an offensive component within law enforcement that denies, degrades, or disrupts black-market business operations.
  • Explore the options for banks or merchants to buy back their customers' stolen data.
  • Explore the effects of implementing mandates for encryption on point-of-sale terminals, safer and stronger storage of passwords and user credentials, worldwide implementation of chips and PINs, and regular checks of websites to prevent common vulnerabilities put a dent in the black market, or enforce significant changes to how the market operates.
  • Explore how to apply lessons learned from the black market for drugs or arms merchants to the black market for cybercrime.
  • Determine whether it is more effective for law enforcement to go after the small number of top-tier operators or the lower- or open-tier participants.
  • Examine whether governments and law enforcement worldwide could work together to prosecute and extradite when appropriate, and coordinate for physical arrests and indictments.
主题Computer Viruses ; Critical Infrastructure Protection ; Cyber and Data Sciences ; Cybercrime ; Cybersecurity ; Databases and Data Collection ; Analysis ; and Processing ; Health Information Privacy ; Information Privacy ; The Internet ; Law Enforcement ; Markets
URLhttps://www.rand.org/pubs/research_reports/RR610.html
来源智库RAND Corporation (United States)
资源类型智库出版物
条目标识符http://119.78.100.153/handle/2XGU8XDN/107766
推荐引用方式
GB/T 7714
Lillian Ablon,Martin C. Libicki,Andrea A. Golay. Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar. 2014.
条目包含的文件
文件名称/大小 资源类型 版本类型 开放类型 使用许可
x1495316287980.jpg(3KB)智库出版物 限制开放CC BY-NC-SA浏览
RAND_RR610.pdf(1809KB)智库出版物 限制开放CC BY-NC-SA浏览
个性服务
推荐该条目
保存到收藏夹
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Lillian Ablon]的文章
[Martin C. Libicki]的文章
[Andrea A. Golay]的文章
百度学术
百度学术中相似的文章
[Lillian Ablon]的文章
[Martin C. Libicki]的文章
[Andrea A. Golay]的文章
必应学术
必应学术中相似的文章
[Lillian Ablon]的文章
[Martin C. Libicki]的文章
[Andrea A. Golay]的文章
相关权益政策
暂无数据
收藏/分享
文件名: x1495316287980.jpg
格式: JPEG
文件名: RAND_RR610.pdf
格式: Adobe PDF

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。