Cybercrime part of sophisticated online economy, study says

Mar 25, 2014 by Rob Lever
The dark world of cybercrime has evolved from one of rogue individuals to a functioning market-based economy with its ups and downs, code of conduct and "innovation, study shows

The dark world of cybercrime has evolved from one of rogue individuals to a functioning market-based economy with its ups and downs, code of conduct and "innovation."

A study by Rand Corp. and commissioned by the security firm Juniper Networks found a well-organized, multibillion-dollar underground economy that has become "a playground of financially driven, highly organized and sophisticated groups."

The evolution of cybercrime creates new challenges for security professionals trying to protect computer networks, says Nawaf Bitar, Juniper's general manager for security.

"We have long suspected that cybercriminals were sophisticated and that they had an organizational structure, but no one had studied this," Bitar told AFP.

"The success of this market is driven by accelerated economics, and the way to address this is through economics."

The report says the black markets "are growing in size and complexity" and that this activity "mirrors the normal evolution of a free market, with both innovation and growth."

Juniper's security vice president Michael Callahan said this cyber underground has all the characteristics of an economy, including its own currencies—chiefly cryptographic payment forms such as Bitcoin.

Callahan said the underground economy is characterized by specialization and "resilience," so that if one market participant leaves, another steps up.

"We saw this when (the bazaar) Silk Road went down, and within a day other participants started filling that gap," Callahan said.

"It's one of those signs this is a mature economy."

A study by Rand Corp. has found a well-organized, multibillion-dollar underground economy in cybercrime that has become "a playground of financially driven, highly organized and sophisticated groups"

'Honor among thieves'

The report notes that, just as in some organized crime groups, there is a code of conduct that helps reassure customers.

"You have honor among thieves," Callahan said.

"They work to a level of conduct. They know it is in all of their best interests to follow the rules. Like in other markets, these people know that your reputation is key."

The report suggests that about 30 percent of the sellers of financial data are "rippers," who fail to deliver promised goods or services.

These abuses generally occur in the "lower" levels of the black market that are easiest to access. But these rippers "tend to get reported and then often quickly removed," the report said.

The study found these markets span the globe from China to Eastern Europe to Latin America, with many US-based players and "more cross-pollination between these cybercriminals than ever before."

A cash register screen indicates a customer is entering their PIN number at a Target store on December 19, 2013 in Miami, Florida

The world features "storefronts" like other forms of e-commerce, with hacker tools and services bought and sold.

The tools available include those used in the attack on US retail giant Target, where upwards of 110 million customers may have had their personal data stolen.

For those who lack technical savvy, new services are offered. Rand found one can obtain a Distributed Denial of Service (DDoS) attack—in which hackers overwhelm a server to interrupt access—for as low as $50 for a 24-hour attack.

'Active resistance'

Bitar said the cybersecurity community needs to shift its focus because of the new threat, because the traditional methods of using firewalls and other defensive measures are not enough.

"We need to use active resistance rather than passive resistance," he said.

French police officers of the PHAROS internet investigation unit work in Nanterre, near Paris, on February 4, 2014. PHAROS is part of the French Anti-Cybercrime Office

This could involve setting traps, using encryption and delivering bogus information that disrupts efforts by hackers and attacks.

But he said he strongly opposes the idea of "hacking back" at the attackers.

"I believe that is wrong. You can harm innocent bystanders," he said.

Explore further: New Chinese law reinforces government control of cyberspace (Update)

Related Stories

Global attack needed to catch credit thieves

Mar 19, 2014

Stopping massive data breaches like the one that hit Target will require a more sophisticated, collaborative approach by law enforcement agencies around the world, a Michigan State University cyber security ...

US cybersecurity chief warns of 'market' in malware

Jun 17, 2009

More must be done to combat the lucrative trade in malicious software, which threatens sensitive government networks and personal data, the head of the US National Cybersecurity Center warned Tuesday.

Recommended for you

Five properties of physics that affect your gas mileage

19 minutes ago

Physics is inescapable. It's everywhere, making your Frisbees fly, your toilets flush and your pasta water boil at a lower temperature at altitude. We've harnessed these forces, along with chemistry and engineering, ...

Encryption made easier: Just talk like a parent

1 hour ago

Encrypting emails can be tedious, difficult and very confusing. And even for those who have mastered the process, it's useless unless the intended recipient has the correct software to decode the message. ...

SemanticPaint system labels environment quickly online

3 hours ago

Ten researchers from University of Oxford, Microsoft Research Cambridge, Stanford, and Nankai University have presented a new approach to 3D scene understanding with a system which they dubbed SemanticPaint. ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.