Free Trade in the Cyber Underground Malware Outsourcing Marita Fowler Farrah Patterson CAP 6135 – Term Project Proposal.

Slides:



Advertisements
Similar presentations
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
Advertisements

PEOPLE’S REPUBLIC OF HACKING By: Lani N, Ashley R, Michael R, Gregory R.
Computer Threats I can understand computer threats and how to protect myself from these threats.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
#AVeSPresents AVeS Cyber Security Confidence in your Digital Information 2014/09/25 Charl Ueckermann Managing Director AVeS Cyber Security Lex Informatica.
Security for Internet Every Day Use Standard Security Practices and New Threats.
Computer and Internet Crimes By: Tracey Ross & Tommy Brown.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Cyber X-Force-SMS alert system for threats.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
March 2006 Taner Erig - EMU5-1 Basic Information on Spyware and Adware n It is difficult to define spyware and adware with precision. The working definition.
Presentation By Timothy Mangas. Why should we worry? Crimes committed using the computer or Internet can be more costly (money wise) than other crimes.
E-Commerce Chapter 5. Electronic commerce : E-commerce : eCommerce o Is Trading in products or services using computer networks, such as the Internet.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
CYBER CRIME AND SECURITY TRENDS
CERN - IT Department CH-1211 Genève 23 Switzerland t Update on the underground economy and making profit on the black market Wojciech Lapka.
1 ANTI VIRUS UPDATING. 2 Anti Virus Software: There are as many hackers today as there are software developers. Cyber crime has been recognized as needing.
Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs
Chapter Nine Maintaining a Computer Part III: Malware.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
1 Title ECI: Anatomy of a Cyber Investigation Who Are the Actors.
Risks and Revenues Virtual Business Copyright © Texas Education Agency, All rights reserved.
Marine Industry Day 2015 Sector Command Center (24 hours): (504) National Response Center: Website:
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Unit 19 INTERNET SECURITY
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
OPSWAT Presentation for XXX Month Date, Year. OPSWAT & ____________ Agenda  Overview of OPSWAT  Multi-scanning with Metascan  Controlling Data Workflow.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
Information Warfare Playgrounds to Battlegrounds.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Trojan Attacks - presented by Leo October 28/2010.
Topic 5: Basic Security.
Information Warfare Playgrounds to Battlegrounds.
INTRODUCTION & QUESTIONS.
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
Smart City Hacked??? Technology & Society. American cities vulnerable to large-scale cyber attack
All this information What is it? Teachers Pay Teachers is the world’s first and largest open marketplace for educators to.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
Matt Jennings.  Introduction  Value Chains  Major value chains in the illegal market  Means of Communication  Conclusion.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
3.6 Fundamentals of cyber security
CYBER SECURITY...
Big Picture Consider this How many online threats might you be faced with a day?
Various Types of Malware
Cyber Security & IT: What’s Next?
Cyber Security By: Pratik Gandhi.
Chapter 11 crime and security in the networked economy
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Partnering to Minimize the Impact of Data Compromises
“CYBER SPACE” - THE UNDERGROUND ECONOMY
Risk of the Internet At Home
Get Rid of a Trojan Horse? Even with a competent anti-virus installed, PCs could still be susceptible to malicious programs such.
IASP 470 PROJECT PROPOSAL MALWARE DETECTION
Marcial Quinones-Cardona
Internet Safety By: Ayana Shiggs.
Texas Assisted Living Association 2019 Conference
Internet Safety By: Ayana Shiggs.
Presentation transcript:

Free Trade in the Cyber Underground Malware Outsourcing Marita Fowler Farrah Patterson CAP 6135 – Term Project Proposal

Overview Our research will cover the following topics: What is Malware Outsourcing Underground Outsourcing Culture Anatomy of the Malware Consumer Malware Business Model Examples Security Challenges

What is Malware Outsourcing It’s the distribution of malware software for profit Malware market has developed greatly over the last year Parts of the process are outsourced such as code writing, distribution and even the set up of support services for those who buy the software New malware threats rose from 74,482 in 2006 to 499,811 last year

Underground Outsourcing Culture Who is selling/renting? top-notch software engineers (sellers) criminals (buyers/sellers) Hacker hobbyists (buyers/sellers) Supply and Demand Comparison to original hacker culture

Anatomy of the Malware Consumer Motivation Monetary Espionage Steal private information Attention seeking

Malware Business Model How do you buy/sell? Online criminals regularly post their ads on YouTube, looking for buyers for their products. Forums How to sellers/buyers avoid detection? Pseudo profiles on marketplace forums, IRQ’s,

Malware Business Model Selling designer code Prefabricated malware kits Botnet rentals Some even manage the infected systems for purchaser

Examples 0Day attack for Windows Vista selling for $50,000 in 2006 MPACK $50 to 1$50 (an application that helps download malicious programs onto others' computers by exploiting a number of flaws) DreamDownloader for $300. ( creates downloader Trojans ) Zeus Trojan $4000 ( form injection capabilities ) CIA disclosed information indicating that utility companies outside of the United States had been hacked via the Internet and ransom edicts issued by the attackers (2008).

Security Challenges Locating and prosecuting criminals Legal Complications Local Federal International

Conclusion There are many different types of consumers of malware The market is growing, business is booming There are a number of challenges in locating and prosecuting criminals