Blackhatonomics: An Inside Look at the Economics of Cybercrime

Blackhatonomics: An Inside Look at the Economics of Cybercrime

Will Gragido, Daniel Molina, John Pirc, Nick Selby

Language: English

Pages: 216

ISBN: 1597497401

Format: PDF / Kindle (mobi) / ePub


Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people around the world devote tremendous resources to developing and implementing malware. The book provides an economic view of the evolving business of cybercrime, showing the methods and motivations behind organized cybercrime attacks, and the changing tendencies towards cyber-warfare. Written by an exceptional author team of Will Gragido, Daniel J Molina, John Pirc and Nick Selby, Blackhatonomics takes practical academic principles and backs them up with use cases and extensive interviews, placing you right into the mindset of the cyber criminal.

  • Historical perspectives of the development of malware as it evolved into a viable economic endeavour
  • Country specific cyber-crime analysis of the United States, China, and Russia, as well as an analysis of the impact of Globalization on cyber-crime.
  • Presents the behind the scenes methods used to successfully execute financially motivated attacks in a globalized cybercrime economy.
  • Provides unique insights, analysis, and useful tools for justifying corporate information security budgets.
  • Provides multiple points of view, from pure research, to corporate, to academic, to law enforcement.
  • Includes real world cybercrime case studies and profiles of high-profile cybercriminals.

 

 

 

 

 

 

 

 

 

 

 

 

they’re the victims of a crime they can’t see, hear, feel, smell, or touch; rather, such a person is more likely to say of his or her computer, “I don’t have anything on it worth stealing anyway!” [8] As a result, these people are almost the perfect facilitators of cybercrime. You’ve often heard it stated that the users are a network’s largest single point of vulnerability, but until you contemplate just how easy it is to get users to betray your network security, that statement probably doesn’t

cybercriminals have decided that there is less risk in leasing the tools for attacking than in trying to steal directly from their victims. Bagle actually had an integrated SMTP engine, which allowed it to convert any compromised machine into a mail server so that it could spam other users. With more stable attack platforms, the command and control channel requires less redundancy and self-healing features to be included. As such, the amount of unecessary chatter between systems can be cut down

analysts and law enforcement agents around the world. He is a stereotype; a model that some emulate and others fight. Russia and the former states that once comprised the USSR do have a large population of talented hackers that are under less pressure from the law than their counterparts elsewhere[9] in the world to date. Though this is changing, as we have seen in cases associated with the takedown of various parts of the ZeuS banking Trojan/botnet gang and the DNS Changerbot gang, among others,

of protection users had at the time. With better intelligence and protection, we now know that 80 percent of the spam traffic in the United States and Europe can be attributed to 100 known spam operations. Out of these, 62 of the largest offenders are located within the United States, meaning that the greatest part of this traffic is created, transported, filtered, and rejected all within U.S. servers. External countries responsible for spam traffic are the Russian Federation, with 11 known

mention, of course, the fact that most production lines are today themselves controlled primarily by computer-controlled robots and systems; see, for example, Astrom, A., and B. 127 128 CHAPTER 10:   America, Land of Opportunity Into this environment we now introduce cybercriminals. The target is not necessarily financial data, but rather data that can be monetized. Consider the TJX hack of 2005 through 2007. Hackers had breached the company’s network through subverting controls of an

Download sample

Download