• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Whitepapers
  • Newsletters
  • Sign in
  • Events
    • Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Whitepapers
    • V3resources 120x194
      Network Security Forensics For GDPR Compliance

      An effective network security forensics strategy can assist an organization in providing key compliance-related details as part of any post-incident GDPR investigation.

      Download
      V3resources 120x194
      10 ways to increase productivity with managed Office 365

      For businesses large and small, relying on a cloud-based collaboration and productivity suite such as Microsoft Office 365 is becoming the norm. Enhancing productivity in your organisation is vital to get ahead in 2017 - and using Office 365 can help, if it's used right...

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Data Strategy Spotlight
  • Sign in
  •  
    •  

      You are currently accessing V3 .co.uk via your Enterprise account.

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      • Sign in
     
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    You are currently accessing V3 .co.uk via your Enterprise account.

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    • Sign in
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Skills

vnunet.com analysis: The malware 'shadow economy'

Online criminals using techniques of the free market

  • Ian Williams
  • 09 January 2008
  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
0 Comments

Viruses, malware and online crime are evolving from the realm of geeks into a major shadow economy that closely mimics the real world.

Maksym Schipka, a senior architect at security firm MessageLabs, claims to have identified a sophisticated online black market with tens of thousands of participants.

This underground internet economy is worth over $105bn, making it bigger than the global drugs trade.

  • Click here for the full interview with Maksym Schipka (MP3)

Collectively, online criminals are using the techniques of the free market to subvert and corrupt legitimate online business.

In his report Schipka lays out the basic workings of this system, comparing it to a normal high street experience.

As with high street stores, online crime breaks down into a series of specialised trades.

Malware writers first create new viruses, spyware, and Trojans to infect computers, but the majority do not distribute the code themselves.

In fact, they make great play of offering their software 'for educational purposes only' in the hope that this provides some immunity from prosecution.

The malware writers then sell this code for as little as $250 and customers can subscribe to updates for an extra $25 a month which ensures that the malware evades detection.

The middleman who buys malware from a programmer then typically uses the services of a botnet owner to spread it.

Once the malware has spread, the middleman can sit back and start to collect stolen information and stolen identities which are then sold on to make money.

According to Schipka's research, a full identity sells for around $5. This includes name and address, a passport or driving licence scan, credit card numbers and bank account details.

Credit card numbers sell for between two and five per cent of the remaining credit balance on the cards in questions.

As competition is stiff, identity thieves offer customers a high level of service. For example, people can buy identities sorted by a given country, industry, role or credit card sorted by remaining balance.

There are a range of other services offered within the shadow economy, including a system of guarantors and escrow accounts to help thieves make sure they are not ripped off themselves.

Another sign of growing sophistication is the continuous improvement in the quality of products on sale in the shadow economy.

Malware writers will offer guarantees that a given virus or Trojan will not be detected using current antivirus programs, and the malware author will supply a new version if vendors update their software.

The shadow economy has all the attributes of a traditional economy - division of labour, price competition, marketing etc - but accelerated to internet speed and carried out online.

Schipka warned that, while it is interesting to observe these classic economic principles at work, it suggests that malware is going to get more common and more virulent.

The researcher explained that many conventional antivirus programs rely on 'signatures' to detect malware and update their signature files as new malware comes to light.

However, this means that a signature can only be created after a new virus is in the wild and is attacking computers. Worse, malware authors can also download the signatures and test their creations against the latest updates.

Schipka's research suggests that malware authors can produce new unique malware every 45 seconds in order to keep it undetected.

With this in mind, Schipka recommends security program developers to use a combined signature-based and heuristic scanner to help maximise the strength of their products.

  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
  • Topics
  • Skills
  • Law
  • Security

V3 Latest

First plant to grow on the Moon, err, dies
First plant to grow on the Moon, err, dies

Cotton seedling freezes to death as Chang'e-4 shuts down for the Moon's 14-day lunar night

  • Communications
  • 18 January 2019
Fortnite news and updates: Fortnite made $2.4bn in 2018, according to SuperData
Fortnite news and updates: Fortnite made $2.4bn in 2018, according to SuperData

Fortnite easily out-earns PUBG, Assassin's Creed Odyssey and Red Dead Redemption 2 in 2018

  • Software
  • 18 January 2019
Japanese firm sends micro-satellites into space to deliver artificial meteor showers on demand
Japanese firm sends micro-satellites into space to deliver artificial meteor showers on demand

Meteor showers as a service will be visible for about 100 kilometres in all directions

  • Communications
  • 18 January 2019
Saturn's rings only formed in the past 100 million years, suggests analysis of Cassini space probe data
Saturn's rings only formed in the past 100 million years, suggests analysis of Cassini space probe data

New findings contradict conventional belief that Saturn's rings were formed along with the planet about 4.5 billion years ago

  • Communications
  • 18 January 2019
Back to Top
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017