110 likes | 230 Views
Malware Outsourcing . Free Trade in the Cyber Underground. Marita Fowler Farrah Patterson CAP 6135 – Term Project Proposal. Overview. Our research will cover the following topics: What is Malware Outsourcing Underground Outsourcing Culture Anatomy of the Malware Consumer
E N D
Malware Outsourcing Free Trade in the Cyber Underground Marita Fowler Farrah Patterson CAP 6135 – Term Project Proposal
Overview • Our research will cover the following topics: • What is Malware Outsourcing • Underground Outsourcing Culture • Anatomy of the Malware Consumer • Malware Business Model • Examples • Security Challenges
What is Malware Outsourcing • It’s the distribution of malware software for profit • Malware market has developed greatly over the last year • Parts of the process are outsourced such as code writing, distribution and even the set up of support services for those who buy the software • New malware threats rose from 74,482 in 2006 to 499,811 last year
Underground Outsourcing Culture • Who is selling/renting? • top-notch software engineers (sellers) • criminals (buyers/sellers) • Hacker hobbyists (buyers/sellers) • Supply and Demand • Comparison to original hacker culture
Anatomy of the Malware Consumer • Motivation • Monetary • Espionage • Steal private information • Attention seeking
Malware Business Model • How do you buy/sell? • Online criminals regularly post their ads on YouTube, looking for buyers for their products. • Forums • How to sellers/buyers avoid detection? • Pseudo profiles on marketplace forums, IRQ’s, email
Malware Business Model • Selling designer code • Prefabricated malware kits • Botnet rentals • Some even manage the infected systems for purchaser
Examples • 0Day attack for Windows Vista selling for $50,000 in 2006 • MPACK $50 to 1$50 (an application that helps download malicious programs onto others' computers by exploiting a number of flaws) • DreamDownloader for $300. (creates downloader Trojans) • Zeus Trojan $4000 (form injection capabilities) • CIA disclosed information indicating that utility companies outside of the United States had been hacked via the Internet and ransom edicts issued by the attackers (2008).
Security Challenges • Locating and prosecuting criminals • Legal Complications • Local • Federal • International
Conclusion • There are many different types of consumers of malware • The market is growing, business is booming • There are a number of challenges in locating and prosecuting criminals