Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ New research: The underground market fueling for-profit abuse

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š New research: The underground market fueling for-profit abuse


๐Ÿ’ก Newskategorie: Video
๐Ÿ”— Quelle: feedproxy.google.com

Posted by Kurt Thomas and Elie Bursztein, Google Anti-Fraud and Abuse Research

Recently, we teamed up with top researchers exploring innovative anti-abuse strategies to build a holistic understanding of for-profit abuse. The full report, which you can read here, was presented in June at the Workshop on the Economics of Information Security 2015.

Over the last decade, Internet crime has matured into an underground economy where a large number of globally distributed criminals trade in data, knowledge, and services specifically geared towards defrauding users and businesses. Within this black market, criminals buy and sell compromised machines, scam hosting, exploit kits, and wholesale access to pilfered user records including usernames and passwords, credit card numbers, and other sensitive personal data. The availability of such specialized resources has transformed for-profit abuse into a cooperative effort among criminals each satisfying a cog in a supply chain.

Profiting from abuse: a bird’s eye view

Here’s an example of the underground value chain required to make money from spamming knock-off luxury products:


In aggregate, the problem may appear intractable to stop. However, if we view this scenario in an economic light, then increasing the cost of fake accounts, phone numbers, or compromised websites cuts into the profitability of abuse. In the end, abuse propped up by cost-ineffective resources will crumble.


Collaborating to better understand the underground

Given the complex underbelly of abuse, we pulled together experts from industry and academia to build a systematic understanding of how criminals operate. Our previous example represents just one configuration of a value chain. In our example, revenue originates solely from victims buying counterfeit products. Criminals could adapt this strategy to scam users into paying for fake anti-virus, defraud advertisers via clickbots, or liquidate a victim’s banking assets. Regardless of the composition, we argue there is always a profit center through which victims transfer new capital into the underground. These schemes form a spectrum between selling products to unwitting victims to outright theft. A medley of alternatives such as dating scams, call-center scams, premium SMS fraud, DDoS extortion, or even stealing and re-selling gaming assets all fall within this spectrum and ultimately derive a payout from victims outside the underground.

These profit centers are in turn propped up by an ecosystem of support infrastructure that can be configured arbitrarily by criminals per their requirements. This infrastructure includes compromised hosts, human labor, networking and hosting, and accounts and engagement—all available for a fee. For example, 1,000 Google accounts cost on the order of $170, compared to CAPTCHAs which cost $1 per thousand. These costs reflect socio-economic factors as well as the impact of technical, legal, and law enforcement interventions on the availability of resources.

Redefining the abuse arms race

Client and server-side security has dominated industry’s response to digital abuse over the last decade. The spectrum of solutions—automated software updates, personal anti-virus, network packet scanners, firewalls, spam filters, password managers, and two-factor authentication to name a few—all attempt to reduce the attack surface that criminals can penetrate.

While these safeguards have significantly improved user security, they create an arms race: criminals adapt or find the subset of systems that remain vulnerable and resume operation.

To overcome this reactive defense cycle, we are improving our approach to abuse fighting to also strike at the support infrastructure, financial centers, and actors that incentivize abuse. By exploring the value chain required to bulk register accounts, we were able to make Google accounts 30–40% more expensive on the black market. Success stories from our academic partners include disrupting payment processing for illegal pharmacies and counterfeit software outlets advertised by spam, cutting off access to fake accounts that pollute online services, and disabling the command and control infrastructure of botnets.
...













๐Ÿ“Œ Deception Technology Market Research Report - Forecasts up to 2023 | JSB Market Research


๐Ÿ“ˆ 35.03 Punkte

๐Ÿ“Œ Deception Technology Market Research Report - Forecasts up to 2023 | JSB Market Research


๐Ÿ“ˆ 35.03 Punkte

๐Ÿ“Œ Google Introduces Abuse Research Grants Program For Product Abuse Issues


๐Ÿ“ˆ 33.4 Punkte

๐Ÿ“Œ The new Azorult 3.3 is available in the cybercrime underground market


๐Ÿ“ˆ 27.59 Punkte

๐Ÿ“Œ Phishing kits: The new bestsellers on the underground market


๐Ÿ“ˆ 27.59 Punkte

๐Ÿ“Œ Global Perimeter Security Market size, Analysis, Trends and Forecast to 2025 | Security Services Market Research Reports


๐Ÿ“ˆ 26.43 Punkte

๐Ÿ“Œ The independent inquiry into child sexual abuse (iicsa) has been fined ยฃ200,000 for revealing identities of abuse victims in a mass email.


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Ryan s. lin pleaded guilty to cyberstalking, distribution of child abuse imagery, hoax bomb threats, computer fraud and abuse, and id theft.


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Signifyd Return Abuse Prevention gives merchants the flexibility to customize their return-abuse response


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Gssapi-Abuse - A Tool For Enumerating Potential Hosts That Are Open To GSSAPI Abuse Within Active Directory Networks


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Underground Market Selling Cheap Access to Hacked Servers


๐Ÿ“ˆ 24.66 Punkte

๐Ÿ“Œ Underground Market Selling Cheap Access to Hacked Servers


๐Ÿ“ˆ 24.66 Punkte

๐Ÿ“Œ Researchers: Booming Cyber-Underground Market for Initial-Access Brokers


๐Ÿ“ˆ 24.66 Punkte

๐Ÿ“Œ Genesis Market: BKA geht gegen Underground Economy vor


๐Ÿ“ˆ 24.66 Punkte

๐Ÿ“Œ A dataset of 200 million PII exfiltrated from several Japanese websites offered on underground market


๐Ÿ“ˆ 24.66 Punkte

๐Ÿ“Œ Authorities Shut Down the Largest Underground Market Place for Buying and Selling the Hacked Servers


๐Ÿ“ˆ 24.66 Punkte

๐Ÿ“Œ Authorities Shut Down the Largest Underground Market Place for Buying and Selling the Hacked Servers


๐Ÿ“ˆ 24.66 Punkte

๐Ÿ“Œ Underground Black-Market Website โ€˜BriansClubโ€™ Hacked โ€“ 26 Million Stolen Credit Cards Rescued


๐Ÿ“ˆ 24.66 Punkte

๐Ÿ“Œ 1.3 Million Indianโ€™s Credit/Debit Card Data Available to Sale on Underground Darkweb Market


๐Ÿ“ˆ 24.66 Punkte

๐Ÿ“Œ How much is the phish? Underground market of phishing kits is booming โ€“ Group-IB


๐Ÿ“ˆ 24.66 Punkte

๐Ÿ“Œ Hackers Selling $2 Million Worth South Korean & US Payment Card Details in The Underground Darknet Market


๐Ÿ“ˆ 24.66 Punkte

๐Ÿ“Œ Collection of South Korean, U.S. Payment Cards Emerges on Underground Market


๐Ÿ“ˆ 24.66 Punkte

๐Ÿ“Œ Whatโ€™s trending on the underground market?


๐Ÿ“ˆ 24.66 Punkte

๐Ÿ“Œ 1M compromised cards available for free in the underground market


๐Ÿ“ˆ 24.66 Punkte

๐Ÿ“Œ Google announces new experimental Abuse Research Grants Program


๐Ÿ“ˆ 23.93 Punkte

๐Ÿ“Œ Announcing New Abuse Research Grants Program


๐Ÿ“ˆ 23.93 Punkte

๐Ÿ“Œ Apple pays $12.1 million fine in Russia for alleged app market abuse


๐Ÿ“ˆ 21.3 Punkte

๐Ÿ“Œ UK Pondering Google Probe on Mobile Market Abuse, Windows Phone Possible Victim


๐Ÿ“ˆ 21.3 Punkte

๐Ÿ“Œ UK Pondering Google Probe on Mobile Market Abuse, Windows Phone Possible Victim


๐Ÿ“ˆ 21.3 Punkte

๐Ÿ“Œ Telecom Italia Fined $131 Million for Broadband Market Abuse


๐Ÿ“ˆ 21.3 Punkte

๐Ÿ“Œ Google Sued by States for Abuse of Search-Market Dominance


๐Ÿ“ˆ 21.3 Punkte

๐Ÿ“Œ HUMAN and PerimeterX Unite in Market-Changing Merger to Safeguard Customers From Sophisticated Bot Attacks, Fraud and Account Abuse


๐Ÿ“ˆ 21.3 Punkte

๐Ÿ“Œ HUMAN and PerimeterX Unite in Market-Changing Merger to Safeguard Customers From Sophisticated Bot Attacks, Fraud and Account Abuse


๐Ÿ“ˆ 21.3 Punkte

๐Ÿ“Œ Apple and Google abuse market dominance, says Japan antitrust regulator


๐Ÿ“ˆ 21.3 Punkte

matomo