{"id":1439,"date":"2014-03-29T08:54:53","date_gmt":"2014-03-29T06:54:53","guid":{"rendered":"http:\/\/saisa.eu\/blogs\/Guidance\/?p=1439"},"modified":"2014-03-29T15:40:17","modified_gmt":"2014-03-29T13:40:17","slug":"report-on-cybersecurity-black-market-by-rand-and-juniper","status":"publish","type":"post","link":"https:\/\/saisa.eu\/blogs\/Guidance\/?p=1439","title":{"rendered":"Report on Cybersecurity Black Market, by RAND and Juniper"},"content":{"rendered":"<p><a href=\"http:\/\/www.rand.org\/\">RAND<\/a> has published an interesting report on the cybersecurity black market. This report &#8220;<a title=\"Markets for Cybercrime Tools and Stolen Data\" href=\"http:\/\/www.rand.org\/pubs\/research_reports\/RR610.html\">Markets for Cybercrime Tools and Stolen Data<\/a>&#8221; was sponsored by <a href=\"http:\/\/www.juniper.net\">Juniper<\/a> . (direct link to <a href=\"http:\/\/www.rand.org\/content\/dam\/rand\/pubs\/research_reports\/RR600\/RR610\/RAND_RR610.pdf\">pdf<\/a>).<\/p>\n<p>This report is good reading for any security professional, worth to have a look!<\/p>\n<p><strong>Some highlights from the report<\/strong><\/p>\n<blockquote>\n<p>The hacker market has emerged as a playground of financially driven, highly organized, and sophisticated groups.<br \/>\nBlack markets are organized and run for the purpose of cybercrime; they deal in exploit kits, botnets, Distributed Denial of Service (DDoS), attack<br \/>\nservices, and the fruits of crime (e.g., stolen credit card numbers, compromised hosts).<\/p>\n<p>Gray markets, by our definition, are limited to the exchange of vulnerabilities and exploits, the dis-covery and development of which are not illegal per se (legitimate companies, for instance, often pay for information about vulnerabilities in their own products), but can nevertheless be troubling because they also complicate the life of system defenders.<\/p>\n<\/blockquote>\n<p><a href=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2014\/03\/rand-blackmarket2014a.png\"><img loading=\"lazy\" alt=\"RAND-blackmarket2014a\" src=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2014\/03\/rand-blackmarket2014a-small.png\" width=\"550\" height=\"409\" \/><\/a><\/p>\n<blockquote>\n<p>Products include both goods (hacking tools, digital assets) and services (as-a-service hacking, digital asset handling).<\/p>\n<p><a href=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2014\/03\/rand-blackmarket2014b.png\"><img loading=\"lazy\" alt=\"RAND-blackmarket2014b\" src=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2014\/03\/rand-blackmarket2014b-small.png\" width=\"300\" height=\"384\" \/><\/a><\/p>\n<p>The black market can be more profitable than the illegal drug trade: Links to end-users are more direct, and because worldwide distribution is accomplished electronically, the requirements are negligible.<\/p>\n<p><a href=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2014\/03\/rand-blackmarket2014c.png\"><img loading=\"lazy\" alt=\"RAND-blackmarket2014c\" src=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2014\/03\/rand-blackmarket2014c-small.png\" width=\"300\" height=\"432\" \/><\/a><\/p>\n<\/blockquote>\n<p><strong>Links<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/www.juniper.net\/us\/en\/dm\/rand2014\/\">Juniper page<\/a>, including link to webinar<\/li>\n<li>Webinar <a href=\"https:\/\/www.brighttalk.com\/webcast\/7013\/102143\">Insight Into the World of Hacker Economics<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>RAND has published an interesting report on the cybersecurity black market. This report &#8220;Markets for Cybercrime Tools and Stolen Data&#8221; was sponsored by Juniper . (direct link to pdf). This report is good reading for any security professional, worth to &hellip; <a href=\"https:\/\/saisa.eu\/blogs\/Guidance\/?p=1439\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[37,62,69,31,32,47,44],"tags":[],"_links":{"self":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/1439"}],"collection":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1439"}],"version-history":[{"count":1,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/1439\/revisions"}],"predecessor-version":[{"id":1440,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/1439\/revisions\/1440"}],"wp:attachment":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1439"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1439"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1439"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}