Feeds

Black market for malware a thriving place

It slices, it dices . . .

The Essential Guide to IT Transformation

Defcon The sale of Trojans, phishing kits and other types of malware thrives in a growing marketplace that resembles many of the more legitimate businesses that have set up shop online over the past decade.

With a wealth of online bazaars, 24-by-7 support and the ability for other buyers to weigh in on the quality of the products, this malware economy continues to make it easier to break into the shady world of computer crime.

Thomas Holt, a professor of criminal justice at the University of North Carolina at Charlotte, presented data collected by his honey net team over the past 16 months at the Defcon security conference in Las Vegas. Adopting user-feedback ratings, independent reviews and discounts for bulk purchases, the malware business models often appear to mimic those of eBay, Yelp or Ronco.

"It's especially important thinking about stolen data, when there's time sensitive materials involved," Holt said during his presentation. "You can basically build a nice arsenal of attack tools by going to these sites."

Holt's research was gathered with the help of a team of grad students who monitor about 30 forums on IRC and the web. His discovery of a bubbling underground economy that mimics the public web isn't exactly new. But it does bring a fresh infusion of data that suggests the economy is maturing and expanding.

Any boob can jump on an online forum and claim to have a flaw-free Trojan, so many online marketplaces adopt buyer-feedback ratings. Many sites compile user comments to generate labels that get attached to each forum participant. A "ripper," for example, describes fraudulent sellers out to rip off buyers while a "verified seller" designates a user known to actually deliver products that work as advertised.

There are also sites that provide independent reviews that sellers with positive feedback can link to when advertising their wares.

"Thanks you for a FreeJoiner," reads one syntax challenged user review concerning a malware tool by that name. "Is the best program in its class that I have ever seen, the result of these use was not long in coming, weaknesses and suggestions on the work simply no!"

The sites unabashedly promote the virtues of the malware tools advertised. An ad for the Suicide DDoS bot, for example, promises the malware can be controlled via web access or IRC, injects code into trusted processes, and is not detected by antivirus programs. An ad for the PG Universal Grabber Trojan promises standard updates, bug fixes and optimization as part of the $700 purchase.

It would seem that buying naughty code is as easy as buying Britney's undies on eBay. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Tor attack nodes RIPPED MASKS off users for 6 MONTHS
Traffic confirmation attack bared users' privates - but to whom?
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.