{"id":4415,"date":"2018-05-21T04:01:19","date_gmt":"2018-05-21T09:01:19","guid":{"rendered":"http:\/\/blog.zoha-islands.com\/?p=4415"},"modified":"2018-05-21T04:01:19","modified_gmt":"2018-05-21T09:01:19","slug":"cybercrime","status":"publish","type":"post","link":"https:\/\/zoha-islands.com\/blog\/cybercrime\/","title":{"rendered":"Cybercrime"},"content":{"rendered":"<p><strong>A new report that looks at the big picture pegs the worldwide haul from cybercrime at 1.5 trillion dollars. That\u2019s not <\/strong>just<strong> criminal business, it\u2019s an entire criminal economy, say the authors of the report, \u201cInto The Web Of Profit.\u201d So what&#8217;s this about <\/strong>secret<strong> sauce? Well, you&#8217;ll have to read on for that&#8230;<\/strong><\/p>\n<h2>What do you know? Crime DOES Pay! <img decoding=\"async\" loading=\"lazy\" class=\" wp-image-4429 alignright\" src=\"http:\/\/blog.zoha-islands.com\/wp-content\/uploads\/2018\/05\/2017-2016-DrillDown-300x156.png\" alt=\"\" width=\"537\" height=\"279\" srcset=\"https:\/\/zoha-islands.com\/blog\/wp-content\/uploads\/2018\/05\/2017-2016-DrillDown-300x156.png 300w, https:\/\/zoha-islands.com\/blog\/wp-content\/uploads\/2018\/05\/2017-2016-DrillDown-768x398.png 768w, https:\/\/zoha-islands.com\/blog\/wp-content\/uploads\/2018\/05\/2017-2016-DrillDown.png 800w\" sizes=\"(max-width: 537px) 100vw, 537px\" \/><\/h2>\n<p>The <a href=\"https:\/\/www.mcafee.com\/us\/solutions\/lp\/economics-cybercrime.html\" target=\"_blank\" rel=\"noopener\">cybercrime report<\/a> was researched at the University of Surrey (UK) and commissioned (paid for) by Bromium, a startup security software firm that must have a lot of venture capital behind it.<\/p>\n<p>The security software market has dozens of entrenched players, many of which are household names at least among computer-housing households. Think Symantec, McAfee, Avast, AVG, Kaspersky, Bitdefender, and all of the others I have tested over the years. To gain a profitable market share, Bromium will need some \u201csecret sauce\u201d that nobody else has and which sounds terribly sexy to its prospective users.<\/p>\n<p>Sure enough, <a href=\"https:\/\/www.bromium.com\" target=\"_blank\" rel=\"noopener\">Bromium<\/a> has it: \u201cvirtualization-based security\u201d is what they\u2019re selling, and it doesn\u2019t come cheap; I know because no price is to be found anywhere, just \u201ccontact us for a demo\u201d buttons on every page of Bromium\u2019s site. Here is the company\u2019s own explanation of its secret sauce:<\/p>\n<p>\u201cThe Bromium Secure Platform protects you from threats by isolating user tasks, such as email attachments, links, and downloads, inside protected micro-virtual machines \u2014 a separate VM for each task. If malware is delivered, it can\u2019t escape. Users can click with confidence.\u201d (Sounds more like &#8220;reckless abandon&#8221; to me.)<\/p>\n<p>Bromium&#8217;s tech was tested by NSS Labs and got a perfect score in defeating all malware and even expert human attempts at penetration. So you might be wondering if there&#8217;s a free version of Bromium for personal use. Fuggedaboutit&#8230; Bromium\u2019s solution requires a specially equipped computer connected to a corporate network. Their product is aimed at companies, not consumers. But the cybercrime report that Bromium bought is useful and free. <span id=\"ezoic-pub-ad-placeholder-117\" class=\"ezoic-adpicker-ad\"><\/span><\/p>\n<p>Dr. Michael McGuire is a Senior Lecturer in Criminology at Surrey University, England. He spent nearly a year figuring out where the money goes after a ransom is paid or intellectual property is stolen. Let\u2019s look at some the highlights of his report.<\/p>\n<p>First, the cybercrime economy moves very fast! There are no hours-long lunches at Luigi\u2019s where plots are discussed<\/p>\n<p>obliquely; these criminals use encrypted, short-lived channels to make deals, swap data, commit crimes, and move on before Don Corleone puts a spoon to his spumoni.<\/p>\n<p>Second, the real world of crime is blending into the cybercrime world. According to the report, \u201cCompanies and nation states now make money from it (the cybercrime world), acquire data and competitive advantages from it, and use it as a tool for strategy, global advancement and social control.\u201d<\/p>\n<h2>Today&#8217;s Cybercrime is Carefully Planned and Executed<img decoding=\"async\" loading=\"lazy\" class=\"alignleft wp-image-4425\" src=\"http:\/\/blog.zoha-islands.com\/wp-content\/uploads\/2018\/05\/Cyber-crime-planned-300x175.jpg\" alt=\"\" width=\"481\" height=\"281\" srcset=\"https:\/\/zoha-islands.com\/blog\/wp-content\/uploads\/2018\/05\/Cyber-crime-planned-300x175.jpg 300w, https:\/\/zoha-islands.com\/blog\/wp-content\/uploads\/2018\/05\/Cyber-crime-planned-768x449.jpg 768w, https:\/\/zoha-islands.com\/blog\/wp-content\/uploads\/2018\/05\/Cyber-crime-planned.jpg 964w\" sizes=\"(max-width: 481px) 100vw, 481px\" \/><\/h2>\n<p><span id=\"ezoic-pub-ad-placeholder-113\" class=\"ezoic-adpicker-ad\"><\/span>Gone are the days when \u201chacking\u201d was just a prank, or a way to show off your skills to your circle of hacker pals. Today\u2019s cybercriminal is in it for the money, sonny, and not for the laughs. There are no more \u201crandom attacks,\u201d it\u2019s all very carefully planned and executed.<\/p>\n<p>The report contends that cybercrime \u201chas now become a kind of mirror image of contemporary capitalism \u2013 reproducing disruptive business models popularised by the likes of Amazon and Uber.\u201d The report lists a number of ways in which the cybercrime economy has copied the wealth-generating techniques developed by the legitimate information economy; here are just a few of them:<\/p>\n<ul>\n<li>A dizzying range of methods and mechanisms for generating revenues, often at industrial scales.<\/li>\n<li>Digitally specific currencies and currency exchange tools. (Somebody must be using those hundreds of Bitcoin imitators.)<\/li>\n<li>A range of specialised economic agents, such as producers, suppliers, service providers and consumers.<\/li>\n<li>The extraction and exchange of data as the key raw material and object of value for illicit trading (this trade now occurs across many dimensions and no longer simply involves buying or selling data from stolen credit or debit cards, but newer data forms that possess value \u2013 such as hotel loyalty points, \u2018likes\u2019 on Facebook, account login details and even soft drink formulas or government-developed hacking tools).<\/li>\n<li>Dedicated production zones and centres of income generation \u2013 whether these be troll factories in Russia, the Hackerville fraud villages in Romania, or mass marketing scam centres in West Africa.<\/li>\n<li>Specialised tool supply, technical support and provision of skills and expertise.<\/li>\n<li>Professionalisation and the development of career structures \u2013 this includes training, CVs, personal recommendations and references.<\/li>\n<\/ul>\n<p>Okay, let\u2019s stop at the thought of hackers with resumes and references, marching (or video-calling, more likely) into the HQ of a Russian troll factory to apply for a job. That\u2019s enough to freeze my brain.<\/p>\n<h2>Following the Money<img decoding=\"async\" loading=\"lazy\" class=\" wp-image-4426 alignright\" src=\"http:\/\/blog.zoha-islands.com\/wp-content\/uploads\/2018\/05\/FollowTheMoney-300x209.jpg\" alt=\"\" width=\"423\" height=\"295\" srcset=\"https:\/\/zoha-islands.com\/blog\/wp-content\/uploads\/2018\/05\/FollowTheMoney-300x209.jpg 300w, https:\/\/zoha-islands.com\/blog\/wp-content\/uploads\/2018\/05\/FollowTheMoney.jpg 400w\" sizes=\"(max-width: 423px) 100vw, 423px\" \/><\/h2>\n<p>The scariest headline-grabbing cybercrimes are barely registering on the global economy\u2019s meter. Ransomware and \u201ccyber-crime-as-a-service\u201d each contributes less than 1 percent to the cybercrime economy. None the less, the FBI estimates worldwide revenues from ransomware were about $1 billion in 2017.<\/p>\n<p>Also, cryptocurrencies such as Bitcoin may not play as large a role in cybercrime as the popular press has suggested. Only about 4 percent of laundered money &#8211; proceeds of crime that have been processed through enough legitimate online payment systems to appear \u201cclean\u201d or at least \u201cnot guilty\u201d &#8211; is held in cryptocurrencies. The rest has found its way into more legitimate currencies and bank accounts, or is even used to buy tangible, untraceable commodities like gold or oil directly with cryptocurrencies.<\/p>\n<p>And surprisingly, trade in stolen identities is not one of the biggest contributors to the cybercrime economy. In fact, such trade accounts for \u201conly\u201d $160 billion of the $15,000 billion cybercrime economy.<\/p>\n<p>Trade in illegal drugs and other physical contraband accounts for $860 billion. Thefts and sales of \u201ctrade secrets,\u201d such as soft drink recipes, and other intellectual property score $500 billion, and \u201cdata trading\u201d brings in another $160 billion. \u201cData trading\u201d is what happens after you lose your wallet, but on a much larger (digital) scale.<\/p>\n<p>I have to wonder, given the labyrinthine world of cybercrime, how much of the digital iceberg Dr. McGuire was able to discover. The fact that he lives to tell may indicate that he&#8217;s only scratched the surface. Still, the report makes fascinating reading if you are interested in either crime or how cybercrime economies form, grow more complex, and eventually become dark shadows of the economies upon which they prey.<\/p>\n<p>Have a great week<\/p>\n<p>ZI Staff<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new report that looks at the big picture pegs the worldwide haul from cybercrime at 1.5 trillion dollars. That\u2019s not just criminal business, it\u2019s an entire criminal economy, say the authors of the report, \u201cInto The Web Of Profit.\u201d So what&#8217;s this about secret sauce? Well, you&#8217;ll have to read on for that&#8230; What &hellip; <a href=\"https:\/\/zoha-islands.com\/blog\/cybercrime\/\" class=\"more-link\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":4423,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[5],"tags":[],"_links":{"self":[{"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/posts\/4415"}],"collection":[{"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/comments?post=4415"}],"version-history":[{"count":0,"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/posts\/4415\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/media\/4423"}],"wp:attachment":[{"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/media?parent=4415"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/categories?post=4415"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/tags?post=4415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}