31 research outputs found

    Malware and Exploits on the Dark Web

    Full text link
    In recent years, the darknet has become the key location for the distribution of malware and exploits. We have seen scenarios where software vulnerabilities have been disclosed by vendors and shortly after, operational exploits are available on darknet forums and marketplaces. Many marketplace vendors offer zero-day exploits that have not yet been discovered or disclosed. This trend has led to security companies offering darknet analysis services to detect new exploits and malware, providing proactive threat intelligence. This paper presents information on the scale of malware distribution, the trends of malware types offered, the methods for discovering new exploits and the effectiveness of darknet analysis in detecting malware at the earliest possible stage.Comment: 5 pages, 0 figure

    Big data og Cyberkriminalitet : En litteraturstudie om hvordan Big Data kan brukes for å bekjempe cyberkriminalitet

    Get PDF
    Masteroppgave informasjonssystemer IS501 - Universitetet i Agder 2019Cyberkriminalitet er et økende problemi samfunnetoghackerangrepblir stadig mer komplekse og sofistikerte. Bruken av Big Data som et forvarsverktøy mot angrep er et revolusjonerendesteg i utviklingen avsikkerhetssystemerog har enormt et potensialfor å oppdage angrep og truslermot et data-eller nettverkssystem. I denne masterutredningen er det utført en litteraturstudiesomtar for seg aktuell tidligere forskning om temaet Big Data og cyberkriminalitet for å kartlegge hvor langt forskningen har kommet på akkurat dette området. Studien ønsker å bidra med å belyse sentrale trender innen Big Data og cyberkriminalitet de siste seks årene, samt avdekke eventuelle forskningshull hvor ytterligere forskning er nødvendig. Vår problemstilling er følgende:“Hva sier litteraturen om bruken av Big Data for åbekjempe cyberkriminalitet,og hvilke trender fremkommer i nyere forskning?“Bakgrunnen for valget av problemstilling skyldes masterstudiets fokus på Big Data, samt dagsaktuelle nyhetssaker hvor store aktører oppleverat deres datasystemer blir angrepet og skadet. Denne typen angrep forårsaker skader for flere milliarder årlig. På bakgrunn av dette ønsket vi å se nærmere på Big Data i et sikkerhetsperspektiv og hvordan Big Data kan bli brukt for å bekjempe cyberkriminalitet.Studienidentifiserte 37 relevanteartiklerom Big Data og cyberkriminalitetpublisertetter 2013. Studiens funn har blitt delt opp i tre hovedkategorier: Utfordringer, foreslåtte løsninger og trender. Totalt 13 utfordringer og 9 foreslåtte løsninger ble identifisert i studien, samt trender som preger forskningen de siste 6 årene. Studien har avdekket at det eksisterer trender innen nyere forskning. Da spesielt IDS som dominerer forskningsfeltet, men også litt mindre markante trender som visualisering av Big Data systemer, redusering av data og bruken av rammeverk og systemdesign. Dette er alle trender innen foreslåtte løsninger. Videre viser funnene i studien en rekke utfordringer som blir nevnt hyppig i litteraturen. Av utfordringer er det verdt å nevne blant annet “zero-day attacks”,Big Data prosessering, identifisering av avvik/anomalier og konfigurering av maskinlæringsalgoritmer

    The Dark Web Phenomenon: A Review and Research Agenda

    Get PDF
    The internet can be broadly divided into three parts: surface, deep and dark. The dark web has become notorious in the media for being a hidden part of the web where all manner of illegal activities take place. This review investigates how the dark web is being utilised with an emphasis on cybercrime, and how law enforcement plays the role of its adversary. The review describes these hidden spaces, sheds light on their history, the activities that they harbour – including cybercrime, the nature of attention they receive, and methodologies employed by law enforcement in an attempt to defeat their purpose. More importantly, it is argued that these spaces should be considered a phenomenon and not an isolated occurrence to be taken as merely a natural consequence of technology. This paper contributes to the area of dark web research by serving as a reference document and by proposing a research agenda

    Malware in the Future? Forecasting of Analyst Detection of Cyber Events

    Full text link
    There have been extensive efforts in government, academia, and industry to anticipate, forecast, and mitigate cyber attacks. A common approach is time-series forecasting of cyber attacks based on data from network telescopes, honeypots, and automated intrusion detection/prevention systems. This research has uncovered key insights such as systematicity in cyber attacks. Here, we propose an alternate perspective of this problem by performing forecasting of attacks that are analyst-detected and -verified occurrences of malware. We call these instances of malware cyber event data. Specifically, our dataset was analyst-detected incidents from a large operational Computer Security Service Provider (CSSP) for the U.S. Department of Defense, which rarely relies only on automated systems. Our data set consists of weekly counts of cyber events over approximately seven years. Since all cyber events were validated by analysts, our dataset is unlikely to have false positives which are often endemic in other sources of data. Further, the higher-quality data could be used for a number for resource allocation, estimation of security resources, and the development of effective risk-management strategies. We used a Bayesian State Space Model for forecasting and found that events one week ahead could be predicted. To quantify bursts, we used a Markov model. Our findings of systematicity in analyst-detected cyber attacks are consistent with previous work using other sources. The advanced information provided by a forecast may help with threat awareness by providing a probable value and range for future cyber events one week ahead. Other potential applications for cyber event forecasting include proactive allocation of resources and capabilities for cyber defense (e.g., analyst staffing and sensor configuration) in CSSPs. Enhanced threat awareness may improve cybersecurity.Comment: Revised version resubmitted to journa

    Dynamics of Dark Web Financial Marketplaces: An Exploratory Study of Underground Fraud and Scam Business

    Get PDF
    The number of Dark Web financial marketplaces where Dark Web users and sellers actively trade illegal goods and services anonymously has been growing exponentially in recent years. The Dark Web has expanded illegal activities via selling various illicit products, from hacked credit cards to stolen crypto accounts. This study aims to delineate the characteristics of the Dark Web financial market and its scams. Data were derived from leading Dark Web financial websites, including Hidden Wiki, Onion List, and Dark Web Wiki, using Dark Web search engines. The study combines statistical analysis with thematic analysis of Dark Web content. Offering promotions and customer services with the payment methods of cryptocurrencies were prevalent, similar to the Surface Web\u27s e-commerce market. The findings suggest that the Dark Web financial market is likely to harbor scams targeting Dark Web buyers. Dark Web sellers construct a website to sell scam products and recommend purchasing Escrow services to ensure safe transactions as an additional scam. The results from this study provided empirical support for the components of the routine activity theory of the Dark Web financial market to substantiate a more comprehensive view of patterns of fraud/ scams. Enhancing law enforcement capabilities of investigating financial marketplaces and promoting public awareness and consumer safety programs are discussed as effective preventive measures

    Knowledge Sharing Network in a Community of Illicit Practice: A Cybermarket Subreddit Case

    Get PDF
    Often neglected in the literature about communities of practice is the fact that online knowledge-sharing communities thrive among illicit collectives whose activities are stigmatized or outlawed. This paper focuses on a knowledge-sharing community of users who engage in illegal practices by examining the ways in which the community’s network structure changes when a high-stakes, uncertain event—the July 2017 shutdown of the dark web market Alphabay—occurs. This study compares the discussion network structures in the subreddit r/AlphaBay during pre-shutdown days (the “routine” period) and shutdown days (the “market defect” period) and offers a content analysis of the knowledge and resources shared by users during these periods. Several differences were observed: (a) the network structure changed such that the network size grew while becoming more centralized; (b) new crisis-specific players emerged; (c) types of knowledge shared during the market defect period was qualitatively different from the routine period
    corecore