|By Marketwired .||
|March 25, 2014 12:01 AM EDT||
SUNNYVALE, CA -- (Marketwired) -- 03/25/14 -- Juniper Networks (NYSE: JNPR), the industry leader in network innovation, finds the cyber black markets have a mature economy with characteristics akin to those of a thriving metropolitan city. A new global report, sponsored by Juniper Networks and conducted by the RAND Corporation, reveals several economic indicators that cyber black markets have reached unprecedented levels of maturity and growth.
While there has been significant research measuring different parts of the hacker black markets, RAND's report, "Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar," examines for the first time these markets in their entirety and applies economic analysis to better understand how they function. RAND found significant levels of economic sophistication, reliability, accessibility and resilience in the products, distribution channels and actors involved in the black markets.
RAND's report, confirmed by Juniper's vast experience in the network security ecosystem, suggests the cyber black markets are a mature and growing multi-billion-dollar economy with a robust infrastructure and social organization. RAND found these black markets, like any other economy, react to market forces like supply and demand, and continue to evolve.
Juniper Networks likens the hacker black markets to a thriving metropolitan city with diverse communities, industries and interactions.
- Storefronts - Like other forms of e-commerce, many data records, exploit kits and goods are bought and sold from storefronts -- which can encompass everything from instant messaging chat channels and forums to sophisticated stores. RAND found some organizations can reach 70 to 80,000 people, with a global footprint that brings in hundreds of millions of dollars.
- Service Economy - RAND found that not only goods, but criminal services are available for purchase. These tools, sold on the black market as traditional software or leased like any other managed service, can help enable the most unskilled hackers to launch fairly elaborate and advanced attacks. For example, RAND found botnets, which can be used to launch a Distributed Denial of Service (DDoS) attack, are sold for as low as $50 for a 24-hour attack.
- Hierarchal Society - Much like a legitimate business, RAND found it takes connections and relationships to move up the (cyber) food chain. Getting to the top requires personal connections and those at the top are making the lion's share of the money.
- Rule of Law - There is indeed honor among thieves. RAND found many parts of the cyber black market are well structured, policed and have rules like a constitution. In addition, those who scam others are regularly banned or otherwise pushed off the market.
- Education and Training - RAND identified widely available tools and resources on the black markets that teach criminals how to hack, including instructions for exploit kits and where to buy credit cards. This access to training has accelerated sophistication, a broader set of roles and has helped facilitate entry into the hacker economy.
- Currencies - Transactions in the cyber black markets are often conducted by means of digital currencies. Bitcoin, Pecunix, AlertPay, PPcoin, Litecoin, Feathercoin, and Bitcoin extensions such as Zerocoin are a few. RAND found many criminal sites are starting to accept only digital crypto currencies due to their anonymity and security characteristics.
- Diversity - While RAND found cybercriminals from China, Latin America and Eastern Europe are typically known for quantity in malware attacks, those from Russia tend to be thought of the leader in quality. RAND also found areas of expertise and focus among different countries. Many Vietnamese criminal groups, for example, mainly focus on e-commerce hacks. Cybercriminals from Russia, Romania, Lithuania and Ukraine focus on financial institutions. Many Chinese cybercriminals specialize in intellectual property. And U.S.-based cybercriminals primarily target U.S.-based financial systems. In addition to a diverse set of cybercriminals, RAND also found more cross-pollination between these groups than ever before.
- Criminals - Even the criminal cyber black market has criminals. Known as "rippers," these specific bad guys do not provide the goods or services they claim.
The research report, "Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar," is based on in-depth interviews conducted by RAND between October and December 2013, with global experts who are currently or formerly involved in the market, including academics, security researchers, reporters, security vendors and law enforcement. It is the first of a series of reports from RAND that are sponsored by Juniper Networks.
"The security industry, government and legal communities must come together to establish new norms for how companies can more vigorously defend themselves against cyber-attacks. We must address the root cause behind the accelerated maturation of the cyber-crime market -- the very economics that drive its success. By disrupting the economics of hacking we can break the value chains that drive successful attacks. We must never lose the moral high ground, however, so we cannot go on the offensive and hack back, but we can no longer remain passive. By using forms of active defense such as intrusion deception we can identify, thwart and frustrate attackers. Active defense is a promising and exciting approach for addressing the rapidly evolving threat landscape."
- Nawaf Bitar, senior vice president and general manager, security business, Juniper Networks
- Juniper Networks Executive Summary: From Underground City to Thriving Metropolis - An Economic Analysis of the Cyber Black Market
- RAND Corporation Report: Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
- RAND Corporation Press Release
- Interactive Timeline: A Decade in the Making - Cyber Black Market Maturity
- Blog Post & Graphic: Black Market Prices: The Decline of Credit Cards and the Rise of Twitter
- Blog Post: Making a Choice for Good over Evil; the Conundrum Facing Today's Tech Geniuses
- Insight into the World of Hacker Economics - Webcast Registration
- The Next War Will Be Fought in Silicon Valley - Nawaf Bitar RSA 2014 Keynote
About Juniper Networks in Security
Juniper Networks builds secure and trusted networks with end-to-end security across every environment -- from the data center to campus and branch environments and to the device itself. Our security solutions give enterprise and service provider customers a competitive advantage as they set out to build the best networks on the planet.
About Juniper Networks
Juniper Networks (NYSE: JNPR) delivers innovation across routing, switching and security. From the network core down to consumer devices, Juniper Networks' innovations in software, silicon and systems transform the experience and economics of networking. Additional information can be found at Juniper Networks (www.juniper.net) or connect with Juniper on Twitter and Facebook.
Juniper Networks and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks and Junos logos are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.
Statements in this press release concerning Juniper Networks' prospects, future products and prospective benefits to customers are forward-looking statements that involve a number of uncertainties and risks. Actual results or events could differ materially from those anticipated in those forward-looking statements as a result of certain factors, including delays in scheduled product availability, the company's failure to accurately predict emerging technological trends, and other factors listed in Juniper Networks' most recent report on Form 10-K and 10-Q filed with the Securities and Exchange Commission. All statements made in this press release are made only as of the date of this press release. Juniper Networks undertakes no obligation to update the information in this release in the event facts or circumstances subsequently change after the date of this press release, except as required by applicable law. Any future product, feature, enhancement or related specification that may be referenced in this press release are for information purposes only, are subject to change at any time without notice and are not commitments to deliver any future product, feature, enhancement or related specification. The information contained in this press release is intended to outline Juniper Networks' general product direction and should not be relied on in making a purchasing decision.
+1 408 936-7817
For organizations that have amassed large sums of software complexity, taking a microservices approach is the first step toward DevOps and continuous improvement / development. Integrating system-level analysis with microservices makes it easier to change and add functionality to applications at any time without the increase of risk. Before you start big transformation projects or a cloud migration, make sure these changes won’t take down your entire organization.
Feb. 22, 2017 04:45 PM EST Reads: 838
Feb. 22, 2017 04:30 PM EST Reads: 998
In the first article of this three-part series on hybrid cloud security, we discussed the Shared Responsibility Model and examined how the most common attack strategies persist, are amplified, or are mitigated as assets move from data centers to the cloud. Today, we’ll look at some of the unique security challenges that are introduced by public cloud environments. While cloud computing delivers many operational, cost-saving and security benefits, it takes place in a public, shared and on-demand ...
Feb. 22, 2017 04:00 PM EST Reads: 1,383
In his session at @ThingsExpo, Sudarshan Krishnamurthi, a Senior Manager, Business Strategy, at Cisco Systems, will discuss how IT and operational technology (OT) work together, as opposed to being in separate siloes as once was traditional. Attendees will learn how to fully leverage the power of IoT in their organization by bringing the two sides together and bridging the communication gap. He will also look at what good leadership must entail in order to accomplish this, and how IT managers ca...
Feb. 22, 2017 03:45 PM EST Reads: 1,428
Feb. 22, 2017 03:00 PM EST Reads: 10,334
SYS-CON Events announced today that CA Technologies has been named “Platinum Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business – from apparel to energy – is being rewritten by software. From ...
Feb. 22, 2017 02:45 PM EST Reads: 1,538
SYS-CON Events announced today that Outlyer, a monitoring service for DevOps and operations teams, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Outlyer is a monitoring service for DevOps and Operations teams running Cloud, SaaS, Microservices and IoT deployments. Designed for today's dynamic environments that need beyond cloud-scale monitoring, we make monitoring effortless so you...
Feb. 22, 2017 02:30 PM EST Reads: 1,429
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
Feb. 22, 2017 02:30 PM EST Reads: 4,670
Cloud Expo, Inc. has announced today that Andi Mann and Aruna Ravichandran have been named Co-Chairs of @DevOpsSummit at Cloud Expo 2017. The @DevOpsSummit at Cloud Expo New York will take place on June 6-8, 2017, at the Javits Center in New York City, New York, and @DevOpsSummit at Cloud Expo Silicon Valley will take place Oct. 31-Nov. 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Feb. 22, 2017 02:15 PM EST Reads: 1,400
In his session at @ThingsExpo, Steve Wilkes, CTO and founder of Striim, will delve into four enterprise-scale, business-critical case studies where streaming analytics serves as the key to enabling real-time data integration and right-time insights in hybrid cloud, IoT, and fog computing environments. As part of this discussion, he will also present a demo based on its partnership with Fujitsu, highlighting their technologies in a healthcare IoT use-case. The demo showcases the tracking of pati...
Feb. 22, 2017 02:00 PM EST Reads: 325
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, Cloud Expo and @ThingsExpo are two of the most important technology events of the year. Since its launch over eight years ago, Cloud Expo and @ThingsExpo have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, I provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading the...
Feb. 22, 2017 01:45 PM EST Reads: 8,170
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settle...
Feb. 22, 2017 01:45 PM EST Reads: 1,038
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, whic...
Feb. 22, 2017 01:45 PM EST Reads: 960
SYS-CON Events announced today that Cloud Academy will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Cloud Academy is the industry’s most innovative, vendor-neutral cloud technology training platform. Cloud Academy provides continuous learning solutions for individuals and enterprise teams for Amazon Web Services, Microsoft Azure, Google Cloud Platform, and the most popular cloud computing technologies. Ge...
Feb. 22, 2017 01:45 PM EST Reads: 1,276
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
Feb. 22, 2017 01:30 PM EST Reads: 1,592