Cyber-arms industry
The cyber-arms industry are the markets and associated events[1] surrounding the sale of software exploits, zero-days, cyberweaponry, surveillance technologies,[2] and related tools[3] for perpetrating cyberattacks. The term may extend to both grey and black markets online and offline.[4]
For many years, the burgeoning dark web market remained niche, available only to those in-the-know or well funded. Since at least 2005, western governments including the U.S., United Kingdom, Russia,[5] France, and Israel have been buying exploits from defence contractors and individual hackers.[6] This 'legitimate' market for zero day exploits exists[4] but is not well advertised or immediately accessible.
Attempts to openly sell zero day exploits to governments and security vendors to keep them off the black market have so far been unsuccessful.[7]
Companies
Traditional arms producers and military services companies such as BAE Systems, EADS, Leonardo, General Dynamics, Raytheon, and Thales have all expanded into the cybersecurity markets. However, smaller software companies such as Blue Coat and Amesys have also become involved, often drawing attention for providing surveillance and censorship technologies to the regimes of Bashar al-Assad in Syria and Muammar Gaddafi in Libya.[8]
Suppliers of exploits to western governments include the Massachusetts firm Netragard.[9]
The trade show ISS World that runs every few months has been referred to as the 'international cyber arms bazaar' and the 'wiretappers ball'[10] focuses on surveillance software for lawful interception.
Some other cyberarms companies include Endgame, Inc., Gamma Group, NSO Group and Ability. Circles, a former surveillance business, merged with NSO Group in 2014.[11]
On 26 July 2017 Google researchers announced the discovery of new spyware they named "Lipizzan". According to Google, "Lipizzan's code contains references to a cyber arms company, Equus Technologies.".[12][13]
On the Internet
The most popular Internet forums are generally in Russian or Ukrainian and there are reports of English-only, Chinese-only, German-only, and Vietnamese-only sites, among others. Phishing, spear-phishing, and other social engineer campaigns are typically done in English, as a majority of potential victims know that language.[4] India's Central Bureau of Investigation describe the proliferation of underground markets as 'widespread'.[9] Colonel John Adams, head of the Marine Corps Intelligence Activity has expressed concerns these markets could allow cyberweapony to fall into the hands of hostile governments which would otherwise lack the expertise to attack an advanced country's computer systems.
Online, there is increasing uses of encryption and privacy mechanisms such as off the record messaging and cryptocurrencies.[4]
Since 2005 on darknet markets and black markets such as the 'Cyber Arms Bazaar' have had their prices dropping fast with the cost of cyberweaponry plummeting at least 90 percent.[14]
Botnets are increasingly rented out by cyber criminals as commodities for a variety of purposes.[15]
Vendor responses
In recent years, many software firms have had success with bug bounty programs, but in some cases such as with Vupen's Chrome exploit these will be rejected as below market value. Meanwhile, some vendors such as HP spent more than $7 million between 2005 and 2015 buying exploits for its own software. This behaviour has been criticised by head of the United States Cyber Command, General Keith Alexander, as "building the black market".[9]
Notable markets
- Cyber Arms Bazaar – a darknet market operating out of various Eastern European countries, trafficking crimeware and hacking tools[17] that has run since at least the year 2000.[14][18] Tom Kellermann, chief cybersecurity officer of Trend Micro, estimates over 80 percent of financial sector cyberattacks could be traced back to the bazaar, with retail cyberattacks not far behind.[14]
- Darkode
- TheRealDeal
See also
References
- Hepher, Tim (15 June 2010). "Defense firms face cyber spying at arms bazaar". Retrieved 30 May 2015.
- Appelbaum, Jacob (17 January 2015). "The Digital Arms Race: NSA Preps America for Future Battle". Retrieved 31 May 2015.
- Joseph Gross, Michael (July 2013). "Silent War". Retrieved 15 May 2015.
- "Markets for Cybercrime Tools and Stolen Data - Hackers' Bazaar" (PDF). rand.org/. Retrieved 30 May 2015.
- Corera, Gordon (29 April 2015). "Rapid escalation of the cyber-arms race". Retrieved 30 May 2015.
- Joseph Gross, Michael (July 2013). "Silent War". Retrieved 30 May 2015.
- Anderson, Nate (9 July 2009). "WabiSabiLabi wants to be the eBay of 0-day exploits". Retrieved 30 May 2015.
- Boulanin, Vincent (13 May 2014). "Arms production goes cyber: a challenge for arms control". Retrieved 30 May 2015.
- "The digital arms trade". 30 March 2013. Retrieved 30 May 2015.
- Silver, Vernon (31 May 2015). "Spies Fail to Escape Spyware in $5 Billion Bazaar for Cyber Arms". Retrieved 30 May 2015.
- Brewster, Thomas. "A Multimillionaire Surveillance Dealer Steps Out Of The Shadows . . . And His $9 Million WhatsApp Hacking Van". Forbes.
- Megan Ruthven; Ken Bodzak; Neel Mehta. "From Chrysaor to Lipizzan: Blocking a new targeted spyware family". Android Developers Blog.
- Joseph Cox; Lorenzo Franceschi-Bicchierai (27 July 2017). "Google Revealed an Israeli Spyware Company That Has Quietly Sold Its Wares for Years". Vice. VICE MEDIA LLC.
- Bennett, Cory (15 March 2015). "Feds search for ways to impede 'cyber bazaar'". Retrieved 15 May 2015.
- Danchev, Dancho (11 October 2013). "Novice cyberciminals offer commercial access to five mini botnets". Retrieved 28 June 2015.
- SCUK (25 October 2017). "Russian underground shop selling RDP servers for £11 or less". Retrieved 27 August 2018.
- Cyber Security Dojo (13 May 2015). "Romania defending Ukraine's cyberspace". Archived from the original on 17 May 2015. Retrieved 14 May 2015.
- "Cyber scheme could get you to give up bank details by phone". 3 April 2015. Retrieved 15 May 2015.