The Dark Web Uncovered

2D7B266700000578-3276190-The_report_found_a_value_hierarchy_in_how_this_stolen_data_is_pa-a-7_1445014741932.jpg

The report found a 'value hierarchy' in how this stolen data is packaged, priced

A new report from Intel Security has shone a light on the shadowy world of Dark Web cybercrime markets, where everything from £1 Netflix accounts to critical infrastructure access is available.

The security giant’s McAfee Labs division revealed a cyber-criminal underground, which mimics the real world—with sellers offering guarantees on stolen cards, and 'disreputable' members of illegal forums named and shamed. Stolen credit and debit cards start at just $5 in the US, while online video streaming services are even cheaper, beginning at only $0.55.

Payment card info is there in abundance, with the basic package including account number, CV2 and expiry date. Prices then rise for additional information such as bank account ID number, date of birth, and billing address, which allows the cyber-criminal to conduct more types of fraud.

Other data bought and sold on such sites included bank log-ins, payment service account details and even loyalty card info, Intel Security claimed.

Hackers are even selling the means to launch cyber-attacks on large corporations or critical infrastructure systems. The firm’s EMEA CTO, Raj Samani, argued that these underground markets are extremely volatile, with the recent spate of data breaches having precipitated a huge decrease in prices.
“When a breach occurs, stolen card credentials flood the market and prices can plummet. One recent breach resulted in details for over 100 million cards being stolen and overnight prices tumbled,” he told Infosecurity.
“However, the breadth of information being stolen goes far beyond payment cards. Almost everything that you can imagine is being sold. In such an enormous marketplace, sellers are also undercutting each other to try to ensure that their stolen data gets buyers’ attention.”

Far from being hidden away on anonymisation platforms like Tor, many of these markets are easy to find, Samani added.
“A few seconds of digging using a standard search engine reveals that the majority of this data is not hidden away,” he claimed.

Nevertheless, businesses should get more proactive in investing in advanced intelligence tools to scour both surface and dark web for signs of stolen data.
“You can’t work to protect and retrieve information if you don’t know it has been stolen,” Samani argued. “Any measure to protect valuable corporate information falling into the wrong hands is a step in the right direction.”

Infosecurity: http://bit.ly/1KjRVcZ

 

 

« IBM's Watson Analytics - New Data Discovery
Attract and Retain Great Cyber Security Talent »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

QinetiQ

QinetiQ

QinetiQ is one of the world's leading defence technology and security companies. Areas of activity include air, land, sea and space systems, weapons, robotics, C4ISR and cyber security.

Trusted Computing Group

Trusted Computing Group

TCG was formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms.

FireEye

FireEye

FireEye delivers unmatched detection, protection and response technology through an extensible and flexible cloud-based XDR platform.

Infrascale

Infrascale

Infrascale specialise in providing cloud backup and disaster recovery services.

Detectify

Detectify

Detectify is a web security service that simulates automated hacker attacks on your website, detecting critical security issues before real hackers do.

Hunters.AI

Hunters.AI

Hunters is the world's first autonomous hunting solution that leverages top-tier cyber expertise and AI to uncover hidden cyber threats.

Secure Code Warrior

Secure Code Warrior

Secure your code from the start with gamified, scalable online secure coding training for software developers.

EBRAND Services

EBRAND Services

EBRAND, the European experts for brand protection on the Internet. We offer a full set of services including cybermonitoring, fighting counterfeiting offences and online security.

Palmchip

Palmchip

Palmchip is a Cyber Security, SOC and Software consulting company. We design and develop high performance and secure applications.

rSolutions

rSolutions

rSolutions delivers managed cybersecurity services to clients in many industry sectors including financial services, telecommunications, energy, government and retail.

Flow Security

Flow Security

Enterprises run on data, Flow secures it at runtime. With a runtime-first approach, Flow is a game-changer in the data security space, securing data itself, beyond the infrastructure it resides in.

Dispel

Dispel

Dispel makes the fastest secure remote access for industrial networks. Built by operators for operators: a zero trust engine for your entire OT, IoT, and xIoT stack.

Rebellion Defense

Rebellion Defense

Rebellion Defense is a technology company developing advanced software to ensure mission-critical organizations stay ahead of emerging threats.

Orca Fraud

Orca Fraud

Orca is an AI-driven fraud orchestration platform. We empower fraud fighters to outpace fraud using our custom ML models.

Neural Defend

Neural Defend

Neural Defend is a deepfake detection technology with proprietary algorithms and an AI agentic multi-layered of solution.

Roundsec

Roundsec

Roundsec provide information security services including risk assessment and pentesting of sites and apps.