Popular Posts
-
Customers of hosting firm Fasthosts have seen a number of cloud services knocked over after system problems started last Thursday. In a ...
-
2017-12-17 Music of Sun, 17 Dec 20170 M.anifest to host fifth edition of Manifestivities on December 22 The annual musical conce...
-
There are a lot of web hosting providers out there. If you are starting a first website or simply haven't faced this decis...
-
Web.com is set to purchase all the available shares of Yodle, closing at the end of the first quarter of 2016 Yodle, based in New York C...
-
SANTA FE, NM --(Marketwired - February 29, 2016) - CrowdReviews.com, a platform for reviewing and ranking web hosting providers, has relea...
-
To continue reading, we request you to support us by disabling your Ad Blocker In order to serve content on our website, we rely on adver...
-
Web hosting is one of the most important components to any great website. After all, without the right hosting package, you won't have...
-
Introduction I am writing this article as a result of my learning for deploying ASP.NET Core web applications on Linux boxes. There is a ...
-
Greater Manchester, UK -- (SBWIRE) -- 12/02/2015 -- The attacks in Paris have changed the way many people see the world, not least because...
-
Premier John Horgan, who has promised to get big money out of B.C. politics, is hosting a $500-a-head fundraising event at Bear Mountain R...
Blog Archive
- December (19)
- November (25)
- October (28)
- September (26)
- August (28)
- July (31)
- June (26)
- May (27)
- April (28)
- March (30)
- February (28)
- January (31)
- December (31)
- November (30)
- October (31)
- September (29)
- August (44)
- July (56)
- June (53)
- May (54)
- April (48)
- March (55)
- February (44)
- January (3)
- December (5)
- November (5)
- October (26)
- September (25)
- August (29)
- July (26)
- June (18)
- September (1)
About Me
Total Pageviews
Whatâs that worth? Find out on the Dark Web
It's no secret the dark web is where bad guys go to conduct business.
But beyond being the place where cybercriminals share information and buy/sell illicit goods (stolen information, counterfeits, drugs, weapons, etc.), the dark web can also serve as a key resource for the above ground business to understand what is of value to others – and how to quantify the value an organisation places on its data.
When people discuss dark web markets, they tend to focus on payment cards; however, criminals are able to monetise a variety of different types of personal information, account credentials, and other stolen data.
Over just the past week SurfWatch Labs has observed the following items for sale on the dark web:
Stolen payment card data is also readily available on the dark web. This seller is selling compromised card information for $11.95, although buyers can get a better deal if they buy the cards in bulk.
Other cybercrime-related items for sale include pirated media, hacking services and software exploits. For example, our threat intelligence analysts recently came across a seller offering what he claimed was a new Microsoft Office zero day exploit for 40 bitcoins – or around $23,000.
Internal vs. External Threat IntelligenceAwareness of what is being sold on the dark web provides crucial insight into what cybercriminals are currently targeting – and what they're likely to target in the future. Understanding the types of information for sale on the dark web related to your customers, your infrastructure, your supply chain and your competitors can help cut through the overwhelming amount of cybersecurity noise in order to focus resources on the threats that really matter – to see the forest from the trees, as the saying goes.
This is the crucial difference between external and internal threat intelligence. Internal threat intelligence is necessary for tactical defense. It's necessary for detecting and preventing threats, for responding to incidents, and for understanding what is happening inside your own network.
External threat intelligence looks outside the organisation's walls for relevant cyber activity trends facing similar types of organisations to better plan and prepare for impending threats to the business. This intelligence can provide the strategic insight necessary to direct resources and help guide internal tools and processes towards reducing an organisation's cyber risk. For example, if dark web intelligence reveals that gift card fraud is heavily impacting your organisation or others in your sector, resources can be directed towards discovering the cause of that fraud and implementing tactics to plug those weaknesses. Is the fraud due to skimmers making counterfeit cards, an insider stealing and selling cards, a third-party data leak, or something else?
Relevant, timely and accurate external threat intelligence can help to provide the context necessary to better act on your organisation's internal data. It can help to answer questions such as:
In essence, this external intelligence can provide the high-level strategic insight necessary to better direct limited cyber resources and more effectively reduce the cyber risk facing your organisation.
Taking Action on Threat IntelligenceAs a real-world example of this threat intelligence process in action, SurfWatch Labs recently observed an actor going by the name of AlphaLeon discussing his cybercrime operations on a dark web forum. Additional research helped to confirm that web hosting provider Invision Power Services was compromised by AlphaLeon, and that once AlphaLeon executed his code, web forum users on some professional sports leagues as well as major media and entertainment companies would be breached. In summary, the intelligence led to the threat being eradicated before it could be executed.
This is an example of external threat intelligence being used to directly drive changes to an organisation's internal security and infrastructure by identifying a cyber threat before it spreads either further into the organisation or on to others in the supply chain. Identifying active threats such as compromised employee email accounts, stolen payment cards tied to a particular organisation and other indicators can help to limit the potential damage of a cyber incident.
As many studies have noted, a significant percentage of breaches go undetected by the affected organisation and are instead discovered by various third parties. Threat intelligence can help to identify a threat before a breach occurs or shorten the window between breach and discovery.
Adam Meyer, chief security strategist, SurfWatch Labs
Image source: Shutterstock/BeeBright
Leave a comment on this articleSource: What's that worth? Find out on the Dark Web
0 comments:
Post a Comment