Blackhatonomics.Pdf
Total Page:16
File Type:pdf, Size:1020Kb
Blackhatonomics This page is intentionally left blank Blackhatonomics An Inside Look at the Economics of Cybercrime Will Gragido Daniel Molina John Pirc Nick Selby Andrew Hay, Technical Editor AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW YORK • OXFORD • PARIS • SAN DIEGO SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO Syngress is an Imprint of Elsevier Acquiring Editor: Steve Elliot Development Editor: Heather Scherer Project Manager: Malathi Samayan Designer: Mark Rogers Syngress is an imprint of Elsevier 225 Wyman Street, Waltham, MA 02451, USA Copyright © 2013 Elsevier, Inc. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Pub- lisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions This book and the individual contributions contained in it are protected under copy- right by the Publisher (other than as may be noted herein). Notices Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods or professional practices, may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information or methods described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a profes- sional responsibility. To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any meth- ods, products, instructions, or ideas contained in the material herein. Library of Congress Cataloging-in-Publication Data Application submitted British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library ISBN: 978-1-59749-740-4 Printed in the United States of America 13 14 15 16 17 12 11 10 9 8 7 6 5 4 3 2 1 For information on all Syngress publications, visit our werbsite at www.syngress.com Acknowledgements I’d like to thank my wife, Tracy for her unfailing support in all that I do, my children and my co-authors Dan, Nick and John. I’d also like to thank Red Bull. —Will Gragido First and foremost, I want to thank my family for enduring the writing pro- cess, and specifically my wife, Lisette, for it was her support during this past two years as the project developed and evolved that kept me motivated and progressing. To my daughter, Danielle, you can always make me laugh, and keep me humble. To my co-authors, you have shared and shown me a lot, and I appreciate your letting me share this experience with you. To my friends and colleagues in the Information Security field, starting with Chris Klaus and Tom Noonan, who gave many of us a chance to learn the basics back in the ISS days, to Gary Mullen, and Ray Menard, who have been great colleagues and even better friends. To my Kaspersky Lab team, those in ELAM, LTAM, those in the GReAT team, and those in Emerging Markets, thank you for growing and learning with me. Lastly, to Eugene Kaspersky, who showed me that your pas- sion can drive your life’s goals far beyond what one single human can dream. —Daniel Molina To my boss Greg Adams, thank you for believing and encouraging me. Your leadership and examples you demonstrate on a daily basis is one that I will never forget. To my best friends Eric York, Heath Peyton and Will Gragido… so thankful to have you guys in my life and thank you for the constant encour- agement during a rough time! To my mom Judy Pirc and my sister Jamie Line, thank you for your love and encouragement. To my team at TippingPoint (Orion Suydam, Chris Thomas, Dave de Valk (Virtual Dave), James Collinge, Patrick Hill, Pat Geistman and Rohan Kotain), thank you for the honor to manage you guys…you taught me a lot in very short period of time. Chris Haskins, Bobby and Veronica Gideon, Charles and Crystal Carlson, Scott Lupfer, Brian Reed, Dinesh Vakharia, Chuck Maples, Jay Rollete, Scott Rivers, Mike Polston, Rhonda Pouraty, Jon Dykes, Chris Radosh, Kathy Skinner, John Trollinger & Chad, Ryan Strecker, Sanjay Raja, Reese Ann Sims, Dan Holden and Jennifer Lake… v vi Acknowledgements thank you as each one of you invested time in me. DJ, Nick and Will, it was a pleasure to work with you all on this project. I have tremendous respect for each of you and thank you for an incredible knowledge transfer. To my chil- dren, Kelsey, Aubrey and Jack, I love each one of you more than anything in world and thank you for supporting your daddy! Lastly, I want to thank my Lord and Savior Jesus Christ as none of this would have been possible without HIM (Proverbs 3 5:6). WYMM? —John Pirc Thank you to my co-authors for getting me involved with this project, and your inspiration and support through the process. Thank you to Bill and Natalie, and officers, defense and prosecution attorneys in the US and Europe for your input to and peer-review of the chapter on global law enforcement. To the small international cadre of law enforcement officers who combat uneducated policymakers, unmotivated and uneducated officials and slog across politics- mined terrain as they carry out their mission of investigating cyber crimes and prosecuting cyber criminals: to quote a friend in public service, “Thank you so much for your thankless work.” —Nick Selby Dedication This book is dedicated to all those seeking to comprehend the nuances associated with and pertaining to, illicit sub-economic markets; particularly those associated with cyberspace. —Will Gragido This book is dedicated to the security professionals that are surviving the ever-changing realities of cyber-crime, cyber-terrorism, and cyber-warfare in today’s world. —Daniel Molina I want to dedicate my portion of the book to Nicole Langenbach. Nicole, I’m very thankful that the Lord placed you in my life at the right time. I’m also looking forward to spending the rest of my life with you. I also want to thank Ted Ross and Jennifer Parker for re-introducing me to you. —John Pirc For Corinna and Spijk. —Nick Selby vii This page is intentionally left blank Contents ACKNOWLEDGEMENTS ��������������������������������������������������������������������������� v DEDICATION ��������������������������������������������������������������������������������������������vii ABOUT THE AUTHORS ��������������������������������������������������������������������������� xv ABOUT THE TECHNICAL EDITOR �������������������������������������������������������xix FOREWORD ���������������������������������������������������������������������������������������������xxi PREFACE ������������������������������������������������������������������������������������������������xxiii INTRODUCTION �����������������������������������������������������������������������������������xxvii CHAPTER 1 Psychological and Cultural Trends ����������������������������������� 1 Introduction ���������������������������������������������������������������������������������� 1 Psychology of Attackers �������������������������������������������������������������� 2 Some Background on Cybercrime Legislation ����������������������� 2 Enter the Hackers �������������������������������������������������������������������� 3 Psychology of Victims ������������������������������������������������������������������ 5 It’s Not the Crimes That Are New, It’s Their Execution ������� 6 Attackers’ Familiarity with Human Psychology......................... 7 We All Want to Help ���������������������������������������������������������������� 7 Motivations and Event-Driven Trends........................................ 8 Politically Motivated Attacks �������������������������������������������������� 9 Philosophically Motivated Attacks ����������������������������������������� 9 Financially Motivated Attacks ������������������������������������������������ 9 Summary ��������������������������������������������������������������������������������������� 9 References ������������������������������������������������������������������������������������ 9 CHAPTER 2 Seasons of Change ����������������������������������������������������������� 11 Introduction �������������������������������������������������������������������������������� 11 From Experiment to Exposé to Exploit..................................... 12 Timeline: Innovations, Intrigue, and Intrusions...................... 13 The First among Equals �������������������������������������������������������� 13 The Birth of the Hack ������������������������������������������������������������� 14 Exploration of Systems: Phreaks, Geeks, and Cereal ��������� 19 Organization Skillz: The Birth of Hacker Culture ���������������� 21 ix x Contents Contents Propaganda and Lulz ����������������������������������������������������������������� 29 Summary ������������������������������������������������������������������������������������� 31 References ���������������������������������������������������������������������������������� 31 CHAPTER 3 Drivers