First challenge is a logistical one: acquire a live hostage and convey them to a place from which the ransom negotiation can be safely conducted.
5
EXTRA-LEGAL GOVERNANCE
6
IN CULTURES WHERE HOSTAGE- TAKING IS AN ESTABLISHED WAY OF RESOLVING INTER COMMUNITY CONFLICT (E.G. YEMEN) HOSTAGES TRADITIONALLY HAVE THE SOCIAL STATUS OF A GUEST!
7
CAN MALWARE AUTHORS BUILD A REPUTATION?
8
CREATING RULES • DISSEMINATING INFORMATION • EVALUATING PERFORMANCE • SPOTTING BREACHES OF PROTOCOL • ENFORCING RULES AND NORMS
9
THE OVERLONG CAPTIVITY OF THE CHANDLERS
10
COUNTER EXAMPLE
11
UN AND DOMESTIC LAW FORBID THE TRANSFER OF MONEY TO TERRORIST ORGANIZATIONS
12
LAW ENFORCEMENT?
13
COST / BENEFIT
14
THERE ARE NO GIANT KIDNAPPING ENTERPRISES
15
LARGE KIDNAPPING ORGANIZATIONS BECOME PROTECTION RACKETS
16
LARGE REBEL GROUPS BECOME GOVERNMENTS
17
GRIM SPIDER WIZARD SPIDER
18
VERTICAL INTEGRATION
19
HOW TO CHARGE A HIGHER RANSOM?
20
WHAT LIMITS THE GROWTH OF RANSOMWARE?
21
COMMODITY MALWARE
22
CONTAINERIZATION
23
BAD GUYS SUPPLY CHAIN IS IMPRESSIVE
Description:
Explore the dynamics of malware markets in this BSides Cleveland conference talk. Delve into the economics of cybercrime, examining labor specialization, financial trust, and price discrimination in illegal markets. Investigate the challenges of hostage-taking and ransom negotiations, drawing parallels to established practices in certain cultures. Analyze the reputation-building mechanisms for malware authors and the creation of extra-legal governance structures. Discuss the impact of international laws on ransom payments to terrorist organizations and evaluate the cost-benefit analysis of cybercriminal activities. Examine the limitations on growth for ransomware operations and the trend towards vertical integration in cybercrime. Consider the impressive supply chain of malicious actors and the role of commodity malware and containerization in the evolving landscape of digital threats.