Chinese Online Underground Economy

Download Report

Transcript Chinese Online Underground Economy

Matt Jennings
 Introduction
 Value
Chains
 Major value chains in the illegal market
 Means of Communication
 Conclusion
 513
million Chinese Internet users
 Over 300 million online applications
 More than 160 million subscribers
 45% have experience theft of instant
messaging accounts
 32% have had their game accounts
hacked
 Caused
832 million USD worth of damage
 Over 90,000 participants
 Easy money
 Complex organization
 Use legal web-based communication
1.
2.
3.
Person/business receives raw materials
as input
Add value to the raw materials through
different processes
Sell finished product to customers
1.
2.
3.
4.
Real Assets Theft
Network Virtual Assets Theft
Internet Resources and Services abuse
Blackhat techniques, tools and training
 Primary
motivation of cybercrime
 Banking accounts, credit limits, balances
of payment accounts, stock/fund
accounts
 The target
 Techniques:
• Trojan Horses
• Phishing
 Large
user base in online games
 Virtual currency and equipment
translates to real world money
 No rigid law on “virtual property”
 Computing
power, storage, bandwidth, IP
addresses, network traffic, sensitive data
 More resources = More Power
 Botnets
• Email/messaging
• Drive by downloads
• “hanging-on” software
 Click
fraud/spam bots
 DDoS extortion
 Engine
of the underground economy
 Hackers provide Products and Services
to the economy
 Products
• Malware, trojans, vulnerabilites
• Zero-day exploits
 Services
• Attack a target
• Train new criminals
 Most
is done through public channels
 QQ chatting
 Baidu Post Bar
• 100,000 illicit threads
 Most
visible market is for advertisement
and communication
 Higher-tiered aspects are hidden
 Cooperation between law enforcement
and network security professionals
 Legal countermeasures
 Chinese
Internet
 Value chains in illegal market
 Means of Communication
 New laws


Muncaster, Phil. "Exposing China's Vast Underground Economy â ¢
The Register." Exposing China's Vast Underground Economy â ¢ The
Register. The Register, 18 Aug. 2012. Web. 23 Sept. 2012.
<http://www.theregister.co.uk/2012/08/18/baidu_tencent_used_b
y_chinese_cyber_crims/page2.html>.
Jianwei, Zhuge, Gu Liang, and Duan Haixin. Institute on Global
Conflict and Cooperation. Rep. University of California, July 2012.
Web. 27 Sept. 2012.
<http://igcc.ucsd.edu/assets/001/503677.pdf>.