The cyber-arms industry are the markets and associated events surrounding the sale of software exploits, zero-days, cyberweaponry, surveillance technologies, and related tools for perpetrating cyberattacks. The term may extend to both grey and black markets online and offline.
For many years, the burgeoning dark web market remained niche, available only to those in-the-know or well-funded. Since at least 2005, governments including the United States, United Kingdom, Russia, France, and Israel have been buying exploits from defence contractors and individual hackers. This 'legitimate' market for zero-day exploits exists but is not well advertised or immediately accessible.
Attempts to openly sell zero-day exploits to governments and security vendors to keep them off the black market have so far been unsuccessful.
Traditional arms producers and military services companies such as BAE Systems, EADS, Leonardo, General Dynamics, Raytheon, and Thales have all expanded into the cybersecurity markets. However, smaller software companies such as Blue Coat and Amesys have also become involved, often drawing attention for providing surveillance and censorship technologies to the regimes of Bashar al-Assad in Syria and Muammar Gaddafi in Libya.
The trade show ISS World that runs every few months has been referred to as the 'international cyber arms bazaar' and the 'wiretappers ball' focuses on surveillance software for lawful interception.
On 26 July 2017 Google researchers announced the discovery of new spyware they named "Lipizzan". According to Google, "Lipizzan's code contains references to a cyber arms company, Equus Technologies.".
On the Internet edit
The most popular Internet forums are generally in Russian or Ukrainian and there are reports of English-only, Chinese-only, German-only, and Vietnamese-only sites, among others. Phishing, spear-phishing, and other social engineer campaigns are typically done in English, as a majority of potential victims know that language. India's Central Bureau of Investigation describe the proliferation of underground markets as 'widespread'. Colonel John Adams, head of the Marine Corps Intelligence Activity has expressed concerns these markets could allow cyberweaponry to fall into the hands of hostile governments which would otherwise lack the expertise to attack an advanced country's computer systems.[dubious ]
Recent research has indicated that countries will also begin to use artificial intelligence as a tool for national cyberdefense. AI is a new factor in the cyber arms industry, as it can be used for defense purposes. Therefore, academics urge that nations shouls establish regulations for the use of AI, similar to how there are regulations for other military industries.
Vendor responses edit
In recent years, many software firms have had success with bug bounty programs, but in some cases such as with Vupen's Chrome exploit these will be rejected as below market value. Meanwhile, some vendors such as HP spent more than $7 million between 2005 and 2015 buying exploits for its own software. This behaviour has been criticised by head of the United States Cyber Command, General Keith Alexander. This criticism then is known as "building the black market".
Notable markets edit
- Cyber Arms Bazaar – a darknet market operating out of various Eastern European countries, trafficking crimeware and hacking tools that has run since at least the year 2000. Tom Kellermann, chief cybersecurity officer of Trend Micro, estimates over 80 percent of financial sector cyberattacks could be traced back to the bazaar, with retail cyberattacks not far behind.
See also edit
- Hepher, Tim (15 June 2010). "Defense firms face cyber spying at arms bazaar". Retrieved 30 May 2015.
- Appelbaum, Jacob (17 January 2015). "The Digital Arms Race: NSA Preps America for Future Battle". Retrieved 31 May 2015.
- Joseph Gross, Michael (July 2013). "Silent War". Retrieved 15 May 2015.
- "Markets for Cybercrime Tools and Stolen Data - Hackers' Bazaar" (PDF). rand.org/. Retrieved 30 May 2015.
- Corera, Gordon (29 April 2015). "Rapid escalation of the cyber-arms race". Retrieved 30 May 2015.
- Joseph Gross, Michael (July 2013). "Silent War". Retrieved 30 May 2015.
- Anderson, Nate (9 July 2009). "WabiSabiLabi wants to be the eBay of 0-day exploits". Retrieved 30 May 2015.
- Boulanin, Vincent (13 May 2014). "Arms production goes cyber: a challenge for arms control". Retrieved 30 May 2015.
- "The digital arms trade". 30 March 2013. Retrieved 30 May 2015.
- Silver, Vernon (31 May 2015). "Spies Fail to Escape Spyware in $5 Billion Bazaar for Cyber Arms". Retrieved 30 May 2015.
- Brewster, Thomas. "A Multimillionaire Surveillance Dealer Steps Out Of The Shadows . . . And His $9 Million WhatsApp Hacking Van". Forbes.
- Megan Ruthven; Ken Bodzak; Neel Mehta. "From Chrysaor to Lipizzan: Blocking a new targeted spyware family". Android Developers Blog.
- Joseph Cox; Lorenzo Franceschi-Bicchierai (27 July 2017). "Google Revealed an Israeli Spyware Company That Has Quietly Sold Its Wares for Years". Vice. VICE MEDIA LLC.
- Bennett, Cory (15 March 2015). "Feds search for ways to impede 'cyber bazaar'". Retrieved 15 May 2015.
- Danchev, Dancho (11 October 2013). "Novice cyberciminals offer commercial access to five mini botnets". Retrieved 28 June 2015.
- SCUK (25 October 2017). "Russian underground shop selling RDP servers for £11 or less". Retrieved 27 August 2018.
- Taddeo, Mariarosaria; Floridi, Luciano (April 2018). "Regulate artificial intelligence to avert cyber arms race". Nature. 556 (7701): 296–298. Bibcode:2018Natur.556..296T. doi:10.1038/d41586-018-04602-6. ISSN 0028-0836. PMID 29662138.
- Cyber Security Dojo (13 May 2015). "Romania defending Ukraine's cyberspace". Archived from the original on 17 May 2015. Retrieved 14 May 2015.
- "Cyber scheme could get you to give up bank details by phone". 3 April 2015. Archived from the original on 18 May 2015. Retrieved 15 May 2015.