Report - New America Foundation
The Malware Markets: A Graphic Exploration
Introduction
"Computers and computer systems are becoming ubiquitous, managing everything from government databases, to grocery transactions, to activity on our own phones. However, these systems don’t come without their vulnerabilities, and their exploitation has never been in such high demand. So where does malicious software—the code designed to exploit these vulnerabilities—come from?
Malicious software is bought, sold, and traded. These transactions take place on websites which could be mistaken for ebay clones, over encrypted email between former colleagues, and even when vendors publicly offer cash for flaws in their software. The malware markets are home to both defensive groups, like software vendors, and offensive groups, like criminal networks and other attackers. Companies are involved with building and selling malicious code, from single exploits all the way up to integrated surveillance packages. Underneath all of this is a global network of companies, criminal groups, individuals, and even governments that build, buy, and sell code."
Want to Read More?
The full text of this publication is available via the original publication source.
For more information on this publication:
Please contact
Cyber Project
For Academic Citation:
Herr, Trey, Brian de Luna and Luke Heine. “The Malware Markets: A Graphic Exploration.” New America Foundation, August 2017.
- Recommended
- In the Spotlight
- Most Viewed
Recommended
Analysis & Opinions
- Foreign Policy
Why the U.S. Should Not Ban TikTok
Analysis & Opinions
- Slate
Everything Is Hackable
Analysis & Opinions
- Belfer Center for Science and International Affairs, Harvard Kennedy School
We Don’t Need to Reinvent our Democracy to Save it from AI
In the Spotlight
Most Viewed
Analysis & Opinions
- Project Syndicate
What Caused the Ukraine War?
Analysis & Opinions
- Belfer Center for Science and International Affairs, Harvard Kennedy School
Significance of the Iran-Saudi Arabia Agreement Brokered by China
Paper
- Belfer Center for Science and International Affairs, Harvard Kennedy School
The Great Military Rivalry: China vs the U.S.
Introduction
"Computers and computer systems are becoming ubiquitous, managing everything from government databases, to grocery transactions, to activity on our own phones. However, these systems don’t come without their vulnerabilities, and their exploitation has never been in such high demand. So where does malicious software—the code designed to exploit these vulnerabilities—come from?
Malicious software is bought, sold, and traded. These transactions take place on websites which could be mistaken for ebay clones, over encrypted email between former colleagues, and even when vendors publicly offer cash for flaws in their software. The malware markets are home to both defensive groups, like software vendors, and offensive groups, like criminal networks and other attackers. Companies are involved with building and selling malicious code, from single exploits all the way up to integrated surveillance packages. Underneath all of this is a global network of companies, criminal groups, individuals, and even governments that build, buy, and sell code."
Want to Read More?
The full text of this publication is available via the original publication source.- Recommended
- In the Spotlight
- Most Viewed
Recommended
Analysis & Opinions - Foreign Policy
Why the U.S. Should Not Ban TikTok
Analysis & Opinions - Slate
Everything Is Hackable
Analysis & Opinions - Belfer Center for Science and International Affairs, Harvard Kennedy School
We Don’t Need to Reinvent our Democracy to Save it from AI
In the Spotlight
Most Viewed
Analysis & Opinions - Project Syndicate
What Caused the Ukraine War?
Analysis & Opinions - Belfer Center for Science and International Affairs, Harvard Kennedy School
Significance of the Iran-Saudi Arabia Agreement Brokered by China
Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School
The Great Military Rivalry: China vs the U.S.