The data leak frequent and increasingly severe. They attracted special attention of the media by the amount of data leaks is very large and most of them are private.
Over the past few years, dozens of data leakage occurred with the goal of retailers, the health care center and even a database of government. Hacker collects information such as Social Security numbers, fingerprints, information bank rays ...
But what will happen after data leak? Hackers do with the information we collect? Who wants to have this information, why? ...
Many studies indicate that the data stolen by hackers usually sell to others in underground web market. Seller use his hacking skills to collect the desired information or looking for information on request. Buyers use the stolen information to maximize the financial benefits of them include the purchase of goods with stolen credit cards or participate directly transfer money to steal cash.
In case the data data is the social network accounts, buyers could threaten the victims for ransom or to use these data to build another attack, more serious aim at the target. In addition, they can also use the account to commit the fraud.
Due to the nature of black web market, it is unclear how many account acquisitions, data leaks have been made. Most ad sellers of "goods" they like other retailers on Amazon. On it, the buyer and seller together different assessment and evaluation of the quality "goods", personal data, are being sold.
According to statistics, the participation of 320 sellers trading income in the range of 1 to 2 million.Similarly, a buyer involved in trading income 141 1.7 to 3.4 million. Huge profits can be the reason to attract positive hacker steals data.
Joining in the market
market black web, similar activities secret e-commerce sites like eBay and Amazon legitimate. A portion of this market opening activities, can go with conventional web browsers but another part of the underground operation, only accessible through Tor browser. It is not clear the scale of this market to the extent of how big.
People normally do not know to this market because they do not advertise publicly. Method of payment receipt and also very different markets.
Connecting Buyers and Sellers
Seller sends information about the type, quantity and price data that he has and how best to contact as well as the preferred method of payment. Seller accept payments in many different ways such as through Web Money, Yandex and Bitcoin. Some also accept cash payment through international money transfer system Western Union and MoneyGram as.
Most of the negotiations are done through online chat tool or a seller-specified email. After agreeing to the terms, the seller must transfer the money to the buyer before then moved to the following line. Sometimes sellers need a few days to transfer the data to the buyer.
The rating transactions
If the seller does not ship after receiving cash or inactive or incorrect, the buyer can not sue or through involvement labor law. Still, the system devised a way to balance the power between sellers and buyers. Like on other services, buyers can evaluate the credibility of the seller after the transaction.
A seller is not good resume will not be able to continue doing business.
Taking advantage of this approach, the authorities think of a way to disrupt trade market data. They penetrate the market and use many different accounts rated seller in both positive and negative.Therefore, the buyer can not determine what is a reliable sales.
This approach helps authorities can eradicate trafficking data systems and related acts without arrest or using the traditional legislative means.
Over the past few years, dozens of data leakage occurred with the goal of retailers, the health care center and even a database of government. Hacker collects information such as Social Security numbers, fingerprints, information bank rays ...
But what will happen after data leak? Hackers do with the information we collect? Who wants to have this information, why? ...
Many studies indicate that the data stolen by hackers usually sell to others in underground web market. Seller use his hacking skills to collect the desired information or looking for information on request. Buyers use the stolen information to maximize the financial benefits of them include the purchase of goods with stolen credit cards or participate directly transfer money to steal cash.
In case the data data is the social network accounts, buyers could threaten the victims for ransom or to use these data to build another attack, more serious aim at the target. In addition, they can also use the account to commit the fraud.
According to statistics, the participation of 320 sellers trading income in the range of 1 to 2 million.Similarly, a buyer involved in trading income 141 1.7 to 3.4 million. Huge profits can be the reason to attract positive hacker steals data.
Joining in the market
market black web, similar activities secret e-commerce sites like eBay and Amazon legitimate. A portion of this market opening activities, can go with conventional web browsers but another part of the underground operation, only accessible through Tor browser. It is not clear the scale of this market to the extent of how big.
People normally do not know to this market because they do not advertise publicly. Method of payment receipt and also very different markets.
Connecting Buyers and Sellers
Seller sends information about the type, quantity and price data that he has and how best to contact as well as the preferred method of payment. Seller accept payments in many different ways such as through Web Money, Yandex and Bitcoin. Some also accept cash payment through international money transfer system Western Union and MoneyGram as.
The rating transactions
If the seller does not ship after receiving cash or inactive or incorrect, the buyer can not sue or through involvement labor law. Still, the system devised a way to balance the power between sellers and buyers. Like on other services, buyers can evaluate the credibility of the seller after the transaction.
A seller is not good resume will not be able to continue doing business.
Taking advantage of this approach, the authorities think of a way to disrupt trade market data. They penetrate the market and use many different accounts rated seller in both positive and negative.Therefore, the buyer can not determine what is a reliable sales.
This approach helps authorities can eradicate trafficking data systems and related acts without arrest or using the traditional legislative means.
Refer Thrillist
Comments
Post a Comment