Markets in Malware - Adam Hogan
Offered By: YouTube
Course Description
Overview
Syllabus
Intro
Labor specialization Financial trust
PRICE DISCRIMINATION
First challenge is a logistical one: acquire a live hostage and convey them to a place from which the ransom negotiation can be safely conducted.
EXTRA-LEGAL GOVERNANCE
IN CULTURES WHERE HOSTAGE- TAKING IS AN ESTABLISHED WAY OF RESOLVING INTER COMMUNITY CONFLICT (E.G. YEMEN) HOSTAGES TRADITIONALLY HAVE THE SOCIAL STATUS OF A GUEST!
CAN MALWARE AUTHORS BUILD A REPUTATION?
CREATING RULES • DISSEMINATING INFORMATION • EVALUATING PERFORMANCE • SPOTTING BREACHES OF PROTOCOL • ENFORCING RULES AND NORMS
THE OVERLONG CAPTIVITY OF THE CHANDLERS
COUNTER EXAMPLE
UN AND DOMESTIC LAW FORBID THE TRANSFER OF MONEY TO TERRORIST ORGANIZATIONS
LAW ENFORCEMENT?
COST / BENEFIT
THERE ARE NO GIANT KIDNAPPING ENTERPRISES
LARGE KIDNAPPING ORGANIZATIONS BECOME PROTECTION RACKETS
LARGE REBEL GROUPS BECOME GOVERNMENTS
GRIM SPIDER WIZARD SPIDER
VERTICAL INTEGRATION
HOW TO CHARGE A HIGHER RANSOM?
WHAT LIMITS THE GROWTH OF RANSOMWARE?
COMMODITY MALWARE
CONTAINERIZATION
BAD GUYS SUPPLY CHAIN IS IMPRESSIVE
Related Courses
Cyber Security Foundations: Common Malware Attacks and Defense StrategiesEC-Council via FutureLearn Cybersecurity Foundations
LinkedIn Learning The Cybersecurity Threat Landscape
LinkedIn Learning A Guide to Ransomware Protection
Udemy Ciberseguridad. Bases y estructuras para la protección de la información
Universidad Anáhuac via edX