Markets in Malware - Adam Hogan
Offered By: YouTube
Course Description
Overview
Syllabus
Intro
Labor specialization Financial trust
PRICE DISCRIMINATION
First challenge is a logistical one: acquire a live hostage and convey them to a place from which the ransom negotiation can be safely conducted.
EXTRA-LEGAL GOVERNANCE
IN CULTURES WHERE HOSTAGE- TAKING IS AN ESTABLISHED WAY OF RESOLVING INTER COMMUNITY CONFLICT (E.G. YEMEN) HOSTAGES TRADITIONALLY HAVE THE SOCIAL STATUS OF A GUEST!
CAN MALWARE AUTHORS BUILD A REPUTATION?
CREATING RULES • DISSEMINATING INFORMATION • EVALUATING PERFORMANCE • SPOTTING BREACHES OF PROTOCOL • ENFORCING RULES AND NORMS
THE OVERLONG CAPTIVITY OF THE CHANDLERS
COUNTER EXAMPLE
UN AND DOMESTIC LAW FORBID THE TRANSFER OF MONEY TO TERRORIST ORGANIZATIONS
LAW ENFORCEMENT?
COST / BENEFIT
THERE ARE NO GIANT KIDNAPPING ENTERPRISES
LARGE KIDNAPPING ORGANIZATIONS BECOME PROTECTION RACKETS
LARGE REBEL GROUPS BECOME GOVERNMENTS
GRIM SPIDER WIZARD SPIDER
VERTICAL INTEGRATION
HOW TO CHARGE A HIGHER RANSOM?
WHAT LIMITS THE GROWTH OF RANSOMWARE?
COMMODITY MALWARE
CONTAINERIZATION
BAD GUYS SUPPLY CHAIN IS IMPRESSIVE
Related Courses
Derecho y Redes SocialesUniversidad Europea de Madrid via Miríadax كيف تسوق نفسك في سوق العمل
Bayt via Edraak Introduction to Personal Branding
University of Virginia via Coursera Course 3: Strategic Self-Marketing and Personal Branding
State University of New York via Coursera Fundamentals of Digital Marketing, Social Media, and E-Commerce
University of Pennsylvania via edX