Direct Technology Group Blog

Direct Technology Group provides professional IT Support and Network Services for Businesses around Deerfield Beach. Computer Services, Tech Support, IT Solutions and more!

Where Hackers Go to Shop for Malware

b2ap3_thumbnail_black_market_hacker_400.jpgYou might recall how the Silk Road, an illegal online drug market, was recently shut down. Similar to the Silk Road, there’s another distributor of sensitive information out there; this one dealing with zero-day vulnerabilities. These types of cyber threats sell for top-dollar, and hackers are willing to pay in order to access your network.

As reported by WIRED magazine, this new marketplace calls itself TheRealDeal Market. Thanks to the anonymity of the Darknet, TheRealDeal market is capable of using software like Tor to cover its tracks, and Bitcoin to keep transactions anonymous. WIRED goes into detail about the niche which differentiates TheRealDeal from other vulnerability markets: high-quality code, stolen credentials, and hacking tools that are exceptionally difficult to get a hold of. This essentially equates TheRealDeal to a high-end code market that provides a “reliable” mode of acquisition for cybercriminals.

Of course, there’s no telling whether any of these supposed exploits being sold are “the real deal.” According to WIRED:

Any of the listings could instead be attempts to scam gullible buyers. The $17,000 iCloud vulnerability in particular, which claims to offer access to virtually all of a user’s sensitive mobile data including emails and photos, seems like an unusually good bargain. For comparison, zero-day salesmen told me in 2012 that a working iOS exploit could sell for as much as $250,000. The next year The New York Times reported that one had sold to a government for a half million dollars.

In other words, it might really be too good to be true for some hackers, and the site might even be trying to pull them into a hoax (scamming the scammers). Despite this, TheRealDeal apparently has some sort of fraud protection service, though it’s unclear how it operates. Plus, TheRealDeal is surprisingly sophisticated, especially considering the plethora of other illicit activities that the market is known for, including the selling of contraband, illegal substances, and stolen identities.

The level of professionalism seen here is disturbing, but if nothing else, it shows that hackers are both organized and resourceful. Unfortunately, by strategically offering rare code to well-funded hackers, TheRealDeal is making malicious code more readily available to the rest of the world, which means that hacking attacks will grow more common in the near future.

Thankfully, you don’t have to worry if your business is prepared for the worst. By taking advantage of comprehensive security features, like those offered with Direct Technology Group’s UTM (Unified Threat Management) solution, your business can reap the benefits of enterprise-level security measures. To fortify your business’s network from the latest threats and security vulnerabilities, give us a call at PHONENUMER today.

7 Signs of Smartphone Addiction and 4 Things You C...
Tip of the Week: Freeze an Excel Row for Easier Sp...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Sunday, 22 December 2024

Captcha Image

Blog Archive

2014
January
February
March
April
May
June
July
August
September
October
November

Mobile? Grab this Article

QR Code
Request a Consultation

Direct Technology Group strives to provide the best comprehensive IT, Computer, and Networking services to small businesses. We can handle all of your organization's technology challenges.

Contact Us
Contact Us

Learn more about what Direct Technology Group can do for your business.

1358 W Newport Center Dr
Deerfield Beach, Florida 33442

Call us: (954) 739-4700

News & Updates
Direct Technology Group is proud to announce the launch of our new website at www.directtechnologygroup.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...