Sunday, August 4, 2024

#11 Considerations on the Malware Industrial Complex

Considerations on the Malware Industrial Complex

In the field of cybersecurity, there is the concept of a distributed complex, or industrial complex. Here are some key points about this topic.

Historical Background

First, there was the assassination of an American president in the mid-20th century. There is a theory that this event was caused by opposition to the then-existing military-industrial complex. When industrial or military-industrial complexes grow in size, they can cause very troublesome problems.

The Existence of the Malware Industrial Complex

Currently, the existence of a malware industrial complex is widely known, but its specific scale is not as clear as that of data brokers. However, it is certain that the amounts of money being traded are enormous.

Example of Stuxnet

Stuxnet was completely operated as a military operation, reportedly directed by the Obama administration at the time. This malware was characterized by the inclusion of zero-day bugs.

Research Findings on Vulnerabilities

According to research by Carnegie Mellon University, there are 20 to 30 bugs per 1,000 lines of code. Many of these bugs are not critical but remain unchecked. For example, Microsoft Office 2013 has 4.5 million lines of code, and it is estimated to contain over 1 million to 1.5 million vulnerabilities. This means that the number of vulnerabilities traded on the dark web is enormous, making it extremely difficult to cover them all.

Trading of Zero-Day Vulnerabilities

It is also known that zero-day vulnerabilities are traded within the malware industrial complex. While Microsoft and Google's bug bounties offer rewards of about $500, selling them on the black market yields higher returns. There are also vendors that sell crimeware.

Specific Crimeware Vendors

  • Vupen from France
  • Netragard from Massachusetts, USA
  • Endgame from Georgia, USA
  • Exodus Intelligence from Texas, USA

These vendors are said to be selling zero-day vulnerabilities. These zero-days can potentially be used in malware or crimeware, and it is expected that the malware industrial complex will continue to grow in scale.

Future Outlook

It is necessary to keep a close watch on these complex and dangerous cybersecurity issues. As technology evolves, threats are also expected to increase, making it crucial to always share the latest information and take appropriate measures.

No comments:

Post a Comment