Abstract

For consumers the increasingly widespread consumer-grade connected ("smart") devices; growing use of cloud-storage and globally still expanding use of Internet and mobile phones; mobile payment options will pose increasing risk of becoming a victim of cyber-attack. For companies and institutions of all kinds, matters regarding the protection of Intellectual Property (IP) and Personally Identifiable Information (PII) from cyber-breaches and -leaks will demand higher financial investment. With the discovery of Stuxnet, offensive and defensive cyber-capabilities have already become an acknowledged tool in military arsenals worldwide and are at the cusp of shifting the global landscape of military power. With the expanding yield of cyber-related activities, understanding the actors creating, manipulating, and distributing malicious code becomes a paramount task. In this chapter we report on the results of an exploration of black hat hacker forums on both the Internet and crypto-networks (in particular those accessed via the Tor-browser). We report on the structure, content, and standards of behavior within these forums. Throughout we highlight how these activity augment the activities of the black hat hackers who participate.

Original languageEnglish (US)
Title of host publicationCyber Deception
Subtitle of host publicationBuilding the Scientific Foundation
PublisherSpringer International Publishing
Pages259-282
Number of pages24
ISBN (Electronic)9783319326993
ISBN (Print)9783319326979
DOIs
StatePublished - Jan 1 2016

Fingerprint

Internet
Arsenals
Intellectual property
Mobile phones
Industry

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Shakarian, J., Gunn, A. T., & Shakarian, P. (2016). Exploring malicious hacker forums. In Cyber Deception: Building the Scientific Foundation (pp. 259-282). Springer International Publishing. https://doi.org/10.1007/978-3-319-32699-3_11

Exploring malicious hacker forums. / Shakarian, Jana; Gunn, Andrew T.; Shakarian, Paulo.

Cyber Deception: Building the Scientific Foundation. Springer International Publishing, 2016. p. 259-282.

Research output: Chapter in Book/Report/Conference proceedingChapter

Shakarian, J, Gunn, AT & Shakarian, P 2016, Exploring malicious hacker forums. in Cyber Deception: Building the Scientific Foundation. Springer International Publishing, pp. 259-282. https://doi.org/10.1007/978-3-319-32699-3_11
Shakarian J, Gunn AT, Shakarian P. Exploring malicious hacker forums. In Cyber Deception: Building the Scientific Foundation. Springer International Publishing. 2016. p. 259-282 https://doi.org/10.1007/978-3-319-32699-3_11
Shakarian, Jana ; Gunn, Andrew T. ; Shakarian, Paulo. / Exploring malicious hacker forums. Cyber Deception: Building the Scientific Foundation. Springer International Publishing, 2016. pp. 259-282
@inbook{7efcb87093c548c79974c21c8c940704,
title = "Exploring malicious hacker forums",
abstract = "For consumers the increasingly widespread consumer-grade connected ({"}smart{"}) devices; growing use of cloud-storage and globally still expanding use of Internet and mobile phones; mobile payment options will pose increasing risk of becoming a victim of cyber-attack. For companies and institutions of all kinds, matters regarding the protection of Intellectual Property (IP) and Personally Identifiable Information (PII) from cyber-breaches and -leaks will demand higher financial investment. With the discovery of Stuxnet, offensive and defensive cyber-capabilities have already become an acknowledged tool in military arsenals worldwide and are at the cusp of shifting the global landscape of military power. With the expanding yield of cyber-related activities, understanding the actors creating, manipulating, and distributing malicious code becomes a paramount task. In this chapter we report on the results of an exploration of black hat hacker forums on both the Internet and crypto-networks (in particular those accessed via the Tor-browser). We report on the structure, content, and standards of behavior within these forums. Throughout we highlight how these activity augment the activities of the black hat hackers who participate.",
author = "Jana Shakarian and Gunn, {Andrew T.} and Paulo Shakarian",
year = "2016",
month = "1",
day = "1",
doi = "10.1007/978-3-319-32699-3_11",
language = "English (US)",
isbn = "9783319326979",
pages = "259--282",
booktitle = "Cyber Deception",
publisher = "Springer International Publishing",

}

TY - CHAP

T1 - Exploring malicious hacker forums

AU - Shakarian, Jana

AU - Gunn, Andrew T.

AU - Shakarian, Paulo

PY - 2016/1/1

Y1 - 2016/1/1

N2 - For consumers the increasingly widespread consumer-grade connected ("smart") devices; growing use of cloud-storage and globally still expanding use of Internet and mobile phones; mobile payment options will pose increasing risk of becoming a victim of cyber-attack. For companies and institutions of all kinds, matters regarding the protection of Intellectual Property (IP) and Personally Identifiable Information (PII) from cyber-breaches and -leaks will demand higher financial investment. With the discovery of Stuxnet, offensive and defensive cyber-capabilities have already become an acknowledged tool in military arsenals worldwide and are at the cusp of shifting the global landscape of military power. With the expanding yield of cyber-related activities, understanding the actors creating, manipulating, and distributing malicious code becomes a paramount task. In this chapter we report on the results of an exploration of black hat hacker forums on both the Internet and crypto-networks (in particular those accessed via the Tor-browser). We report on the structure, content, and standards of behavior within these forums. Throughout we highlight how these activity augment the activities of the black hat hackers who participate.

AB - For consumers the increasingly widespread consumer-grade connected ("smart") devices; growing use of cloud-storage and globally still expanding use of Internet and mobile phones; mobile payment options will pose increasing risk of becoming a victim of cyber-attack. For companies and institutions of all kinds, matters regarding the protection of Intellectual Property (IP) and Personally Identifiable Information (PII) from cyber-breaches and -leaks will demand higher financial investment. With the discovery of Stuxnet, offensive and defensive cyber-capabilities have already become an acknowledged tool in military arsenals worldwide and are at the cusp of shifting the global landscape of military power. With the expanding yield of cyber-related activities, understanding the actors creating, manipulating, and distributing malicious code becomes a paramount task. In this chapter we report on the results of an exploration of black hat hacker forums on both the Internet and crypto-networks (in particular those accessed via the Tor-browser). We report on the structure, content, and standards of behavior within these forums. Throughout we highlight how these activity augment the activities of the black hat hackers who participate.

UR - http://www.scopus.com/inward/record.url?scp=85004033432&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85004033432&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-32699-3_11

DO - 10.1007/978-3-319-32699-3_11

M3 - Chapter

AN - SCOPUS:85004033432

SN - 9783319326979

SP - 259

EP - 282

BT - Cyber Deception

PB - Springer International Publishing

ER -