• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Security   »   The North American Underground: Open to All for Business

The North American Underground: Open to All for Business

  • Posted on:December 7, 2015
  • Posted in:Security, Underground Economy
  • Posted by:Christopher Budd (Global Threat Communications)
0

For three years now, Trend Micro’s Forward Looking Threat Research (FTR) group has been looking at the Cybercrime Underground Economies of many countries around the world. We’ve done three reports on Russia, three on China, one on Japan, one on Brazil and one on the Deep Web.

Today, we’re releasing a report that brings this topic closer to home for many of us focusing on the United States and Canada. Today our researchers have released “North American Underground: The Glass Tank,” the latest in our Cybercrime Underground Economy Series.

In this report, our researchers outline some of the ways the North American Underground differs from those of places like Russia and China. One of the most important differences is that the North American Underground is characterized by a high degree of openness unlike other undergrounds. Where the Chinese and Japanese Undergrounds in particular follow a “speakeasy” model where access for both buyers and sellers is restricted to “those in the know,” the North American Underground is open to all. In fact, as our researchers note, the North American Underground is characterized by continuous improvement not just in the goods and services offered but in ease of use for access and use by buyers and sellers.

Another thing that uniquely characterizes the North American Underground is the prominence of drugs and weapons for sale on their marketplaces. As our researchers note, contraband like drugs and weapons was a major factor in sparking the growth of the North American Underground in the first place. And these items are certainly available on the North American Underground. In fact, also we see the same drive towards ease of entry and usability around drugs and weapons that we see with the North American Underground generally.

But, despite the impressions that media reports on the Silk Road and its successors might leave you with, the North American Underground is more than just drugs and guns. Like other undergrounds it has its share of malware and attack kits for sale. It also features stolen data and compromised accounts for sale. Another thing that we’ve seen in this arena is the rise on the market for compromised accounts for Netflix and Spotify accounts: giving criminals an opportunity to “piggy back” on the legitimate accounts of others without them knowing it.

The full report has more detail, including information on ways buyers and sellers effectively launder Bitcoins for transactions in the North American Underground.

Overall, though, this report shows that the North American Underground Economy differs as much from those of, say, China, as their surface economies differ. Interestingly, this also shows that the underground economies and the surface economies differ in very similar ways.

Please add your thoughts in the comments below or follow me on Twitter;  @ChristopherBudd.

Related posts:

  1. Cybercrime Underground Economy Series Around the World
  2. The North American underground – and where hackers like to hide
  3. A look at the North American Underground: What’s being bought and sold?
  4. A Look into the Russian Underground

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.