10.08.2013 Views

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2.1.1.1 Detecting vulnerabilities<br />

The first activity 127 consists <strong>of</strong> detecting vulnerabilities. The detection <strong>of</strong> security<br />

vulnerabilities requires a certain level <strong>of</strong> technical knowledge and skills and is the main<br />

occupation <strong>of</strong> hackers and malicious code writers.<br />

Hackers are specialists in gaining unauthorised access to other computers. 128 Hacking is<br />

generally achieved through the application <strong>of</strong> particular tools, programming skills and<br />

computer knowledge, although it can be as simple as accessing password protected<br />

information.<br />

Malicious code writers evolved from virus writers, but are mostly driven by economic<br />

pr<strong>of</strong>it rather than reputation, which will define the shift from the white-hat hacker<br />

motivated by the advance <strong>of</strong> knowledge to the cracker whose motivation is criminal. 129<br />

Almost all crimeware programs have been written with a financial motive in mind. They<br />

can create zombies (hijacked computers) to launch denial-<strong>of</strong>-service attacks, phishing<br />

and spam mails. They can also create click and keystroke frauds, and steal application<br />

serial numbers, login IDs, and financial information such as credit card numbers and<br />

bank account information. 130<br />

It is important to note that in certain cases legitimate s<strong>of</strong>tware tools have been adapted<br />

for crimeware purposes – user innovation will enable the move from legal to illegal<br />

boundaries. Some <strong>of</strong> the tools frequently used by hackers were designed for legitimate<br />

purposes, such as network administration or security auditing. For instance, the most<br />

widely used freeware hacking tool is Nmap, sophisticated port scanning s<strong>of</strong>tware that<br />

can detect the services operating in a system, IP addresses and operating systems. This<br />

127 Despite its sequential representation, it is important to note that cybercrime is not a linear activity. While<br />

the three activities can be modelled as linear for ease <strong>of</strong> understanding, the functions are, more <strong>of</strong>ten than<br />

not, going on in parallel by different actors in the value chain, <strong>of</strong>ten in different parts <strong>of</strong> the world.<br />

128 Note the difference between black-hat hackers and white-hat hackers (see glossary). In this report we will<br />

refer to black hat hackers – this is, malicious hackers – as ‘hackers’ or ‘crackers’ interchangeably, since it is<br />

focused on criminal online activities.<br />

129 See glossary. The advent <strong>of</strong> PayPal is thought to have been an important factor in facilitating the move<br />

from competitive hacking to more remunerative activities.<br />

130 Shih-Yao Dai Sy-Yen Kuo, (2008), MAPMon: A Host-Based Malware Detection Tool, 13th IEEE International<br />

Symposium on Pacific Rim Dependable Computing.<br />

Page 44

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!