A look at the cybercrime ecosystem and the way it works

Dmitry Bestuzhev Kaspersky Lab

In the last few years, cybercrime has evolved into a truly organized crime ecosystem with specific needs, on-demand goods and specific trends.

We have been monitoring the black market and the situation is comparable to a real market, where prices, stock and trends are constantly changing. Nowadays, we're facing a world in which the slogan 'Steal everything' is applied to almost every new piece of malware written.

In this presentation, we will explore some of the unknown sides of the cybercrime ecosystem. We will show genuine examples of goods available on the cyber black market that prove that the worlds of 'traditional' crime and 'cybercrime' are merging.

Obviously, one of the big questions is, 'Can we monitor not just the black market, but also the people who are behind it?' The answer is a resounding 'Yes!' We will present background information about the major players in the world of cybercrime and discuss what initially motivated them to start producing malware.

Have you ever asked yourself how people know whether a product offered for sale on the black market is genuine or fake? We will provide an overview of the current black market structure and the business model used for black market transactions.

Perhaps you have wondered why cybercrime has grown so much in the past few years. It is easily explained by using an economic equation - not to mention that it is potentially the most lucrative business in the world and I'll prove it. You will see for yourself why there are so many cybercriminals out there today.

Last but not least, I will provide a brief analysis of the current legislative issues regarding the prevention, or at least reduction of cybercrime and what we can do in order to make it happen.


We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.