Investigation reveals growth of online black market

Kevin Rawlinson
Wednesday 13 July 2011 00:00 BST

Your support helps us to tell the story

From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging.

At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.

The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.

Your support makes all the difference.

The online trade in credit card details, email addresses and tools used in cyber attacks is growing, an Independent investigation has revealed.

Hackers and scammers are taking advantage of the ease with which they can set up online to make a "comfortable living" dealing on the black market. And some can make nearly £45,000 in a day selling devices used to take down and break into websites, claimed one seller.

"I personally wouldn't call [the trade] 'underground' as underground is defined as secretive. Buying credit cards now is like going up to your local gas station and buying a soda," said the merchant, who was speaking on condition of anonymity.

Experts say that those involved even operate under minimal cover, selling credit card details, names, addresses and passwords. "It's all for sale online, if you know where to look," said Brian Krebs, one of the leaders in research into the online black market.

The former Washington Post reporter, who now runs his own internet security blog, added: "I can point to 22 different sites that are selling stolen credit card data right now, and those are just the sites that I know of. There are plenty of places where you can buy that kind of thing."

He put the industry's growth down, at least in part, to an increase in the availability of what he called "crook-to-crook services"; people with technical expertise being paid to help those without it.

"That would cover services offered by those in the community to those who want to be," he said, adding: "For a small amount of money, you can set yourself up in business, selling stolen personal data. It is almost as easy for people to get started stealing credit card and identity info as it is for them to just go buy it online.

Although accurate figures do not exist, it is though that there is a greater number of people involved in the underground trade, both from the buyer's and seller's point of view. "It is so easy now for people to get into this line of business...often they do not even seem to realise the value of the information they have," said Mr Krebs.

The sheer number and value of the credit card transactions which take place online provide both greater incentive and greater opportunity to thieves, according to internet security firm Symantec. The company, which produces an annual report on online threats, found that, in 2008, there were two billion credit card transactions in the UK, worth a total of £126.3bn.

Mr Krebs explained that the majority of black market transactions take place in private, in online chatrooms or via instant messengers, but he said they might be initiated in public. One seller contacted by The Independent posted a message on his Twitter account, inviting bids for a "0-Day" - a weakness in a website, programme or app's security or a tool for exploiting a weakness.

That seller initially tried to broker a deal over a botnet when contacted by this newspaper. He said he expected the system, which he claimed automatically configures computers to take part in a Denial of Service attack (DoS), to sell for around £12,500.

In a bid to demonstrate the power of the botnet, the developer briefly took down a predesignated website, ostensibly via a DoS and achieved in a fraction of the time more traditional methods would be expected to take. He talked of his pride in his device saying that he felt it was worth "much more" than £12,500 but admitted he would have to be realistic and take the price he could get. "I'm just after the money, man," he said.

The cost of the basic details of a credit card is significantly lower, he said. Symantec reports that a single card can be bought for as little as 4p but, in some cases, could go as high as £60 per card, depending on the information available and the type of card on sale.

As part of its latest Annual Internet Security Threat Report, it said: "The wide range in prices may be a reflection of simple supply and demand, where higher bulk availability results in lower prices and rarer cards are advertised at higher prices. Main factors that influenced the prices included: the amount of information included with the card, rarity of the card type, quality or validity of the card, type of card, and bulk purchase sizes.

"As in previous years, corporate accounts were typically advertised for a higher price than personal accounts as these bank accounts often have larger balances than those of personal accounts."

The anonymous seller claimed that his most common customers are "private black marketers. People that run businesses that can use this to increase their profits or to give themselves an advantage over their competitors.

It is impossible to say whether recent high profile attacks on the likes of the Sony PlayStation Network, which have exposed personal data, including credit card details have themselves provided a greater supply of information on sale or a greater demand for hacking tools.

However, figures from Symantec suggest that the average number of web attacks has increased from a little more than five million per day at the beginning of January 2009, to a little fewer than 20 million per day in late 2010. Its latest report notes that, as people gain better protection against older methods of cyber attack, so must developers continue to advance their "toolkits" in a bid to "remain competitive and successful".

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in