NSF-Funded Research Aims to Help Disrupt Cybercrime Supply Chains

  /     /     /  
Publicated : 23/11/2024   Category : security


NSF-Funded Research Aims to Help Disrupt Cybercrime Supply Chains


The National Science Foundation awarded a grant to Georgia State University (GSU) to come up with innovative ways to thwart the supply chains for counterfeiting, loan- and unemployment fraud.



The National Science Foundation has awarded a $250,000 grant to Georgia State University (GSU) to study how best to disrupt - and ultimately take down - the supply chains that allow cybercriminals to thrive.
David Maimon, associate professor and director of the
Evidence-Based Cybersecurity Research Group
at GSU, says his team will focus on the supply chains that support counterfeiting cash money and PII such as credit card data, social security numbers, and names and addresses, as well as fraud around Small Business Administration loans and unemployment claims.
Maimon says by using an evidence-based approach, the team at GSU will use rigorous social science research, observations, and surveys to find out which law enforcement techniques actually work in the field. 
The goal is to take down these supply chains, Maimon says. Cyber researchers and law enforcement agencies chasing cybercriminals tend to focus on taking down servers to disrupt cybercrime. While these activities are effective, they often have short-term impact, as the cybercriminals can reconfigure servers very quickly and stay in operation.
Ed Cabrera, chief cybersecurity officer at Trend Micro, says theres a definite need for research that looks at the nature of the supply chain versus the technical cyber-side of the equation. 
We tend to look at the symptoms and not the disease, which is the ecosystems that enable these criminal activities, Cabrera says. As security researchers in the industry, well look at the malware bought and sold, the macro picture. But theres a need for more innovative ways to go after these groups.
Anatomy of the Supply Chain
Maimon says the GSU team will study how the four junctions of the supply chain interact with one another and look for creative ways to disrupt them. This includes enablers, offenders, victims, and guardians.
According to GSU,
enablers
are individuals and organizations that deliver services to those who wish to carry out cyberattacks. Enablers include the coders or programmers of malicious software; distributors and vendors who trade and sell hacking tools and stolen data; teachers who exchange information regarding cybercrime techniques and tools; and moderators and administrators of online marketplaces who maintain the criminal infrastructure, vouch for the goods, and enforce social norms in these criminal marketplaces.
Online
offenders
and enablers of cybercrime tend to meet in both offline or online environments.
The
victims
of cybercrimes are private individuals or companies that experience attacks on their computers, networks, and IoT devices. For a variety of reasons, they are often reticent to report that theyve been the victim of a cybercrime to law enforcement.
Finally, the list of relevant cybercrime
guardians
that monitor these activities includes law enforcement agencies such as the FBI and state and local police agencies, governmental intelligence agencies such as the National Security Agency, and systems administrators at Internet service providers, corporations, and industries.
Maimon says GSUs research group especially seeks to find more creative ways to interact with the offenders and enablers so they can protect victims and come up with new tools and techniques for law enforcement. For example, instead of just monitoring traffic on servers, they may look to spread gossip on the Dark Web to see if they can disrupt the market and get the offenders or enablers to make a mistake.
The GSU has two years to report its findings and issue recommendations to law enforcement, government security agencies, and the private sector.
 

Last News

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
NSF-Funded Research Aims to Help Disrupt Cybercrime Supply Chains