RSA Europe: The growth of the underground hacker ‘economy’
Credit card data dealing on underground forums laid bare – service level agreements and efficient cash conversion that even the stock market could take lessons from.

The last few years have seen some of the biggest ever changes in IT security, especially with the new breed of financially motivated hacker.
This was according to Hugh Thompson, chief security strategist for People Security, who was talking at a keynote at RSA Europe 2008. He said that IT security had to deal with many shifts in the last three or four years, such as in internet environments.
But it was the attacker in the forum who Thompson most focused on. He talked of an efficient and effective underground economy where there was the dealing of credit card data. In his research, he revealed that users dealing with credit card data now have service level agreements between the buyer and stolen credit card brokers.
He picked out the example of a broker who was trying to sell various credit card numbers: "He makes a couple of guarantees instant replacement if he sells you bad credit card numbers, good discounts for big orders."
He added: "You can even check the merchandise by giving you a sample set of ten stolen credit card numbers to see if they work for you."
Thompson said that he felt it was incredible that the criminals had the maturity in the underground market that they felt they had to differentiate themselves by the quality of service that they were giving on stolen merchandise.
The strategist then led on to talk about how these transactions were now leading on to secondary markets. Thompson gave an example of how rather than deal with stolen credit card numbers, users would make a profit by converting different types of electronic currency.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
He described the transactions the user could make: "PayPal to e-gold, PayPal to Western Union which is probably the best deal.
"What's fascinating about this is that it was in August, and then went back to look at all the posts from this individual. I found one three months before that, and the rates were different.
"It turns out that one of those e-money providers had just announced they had added an extra layer of security. So the market was so efficient that it priced in that extra problem the broker had to go through."
For more coverage and photos from the RSA show, click here.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
'You need your own bots' to wage war against rogue AI, warns Varonis VP
News Infosec pros are urged to get serious about data access control and automation to thwart AI breaches
By Rene Millman Published
-
CrowdStrike CEO: Embrace AI or be crushed by cyber crooks
News Exec urges infosec bods to adopt next-gen SIEM driven by AI – or risk being outpaced by criminals
By Rene Millman Published
-
Microsoft security boss warns AI insecurity 'unprecedented' as tech goes mainstream
News RSA keynote paints a terrifying picture of billion-plus GenAI users facing innovative criminal tactics
By Rene Millman Published
-
APIcalypse Now: Akamai CSO warns of surging attacks and backdoored open source components
NEWS Apps and APIs bear the brunt as threat actors pivot to living off the land
By Rene Millman Published
-
AI is changing the game when it comes to cyber security
News With AI becoming more of an everyday reality, innovative strategies are needed to counter increasingly sophisticated threats
By Rene Millman Published
-
RSAC Chairman urges collaboration to ensure collective defense in security
News Chairman emphasizes the critical need for cooperation among cyber security experts
By Rene Millman Published
-
IT Pro Live: The future of encryption
Video AI and quantum ccomputing could be about to change the face of security forever
By IT Pro Published
-
Mobile apps now most common method of fraud
News RSA Security report highlights the rise in burner devices and rogue apps
By Bobby Hellard Published