Jart Armin
Jart Armin is an investigator, analyst and writer on cybercrime and computer security, and researcher of cybercrime mechanisms and assessment.
Life
Armin first came into the public eye in 2007 from his exposure of the RBN (Russian Business Network). Throughout 2007, via a dedicated blog entitled RBNExploit, he provided reports and analysis on the undercover operations of the RBN criminal gang, despite constant DDoS attempts and artificially-created mirror websites.
It was via the RBN blog that Armin provided the first reports of cyber attacks, used in conjunction with the invasion of Georgia by Russian troops,[1] three days in advance of the attack in August 2008.
As an advocate of an
The Reports
In August 2008, Jart Armin, via HostExploit, published a report "
In November 2008, Armin published a further report, "
The cybercriminal activities of EstDomains were tracked by Armin and his allies in RBN blog postings and HostExploit reports.[2] Exposing the link between the RBN and EstDomains in the October 2008 report entitled "RBN – Farewell to EstDomains"[5] lead to the operational closure of the EstDomains[6] business and to its customer base moving to the Asian registrar Directi.
In a joint venture with Andrew Martin of MartinSecurity.net, Armin issued the report "Real Host Latvia – RBN Resurgence or Clone?"
In November 2009, in another joint venture with Andrew Martin
In August 2010, Armin and the HostExploit team released a report
Other considerations
Armin has spoken to audiences at
At a workshop held at the 2015 ARES Conference in Toulouse, France, Armin presented the jointly authored paper, '2020 Cybercrime Economic Costs: No Measure No Solution',[13] a result of the EU FP7 Project CyberROAD. Armin presented on the subject of 0-Day Vulnerabilities and Cybercrime at the same venue.
Presentations on the subjects of Cyber Threat Intelligence (CTI) and cyber security metrics are regularly delivered at conferences including ARES 2018 at Hamburg, Germany, where Armin represented the Criminal Use of Information Hiding Initiative (CUING). In October 2018, Armin presented at the Global IEEE 5G-IoT Summit, Marrakesh, on the subject of IOT devices.
Armin regularly participates in EU funded projects (FP7 and H2020) such as ACDC 2013–2015, SWEPT 2014–2017, CyberROAD 2015–2017, SISSDEN 2016–2019, and SAINT 2017–2019.
Armin is a member of the ENISA Threat Landscape Stakeholder Group.
Armin has been cited in books on cybercrime and cyberwarfare.[14] [15]
HostExploit
HostExploit[16] was set up by Armin as an offshoot from the RBN blog to explore wider cybercrime themes. It operates as an open source community project to inform on topics relating to cybercrime with links to daily news items, articles and reports written by Jart Armin and others.
HostExploit reports are regularly cited in academic research papers.[17][18]
References
- ^ "Georgia accuses Russia of coordinated cyberattack | Security - CNET News". Archived from the original on 2012-02-02. Retrieved 2012-04-30.
- ^ a b "Atrivo - Cyber Crime USA" - HostExploit Report
- ^ ""McColo - Cyber Crime USA" - HostExploit Report
- ^ "Host of Internet Spam Groups Is Cut Off" by Brian Krebs, The Washington Post. December 11th, 2008. Retrieved 2010-08-22.
- ^ [1][permanent dead link]
- ^ "ICANN Drops Bad Domain Registrar, but on Technicality" by Jeremy Kirk, PCWorld.About. November 13, 2008. Retrieved 30.04.2012
- ^ "Real Host, Latvia - RBN Resurgence or Clone?" - HostExploit Report
- ^ "Introducing MalFI – Another Report From HostExploit"
- ^ "MALfi, A Cybercrime International Report" - HostExploit Report
- ^ "Demand Media/eNom Report – Cybercrime USA" - HostExploit Report
- ^ "Demand Media a home to badware, researchers say", by Robert McMillan, Computer World August 11, 2010. Retrieved 30.04.2012
- ^ Jart Armin articles at Internet Evolution
- ISBN 978-1-4673-6590-1.
- ISBN 978-0-596-80215-8.
- ISBN 978-1-58648-748-5.
- ^ HostExploit website
- ^ "FiRE - Finding Rogue Networks" (PDF). Archived from the original (PDF) on 2010-08-28. Retrieved 2010-09-06.
- ^ "Wide-area Routing Dynamics of Malicious Networks"