Tag: Cybercrime

The cybercrime business model and its value chain

The security landscape has evolved to a point where most IT threats occur with the intention of generating financial gain for their creators and financiers. Based on this premise, various attack or threat types have proliferated and evolved to affect a greater number of users and organizations. The cybercrime “business model” is based on creating a value chain that offers new methods, for example cybercrime as a service, that is, the practice of facilitating illegal activities via services. In other words, anyone could acquire everything they need to organize frauds or cyberattacks, whatever their skills or technical knowledge.

Read more on We Live Security

‘Avalanche’ Crime Ring Leader Eludes Justice

The accused ringleader of a cyber fraud gang that allegedly rented out access to a criminal cloud hosting service known as “Avalanche” is now a fugitive from justice following a bizarre series of events in which he shot at Ukrainian police, was arrested on cybercrime charges and then released from custody.

Read the full article on Krebs On Security

Cybercrime in social media grows 70% in six months

These days, all you need to do is type “botnet,” “hacking,” “DDoS,” “CVV2,” or any other cybercrime-related term into the search bar on most social media platforms, and you will find a plethora of fraud activity occurring in plain sight.  As reported earlier this year by RSA, social media has become a breeding ground for cybercrime-related activity, attracting fraudsters from around the world who take advantage of these platforms because they are free, easy-to-use, and offer a global reach.

Full article via RSA

How Machine Learning Will Help Attackers

Inside McAfee Labs’ predictions (PDF) for 2017 is this: criminals will use machine learning to analyze massive quantities of stolen records to identify potential victims and build contextually detailed emails that very effectively target these individuals. In short, just as defenders use machine learning to detect attacks, attackers will use machine learning to automate attacks and evade detection.

Read the full article on Security Week

Where Cybercriminals Go To Buy Your Stolen Data

With nothing more than a standard Web browser, cybercriminals can find personal, private information all over the public Internet. It isn’t just legitimate services – from genealogy sites to public records and social media – that can be mined and exploited for nefarious purposes. Openly malicious criminal activities are also happening on the public Internet.

Read the full article on Dark Reading