ALL >> Computers >> View Article
Security Experts Caution Users Against Growing Cybercrime Market
The recent years have witnessed significant increase in cybercrime. Attackers now use well-crafted e-mails and stealth to deceive users. Attackers regularly scan the cyberspace to collect valuable personal information and initiate target based attacks. Criminals extract relevant data from social and professional networking sites. Last year ZeuS Trojan and several variants were used to target employees working in the banking and financial industry. Sophisticated mechanisms are used to evade anti-virus solutions and safeguards in the IT perimeter.
The stolen information is used to steal funds or sold to their peers in the underground crime market. A recent report by security solutions provider Panda Security has found that cybercrime black market is witnessing expansion. One of the reasons for the growing black market is evolvement of new techniques, availability of automated toolkits and growth in malware such as Trojans, botnets and key loggers. The report indicates that number of malware strains identified has grown over 6 times in the last 7 years to around 60 million. The new forms of malware help criminals in gaining ...
... access to credentials, stealing money and identity theft. Cybercriminals now function like an organized business spread over the world with members having different roles such as distribution of stolen information, committing fraud, providing illicit content servers, tech experts, information sale, conducting wire transfers and money laundering among others.
The underground cybercrime market operates as a continuous cycle of creating malware, identifying potential victims, inserting malware, stealing information, selling the stolen credentials and money laundering through money mules.
Criminals take advantage of negligence in adhering to security fundamentals by Internet users to trick them into visiting well-crafted but fake websites or clicking on fake banking and social media links.
The black market which until a few years back was confined to selling credit card and banking information has expanded to include sale of physical credit cards, card cloners, fake ATMs, fraudulent bank transfers, card cloning, online payment accounts, fake online shops, counterfeit pay platforms, leasing spams and mail transfer protocols. Interestingly, they also provide trial offers and customer support. The prices range from as low as $2 for credit card information to around $35,000 for fake teller machines. The market has differential prices for cards originating from different countries.
Both businesses and individuals are targeted by cybercriminals. IT security awareness education may help employees to get an update on the security threats, safe online practices.
Banks may educate customers on the sophisticated threats through online training videos, tutorials and case studies.
Add Comment
Computers Articles
1. What Identity Governance Really Means In Modern EnterprisesAuthor: Mansoor Alam
2. Strategies For Successful Site Selection In Clinical Trials
Author: Giselle Bates
3. Simplifying Business Purchases With Smart, Reliable Procurement Solutions
Author: suma
4. How Businesses In Dubai Are Scaling Faster With Modern Erp Software
Author: Al murooj solutions
5. How To Choose The Right Weapon Tracking System: 7 Must-have Features
Author: 3PL Insights
6. Power Bi Tutorial For Beginners: Learn Business Intelligence Step By Step
Author: Tech Point
7. Spark Matrix™: Data Governance Solutions
Author: Umangp
8. How Prediction Market Software Development Is Transforming Data-driven Decision Making
Author: david
9. Naming Development & Management
Author: brainbell10
10. Mysql Database Development & Management Services
Author: brainbell10
11. Mongodb Development & Management
Author: brainbell10
12. Spark Matrix™: Conversational Automation
Author: Umangp
13. How Care Home Software Helps Improve Daily Operations In Care Homes
Author: Centrim Life UK
14. Pc & Tech Stores: Latest Trends In Hardware And Accessories
Author: Jack Williams
15. The Infozed Blueprint: Powering The Modern Workspace
Author: suma






