CHAPTER 6- HOW CYBER CRIMINALS WORK

Cyber crime has become a profession and the demography of the cyber criminal is changing rapidly with the type of organized gangsters who are more traditionally associated with drug-trafficking, extortion and money laundering. The question of how to obtain credit card/bank account data can be answered by a selection of methods each involving their own relative combinations of risk, expense and skill. The probable marketplace for this transaction is a hidden IRC (Internet Relay Chat) chat room. Gaining control of a bank account is increasingly accomplished through phishing. All of the following phishing tools can be acquired very cheaply.


Coders

The cyber criminals works in the following ways:

They are the comparative veterans of the hacking community. With a few years' experience at the art and a list of established contacts, ‘coders’ produce ready-to-use tools (Trojans, mailers, custom bots) or services (such as making a binary code undetectable to AV engines) to the cyber crime labour force – the ‘kids’. Coders can make a few hundred dollars for every criminal activity they engage in.


Kids

It is called so because of their tender age, most are under 18. They buy, trade and resell the elementary building blocks of effective cyber-scams such as spam lists, PHP mailers, proxies, credit card numbers, hacked hosts, scam pages etc. ‘Kids’ will make less than $100 a month, largely because of the frequency of being ‘ripped off’ by one another.


Drops

These individuals convert the ‘virtual money’ obtained in cyber crime into real cash. Usually located in countries with lax e-crime laws (Bolivia, Indonesia and Malaysia are currently very popular), they represent ‘safe’ addresses for goods purchased with stolen financial details to be sent, or else ‘safe’ legitimate bank accounts for money to be transferred illegally, and paid out of legitimately.


Mobs

These are professionally operating criminal organization which combines all of the above covered functions. Organized crime makes particularly good use of safe ‘drops’, as well as recruiting accomplished ‘coders’ onto their payrolls.

4 views0 comments

Recent Posts

See All

CHAPTER 7 - TYPES OF CYBER HACKERS

White hat hacker: A white hat hacker is an ethical hacker who ethically oppose to the abuse of computer systems. A white hat generally focuses on securing IT systems, whereas a black hat (the opposite

CHAPTER 5 - INFORMATION ON CYBER CRIME

In the beginning of certain development era, people were well motivated to attain a good progress in existing technological activities. Since the start of civilization period, the man has been always

“Education Is The Most Powerful Weapon Which You Can Use To Change The World “

    • Blogger
    • Instagram
    • Twitter
    • YouTube
    © 2021 by www.lawtool.net Copyright™