Categories: News

Cybercriminals – Who They Are and What They Do

[ad_1]

Cybercriminals are clever, organized in gangs, well-funded, and very tech savvy. The goal of these criminals is can be explained in two words: make money. They have hundreds of clever ways to accomplish their goal. They may capture sensitive data such as user names and passwords, credit card numbers, or e-mail addresses. They then either sell this information over the Internet in bulk to other cybercriminals or use the data themselves to make money.

Their crimes fall into two general types that often work together.

The first type of Internet crime is called social engineering. It is often an attempt to convince a user to open an email attachment or click on a link in an e-mail. These links may lead to a forged website where the user is asked to provide their username and password. This practice is called ‘phishing.’ Another example of social engineering is the scam that tries to convince a victim to send money.

The second type of crime takes advantage of software vulnerabilities to install malware. The e-mail links in the example above may lead to a malicious website that installs malware.

A few examples:

– Suppose cybercriminals break into a number of existing social media accounts – Facebook, MySpace, etc. and capture the usernames and passwords of those accounts. Access to those accounts allows them to capture the names and details of friends of those accounts. One way to monetize that information directly is to pose as the account holder and e-mail their friends with an imaginary emergency and ask those friends to wire money to a specific address or account immediately.

– Suppose they are able to download malware into your computer. This malware captures usernames and passwords of bank accounts, along with e-mail addresses from your address book. They the cybercriminals proceed to empty your bank accounts and send spam to everyone in your address book in your name attempting to infect them with the same malware.

– Maybe they are able to download malware that opens a backdoor to your computer. More malware is then downloaded to take control your computer remotely. Without your knowledge it has then become a ‘bot’ or ‘zombie,’ one of thousands, or even hundreds of thousands of computers in a network known as a ‘botnet.’ Hundreds of botnets are known to exist. These botnets may be used by cybercriminals either to send out billions of spam messages per day or rented out to attack other websites, or even other countries.

The fact is that these methods of Internet crime work. According to the Anti-Phishing Working Group, good credible estimates of the direct financial losses due to “phishing” alone exceed $1 billion dollars per year. And that is just one small slice of the Internet crime pie.

How many botnets exist? It is hard to tell. Several dozen large botnets are known to exist according to many experts. The number of smaller botnets is more difficult to determine. A 2009 post on SecureList.com estimates that at least 3600 botnets exist.

[ad_2]

Source: http://ezinearticles.com/?Cybercriminals—Who-They-Are-and-What-They-Do&id=4379613

techfeatured

Recent Posts

Why Document Shredding is Essential for Businesses

Key Takeaways Understand the importance of document shredding for data protection. Explore cost-effective and compliant…

2 weeks ago

Innovative Strategies for Basement Waterproofing Success

Key Takeaways Basement waterproofing involves multiple strategies for long-term success. Proper drainage and sealing are…

2 weeks ago

Revolutionizing Food Display Solutions: Innovative Approaches for the Modern Era

Table of Contents Understanding the Basics of Food Display Latest Trends in Food Display Solutions…

2 weeks ago

How Technology is Reshaping Healthcare: A Journey Towards Better Patient Care

Key Takeaways Technology is rapidly transforming the healthcare industry. Benefits include improved patient outcomes, increased…

3 weeks ago

Innovative Strategies for Efficient Log Book Management in Trucking

Key Takeaways Understand the importance of efficient log book management for truck drivers. Explore the…

1 month ago

Best Crypto to Buy Now: Cryptocurrencies with the Most Potential in 2025

2025 is shaping up to be a monumental year for the cryptocurrency market. With Bitcoin…

1 month ago