Tag Archive for: cybercriminal

Inside the mind of a cybercriminal: do digital law breakers have a personality type?


Antisocial, loner, computer addicted — malicious hackers have long been labeled with these stereotypes by the public. While movies and popular culture may paint a simple, unflattering portrait of the average cybercriminal, a scientific approach to the question found a more nuanced and complex picture, with many actors exhibiting skills and traits that would be considered positive or even admirable in other contexts.

A recent study led by Marleen Weulen Kranenbarg, assistant professor of criminology at Vrije University in Amsterdam, sheds new light on the specific personal characteristics of digital offenders by comparing a sample of 261 cybercrime suspects with that of offline offenders. The study found that cyber offenders have a higher level of diligence, conscientiousness, and self-regulation but scored low on modesty, fearfulness, flexibility, and aesthetic appreciation.

Studying the specific mindsets and psychological proclivities of cybercriminals may be worth the effort in part because, as the study notes, online crime continues to steadily rise as other forms of offline crime become less and less frequent. Further, online crime differs from offline crime in important ways that may shape the behavior of both cybercriminals and their victims.

“Cyberspace is a unique context in which interactions have a different nature than in the offline world. For example, offenders and victims do not need to have physical contact in cyberspace, which may lower the threshold for committing cybercrimes,” the study notes. “Additionally, cyberspace may require specific skills or characteristics that offline crimes do not. This begs the question whether decades of consolidated knowledge about offender characteristics still apply to this comparatively novel category of offenders.”

For example, studies of criminals in the physical space show that many tend to focus on short-term rewards, have lower levels of education, exhibit poor self-regulation and have higher rates of alcohol and drug use. What little research there has been on cybercriminals tend to show that these individuals are better at self-regulating their behavior, are more diligent and less willing to experiment with drugs…

Source…

Cybercriminal Groups Now Selling Malware Kits To Amateur Hackers For Less Than $10: HP Report


Security News


Jay Fitzgerald


The amount of stolen data on the dark web is so huge that compromised system credentials are selling for under $5, the report says.

 ARTICLE TITLE HERE

Cyber-criminal organizations have become so professionally proficient that they’re now selling malware kits to amateur hackers for less than $10 and compromised system credentials for under $5, according to a new security report released Thursday.

In “The Evolution of Cybercrime,” HP Wolf Security, the new security platform arm of HP Inc., says a team of its investigators, along with researchers from Forensic Pathways, spent more than three months investigating the dark web and the cybercriminals lurking there.

The researchers said they analyzed more than 35 million cybercriminal marketplaces and forum posts to better “understand how cybercriminals operate, gain trust, and build reputation,” HP said in a press release.

[RELATED STORY: THE 10 BIGGEST DATA BREACHES OF 2022 (SO FAR)]

In general, researchers found what others have discovered as well: cybercriminal organizations are becoming increasingly more professional and business-like in the way they run their illegal operations, such as actually advertising stolen data and other ill-gotten materials on the dark web..

But HP researchers said they were surprised how professionally proficient cybercriminal organizations have become, such as setting up entire vendor platforms, or marketplaces, to sell an array of “products,” such as malware kits, sensitive stolen data, compromised system credentials and other items.

The cybercriminal world has become so competitive among sellers, with ever more stolen data and information, that some prices have fallen to bargain-basement levels, researchers say.

Researchers found that 76 percent of malware advertisements listed, and 91 percent of exploits (i.e. code that gives attackers control over systems by taking advantage of software…

Source…

Fortinet Threat Landscape Report Q2 2017 | FortiGuard | Cyber Security | Ransomware



Russian Cybercriminal Forum ‘Maza’ Breached


Breach Notification
,
Cybercrime
,
Fraud Management & Cybercrime

Flashpoint Reports That Hackers Leaked Users’ Credentials

Russian Cybercriminal Forum 'Maza' Breached
Maza cybercriminals’ data breached (Source: Flashpoint)

Maza, a Russian carding and fraud discussion forum, has been breached, and hackers have leaked users’ email addresses and forum credentials, security firm Flashpoint reports.

See Also: Case Study: Live Oak Bank Tackles Cloud Security with Orca Security

Flashpoint, which detected the breach Wednesday evening, says the exposed information includes user IDs; usernames; email addresses; passwords (hashed and obfuscated); Yahoo, MSN and Skype credentials; and other data that could help identify individuals.

A 35-page PDF leaked on the dark web also includes many users’ ICQ numbers, which can be used to connect multiple accounts to the same user across many forums and different nicknames over time, Flashpoint notes.

The hackers might be law enforcement agencies or forum members, Flashpoint says. “We have recently seen some law enforcement successes in this space, and it is possible that the recent increase in broader criminal activity in the cyber landscape gave them an opportunity to conduct this operation against Maza,” Flashpoint tells Information Security Media Group.

“Threats to Maza users are that their contact details are now exposed,” Flashpoint says. “This will enable investigators to initiate or further any investigations targeting their illicit activity and removes a layer of anonymity that these forums have traditionally afforded.”

Maza, an invitation-only…

Source…