Malicious code injected into the site by a 
cybercriminal collects any information entered into the form, including card details, email addresses and names.
Summary: Underground 
cybercriminal gangs have their sights set on the clouds
However, while e-commerce enjoys rapid growth, global attack trends indicate that the retail support sector continues to be a popular target for 
cybercriminals, according to Booz Allen Hamilton For example, the 
cybercriminal operation 'MageCart' targets online retailers by creating websites that mimic their victims' websites and inserts malicious code to capture card data.
Alan Turnbull Talon Business Solutions Ltd Thomson House 8 Minerva Way Glasgow G3 8AU Tel: 0141 248 5750 www.talonsys.co.uk Think Like a 
Cybercriminal CYBERCRIMINALS are a diverse lot, yet you can spot some patterns and motives across the group.
By implementing MFA through requiring a username and password in addition to an additional login code sent to your smartphone, a 
cybercriminal would not only have to compromise your username and password, but also would need possession of your smartphone to receive the additional login code sent to the device.
These banks are gaining more and more momentum and this, of course, has attracted 
cybercriminal attention.
Rechtman rightly infers that an organization that is risk-aware and assumes a posture of security is the best defense against today's (and tomorrow's) 
cybercriminal; I couldn't agree more.
Trend Micro Incorporated has unveiled its North American 
cybercriminal underground report, North American Underground: The Glass Tank, as part of its ongoing Deep Web/Cybercriminal Underground Economy Series (CUES) Program.
Other main trends in 
cybercriminal activity in 2015:
With Bitcoins in hand, a criminal can buy their way into being an incredibly effective 
cybercriminal, so we can expect to see cybercrime exponentially expand as both the supply and demand side of the markets are booming.
In addition, it turned out the Russian-speaking 
cybercriminal community is now using a standard package consisting of two Trojans and the botnet controlled by them.