According to the researchers, when these certificates are sold on the darknet, they are packaged with a wide range of crimeware
that delivers machine identities to cybercriminals who use them to spoof websites, eavesdrop on encrypted traffic, perform attacks and steal sensitive data, among other activities.
And vulnerabilities such as Crimeware
, which is malware devised for financial loss, can also be present on the device and target customer account information for future fraud attempts.
Classifications include: crimeware
, DoS, error, lost/stolen asset, POS, skimmer, unsecured database, web apps, other, and unknown.
Major primary product categories are, malware: 27 per cent, fake documents 27 per cent, Stolen data 20 per cent, crimeware
13 per cent, weapons 10 per cent, and narcotics 3 per cent, said the whitepaper titled "Digital Souks: A Glimpse into the Middle Eastern and North African Underground," an in-depth analysis of the cybercriminal activities within the region.
The dark world of the Internet is much bigger than the visible world that we see in our day-to-day lives with crimeware
and hacking tools sold for as low as $1 to $50 in the Middle East and North Africa region, says a new report.
Major primary product categories are, malware: 27%, fake documents 27%, Stolen data 20%, crimeware
13%, weapons 10%, and narcotics 3%.
The latest Verizon Data Breach Investigations Report (DBIR) states that it is the most common type of crimeware
, as holding files for ransom is fast, low risk, and easily monetizable, especially with Bitcoin to collect anonymous payment.1 Attacks targeting businesses have grown by 300 percent since January 2016, and an attack happens every 40 seconds.2 The latest global ransomware attack, called WannaCry, has affected more than 200,000 victims in 150 countries since May 12th.
As a result, it's possible to tell how much the criminals at the helm of this crimeware
spree have made and how many victims have paid the ransom.
- malware incidents, typically opportunistic and financially motivated in nature (e.g., banking Trojans, ransomware).
Boukhtouta et al., "On the analysis of the Zeus botnet crimeware
toolkit," in Proceedings of the 2010 8th International Conference on Privacy, Security and Trust, PST 2010, pp.
Given the rise of crimeware
and crime-as-a-service (CaaS) cloud offerings that provide less tech-savvy cybercriminals with readymade malware and other hacking tools (with some including money-back guarantees and 24/7 chat support), Shipley said, "We're seeing a massive growth in cybercriminal entrepreneurism.