Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Slashdot Deals: Prep for the CompTIA A+ certification exam. Save 95% on the CompTIA IT Certification Bundle ×
Security

Submission + - A Look Inside Cybercriminal Mule Networks->

wiredmikey writes: An interesting piece on about money mule recruitment and herding tactics, and how mules play such a critical part in cybercrime operations.

Mules have been considered to be the “bottleneck” of fraud. While fraudsters have the capabilities of stealing millions of credentials, eventually they can cash out only as many mules as they have access to. Fraudsters are aware of it just as much as security professionals and they invest their efforts, resources, time and ingenuity to open this bottleneck as much as they can.

Because of it, we can expect new scams and innovations coming from fraudsters not only in the realm of obtaining credentials or new ways to cash them out, but also in establishing the infrastructure that allows them to do just that.

Link to Original Source
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

A Look Inside Cybercriminal Mule Networks

Comments Filter:

Our OS who art in CPU, UNIX be thy name. Thy programs run, thy syscalls done, In kernel as it is in user!

Working...