



A Look Inside the Bustling Cybercrime Marketplace 44
wiredmikey writes "Cybercrime's underground activity, much like a Middle Eastern bazaar, is a loud and boisterous market. Buying, selling, haggling and cheating all take place in these marketplaces. Each marketplace houses other specialized-markets of illegitimate goods. There's the credit cards market, the bot rental market, another one for viruses, and one more for the credentials – to name a few. The column discusses how cybercriminals communicate, how these markets operate and how hacker transactions are being performed."
No way... (Score:1)
So these people on the internet are using forums, IRC, IMs, and Facebook to communicate? GET OUT.
Don't bother RTFA (Score:4, Insightful)
securityweek.com - yet another site with writers who don't know their subject.
Fluff Article (Score:1, Informative)
Criminals use IRC, IM, Forums and Social Networking to communicate.
The information about payment methods is vague to the point of irrelevance. Stop putting this sort of fluff on the front page to fill in space and actually put up a real article for once.
Re: (Score:1)
Re: (Score:1)
One-line summary. (Score:5, Informative)
Here, I'll summarize it for you:
"Cybercriminals" use: Underground Forums, Internet Relay Chat (IRC) channels, Instant Messaging (IM), and Social Networks. And they use Russian versions of Paypal for payments.
That's the whole of the article. In the next column, she's going to talk about what goods cybercriminals trade for money.
The IRC channel is analogous to an exclusive party where matches as well as transactions all occur within a specific IRC channel.
She could've just called it a private chatroom and skip writing the entire paragraph.
Re: (Score:3)
Re: (Score:1)
Re: (Score:3)
You forgot: "Fucking great advert splatted in the middle of the screen, on top of the text." No idea what it was for. As soon as I see one of those I close the tab.
Re: (Score:2)
why don't the popup blockers stop that crap anyway?
Re: (Score:2)
They dont stop that crap anyway because it is in the same browser window, just on a different layer.
Re: (Score:2)
Cybercriminals? (Score:1)
Re: (Score:1)
Morse Code? What kind of cyber-criminal pussy are you. Go back to your Mom's house and continue pwning your own box.
Us real cyber-criminals use semaphore - and that's for transferring the data bit-by-bit as well as just talking to eech other.
Re: (Score:1)
Semaphore? What kind of weak sauce namby-pamby bullshit is that?
Us real cyber-criminals use smoke signals, n00b.
Re: (Score:1)
Well, we only use semaphore when we need to transmit something really urgent. The rest of the time we wait for the next ice-age and carve our messages into the landscape by diverting the flow where we need it.
Besides that - real criminals don't smoke, that's just in the movies.
Re: (Score:2)
Yeah, yeah. Land formation message passing has a great bit-rate, but it is highly granular, and is subject to extreme latency. But hey, it also supports millennial delivery retry attempts.
And who is surprised? (Score:3, Informative)
Re: (Score:2)
You'd be surprised by how many lone hackers there are still, mostly dumb teenagers. They might not be dangerous to large sites independently, but they can quite effectively disrupt normal activity for smaller sites. Furthermore, many joining together can be problematic. Ever heard of Anonymous?
I know various sites and servers which have been the target of those lone hackers. They have access to a moderately-sized botnet and have absolutely nothing to fear, being small fish to the authorities. I'd much rathe
Re: (Score:2)
When was the last time you heard about any major conviction in a Russian jurisdiction?
Never. Hmm... I've also never heard of any major convictions in... well, anywhere but the US. Thus I conclude that the rest of the world is the cybercrime capitol of the world.
-1, Reinforcing regional stereotypes (Score:4, Insightful)
"Cybercrime's underground activity, much like a Middle Eastern bazaar, is a loud and boisterous market. Buying, selling, haggling and cheating all take place in these marketplaces". ...and Wall Street. But why pass up an opportunity to criticise people in the Middle East when Westerns are so darn quiet and honest?
Pity you posted that anonymously. (Score:2)
The parent post is severely under-rated. Someone please mod it up.
I mean, really, the "Middle Eastern Bazaar" analogy was quite hypocritical considering America is the PRIMARY breeding ground for this crap. China, Russia and the Middle East have a long way to go to catch up to America.
Middle Eastern? (Score:3)
Re: (Score:2)
Re:Middle Eastern? (Score:5, Funny)
Re: (Score:2)
Re: (Score:2)
Do they have towels wrapped around their heads and greet everyone with Salamalaikum?
Yes, but the towels really just hide the greasy hair and tinfoil hats. And "Salamalaikum" happens to be the password to a major cybercrime organization. Come to think of it, it has lead to many avoidable confusions... maybe we should change it...
TFA didn't address step 2: ??? (Score:2)
However (Score:1)
Re: (Score:1)
I'm glad I found this article, I didn't know it was so easy.
Woah (Score:2)
Apparently Cyber-criminals communicate like the rest of us normal people.
That was very amazing. I never realised. This article was as filled with as much insight as this post was filled with sarcasm.