2010年3月23日 星期二

FW: NEWSBANK:: FBI Lists Top 10 Posts in Cyber-Criminal Operations


-------------------------------------------
From: Paul Ferguson (RD-US)
Sent: Wednesday, March 24, 2010 4:26:09 AM
To: Newsbank
Subject: NEWSBANK:: FBI Lists Top 10 Posts in Cyber-Criminal Operations
Auto forwarded by a Rule


FBI lists Top 10 posts in cybercriminal operations

Cybercrime organizations often run like corporations, staffed by experts in specific jobs

By Patrick Thibodeau

March 23, 2010 03:24 PM ET

 

Computerworld - WASHINGTON -- Criminal hacker organizations are operating with increasing corporate-life efficiency, specialization and expertise, according to the FBI.

From a business perspective, these criminal enterprises are highly productive and staffed by dedicated people willing to operate worldwide, around the clock "without holidays, weekends or vacations," according to Steven Chabinsky, deputy assistant director in the FBI's cyber division. "As a result, when an opportunity presents itself these criminals can start planning within hours."

"The cyber underground now consist of subject matter experts that can focus all their time and energy on improving their techniques, their goods and services," Chabinsky told an audience today at the FOSE conference, a government IT trade show, held here.

During the presentation, Chabinsky presented a list of the top 10 positions in cyber crminal organizations. They are:

1. Coders/programmers, who write the exploits and malware used by the criminal enterprise. Contrary to popular belief, Chabinsky noted that coders who knowingly take part in a criminal enterprise are not protected by the First Amendment.

2. Distributors, who trade and sell stolen data and act as vouchers for the goods provided by other specialists.

3. Tech experts, who maintain the criminal enterprise's IT infrastructure, including servers, encryption technologies, databases, and the like.

4. Hackers, who search for and exploit applications, systems and network vulnerabilities.

5. Fraudsters, who create and deploy various social engineering schemes, such as phishing and spam.

6. Hosted systems providers, who offer safe hosting of illicit content servers and sites.

7. Cashiers, who control drop accounts and provide names and accounts to other criminals for a fee.

8. Money mules, who complete wire transfers between bank accounts. The money mules may use student and work visas to travel to the U.S. to open bank accounts.

9. Tellers, who are charged with transferring and laundering illicitly gained proceeds through digital currency services and different world currencies.

10. Organization Leaders, often "people persons" without technical skills. The leaders assemble the team and choose the targets.

 

 

http://www.computerworld.com/s/article/9173965/FBI_lists_Top_10_posts_in_cybercriminal_operations

 

-ferg

 

--

"Fergie", a.k.a. Paul Ferguson

 Threat Research,

 CoreTech Engineering

 Trend Micro, Inc., Cupertino, California USA

 

 

沒有留言: