Select Page

Serious money is flowing into the internet underworld

The palette ranges from “home browsers” to millions of data misuses to everyday data theft and phishing attacks by IT thieves.

computer hacker According to Trend Micro, all data obtained ultimately goes to the party who offers the most for it through illegal trade. This is when illegal use of data can begin, from identity theft to credit card fraud to attacks on other users ’systems. Using the data, they sometimes make high-value purchases (which are shipped to cybercriminals) or pay for it with a “bulletproof” web host on which they prefer to install malicious websites. Their occasional value may not be as high, but the loss to users is very significant.

Not only are the proceeds of cybercrime sold in black, but the tools needed to do so, such as vulnerabilities and exploits that exploit vulnerabilities in systems, are also sold in this way. These, especially the more special and advanced devices, fall into the category of hundreds of thousands of forints.

So much money has gone into the internet underworld that it has become organized and methodical like a real company. Although the organizational form of the black market varies from region to region, the fact of organization is a novelty in itself, because on the one hand more data and tools can be marketed and on the other hand the chance of failure can be reduced.

About the Author