Online Criminals Move On To Corporate Espionage
from the plain-old-phishing-doesn't-pay dept
One of these days, someone will do a fascinating study or book on the evolving nature of online crime. It's a constantly changing phenomenon that would be quite interesting to study. A few years ago, we noted that the ease with which script kiddies could jump into the phishing and online extortion market meant that margins were getting squeezed for older online organized crime groups who had focused on such practices in the past. Apparently, the big money now has moved away from standard phishing and into corporate espionage. Organized crime groups are figuring out ways to hack into company networks, suck up as much data as possible, and then sell it off to the highest bidder -- whether it's competing firms or foreign governments.Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: corporate espionage, cybercrime, espionage, organized crime, phishing
Reader Comments
Subscribe: RSS
View by: Time | Thread
technology grows, cybercrime grows
The only thing we can do is diffuse the importance of being vigilant. I work for Passpack, which is an online password manager - we try to make it so that 'the highest bidder' has nothing to bid on anymore.
Here is a quick post on how privacy is evolving:
http://tinyurl.com/43m5s7
Louise
[ link to this | view in chronology ]
The key to understanding
Any biological system that has input of energy, transformation of energy and output of energy, has the potential to be parasitized by organisms that exploit weaknesses in the system's defenses.
This is not to justify crime or to say we shouldn't fight it. Of course we should. But it behooves us to appreciate that with any new system that we devise, new ways of feeding from it will emerge.
[ link to this | view in chronology ]
Ha
[ link to this | view in chronology ]
[ link to this | view in chronology ]
The future of fighting fraud
http://news.bbc.co.uk/2/hi/technology/7729218.stm
[ link to this | view in chronology ]
Bruce Potter called this years ago
the middle of the threat spectrum is represented by more specialized and targeted attacks (spear phishing, rootkits, malware, bots etc.) by teams of skilled programmers. this is the current state of the art for information security professionals. these teams require funding and recruiting and are probably backed by a corporation, criminal organization, or nation state.
the high end of the threat spectrum is the insider: a person with varying levels of security clearance and physical access. in the industry this is largely ignored or written off as detecting and defending against these attacks are not feasible if not impossible.
[ link to this | view in chronology ]
The Weakest Link
[ link to this | view in chronology ]