How to be a successful online fraudster

Ever wanted to know how easy it is to be an identity thief and earn a fortune? IT PRO reveals all…

Take advantage of an employee. Often this is the easiest way to get hold of information which could be left open due to negligence or even rogue ones who are willing to sell information. Poorly protected back-end servers? You can probably find many other ways to find data.

Three - Malware and trojans

Trojan technology

This is for the harvester fraudsters out there those who want to get their hands dirty with the tech and steal personal information direct from the consumer.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Trojans are invisible, and you can get these on anybody's computer without them being aware of it. They'll collect information everything that you do online, and deliver it to the trojan operator.

One of the more common ways to get a trojan on a computer at present is a blend of phishing and trojan attack. Users will often receive an email which takes you to a fake website which is playing a video which freezes.

It will then ask you to run an application which will enable you to run the video. Once you click on the application hey presto! You've got a trojan on somebody's machine. In some cases you won't have to get the user to click on the application prompt they'll be automatically infected.

Crimeware

Cash-out fraudsters will be interested in buying a ready-made trojan because instead of fiddling around with the technology, all you need is to purchase one, leave it running, and collect data at your leisure.

The price of malware and trojans is dropping. A good example is Zeus, a dangerous and effective trojan which has the ability to do many nasty things and is available for about $700 to $1000.

Advertisement - Article continues below

There are infection kits, building your own botnet kits, as well as beginner' trojans which you can practice with for less money.

If you are going to go for the technical route then you will have to deal with several factors you'll need to find hosting servers, install the botnet on machines, install SQL databases, encryption packages as well as other components.

You'll also have to deal with anti-virus companies sending out signatures against your trojans which means additional builds and upgrades. You'll need to make new patches as well. You'll also need knowledge of how to do the actual infection of all the computers.

Featured Resources

Transform the operator experience with enhanced automation & analytics

Bring networking into the digital era

Download now

Artificially intelligent data centres

How the C-Suite is embracing continuous change to drive value

Download now

Deliver secure automated multicloud for containers with Red Hat and Juniper

Learn how to get started with the multicloud enabler from Red Hat and Juniper

Download now

Get the best out of your workforce

7 steps to unleashing their true potential with robotic process automation

Download now
Advertisement

Most Popular

Visit/operating-systems/microsoft-windows/354297/this-exploit-could-give-users-free-windows-7-updates
Microsoft Windows

This exploit could give users free Windows 7 updates beyond 2020

9 Dec 2019
Visit/security/vulnerability/354309/patch-issued-for-critical-windows-bug
vulnerability

Patch issued for critical Windows bug

11 Dec 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/data-insights/big-data/354311/google-reveals-uks-most-searched-for-terms-in-2019
big data

Google reveals UK’s most searched for terms in 2019

11 Dec 2019