Scammers pool talent to bolster malware, profits

Powered by SC Magazine
 

Affiliate networks combine cracking talents.

Cyber criminals are setting up affiliate networks to combine talents in bypassing gateways and anti-virus, and to bolster the quality ofmalware.

Webroot security blogger Dancho Danchev told SC Magazine consolidation in cyber crime was occurring as spammers and phishers worked to form relationships to outwit whitehats.

This produced better malware, higher infection rates and fatter profits.

Complete coverage of Infosecurity Europe 2012 

“Someone sets up an affiliate network and sends spam and phishing messages to make money and gather hundreds of hosts," he said.

"They also share intelligence so the quality assurance is better.

“The managed services are offering exploits in Javascript, iFrames, Microsoft, Excel and encryption of services. You can send a file, they will encrypt it for you, scan it and test is against five or six anti-virus vendors and make it undetectable.”

Danchev said the first affiliate network was seen in 2008 and the services have improved since then as they have become more automated.

“Personally, I think cyber criminals are one step ahead of our industry and are aware of the latest technologies.”

He said there was no affiliate network for Macs as yet. Affiliate networks existed for pharmaceutical spam, manufacturing networks and software.

This article originally appeared at scmagazineuk.com

Copyright © SC Magazine, UK edition


Scammers pool talent to bolster malware, profits
 
 
 
Top Stories
The True Cost of BYOD - 2014 survey
Twelve months on from our first study, is BYOD a better proposition?
 
Photos: Unboxing the Magnus supercomputer
Pawsey's biggest beast slots into place.
 
ANZ looks to life beyond the transaction
If digital disruptors think an online payments startup could rock the big four, they’ve missed the point of why people use banks, says Patrick Maes.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  28%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  21%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1089

Vote