Scammers pool talent to bolster malware, profits

Powered by SC Magazine
 

Affiliate networks combine cracking talents.

Cyber criminals are setting up affiliate networks to combine talents in bypassing gateways and anti-virus, and to bolster the quality ofmalware.

Webroot security blogger Dancho Danchev told SC Magazine consolidation in cyber crime was occurring as spammers and phishers worked to form relationships to outwit whitehats.

This produced better malware, higher infection rates and fatter profits.

Complete coverage of Infosecurity Europe 2012 

“Someone sets up an affiliate network and sends spam and phishing messages to make money and gather hundreds of hosts," he said.

"They also share intelligence so the quality assurance is better.

“The managed services are offering exploits in Javascript, iFrames, Microsoft, Excel and encryption of services. You can send a file, they will encrypt it for you, scan it and test is against five or six anti-virus vendors and make it undetectable.”

Danchev said the first affiliate network was seen in 2008 and the services have improved since then as they have become more automated.

“Personally, I think cyber criminals are one step ahead of our industry and are aware of the latest technologies.”

He said there was no affiliate network for Macs as yet. Affiliate networks existed for pharmaceutical spam, manufacturing networks and software.

This article originally appeared at scmagazineuk.com

Copyright © SC Magazine, UK edition


Scammers pool talent to bolster malware, profits
 
 
 
Top Stories
Earning the right to innovate
Breaking down the barriers to innovation is a long, but rewarding process, says Bank of Queensland Group CIO, Julie Bale.
 
A call for timely reporting
[Blog post] Businesses need incentives to keep customer data secure.
 
Doubts cast on Queensland's ICT Dashboard
Opposition, former Govt CIO say it can't be trusted.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  26%
 
Application integration concerns
  3%
 
Security and compliance concerns
  29%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  5%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 858

Vote