Scammers pool talent to bolster malware, profits

By

Affiliate networks combine cracking talents.

Cyber criminals are setting up affiliate networks to combine talents in bypassing gateways and anti-virus, and to bolster the quality ofmalware.

Scammers pool talent to bolster malware, profits

Webroot security blogger Dancho Danchev told SC Magazine consolidation in cyber crime was occurring as spammers and phishers worked to form relationships to outwit whitehats.

This produced better malware, higher infection rates and fatter profits.

Complete coverage of Infosecurity Europe 2012 

“Someone sets up an affiliate network and sends spam and phishing messages to make money and gather hundreds of hosts," he said.

"They also share intelligence so the quality assurance is better.

“The managed services are offering exploits in Javascript, iFrames, Microsoft, Excel and encryption of services. You can send a file, they will encrypt it for you, scan it and test is against five or six anti-virus vendors and make it undetectable.”

Danchev said the first affiliate network was seen in 2008 and the services have improved since then as they have become more automated.

“Personally, I think cyber criminals are one step ahead of our industry and are aware of the latest technologies.”

He said there was no affiliate network for Macs as yet. Affiliate networks existed for pharmaceutical spam, manufacturing networks and software.

This article originally appeared at scmagazineuk.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, UK edition
Tags:

Most Read Articles

India's alarm over Chinese spying rocks CCTV makers

India's alarm over Chinese spying rocks CCTV makers

Hackers abuse modified Salesforce app to steal data, extort companies

Hackers abuse modified Salesforce app to steal data, extort companies

Victoria's Secret pulls down website amid security incident

Victoria's Secret pulls down website amid security incident

Cyber companies hope to untangle weird hacker codenames

Cyber companies hope to untangle weird hacker codenames

Log In

  |  Forgot your password?