Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.

Now Hiring: The 8 Best Jobs in Cybercrime

8.464 visualizaciones

Publicado el

Organized cybercrime operates like a traditional business, focused on maximizing profits and minimizing risk. And just like a business, cybercriminal leaders seek out experts to work in the various parts of their operation, outsourcing jobs and employing full-time professionals who serve in different roles.
Here is a look at eight of these roles, each integral to the success of these cybercrime gangs.
For more insights into the organizational structure of some of the most proficient criminal groups on the internet, read the Secureworks 2017 State of Cybercrime Executive Summary. More details: http://dell.to/2p9T6L3

  • Just got my check for $500, Sometimes people don't believe me when I tell them about how much you can make taking paid surveys online... So I took a video of myself actually getting paid $500 for paid surveys to finally set the record straight. I'm not going to leave this video up for long, so check it out now before I take it down! ➤➤ http://ishbv.com/surveys6/pdf
       Responder 
    ¿Estás seguro?    No
    Tu mensaje aparecerá aquí
  • Like to know how to take easy surveys and get huge checks - then you need to visit us now! Having so many paid surveys available to you all the time let you live the kind of life you want. learn more...◆◆◆ https://tinyurl.com/make2793amonth
       Responder 
    ¿Estás seguro?    No
    Tu mensaje aparecerá aquí

Now Hiring: The 8 Best Jobs in Cybercrime

  1. 1. NOW HIRING: The 8 Best Jobs in Cybercrime
  2. 2. Organized cybercrime operates like a traditional business, focused on maximizing profits and minimizing risk. And just like a business, cybercriminal leaders seek out experts to work in the various parts of their operation, outsourcing jobs and employing full-time professionals who serve in different roles. Here is a look at eight of these roles, each integral to the success of these cybercrime gangs.
  3. 3. 1MONEY MULE WORK FROM HOME! Hackers don’t simply transfer money directly to their bank accounts. Instead, they hire money mules to move the money around a few times, making the electronic trail harder to follow. These unwitting individuals – often answering a “work from home” ad – receive stolen monies or goods and then transfer them out of the country and ultimately into the hands of the criminal, often via a local or “nearside” mule who is trusted by the criminal.
  4. 4. 2MALWARE AUTHOR Malware authors/writers code malicious software that will be used to infect the computers of unwitting victims and steal their credit card data, personally identifiable information, and banking credentials… and eventually their money.
  5. 5. 3INJECT WRITER Inject writers code “injects” – the specific pieces of individual code that will be loaded into banking malware in order to mimic and interact with a bank’s website, as victims log in and carry out their online banking. These injects are the most important part of banking malware, as a well- written inject can alter payment instructions, use social engineering tricks to circumvent two-factor authentication and mask unauthorized transactions from online statements. Victims will be left almost helpless to detect or stop the theft themselves without calling their bank or relying on paper statements.
  6. 6. 4EXPLOIT KIT LOAD VENDOR GET PAID $ PER VICTIM: Exploit kit load vendors use their collection of often legitimate websites that have been hacked to include malicious attack tools called “exploit kits.” They attempt to force the victim’s web browser to download and install the malware that the cybercriminal pays them to distribute. Cybercriminals will pay exploit kit load vendors per number of victims that their malware is installed on using the exploit kits.
  7. 7. 5NETWORK & SYSTEM ADMINS Network and system administrators support the cybercrime organization’s botnet-related revenue streams – such as DDoS, spam distribution, and malware deployment – by “bot herding,” or gaining control over a large number of distributed computing resources. They maintain command-and-control and other infrastructure for ransomware campaigns, banking trojans and exploit kits.
  8. 8. 6DATA PROCESSING SPECIALISTS Data processing specialists triage large amounts of data that the cybercrime organization collects, including information on compromised devices, stolen bank details and other personal information. They are also instrumental in identifying the value in this data and producing the output in a sellable format.
  9. 9. 7NETWORK EXPLOITATION SPECIALISTS Network exploitation specialists are responsible for deploying and using tools to maintain undetected access within a victim’s network over a long period of time. This may require innovative problem solving, and the development of new tools and solutions to achieve the objective.
  10. 10. 8CYBERCRIMINAL RECRUITERS Some cybercriminal role recruitment takes place on the Internet underground, with a significant proportion of forum posts advertising for people with certain skillsets or connections. However, organized cybercriminal groups often avoid advertising or accepting positions on underground forums. Once a certain level of sophistication and experience is reached, threat actors are more likely to work with people they already know and trust.

×