Connect with us

Hi, what are you looking for?

HEADLINES

Organized cybercrime is ‘not your average mafia’

Cybercriminals also worked together to create fake documents so they could obtain money from banks under fraudulent identities.

Does the common stereotype for “organized crime” hold up for organizations of hackers? Research from Michigan State University is one of the first to identify common attributes of cybercrime networks, revealing how these groups function and work together to cause an estimated $445-600 billion of harm globally per year.

“It’s not the ‘Tony Soprano mob boss type’ who’s ordering cybercrime against financial institutions,” said Thomas Holt, MSU professor of criminal justice and co-author of the study. “Certainly, there are different nation states and groups engaging in cybercrime, but the ones causing the most damage are loose groups of individuals who come together to do one thing, do it really well – and even for a period of time – then disappear.”

In cases like New York City’s “Five Families,” organized crime networks have historic validity, and are documented and traceable. In the online space, however, it’s a very difficult trail to follow, Holt said.

“We found that these cybercriminals work in organizations, but those organizations differ depending on the offense,” Holt said. “They may have relationships with each other, but they’re not multi-year, multi-generation, sophisticated groups that you associate with other organized crime networks.”

Advertisement. Scroll to continue reading.

Holt explained that organized cybercrime networks are made up of hackers coming together because of functional skills that allow them to collaborate to commit the specific crime. So, if someone has specific expertise in password encryption and another can code in a specific programming language, they work together because they can be more effective – and cause greater disruption – together than alone.

“Many of these criminals connected online, at least initially, in order to communicate to find one another,” Holt said. “In some of the bigger cases that we had, there’s a core group of actors who know one another really well, who then develop an ancillary network of people who they can use for money muling or for converting the information that they obtained into actual cash.”

Holt and lead author E. R. Leukfeldt, researcher at the Netherlands Institute for the Study of Crime and Law Enforcement, reviewed 18 cases from the Netherlands in which individuals were prosecuted for cases related to phishing. Data came directly from police files and was gathered through wire and IP taps, undercover policing, observation and house searches.

Beyond accessing credit cards and banking information, Holt and Leukfeldt found that cybercriminals also worked together to create fake documents so they could obtain money from banks under fraudulent identities.

The research, published in International Journal of Offender Therapy and Comparative Criminology, also debunks common misconceptions that sophisticated organized criminal networks – such as the Russian mafia – are the ones creating cybercrime.

Advertisement. Scroll to continue reading.

Looking ahead as law enforcement around the world takes steps to crack down on these hackers, Holt hopes his findings will help guide them in the right direction.

“As things move to the dark web and use cryptocurrencies and other avenues for payment, hacker behaviors change and become harder to fully identify, it’s going to become harder to understand some of these relational networks,” Holt said. “We hope to see better relationships between law enforcement and academia, better information sharing, and sourcing so we can better understand actor behaviors.”

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

The exploit, discovered by Kaspersky’s Global Research and Analysis Team (GReAT), required no user interaction beyond clicking a malicious link and demonstrated exceptional technical...

HEADLINES

At the end of 2023, Sophos X-Ops noted a significant increase in ‘remote encryption’ attacks – where ransomware attackers breach a compromised and often...

HEADLINES

With the launch of KATA 7.0, organizations can now benefit from enhanced Network Detection and Response (NDR) capabilities with deeper network visibility, internal threats...

HEADLINES

In 2024, Globe blocked 3,096 child pornography domains or those containing child sexual abuse and exploitation materials (CSAEM), a slight increase from 3,047 domains restricted...

HEADLINES

During a recent webinar on Building Resilience Against Online Scams, hosted by fiber broadband and technology provider Converge ICT Solutions Inc., its Chief Executive...

HEADLINES

In 2024, Kaspersky restructured its Partner Program into four key partner types, recognizing the diverse profiles within its network – from traditional resellers and...

White Papers

The study tested 2,000 UK and US consumers, exposing them to a series of real and deepfake content. The results are alarming: only 0.1%...

HEADLINES

Deepfakes pose significant threats and risks, with nearly half of companies worldwide reporting incidents in 2024, according to industry reports. HONOR’s innovative solution immediately...

Advertisement