Criminal sellers are peddling ready-to-use ATM malware in underground markets for hacking into banks. In this report, we discuss how criminals advertise and even provide instructions on how to pull off a digital heist.
Understanding current and future threats to the internet of things (IoT) can help shape how we secure this technology that is increasingly becoming integral to today's world. What insights can be reaped from the cybercrime underground?
While considered new and relatively smaller than its foreign counterparts, the German underground is a fully developed, well-managed haven that gives cybercriminals just about everything they need to start their own cybercrime business
Details of the different regional underground scenes we visited in 2015. Find out why we say the cybercriminal underground is not a huge global conglomerate, but rather a wide-ranging cluster of specialized “branches” that cater to specific needs.
In 2012, we predicted that we would soon see an African underground market take root. Our recent joint research effort with the INTERPOL on the West African threat landscape may just be even greater proof of that.
We take a closer look at an emerging underground market that is driven by malicious actors who sell access to a gargantuan amount of stolen data, frequently advertised in the underground as “cloud of logs."