article thumbnail

Career Choice Tip: Cybercrime is Mostly Boring

Krebs on Security

The findings come in a new paper released by researchers at Cambridge University’s Cybercrime Centre , which examined the quality and types of work needed to build, maintain and defend illicit enterprises that make up a large portion of the cybercrime-as-a-service market.

article thumbnail

Orcus RAT Author Charged in Malware Scheme

Krebs on Security

In July 2016, KrebsOnSecurity published a story identifying a Toronto man as the author of the Orcus RAT , a software product that’s been marketed on underground forums and used in countless malware attacks since its creation in 2015. This week, Canadian authorities criminally charged him with orchestrating an international malware scheme.

Malware 203
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

API Security for the Modern Enterprise

IT Security Guru

An attacker could use an internal API to launch DDoS attacks against companies by sending large volumes of traffic over a short period. Tools like two-factor authentication, rate limiting, and DDoS protection can go a long way in securing APIs. Internal APIs or Private APIs are not Immune. API Security Tools.

DDOS 114
article thumbnail

How Did Authorities Identify the Alleged Lockbit Boss?

Krebs on Security

2011 said he was a system administrator and C++ coder. “Installing SpyEYE, ZeuS, any DDoS and spam admin panels,” NeroWolfe wrote. “Cryptolockers made a lot of noise in the press, but lazy system administrators don’t make backups after that. “P.S. .

article thumbnail

Canadian Police Raid ‘Orcus RAT’ Author

Krebs on Security

Canadian police last week raided the residence of a Toronto software developer behind “ Orcus RAT ,” a product that’s been marketed on underground forums and used in countless malware attacks since its creation in 2015. Tips from international private cyber security firms triggered the investigation.”. 2017 analysis of the RAT.

article thumbnail

Who and What is Behind the Malware Proxy Service SocksEscort?

Krebs on Security

And a great many of these “proxy” networks are marketed primarily to cybercriminals seeking to anonymize their traffic by routing it through an infected PC, router or mobile device. md , and that they were a systems administrator for sscompany[.]net. co and a VPN provider called HideIPVPN[.]com.

Malware 211
article thumbnail

Russian-speaking cybercrime evolution: What changed from 2016 to 2021

SecureList

We overview what kind of attacks are now carried out by cybercriminals and what influenced this change — including such factors as changes in vulnerability market and browser safety. A whole market was built around that process — with dedicated staff to make it roll. Vulnerabilities market got a remake.