The Inner Workings of Financially Motivated Cybercrime

Automatic TRANSCRIPT

Roman wireless start with you The report is called the business of fraud and overview of how cybercrime gets monetize. What prompted the creation of the report here and so the question. So one of the things that we've noticed is that In profession there's a lot of focus on preventing things like unauthorized access. Am justifiably so obviously. We don't want a bad guys and threat actors being able to get into places where they don't but what we've noticed is that there isn't as much of a focus or isn't as a thorough understanding of what frequently happens after The fact the where the cybercriminals have gained access to something so for example be a credit card information b be other types of information. How do they then monetize that isis. The cybercrime is called crime for reason. And that's because they're trying to gain Something financially from all of their hard work or the threat actors hard work so we decided to put together this report really detailing the various aspects Of the kind of what. I like to call the second half of the cycle After they've gained access to your credit card data your bank account data that kind of data. What are the new next. How do they actually make money From something like that curiel. Can you give us a little bit of a notion of where we stand today in terms of the the lay of the land the the kind of breadth and spectrum of what you all see when it comes to cybercrime so what we see. Is that cyber criminal. Fraud is is an ecosystem and it's pretty specialized we see that they're specialized vendors of different services. We see that they're a threat. Actors that advertise very specific tools that are tailored for different methods of fraud. We see that That it all comes says different different methods and they're different different targets for fraudsters on criminal underground as we as we see and and they're cash-out schemes.

Coming up next