Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.
NOW HIRING:
The 8 Best Jobs in Cybercrime
Organized cybercrime operates like a traditional business,
focused on maximizing profits and minimizing risk. And just
lik...
1MONEY MULE
WORK FROM HOME! Hackers don’t simply
transfer money directly to their bank accounts.
Instead, they hire money ...
2MALWARE AUTHOR
Malware authors/writers code malicious
software that will be used to infect the
computers of unwitting vic...
3INJECT WRITER
Inject writers code “injects” – the specific pieces
of individual code that will be loaded into banking
mal...
4EXPLOIT KIT LOAD
VENDOR
GET PAID $ PER VICTIM: Exploit kit load
vendors use their collection of often
legitimate websites...
5NETWORK &
SYSTEM ADMINS
Network and system administrators support
the cybercrime organization’s botnet-related
revenue st...
6DATA PROCESSING
SPECIALISTS
Data processing specialists triage large
amounts of data that the cybercrime
organization col...
7NETWORK
EXPLOITATION
SPECIALISTS
Network exploitation specialists are
responsible for deploying and using tools to
mainta...
8CYBERCRIMINAL
RECRUITERS
Some cybercriminal role recruitment takes
place on the Internet underground, with a
significant ...
Now Hiring: The 8 Best Jobs in Cybercrime
Prochain SlideShare
Chargement dans…5
×

Now Hiring: The 8 Best Jobs in Cybercrime

8 545 vues

Publié le

Organized cybercrime operates like a traditional business, focused on maximizing profits and minimizing risk. And just like a business, cybercriminal leaders seek out experts to work in the various parts of their operation, outsourcing jobs and employing full-time professionals who serve in different roles.
Here is a look at eight of these roles, each integral to the success of these cybercrime gangs.
For more insights into the organizational structure of some of the most proficient criminal groups on the internet, read the Secureworks 2017 State of Cybercrime Executive Summary. More details: http://dell.to/2p9T6L3

  • Just got my check for $500, Sometimes people don't believe me when I tell them about how much you can make taking paid surveys online... So I took a video of myself actually getting paid $500 for paid surveys to finally set the record straight. I'm not going to leave this video up for long, so check it out now before I take it down! ➤➤ http://ishbv.com/surveys6/pdf
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • Like to know how to take easy surveys and get huge checks - then you need to visit us now! Having so many paid surveys available to you all the time let you live the kind of life you want. learn more...◆◆◆ https://tinyurl.com/make2793amonth
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici

Now Hiring: The 8 Best Jobs in Cybercrime

  1. 1. NOW HIRING: The 8 Best Jobs in Cybercrime
  2. 2. Organized cybercrime operates like a traditional business, focused on maximizing profits and minimizing risk. And just like a business, cybercriminal leaders seek out experts to work in the various parts of their operation, outsourcing jobs and employing full-time professionals who serve in different roles. Here is a look at eight of these roles, each integral to the success of these cybercrime gangs.
  3. 3. 1MONEY MULE WORK FROM HOME! Hackers don’t simply transfer money directly to their bank accounts. Instead, they hire money mules to move the money around a few times, making the electronic trail harder to follow. These unwitting individuals – often answering a “work from home” ad – receive stolen monies or goods and then transfer them out of the country and ultimately into the hands of the criminal, often via a local or “nearside” mule who is trusted by the criminal.
  4. 4. 2MALWARE AUTHOR Malware authors/writers code malicious software that will be used to infect the computers of unwitting victims and steal their credit card data, personally identifiable information, and banking credentials… and eventually their money.
  5. 5. 3INJECT WRITER Inject writers code “injects” – the specific pieces of individual code that will be loaded into banking malware in order to mimic and interact with a bank’s website, as victims log in and carry out their online banking. These injects are the most important part of banking malware, as a well- written inject can alter payment instructions, use social engineering tricks to circumvent two-factor authentication and mask unauthorized transactions from online statements. Victims will be left almost helpless to detect or stop the theft themselves without calling their bank or relying on paper statements.
  6. 6. 4EXPLOIT KIT LOAD VENDOR GET PAID $ PER VICTIM: Exploit kit load vendors use their collection of often legitimate websites that have been hacked to include malicious attack tools called “exploit kits.” They attempt to force the victim’s web browser to download and install the malware that the cybercriminal pays them to distribute. Cybercriminals will pay exploit kit load vendors per number of victims that their malware is installed on using the exploit kits.
  7. 7. 5NETWORK & SYSTEM ADMINS Network and system administrators support the cybercrime organization’s botnet-related revenue streams – such as DDoS, spam distribution, and malware deployment – by “bot herding,” or gaining control over a large number of distributed computing resources. They maintain command-and-control and other infrastructure for ransomware campaigns, banking trojans and exploit kits.
  8. 8. 6DATA PROCESSING SPECIALISTS Data processing specialists triage large amounts of data that the cybercrime organization collects, including information on compromised devices, stolen bank details and other personal information. They are also instrumental in identifying the value in this data and producing the output in a sellable format.
  9. 9. 7NETWORK EXPLOITATION SPECIALISTS Network exploitation specialists are responsible for deploying and using tools to maintain undetected access within a victim’s network over a long period of time. This may require innovative problem solving, and the development of new tools and solutions to achieve the objective.
  10. 10. 8CYBERCRIMINAL RECRUITERS Some cybercriminal role recruitment takes place on the Internet underground, with a significant proportion of forum posts advertising for people with certain skillsets or connections. However, organized cybercriminal groups often avoid advertising or accepting positions on underground forums. Once a certain level of sophistication and experience is reached, threat actors are more likely to work with people they already know and trust.

×