123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Chasing Fraudsters To Disrupt Fraudulent Threats

Profile Picture
By Author: eccouncil
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The criminal underground's black market is a place filled with much criminal activities and also trade. All fraudsters around the world gather just to trade stolen informations – informations like personal information, credentials for online banking and credit card infos. What these frauds do can be considered as organized crime, but still it is not comparable to mafias and such. Yes, these fraudsters have administrators in their forums, but they are not crime boss which every members of the fraud community has to follow.

Underground forums is organized like regular forums are; laws are placed to be followed by buyers and as well as sellers; there are also services that are designed to resolve disputes and secure all parties involved. There are different statuses that can be obtained in the forum; although there is hierarchy in the group, all the members are treated as equal as long as they are not rippers. Indeed, they may be equal in rank, but they are not equals when you consider the levels of sophistication. It is the same in the community of hackers, the population of those individuals are lesser as the levels ...
... of sophistication increases.

Most hackers are script users who only use the scripts that are invented by elite hackers; fraudsters are the same. Imagine a pyramid divided into three major levels, where the top is the elite fraudsters and hackers using cutting edge fraudulent methods; they can produce their very own malware, can find ways to circumvent security systems of EMVs. The least sophisticated fraudsters scavenge the internet to rip off a few dimes and nickels to different individuals. Each fraudulent activity can also have a part in the pyramidal hierarchy; each activity is arranged accordingly – the more sophisticated they are the higher they are in the pyramid and the lesser the number who can accomplish it.

Let us consider Trojan scripts, phishing and botnet methods. Trojan methods are more sophisticated than phishing attacks, thus the number of individuals who can launch Trojan attacks are fewer in comparison to the number of individuals who can launch phishing attacks. While using botnets to distribute malwares is not as sophisticated as the other two and can be used by many regular fraudsters. However, people who are already breached can find a way to strengthen their security system and that is to hire people to man their system who have already passed a computer forensics training or a computer forensic course.

We can say that these levels of sophistication can be beneficial to the underground economy. It is because fraudsters who are experts in specific fields rather than the whole process can help those less sophisticated individuals; they create markets where their commodities and the services they have can be shared. For example, less sophisticated fraudsters and hackers can have the information or tools they want from the elites for a certain price or for free. However, the bad thing about this is that even the smaller fish in the fraudulent community can conduct sophisticated attacks that would be troubling to many companies and individuals.

Opportunities for anti-fraud professionals are also open because they can use the current model or structure of the underground community to disrupt or reduce the activities of fraudster – even if it is temporary. For example, if there is a proliferation of MITB scripts in the underground community, they can device a temporary solution like adding SpyEye or Zeus to thwart fraudulent transactions by the MITB.

When issuing a fraudulent transaction automatically, Man-in-the-browser modules for Zeus and SpyEye are programmed to auto-fill a transaction form based on the name or location of each field in the form. A simple addition to a bank's website, one that would generate random field names as well as place hidden fields in a random order, could thwart the Trojan's ability to make fraudulent transactions. However, this solution would work against unsophisticated fraudsters; the elites could find ways to bypass this security measure.

Even if it is just temporary, it could still help prevent fraud attacks from less sophisticated fraudsters, thus reducing loss from Trojans. Once the newest version of security is released, everything will be back from the start. The developers of these Trojans would then focus their attention into their existing malware – making it much better than making new fraudulent methods. Temporary disruptions in the system will make many kits for phishing unusable, thus the fraudsters would have to target others instead of the intended target.

Security professionals of banks would consider one question first; the number of sophisticated and unsophisticated fraudsters who are targeting the bank because the answer to this question would help in how the banks could build their defenses and thwart the vile plots of fraudsters. Another good way to build up defenses is to hire someone who is good in digital computer forensics.


The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in cybersecurity and e-commerce. It is the owner and developer of 20 security certifications. EC-Council has trained over 90,000 security professionals and certified more than 40,000 members. These certifications are recognized worldwide and have received endorsements from various government agencies. They also offer trainings in computer forensics.

More information about EC-Council is available at More information about EC-Council is available at www.eccouncil.org..

Total Views: 212Word Count: 882See All articles From Author

Add Comment

Computers Articles

1. Exploring How Ai In The Cloud Can Transform Your Business
Author: TechDogs

2. The Power Of Cloud And Ai: A New Era Of Collaboration
Author: TechDogs

3. Get Business Insights Using Expedia & Booking. Com Review Data Scraping
Author: DataZivot

4. Top 10 Reasons A Strong Communication Strategy Drives Prm Program Success
Author: Archi

5. Achieve Scalable Web Scraping With Aws Lambda
Author: Devil Brown

6. Overcoming Common Challenges In Iso 27001 Implementation
Author: Jenna Miller

7. Basic Computer Course: Your Gateway To Skill Development | The Institute Of Professional Accountants
Author: Tipa Institute

8. Top 7 Advantages Of React Js
Author: Bella Stone

9. Top 7 App Marketing Tools For Mobile Success
Author: Bella Stone

10. Revolutionizing Education Management With Samphire It Solution Pvt Ltd’s Erp Software
Author: CONTENT EDITOR FOR SAMPHIRE IT SOLUTIONS PVT LTD

11. Top 10 Healthcare Technology Trends
Author: goodcoders

12. "building Tomorrow’s Factories: The Role Of Automation & Robotics In Modern Manufacturing"
Author: andrew smith

13. The Ultimate Guide To The Best Ecommerce Plugin For Wordpress
Author: Rocket Press

14. Xsosys Erp: A Scalable Solution For Businesses In Any Industry
Author: Xsosys Technology(S) Pte. Ltd.

15. Rental Management Software: A Complete Solution For Car, Property, And Coworking Space
Author: RentAAA

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: