What Passwords Do Fraudsters Use? Five years ago, Avast published a blog post that analyzed a database of 2,000 passwords used by hackers. It found that hackers use very easy to crack passwords just like most people. In fact, their … Read More
Institutions financières
Aftermath of the Takedown of a Major Carding Kingpin
Aftermath of the Takedown of a Major Carding Kingpin We explained in a previous blog where stolen data goes. Last week, Brian Krebs reported that the Russians had shut down a huge card fraud ring. The FSB (Russian Federal Police) … Read More
Where Does Stolen Data Go?
Where Does Stolen Data Go? The recent indictment of 4 Chinese nationals gives us an opportunity to talk about a topic that touches all the companies that have had the personal or account information they protect stolen: Where does stolen … Read More
Trying Too Hard to Attract Buyers Can Backfire
Trying Too Hard to Attract Buyers Can Backfire Malicious actors face a difficult task in online illicit markets. How can they convince others that they are offering a high quality service (ex. selling stolen credit card numbers) without exposing themselves … Read More
46M Cracked Passwords – Are People Getting Better at Securing Their Accounts?
46M Cracked Passwords – Are People Getting Better at Securing Their Accounts? A little over a year ago, malicious actors hacked the MyFitnessPal service. With 143 million users, this was one of the largest hack of credentials ever reported. Now, … Read More
The Changing Costs of Cybercrime
The Changing Costs of Cybercrime The Workshop on the Economics of Information Security generates year after year some of the best research on information security. This year is no different with the publication of a new paper on the costs … Read More
Extracting Intelligence From Criminal Complaints
Extracting Intelligence From Criminal Complaints On May 3rd, law enforcement agencies announced that they had seized the servers that hosted the Wall Street darknet illicit market. They also arrested the market’s administrators. A copy of criminal complaint is now published … Read More
How Relevant Are Darknet Illicit Markets?
How Relevant Are Darknet Illicit Markets? The lifespan of most darknet illicit markets is very limited. While some remain active for years, most only stay online for months. With the recent shutdown of Dreammarket and Wall Street, many people are … Read More
Clustering Banks Based on the Offenders Targeting Them
Clustering banks based on the offenders targeting them Banks are all in the business of protecting savings, loans and helping invest. As a result, banks commonly share many practices and tools. In this blog post, we demonstrate how malicious … Read More
Why do carders still live with their moms?
Why do carders still live with their moms? What do school teachers and sumo wrestlers have in common? This is just one of the many intriguing questions that Levitt and Dubner ask in the 2005 best-seller Freakonomics. The answer: they … Read More