Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Russian Cybercrime Gangs Flourish with 1,000 New Employees

23/11/2015 by

W1siziisijiwmtuvmtevmjmvmtyvndcvmjcvntevq3lizxjjcmltzsbtyxnrlmpwzwcixsxbinailcj0ahvtyiisijywmhg0mdbcdtawm2uixv0

Russian-language cybercrime gangs have recruited up to 1,000 new ‘employees’ over the past three years, although there are only around 20 people who make up the core of the average group, according to Kaspersky Lab.

The security vendor’s chief investigator, Ruslan Stoyanov, used a new report, Russian financial cybercrime: how it works, to uncover the cyber-criminals behind global attacks.

He claimed that law enforcers around the world have arrested over 160 Russian-speaking cybercriminals since 2012 from gangs of all sizes.

In fact, they’ve been responsible for attacks that have harvested over $790 million—most of which ($509m) was stolen from outside the former USSR—although even this figure could be merely the tip of the iceberg.

The Russian-speaking cybercrime underground is flourishing, and motivated primarily by making money, the report claimed. Of the 330+ incidents investigated by Stoyanov and his team, 95% were connected with the theft of money or financial info.

Although the exact number of gangs working across the region is unknown, Kaspersky Lab revealed that they contain around 20 people on average.

It continued:

“We can calculate fairly precisely the number of people who make up the core structure of an active criminal group: the organizers, the money flow managers involved in withdrawing money from compromised accounts and the professional hackers. Across the cyber-criminal underground, there are only around 20 of these core professionals. They are regular visitors of underground forums, and Kaspersky Lab experts have collected a considerable amount of information that suggests that these 20 people play leading roles in criminal activities that involve the online theft of money and information.”

After uncovering five such groups in 2012-13, Kaspersky Lab has been able to understand more about their operation and structure.

This article has been extracted from http://www.infosecurity-magazine.com, please click on this link to read the article in full http://www.infosecurity-magazine.com/news/russian-cyber-gangs-flourish-1000/

Montash is a multi-award winning global technology recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP Recruitment, BI & Data Recruitment, Information Security Recruitment, Enterprise Architecture & Strategy Recruitment, Energy Technology Recruitment, Demand IT and Business Engagement Recruitment, Digital and E-commerce Recruitment, Leadership Talent, Infrastructure and Service Delivery Recruitment, Project and Programme Delivery Recruitment.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid-management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...