Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

A Look Inside Cybercriminal Mule Networks

wiredmikey (1824622) writes | more than 3 years ago

Security 0

wiredmikey (1824622) writes "An interesting piece on about money mule recruitment and herding tactics, and how mules play such a critical part in cybercrime operations.

Mules have been considered to be the “bottleneck” of fraud. While fraudsters have the capabilities of stealing millions of credentials, eventually they can cash out only as many mules as they have access to. Fraudsters are aware of it just as much as security professionals and they invest their efforts, resources, time and ingenuity to open this bottleneck as much as they can.

Because of it, we can expect new scams and innovations coming from fraudsters not only in the realm of obtaining credentials or new ways to cash them out, but also in establishing the infrastructure that allows them to do just that."

Link to Original Source

cancel ×

0 comments

Sorry! There are no comments related to the filter you selected.

Check for New Comments
Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>