Over 100 International Creepware Hackers Brought Down

Over 100 International Creepware Hackers Brought Down

Just when you thought being a creep was free, now it will cost you a mere $40 to purchase malware called Blackshades that can hijack computers remotely, turn on computer webcams, access hard drives and capture keystrokes to steal passwords, all on the incognito! More than half a million people have fallen prey to its silent snooping…until now.Over 100 International Creepware Hackers Brought Down

As computer hacker forums were plagued with news of a possible international crackdown, law enforcement officials from around the world knocked on doors. Cybercriminals were trying to warn other hackers of this major crackdown, but to no avail. The FBI and police in 17 countries brought more than 100 hackers down, seizing computers, making arrests and putting an end to a two-year operation that was so coordinated these hackers didn’t have time to destroy evidence. (This arrest even included Blackshades’ co-creator, a Swedish hacker who was arrested in Moldova.)

This so-called “creepware” has become one of the world’s most popular RATs (remote administration tools) and has grown so quickly because it is off-the-shelf, easy-to-use software that is very sophisticated, yet easy to install and very difficult to detect.

Most computer users don’t update their anti-virus software, even though cybercriminals prey on weak links to allow them access and mistakes by computer users to infect their machines with viruses. Absent-minded computer users clink on links in messages on social media sites or within emails, without even knowing what they’re clicking. Then, in a matter of seconds, malware is downloaded onto their computer.

And, what’s the most common way cybercriminals have been using Blackshades? By sending legitimate-looking emails that entice the receiver to click on the link inside the email. Simple, yet apparently, very effective.

Officials hope that this initial arrest will put a dent into stopping this global threat, but I suspect in the hacker’s forums, there’s already talk of a new and improved version.

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

Featured Cybersecurity

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3