Criminal Intent

Criminal Intent

7 ways criminals are making money from cyber crime

As more of our lives move online, crime has unfortunately migrated to the internet at matching pace taking form in what’s now considered cybercrime. Cybercrime can take a vast number of forms, ranging from the illegal sale of goods and services to masquerading as another person to steal money from financial institutions.

Data breach. One of the most common online threats is a data breach. Data breaches can take many forms, but at its core, a data breach occurs when a criminal illegally accesses important— and often confidential—information from a company’s database. These attacks are distressingly common as in 2014 there were 783 data breaches in the United States alone. Some data breaches involve the collection of customer’s credit card data, while others involve proprietary information specific to the company itself. Often these attacks lead to the criminals threatening to release the affected companies’ data unless they are paid off.

Selling illegal goods. Beyond the threat of data breaches, cybercriminals also participate in the thriving online ecosystem of buying and selling a products and services, most of which have been deemed illegal in countries around the world. One of the most well-known hubs of this form of cyber activity was Silk Road whose users purchased more than 213 million dollars in goods before the site was shut down by the police. The vast majority of the site’s offerings were illegal drugs and at the time the website was shut down, there were more than 10,000 items listed, around 7,000 of which were illegal drugs like cannabis, MDMA and heroin.

Bitcoin and the dark Web. Silk Road operated primarily by use of an online currency called Bitcoin, which allows both the purchaser and the seller to remain completely anonymous. Through Bitcoin, the users of Silk Road were able to carry on their business over the course of several years. Eventually, however, federal agents were able to track down the founder of Silk Road, who has since been sentenced to life in prison without parole for his role in operating the website. While Silk Road itself has been shut down, a variety of sites have developed to take its place.

The lengths to which these agents had to go were compounded by one key element in the cybercrime economy: the dark web. Criminals rarely list their ill-gotten goods and services where they will be easy for the police to find. Rather, they hide them away in unlisted websites infamously called the dark web. Sites located on the dark web are protected by superlative degrees of encryption, as well as various browsing technologies that we will not dwell on here. The crucial element is that if one does not know what to look for and how to look for it, these websites are a totally hidden part of the Internet.

Tax fraud. Taxes are a pain for everyone, but cybercriminals have found a way to make profit from them. Using stolen social security numbers, cybercriminals file fraudulent tax returns in order to claim refunds in the names of their victims. The harm in this is not limited to the criminals’ fraudulent gains, as money can spill over to the victim whose identity they used. Through some websites, criminals may be able to purchase social security numbers and other personal information for as little as $250.

Commonly, the first indication a victim whose tax returns have been filed by a cybercriminal will come when the IRS rejects their initial tax return. Unfortunately, this may only be the beginning of the victim’s trouble, as once an individual’s identity has been stolen, that information will frequently be sold and traded around the internet as widely as the cybercriminal can.

Identity theft. Due to wide variety of cybercrimes associated with personal information, identity theft is a particularly common element of cybercrime. In 2015, 13.1 million Americans were victims of identity theft, ranging from illegitimate transactions made under the victims’ name to criminals opening new credit cards using their victim’s information to even combining personal information from several victims to create a new identity. Many attacks happen as a result of the victim not properly securing their personal data, particularly their passwords. This common error in security can lead to criminal activity that avoids any need to steal another person’s identity.

Instead, a criminal will acquire their victim’s login information to one service, such as a streaming service like Netflix. Once this information is acquired, it is a simple matter of selling it in the dark web, often for less than $10. The criminal will then see what other services they can access with that information, selling the data as a collection. Password re-use makes this much easier for criminals to gain access to a variety of services, all of which can be sold to the prospective buyer in a bundle. For example, if a victim used the same password for their email address and their login to a streaming service, it would be possible for a criminal to gain access to the email account tied to the account.

Counterfeit. Counterfeit money is another rising problem online, with counterfeiters taking advantage of the anonymity of the internet to distribute their forged currency. Recent reports show that this problem is particularly prevalent in Germany and other European Union countries, with fake bills, particularly fifty-euro bills making up roughly half of the counterfeited bills recovered by authorities. Criminals are not limiting their sales to the finished product; however, materials for new counterfeiters to produce their own fake bills and coins are also rapidly becoming widely available.

There were 86,500 cases involving counterfeit money were reported in 2015, more than double the frequency in 2011. Counterfeit bills are so common and profitable for criminals that for 600 dollars, a criminal can acquire $2,500 in U.S. dollars that are guaranteed to pass common pen and ultraviolet light tests. As counterfeiters continue to push the limits of their printing technology, the deep web will surely advance in step, and the market will only grow.

Medical information. Cyber criminals are not limiting their fraud to counterfeiting; doctor’s offices, pharmacies and the entire medical system are at risk for cybercrime. For example, in June, a hacker was attempting to sell more than 600,000 patient healthcare records harvested from three healthcare providers around the United States. These records present a wide sweep of dangers to the victims and to society at large.

Not only would the purchaser of these records be able to use this information for any number of fraudulent purposes, but there is a real possibility of using the information in these records to purchase prescription drugs. Beyond trafficking illegally acquired drugs, criminals would be able to submit false claims to Medicare, placing an additional burden on a system designed to help people when they need it most. Health care companies are fighting these threats as best as they are able, but the one constant in cyber-crime is a constantly changing variety of threats.

These varieties of crime are by no means the total extent of criminal activity online. Rather, they offer an introduction to understanding some of the ways that a criminal can take advantage of our online economy. Unfortunately, there is no way to protect oneself entirely from these threats, but a careful use of the internet will go a long way to keeping you safe from the threat of cybercrime.

This article originally appeared in the November 2017 issue of Security Today.

Featured

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.