BTC $62478.6927
ETH $3187.4947
BNB $588.0104
SOL $135.0529
stETH $3183.8091
XRP $0.5022
DOGE $0.1416
TON $5.2727
ADA $0.4507
AVAX $33.2366
wstETH $3714.2213
TRX $0.1187
WETH $3172.2353
WBTC $62463.3187
DOT $6.5815
BCH $456.2584
LINK $13.8775
MATIC $0.7040
UNI $7.6259
ICP $13.4346
LTC $82.4392
DAI $1.0006
CAKE $2.6843
FDUSD $1.0001
NEAR $6.9118
RNDR $7.8202
IMX $2.0166
ETC $27.3513
HBAR $0.1020
STX $2.3896
MNT $1.0399
FIL $5.8069
OKB $51.2698
PEPE $0.0000
VET $0.0388
TAO $411.5441
MKR $2939.2654
KAS $0.1127
ATOM $8.0121
WIF $2.6253
GRT $0.2502
FET $2.1485
AR $35.9612
USDE $0.9980
INJ $25.4584
XMR $124.2544
XLM $0.1108
BTC $62478.6927
ETH $3187.4947
BNB $588.0104
SOL $135.0529
stETH $3183.8091
XRP $0.5022
DOGE $0.1416
TON $5.2727
ADA $0.4507
AVAX $33.2366
wstETH $3714.2213
TRX $0.1187
WETH $3172.2353
WBTC $62463.3187
DOT $6.5815
BCH $456.2584
LINK $13.8775
MATIC $0.7040
UNI $7.6259
ICP $13.4346
LTC $82.4392
DAI $1.0006
CAKE $2.6843
FDUSD $1.0001
NEAR $6.9118
RNDR $7.8202
IMX $2.0166
ETC $27.3513
HBAR $0.1020
STX $2.3896
MNT $1.0399
FIL $5.8069
OKB $51.2698
PEPE $0.0000
VET $0.0388
TAO $411.5441
MKR $2939.2654
KAS $0.1127
ATOM $8.0121
WIF $2.6253
GRT $0.2502
FET $2.1485
AR $35.9612
USDE $0.9980
INJ $25.4584
XMR $124.2544
XLM $0.1108
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Live with wolves, howl like wolves: Sophos analysts told how scammers deceive each other


    On deception of each other malefactors have lost not less than $2.5 million.

    In a recent report, Sophos experts revealed how cybercriminals are defrauding each other. The data was obtained from various hacker forums and services where attackers talked about how they were deceived. According to rough estimates, cybercriminals lost at least $2.5 million on deceiving each other.

    Let's take a look at the most popular scams:

    1. Rip-and-run - most often used by scammers. It works in two directions: when the buyer pays for the goods, but does not receive it, or when the seller gives the goods, but does not receive money for it. The support service on hacker forums is powerless in this case. Usually the deceiver receives a ban, but he fails to return what he stole.
    2. Sale of databases that are in the public domain or simply outdated.
    3. Selling fake hacking tools. Attackers sell each other “tools” that actually turn out to be regular PDF/EXE files.
    4. Scams involving “referral”. One attacker invites a potential buyer to buy something from a reputable malware developer. The victim is left with nothing, and the scammers divide her money in half.
    5. Fake guarantor. In this case, the attacker pretends to be a guarantor and simply takes the funds that are intended for the seller.

    Of the less popular, but more sophisticated methods of deception, experts noted fraud with the sale of malware, which is embedded with a backdoor that allows the seller to covertly attack the buyer and steal his data. In addition, there are many fake hacker forums that charge users for registration or steal their credentials in order to sell the stolen information on real shady forums.

    Author DeepWeb
    AI may go to the dark side in the next five years
    The political motives of the new group make Israeli companies nervous

    Comments 0

    Add comment