Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
Security

+ - A Look Inside Cybercriminal Mule Networks->

Submitted by wiredmikey
wiredmikey (1824622) writes "An interesting piece on about money mule recruitment and herding tactics, and how mules play such a critical part in cybercrime operations.

Mules have been considered to be the “bottleneck” of fraud. While fraudsters have the capabilities of stealing millions of credentials, eventually they can cash out only as many mules as they have access to. Fraudsters are aware of it just as much as security professionals and they invest their efforts, resources, time and ingenuity to open this bottleneck as much as they can.

Because of it, we can expect new scams and innovations coming from fraudsters not only in the realm of obtaining credentials or new ways to cash them out, but also in establishing the infrastructure that allows them to do just that."

Link to Original Source
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

A Look Inside Cybercriminal Mule Networks

Comments Filter:

If a 6600 used paper tape instead of core memory, it would use up tape at about 30 miles/second. -- Grishman, Assembly Language Programming

Working...