{"id":3280,"date":"2016-09-12T13:41:27","date_gmt":"2016-09-12T17:41:27","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs5211fall16\/?p=3280"},"modified":"2016-09-12T13:43:31","modified_gmt":"2016-09-12T17:43:31","slug":"article-crimeware-as-a-service-hack-turns-potential-hackers-into-victims","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/2016\/09\/12\/article-crimeware-as-a-service-hack-turns-potential-hackers-into-victims\/","title":{"rendered":"Article: \u201cCrimeware-as-a-Service Hack Turns Potential Hackers into Victims.&#8221;"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>Hacking now is so easy that hackers don\u2019t even have to be a technically sophisticated hacker with hacking skills and knowledge, and to deal with the technical challenges to run their own crimeware. Instead, they can just buy a hacking service that will do most of hacking works for hackers, enables them to automate the hacking online and gain access to sophisticated network easily. Obviously, the Crime-as-a-Service (CaaS) offering is contributing to the increasing volume and sophistication of cybercrime and the increasing difficulties of tracking malicious hackers. The victims are not only the targets under attacks, but also those attackers, customers of the CaaS offerings. For example, a newly discovered crimeware service is using Facebook hacking tools hosted on Google Drive. It requires users\/customers to provide their Facebook login credentials before they can hack other accounts. It steals aspiring hackers\u2019 account information and tricks them that they can hack into other accounts. This crimeware service makes money by selling stolen account information in the underground market. This also put enterprise user accounts under at risk. Hackers can steal business users\u2019 credentials and develop a botnet for stealing a company\u2019s intellectual property, damaging software or conducting other future attacks, while it is hard to track back and find the real attackers. They can also make money by selling the credentials to the highest bidder. Therefore, to prevent this kind of attacks, IT managers are suggested to prevent employees from using business accounts for personal use, open suspicious link or downloading unauthorized files, and ensure to have fast response to attacks.<\/p>\n<p>This article made me think about the security of social media sites, like Facebook, Twitter and LinkedIn. As most trusted communication channels to most of people, many social media sites even cannot secure their own environment. It makes social network a hotbed of CaaS and other cyber crime that allow hackers to manipulate users and develop botnet easily. It is weaponized, and makes hacking more effective and less trackable. To companies, social media attacks are not only about reputation damage, it also leads to big data breaches. According to research, eighth companies suffered a security breach due to social media-related cyber attacks. However, companies can hardly prevent employees from using social network because it has become part of our lives. Instead, companies should identify their social assets, develop an effective social media security plan, educate employees, and be almost prepared to for social media attacks.<\/p>\n<p>Article:\u00a0<a href=\"http:\/\/www.darkreading.com\/attacks-breaches\/crimeware-as-a-service-hack-turns-potential-hackers-into-victims\/d\/d-id\/1326849\">http:\/\/www.darkreading.com\/attacks-breaches\/crimeware-as-a-service-hack-turns-potential-hackers-into-victims\/d\/d-id\/1326849<\/a><\/p>\n<p>References:\u00a0<a href=\"http:\/\/www.darkreading.com\/attacks-breaches\/why-social-media-sites-are-the-new-cyber-weapons-of-choice\/a\/d-id\/1326802\">http:\/\/www.darkreading.com\/attacks-breaches\/why-social-media-sites-are-the-new-cyber-weapons-of-choice\/a\/d-id\/1326802<\/a><\/p>\n<p><a href=\"http:\/\/www.scmagazine.com\/snack-attack-a-crimeware-as-a-service-menu-for-wannabe-hackers\/article\/509166\/\">http:\/\/www.scmagazine.com\/snack-attack-a-crimeware-as-a-service-menu-for-wannabe-hackers\/article\/509166\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Hacking now is so easy that hackers don\u2019t even have to be a technically sophisticated hacker with hacking skills and knowledge, and to deal with the technical challenges to run their own crimeware. Instead, they can just buy a hacking service that will do most of hacking works for hackers, enables them to automate [&hellip;]<\/p>\n","protected":false},"author":11323,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[715219],"tags":[],"class_list":{"0":"post-3280","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-03-it-administrative-controls","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/users\/11323"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/comments?post=3280"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3280\/revisions"}],"predecessor-version":[{"id":3281,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3280\/revisions\/3281"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/media?parent=3280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/categories?post=3280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/tags?post=3280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}