Law Enforcement Agencies Shut Down Genesis Market

One of the largest criminal marketplaces which is used by on-line fraudsters has been closed down by law enforcement. An international operation has taken down an important hacker forum and the US Federal Bureau of Investigation (FBI) has seized Genesis Market, a notorious hacker marketplace used to acquire compromised credentials and digital browser fingerprints.

This FBI action was the result of “Operation Cookie Monster” a reference to the stolen website cookies sold on Genesis Market in huge volumes over the past five years, along with other data needed for logging in to third-party machines. 

In addition to the FBI, the takedown involved law enforcement agencies from the United Kingdom, Europe, Australia, Canada, Germany, Poland and Sweden.

A number of different domain names are tied to Genesis Market, a very active cyber crime store that sold access to passwords and other data stolen from millions of computers infected with malicious software. Genesis Market sold login details, IP addresses and other data some of which often only cost less than a US dollar.

Genesis Market has been working since March 2018 using the marketing slogan “Our store sells bots with logs, cookies, and their real fingerprints,” and it was notable for its user-friendly interface. 

Customers could search for infected systems with a variety of options, including by Internet address or by specific domain names associated with stolen credentials. Genesis criminals were mainly using it for fraud as the hackers could use the data for sale there to deliver ransomware attacks, where hackers use the data to block a legitimate business’s website and data access and demand payment for its release.

Genesis Market had at least 80m sets of victims entre details for sale and it operated on the Open Web as well as the Dark Web.

This law enforcement operation also saw 120 people arrested and 200 searches carried out globally, according to the British National Crime Agency (NCA). NCA officers have arrested 19 suspected users of the site in the UK,  who are being held on suspicion of fraud and computer misuse. And while these arrests take some alleged cyber criminals offline, the acute demand for stolen personal data means that other hackers will take their place.

These arrests won't stop criminal websites from selling bootleg logins and many of Genesis Market's customers will probably just move on to smaller marketplaces. This in, nevertheless, a significant action that could make it harder for attackers to simply buy the login data they need.

Krebs On Security:    BBC:     Endgadget:    Techcrunch:   CNN:      Infosecurity Magazine:

The FBI’s Advice On Ransomware:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Phishing Kits: The New Frontier For Hackers
If It’s Convenient Be Suspicious – The Human Aspect »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Bsquare

Bsquare

Bsquare DataV software and engineering services help enterprises implement business-focused Internet of Things systems.

Nixon Peabody LLP

Nixon Peabody LLP

Nixon Peabody LLP is an international law firm with offices across the USA, Europe and Asia. Practice areas include Data Privacy and Cyber Security.

ADF Solutions

ADF Solutions

ADF Solutions is a leading provider of digital forensic and media storage exploitation tools.

Roke Manor Research

Roke Manor Research

Roke is a world-class electronics engineering consultancy. Areas of expertise include cyber security, cyber assurance and cryptographic solutions.

_cyel

_cyel

_cyel is introducing a new cybersecurity strategy: not a new generation of patches and firewalls, but moving target security – we take away the targets. Without replacing your existing system.

National Cyber Security Center (NCSC) - Hungary

National Cyber Security Center (NCSC) - Hungary

The National Cyber Security Center was established in 2015 by uniting the GovCERT-Hungary, National Electronic Information Security Authority (NEISA) and the Cyber Defence Management Authority (CDMA).

Polish Centre for Accreditation (PCA)

Polish Centre for Accreditation (PCA)

PCA is the national accreditation body for Poland. The directory of members provides details of organisations offering certification services for ISO 27001.

TrustMAPP

TrustMAPP

TrustMAPP automates cybersecurity & privacy assessments, with universal workflow, allowing teams to generate analytics and recommendations to align priorities for improvement.

Socure

Socure

Socure’s identity verification increases auto approval rates, reduces false positives and captures more fraud. In real time.

Stanley Reid & Company (SRC)

Stanley Reid & Company (SRC)

Stanley Reid & Co is an Executive and Technical Search Firm serving the commercial market and the US Intelligence & Defense community. Our areas of expertise include Cybersecurity.

Tego Cyber

Tego Cyber

Tego Cyber delivers a state-of-the-art threat intelligence platform that helps enterprises deploy the proper resolution to an identified threat before the enterprise is compromised.

Kontex

Kontex

Kontex is a Cyber Security consultancy creating resilient solutions. From Strategy, Advisory and Implementation to Management and everything in between.

Wickr

Wickr

Wickr's mission is to secure the world's most critical communications. Wickr provides the highest standard of encryption trusted by millions worldwide.

Beetles Cyber Security

Beetles Cyber Security

Beetles is a crowdsourced penetration testing platform designed to build a trusted, hacker-centric approach to protectan organization’s digital attack surface.

CERT.ar

CERT.ar

CERT.ar is the national Computer Emergency Response Team for the technical-administrative management of computer security incidents in the National Public Sector of Argentina.

Alcatel-Lucent Enterprise (ALE)

Alcatel-Lucent Enterprise (ALE)

We are Alcatel-Lucent Enterprise. Our mission is to make everything connect with digital age networking, communications and cloud solutions.