Spyware Website Taken Down

A website selling hacking tools in 124 countries, that let attackers take over victims' computers, has been closed down after an international investigation. The UK's National Crime Agency (NCA) said 14,500 people had bought spying tools from the Imminent Methods site. 

Police searched more than 80 properties across the world to find those selling the tools and were also able to trace people who had bought the software and charge them with computer misuse offences.

Serious Criminality
Imminent Methods sold a tool known as the Imminent Monitor Remote Access Trojan (Imrat) for about $25 (£19).
It gave the attacker full access to an infected device, letting them steal data, monitor what the victim was doing and even access their webcam. The NCA said properties in Hull, Leeds, London, Manchester, Merseyside, Milton Keynes, Nottingham, Somerset and Surrey were among those searched.The international operation was led by the Australian Federal Police.

The authorities were able to take down the website selling the software, which subsequently stopped the cyber-stalking tools from working.

The NCA's Phil Larratt told reporters that the tools had been used "to commit serious criminality" including "fraud, theft and voyeurism".  Police said 14 people had been arrested worldwide in connection with the sale and use of the software. Europe-wide there were 85 warrants executed, with more than 400 items seized. 

By seizing control of the website, police will have been able to "take a good look at what the site has been up to, including who has bought the illegal items", said Prof Alan Woodward, a cyber-security expert from the University of Surrey.
"The authorities now know how many users bought the malware on offer. They will now be working to unmask the 14,500 who were daft enough to buy this malware."

Crime as a Service
"Organised crime gangs, as well as more petty criminals, are switching their attention to cyber-crime rather than, say, drugs, because it is perceived there will be a significant return on their investment and much lower risk," said Prof Woodward.

In addition to selling hacking tools, criminals also provide access to the infrastructure to power their malware, including so-called bulletproof hosting. "They set themselves up in jurisdictions and in such a technical manner that they think they are untouchable by law enforcement agencies in the countries where their clients conduct their crimes," he told the BBC. "All of the above is called crime as a service, and has been a significant trend in recent years." 

GoTechDaily          BBC:           PlanetRadio:

You Might Also Read:


What’s On The Dark Web?:

Easy Cyber Knowledge Ch.2  Deep Web And The Dark Web (£):

« The Kids Cyber Protection Code
Free Speech And The Detention Of Julian Assange »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ON-DEMAND WEBINAR: How to build and implement an effective endpoint detection and response strategy

ON-DEMAND WEBINAR: How to build and implement an effective endpoint detection and response strategy

Discover how you can implement endpoint detection and response (EDR) tools into your security strategy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Potomac Institute for Policy Studies

Potomac Institute for Policy Studies

Potomac Institute undertakes research on key science, technology, and national security issues facing society, Study areas include cybersecurity.

Snyk

Snyk

Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world.

Swiss Cyber Storm

Swiss Cyber Storm

Swiss Cyber Storm is a non profit organization hosting the international Swiss Cyber Storm Conference and running the Swiss part of the European Cyber Security Challenges.

The ai Corporation

The ai Corporation

The ai Enterprise Fraud Solution is an on-prem or cloud-based self-service, machine learning fraud detection and prevention tool set.

QuoIntelligence

QuoIntelligence

QuoIntelligence experts can help your team understand the evolving cyber threats and provide simple yet comprehensive recommendations so you can focus on what matters.

Secure Forensics

Secure Forensics

Secure Forensics can assist in any situation that requires digital forensics or an investigation ranging from complex criminal matters to fraud and file tampering to cyber crime.

BitTrap

BitTrap

BitTrap helps companies worldwide detect attackers and put an early end to breaches, preventing data exfiltration and ransomware altogether.

Acmetek Global Solutions

Acmetek Global Solutions

Acmetek is a Global Distributor and a Trusted Advisor of PKI /IOT & SSL Security Products and a Managed Services Company.

Inflection Point Ventures (IPV)

Inflection Point Ventures (IPV)

Inflection Point Ventures (IPV) is a 6000+ members angel investing firm which supports new-age entrepreneurs by connecting them with a diverse group of investors.

SilverEdge Government Solutions

SilverEdge Government Solutions

SilverEdge is a next generation provider of innovative and proprietary cybersecurity, software, and intelligence solutions for the Defense and Intelligence Communities.

NetApp

NetApp

The NetApp portfolio includes intelligent cloud services, data services, and storage infrastructure that helps organizations manage applications and data everywhere across hybrid cloud environments.

Ceeyu

Ceeyu

Ceeyu is an all-in-one cybersecurity ratings and third party risk management platform.

PixelQA

PixelQA

Are you looking for a security testing company to cross-check whether your software or mobile app has a possible security threat or not?

SektorCERT

SektorCERT

SektorCERT is the cybersecurity center for the critical infrastructure sectors in Denmark. We help detect and handle when critical infrastructure is exposed to cyber attacks.

Attestiv

Attestiv

Attestiv puts authenticity into photos, videos and documents by utilizing advanced technologies in AI and tamper-proofing.

Beaming

Beaming

Beaming is an established Internet Service Provider for businesses across the UK. We deliver reliable voice, data and managed services, including cybersecurity.