Spyware Website Taken Down

A website selling hacking tools in 124 countries, that let attackers take over victims' computers, has been closed down after an international investigation. The UK's National Crime Agency (NCA) said 14,500 people had bought spying tools from the Imminent Methods site. 

Police searched more than 80 properties across the world to find those selling the tools and were also able to trace people who had bought the software and charge them with computer misuse offences.

Serious Criminality
Imminent Methods sold a tool known as the Imminent Monitor Remote Access Trojan (Imrat) for about $25 (£19).
It gave the attacker full access to an infected device, letting them steal data, monitor what the victim was doing and even access their webcam. The NCA said properties in Hull, Leeds, London, Manchester, Merseyside, Milton Keynes, Nottingham, Somerset and Surrey were among those searched.The international operation was led by the Australian Federal Police.

The authorities were able to take down the website selling the software, which subsequently stopped the cyber-stalking tools from working.

The NCA's Phil Larratt told reporters that the tools had been used "to commit serious criminality" including "fraud, theft and voyeurism".  Police said 14 people had been arrested worldwide in connection with the sale and use of the software. Europe-wide there were 85 warrants executed, with more than 400 items seized. 

By seizing control of the website, police will have been able to "take a good look at what the site has been up to, including who has bought the illegal items", said Prof Alan Woodward, a cyber-security expert from the University of Surrey.
"The authorities now know how many users bought the malware on offer. They will now be working to unmask the 14,500 who were daft enough to buy this malware."

Crime as a Service
"Organised crime gangs, as well as more petty criminals, are switching their attention to cyber-crime rather than, say, drugs, because it is perceived there will be a significant return on their investment and much lower risk," said Prof Woodward.

In addition to selling hacking tools, criminals also provide access to the infrastructure to power their malware, including so-called bulletproof hosting. "They set themselves up in jurisdictions and in such a technical manner that they think they are untouchable by law enforcement agencies in the countries where their clients conduct their crimes," he told the BBC. "All of the above is called crime as a service, and has been a significant trend in recent years." 

GoTechDaily          BBC:           PlanetRadio:

You Might Also Read:


What’s On The Dark Web?:

Easy Cyber Knowledge Ch.2  Deep Web And The Dark Web (£):

« The Kids Cyber Protection Code
Free Speech And The Detention Of Julian Assange »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Team Cymru Research NFP

Team Cymru Research NFP

Team Cymru Research is a group of technologists passionate about making the Internet more secure and dedicated to that goal.

Red Hat

Red Hat

Red Hat is a leader in open source software development. Our software security team proactively identifies weaknesses before they become problems.

Secure Source

Secure Source

Secure Source specialise in search and recruitment for Cyber Security and Security Cleared markets.

Sage Designs

Sage Designs

Sage Designs is a provider of SCADA, Security & Industrial Automation products and training programs.

ESNC

ESNC

ESNC’s vulnerability management and real-time SAP security monitoring solutions help largest corporations in the world to effectively prioritize SAP security tasks and secure their business.

Cryptshare

Cryptshare

Cryptshare is a communication solution that enables you to share e-mails and files of any size securely.

US Secret Service

US Secret Service

The US Secret Service has a pivotal role in securing the nation’s critical infrastructures, specifically in the areas of cyber, banking and finance.

Agile Underwriting

Agile Underwriting

Agile, an underwriting agency, insurtech and Coverholder at Lloyd's, provides niche insurance products across Aviation, Marine & Cargo, Cyber and Financial Lines.

Blok Cyber Security

Blok Cyber Security

Blok provide small businesses and sole traders, with affordable, managed Cyber Security Packages that offer immediate protection and peace of mind.

Comparitech

Comparitech

Comparitech strives to promote cyber security and privacy for all. We are committed to providing detailed information to help our readers become more cyber secure and cyber aware.

Suresecure

Suresecure

Suresecure are a specialised consulting company providing Strategic IT security consulting, Managed Security Services, and Incident Response Management.

Cybertronium

Cybertronium

Cybertronium is a leader in managing cyber risk. We bring you the latest from the complex, ever-evolving online threat environment with the insights to inspire and the expertise to act.

CornerStone

CornerStone

CornerStone is an award winning, independent risk, cyber and security consulting firm providing a range of Risk Management, Security Design and Implementation Management Services.

AdronH

AdronH

AdronH is a company of Cyber Security consultants. We support companies and public institutions with their digital transformation to new and secure business platforms.

CyberAI Group

CyberAI Group

CyberAI's mission is to pioneer the evolution of the cybersecurity landscape globally, by strategically acquiring and elevating IT consulting firms into leaders of cybersecurity innovation.

Harmony Intelligence

Harmony Intelligence

Harmony builds cutting-edge defensive AI products that safeguard people and critical infrastructure around the world from AI-powered threats.