Page 12 - index
P. 12







OPSEC novice ... here the manual for perfect cyber criminals


Cyber security expert Dancho Danchev profiled a new OPSEC training
services in the underground, a new trend that is converging to
standardization of knowledge sharing in the cybercrime ecosystem.


Speaking of cybercrime, with the term OPSEC are usually referred the basic operational
security activities conducted by cyber criminals to avoid being tracked and monetize
their cyber crimes (e.g. Frauds, scams, hacking campaigns and much more).


Cybercrime business will never stop to surprise us, every day new products and model
of sale are proposed by gangs of criminals with a primary purpose to make their
services user-friendly and available for a wide audience.


The cybercrime has its rules, operations, its patterns and monetization processes that
are increasing in sophistication, an attractive underground in which the principal actors
have started to think to earn also sharing their experience and expertise.


The cybercrime expert Dancho Danchev has recently profiled a product/training service
launched around the middle of this year 2013, it is a course that caters novice cyber
criminals offering them tools, manuals and precious suggestions to successfully
undertake their career in illegality.

The course is complete and according Danchev covers the most interesting topics of
OPSEC


 Basic host security
 Setting up Virtual Machines
 Setting up encrypted backups
 Setting up and securely using email clients
 Setting up a firewall
 Basics of OpenVPN and i2p
 Basics of Bitcoin use
 How to configure popular browsers for maximum security and anonymity
 How to use Socks4/Socks5 servers (malware infected hosts)
 How to anonymously use the most popular Web payment processes such as
WebMoney, Yandex etc.
 How to securely communicate online using free/public/community tools

Giving a look to the topics it is easy to recognize the knowledge of all the principal
phases of a malicious criminal activity from the setup of a malicious architecture to the
monetization phases and payment processes.


I consider the coverage of these topics fundamental also for any professionals that
desires proof its knowledge of cybercrime and its OPSEC. The training in Operational
12 Cyber Warnings E-Magazine – December 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide
   7   8   9   10   11   12   13   14   15   16   17