Page 31 - Cyber Warnings
P. 31
skillfully coordinated banking transactions.
These guys would commonly use some of the phishing techniques to get an access to a bank’s
asset and gather the funds so easily – carefully planning the next steps with their operation. The
phishing campaign would simply offer to them to collect data about someone’s IP address and
such an information may get enough to make several steps further as well as do a breach to
that IT infrastructure.
How such an organized crime enterprise works
The organized crime networks would operate as well-coordinated enterprises employing the
wide spectrum of specialized criminals. Some of those folks work as cyber criminals, some as a
logistic support and some as a team to money collection and its transportation. Right here, we
would talk about the heavy scenario of bank’s robbery from the outside.
The crucially important thing that should get mentioned here could be these criminals would as
anyone else – take advantages over new technologies. As it’s well known, it’s not that hard at all
to smash that network – once you get the information about the trace they left in a cyberspace.
On the other hand, how could you get such a detail if the goal of those folks would be to commit
a perfect crime?
Through the coming part of this article, we would pay more attention to a step such a syndicate
should take within a robbery as well as the ways they would apply to trick the authorities and
avoid the arrest. As everyone would know – the aim of criminals is to commit a crime and avoid
any sort of punishment.
The steps within a robbery – how to trick the authorities
The intelligent criminals would usually plan every move and carefully gather the findings before
they decide to get into an action as well as commit the crime. They would so often do some
tracking – trying to prepare that action. For instance, the hacker’s team would attempt to find the
ways how to make a breach into a banking system and organize a transaction to their bank’s
account – commonly being with another bank.
Also, some members of that criminal enterprise would open up one or more bank’s accounts
within different banks – trying to prepare everything for the successfully realized operation. The
guys opening these bank’s accounts would usually use the fake documents – being bought on a
black market. If the entire action is about the illegal bank’s transaction – it would be so easy to
discover that trace and suspend that group.
On the other hand, the experience would suggest that such an organized crime enterprise may
try to trick the authorities – transferring the funds from one bank’s account to another and lately
collecting the cash trying to confuse the investigation and escape from the Police. The entire
31 Cyber Warnings E-Magazine – June 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide