The IT Law Wiki


32,081pages on
this wiki
Add New Page
Add New Page Talk0

Definition Edit


includes the identification and the design of the exploits used for the illegal operations, such as cyber espionage or sabotage. The category may also include development of tools and software to support the attack (e.g., keyloggers, bots) and to avoid malicious code detection (e.g., crypters, polymorphic builders). In many cases, criminal organizations also provide the hardware necessary for financial fraud such as card skimming; these devices are considered products in this category of illegal services. The underground provides various families of malicious code available for either sale or rent. The most popular are:

References Edit

  1. INFOSEC Institute, "Cybercrime as a Service" (full-text).

Also on Fandom

Random Wiki