CYBER 101

  • Alerts
  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • Tutorials

Join our newsletter

FOLLOW US

  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
CyberMaterial

DOCUMENT: The Hacker Infrastructure and Underground Hosting: Services Used by Criminals

By TrendMicro

1 min read
in Document, Report

To understand how the criminal underground operates, one need to understand not only the criminals, their motivations, and their business models, but also the infrastructure and services that underpin everything they do. All online businesses need stable and reliable infrastructure to thrive, and it’s no different for cybercrime. Online bookshops need to take care of shop inventory, advertising, go-to-market strategies, customer retention, and more; without a stable hosting infrastructure as a base, all other areas of the business are ineffective. The same goes for cybercriminal businesses.

The Underground Hosting series aims to offer a comprehensive look into the infrastructure behind cybercrime today and serve as a guide for those who are interested in it, investigating it, or involved in the daily battle to defend against such activities. The first part of the series detailed how the underground market for criminal infrastructure operates, and covered the methods and platforms used to buy and sell such services.1 This research paper, which is the second part of the series, explains the technical details of cybercriminal operations, as well as the main services and methods they use. It reveals the creativity that cybercriminals exhibit when building and organizing their infrastructures. The paper also details some of the common patterns we observed through the years, as well as some interesting “rare” cases we found during this research.

Read full report

Related

Tags: Deep WebDeep Web DocumentDocumentHacker UndergroundReportTrendmicro
2
VIEWS
ADVERTISEMENT

Related Posts

Cybersecurity: Incident Response Short Student Guide

Cybersecurity: Incident Response Short Student Guide

August 11, 2022
Cyber Security Incident Response Plan

Cyber Security Incident Response Plan

August 11, 2022
Sample Incident Handling Checklist

Sample Incident Handling Checklist

August 11, 2022
Incident Response Cheat Sheet

Incident Response Cheat Sheet

August 11, 2022

More Articles

Course

Introduction to Risk Management GS150.06

May 3, 2022

Open Blockchain (Public)

February 23, 2021
Alerts

Attackers are abusing Spring4Shell vulnerability

April 11, 2022
Alerts

North Korean Advanced Persistent Threat Focus: Kimsuky

October 27, 2020
Alerts

VMware Security Advisory

January 4, 2022
Cyber101

Security Automation – Definition

April 27, 2022

Dissecting Popular IT Nerds: What is SOC1 & SOC2… Should I Care?

April 11, 2022
Incidents

Bitcoin scammers steal $69k using iPhone 13 event as a lure: Report

September 23, 2021
Load More

Security through data

Cybersecurity Domains

  • Application Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • Governance
  • IAM
  • Physical Security
  • More...

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • AR/VR
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • IoT
  • Quantum Computing
  • More...

Frameworks

  • CIS Controls
  • CISA TSS
  • FISMA
  • GDPR
  • ISO 2701/02
  • MITRE ATT&CK
  • NIST
  • NYS-DFS
  • More...

Industries

  • Automation
  • E-Commerce
  • Education
  • Fake News
  • Financial
  • Government
  • Health Care
  • Military
  • More...

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering
  • Vulnerabilities
  • More...

© 2022 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
Search

More...

Generic filters
Filter by Categories
Alerts
Blog
Book
Incidents
Quotes
Tutorials
Certification
Cheat Sheet
Course
Game
Meme
Movie
Paper
Podcast
Report
Software
TV Show

Try these: DDoSGDPRMalware

  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Join our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.