{"id":2436,"date":"2013-08-06T10:04:30","date_gmt":"2013-08-06T14:04:30","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=2436"},"modified":"2020-12-25T11:31:09","modified_gmt":"2020-12-25T16:31:09","slug":"are-you-a-secret-cybercriminal","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/are-you-a-secret-cybercriminal\/2436\/","title":{"rendered":"Are You A Secret Cybercriminal?"},"content":{"rendered":"<p>On the night of June 5, 2013 a coalition led by the FBI and Microsoft <a href=\"https:\/\/threatpost.com\/microsoft-authorities-disrupt-hundreds-of-citadel-botnets-with-operation-b54\/100902\" target=\"_blank\" rel=\"noopener nofollow\">broke up a botnet of two million connected PCs<\/a> that was being used by cybercriminals for various malicious purposes. What\u2019s most startling is that those two million PCs were sitting in homes and business, and their owners had no idea what their computers had been up to, and most likely still don\u2019t know.<\/p>\n<p>Botnets are essential tools for modern cybercrime. If a criminal uses a single computer to send spam or hack into a bank, the incident could be easily isolated and eventually traced back to the hacker. However, it becomes much more difficult for police to track attacks if literally millions of computers are engaged in the activity. At the same time, activities like spamming become much more profitable for a hacker. The worst part about this is any computer is of interest to a hacker. It might be old, buggy and totally free from valuable information, but it is still able to earn money for criminals and in some cases, bring police to your door.<\/p>\n<div class=\"pullquote\">If your computer doesn\u2019t contain valuable data, it\u2019s still useful to criminals to commit online crimes.<\/div>\n<p>Here are some of the things your devices might be doing that are going totally unnoticed by you:<\/p>\n<ol start=\"1\">\n<li><b>Spam: <\/b>as you work, browse and play, your devices could be <a href=\"http:\/\/www.securelist.com\/en\/analysis\/204792297\/Spam_in_Q2_2013\" target=\"_blank\" rel=\"noopener nofollow\">spamming thousands of people<\/a> with emails for fake drugs or counterfeit goods.<\/li>\n<li><b>Fraud: <\/b>even with no web browser open, you may be secretly \u2018clicking\u2019 online adverts, so the pay-per-click advertiser can fraudulently inflate their charges.<\/li>\n<li><b>Distributed Denial of Service (DDoS): <\/b>your devices could be amongst thousands bombarding a website\u2019s server with requests, causing it to crash and go offline.<\/li>\n<li><b>Making money, literally:<\/b> bitcoins, the Internet\u2019s crypto-currency, are produced using CPU-intensive calculations. It takes a lot of time to <a href=\"http:\/\/www.securelist.com\/en\/blog\/208194210\/Skypemageddon_by_bitcoining\" target=\"_blank\" rel=\"noopener nofollow\">\u201cmine\u201d a bitcoin<\/a>, so hackers use many computers to speed this process up. Bitcoins are accepted as legitimate payment for many legal and illegal goods, and could be easily exchanged to real currency.<\/li>\n<li><b>Distribute malware:<\/b> as law enforcement agencies <a href=\"https:\/\/www.kaspersky.com\/blog\/fighting-cybercrime-international-success\/\" target=\"_blank\" rel=\"noopener nofollow\">are getting better at taking botnets down<\/a>, their creators try to make zombie networks less vulnerable. Recent botnets are P2P (peer-to-peer) \u2013 each infected computer might be used by a hacker to serve infected downloads to other computers and issue various commands to controlled PCs.<\/li>\n<li><b>Selling \u2018warez\u2019: <\/b>These are normal programs, cracked to work with no serial number. Criminals could be selling them from a secret, illegal store on your PC.<\/li>\n<li><b>Hacking: <\/b>to hide their tracks, cybercriminals remotely take over someone else\u2019s PC to attack their real target. If the activity is traced, it\u2019s traced to you.<\/li>\n<li><b>Downloading or watching illegal content.<\/b> As some countries developed laws prosecuting pirated downloads, it became sensible to download illegal content using other computers, transferring it to a final destination in an encrypted form. If that\u2019s not chilling enough, just consider this piece of advice that was recently posted on a hacking forum: \u201cUse an RDP to do your exploit. For example, if you watch illegal content using an RDP, if anything happens, the real person who owns the RDP gets caught instead of you.\u201d RDP stands for Remote Desktop Protocol, a network protocol used to remotely control another computer, in this case, the cybercriminal\u2019s victim.<\/li>\n<li><b>Breaking passwords.<\/b> Hackers could use the processing power of your computer to try every single password while cracking someone\u2019s valuable data.<\/li>\n<\/ol>\n<p>\u00a0<\/p>\n<p>And remember, it isn\u2019t just PCs that are at risk, cybercrime is now a multi-platform enterprise. The first <a href=\"https:\/\/threatpost.com\/new-android-botnet-androidtrojmdk-infects-1m-phones-china-011513\/77406\" target=\"_blank\" rel=\"noopener nofollow\">Android botnet<\/a> was detected in January 2012. Disguised as a game, the Foncy Trojan gave itself root access to the Android OS. The malware, and the criminals controlling it, had a great amount of control over the infected phones.<\/p>\n<p>In addition to being made to send SMS messages to premium numbers (at the user\u2019s cost), stealing victim\u2019s bank details and spreading malware to others in their address books, infected phones can also be remotely controlled and used in illegal activities, such as those described above.<\/p>\n<p>The conclusion is simple \u2013 any connected device requires protection. Be it your old Windows PC, new smartphone, tablet or Mac laptop, it requires <a href=\"https:\/\/www.kaspersky.com\/home-security\" target=\"_blank\" rel=\"noopener nofollow\">dedicated security software<\/a> to make sure it\u2019s serving only you and not doing anything illegal at your cost.<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On the night of June 5, 2013 a coalition led by the FBI and Microsoft broke up a botnet of two million connected PCs that was being used by cybercriminals<\/p>\n","protected":false},"author":32,"featured_media":2437,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[93,78,363],"class_list":{"0":"post-2436","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-cybercriminals","9":"tag-hackers","10":"tag-personal-data"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/are-you-a-secret-cybercriminal\/2436\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/are-you-a-secret-cybercriminal\/2298\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/are-you-a-secret-cybercriminal\/2213\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/are-you-a-secret-cybercriminal\/2356\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/are-you-a-secret-cybercriminal\/2237\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/are-you-a-secret-cybercriminal\/2436\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/are-you-a-secret-cybercriminal\/2436\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/cybercriminals\/","name":"cybercriminals"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2436","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=2436"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2436\/revisions"}],"predecessor-version":[{"id":38250,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2436\/revisions\/38250"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/2437"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=2436"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=2436"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=2436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}