Base Technologies 5

By Baselinemag  |  Posted 2005-03-07 Print this article Print

Online crime doesn't take many tools.

It doesn't take much to get an organized cybercrime ring going. Below is a list of technologies that the U.S. Secret Service and security experts say have been used by the Shadowcrew and similar organizations to buy and sell stolen credit, debit and identification cards.

Instant messagingICQ, AIMAmerica Online
Encryption softwareTrillianCerulean Studios
Payment handlingMoney Transfer, e-GoldWestern Union, e-Gold Ltd.
Virtual private networkOpenVPNFreeware
Forums, message boardsYaBBFreeware

Source: Criminal complaint against Shadowcrew members filed in U.S. District Court in Newark, N.J.; Watchfire.


Submit a Comment

Loading Comments...
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.