dcsimg
 
 

Base Technologies 5

By Baselinemag  |  Posted 2005-03-07 Print this article Print
 
 
 
 
 

Online crime doesn't take many tools.

It doesn't take much to get an organized cybercrime ring going. Below is a list of technologies that the U.S. Secret Service and security experts say have been used by the Shadowcrew and similar organizations to buy and sell stolen credit, debit and identification cards.

APPLICATIONPRODUCTSUPPLIER
Instant messagingICQ, AIMAmerica Online
ChatmIRCFreeware
Encryption softwareTrillianCerulean Studios
Payment handlingMoney Transfer, e-GoldWestern Union, e-Gold Ltd.
Virtual private networkOpenVPNFreeware
Forums, message boardsYaBBFreeware

Source: Criminal complaint against Shadowcrew members filed in U.S. District Court in Newark, N.J.; Watchfire.


 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.

By submitting your information, you agree that baselinemag.com may send you Baselinemag offers via email, phone and text message, as well as email offers about other products and services that Baselinemag believes may be of interest to you. Baselinemag will process your information in accordance with the Quinstreet Privacy Policy.

Click for a full list of Newsletterssubmit