Methodologies of the RBN
(Page 1 of 4 )
In our last article we discussed, briefly, the background of the RBN and gave an overview of their activities. In this second part of a series on Cybercrime, Cybercriminals, and Internet Syndicates, we will cover the various crimes and methods employed by the Russian Business Network and some of its affiliates in more detail.
Fake Anti-Spyware/Malware Programs
I remember a time, back long before I had ever heard of the RBN or started writing for Developer Shed, I came across an anti-spyware program on the net and installed it. Instantly, I began to get pop-ups on my computer, even when I wasn't surfing the Internet. And it occurred to me for perhaps the first time just how tricky those cybercriminals really were. They had adhered to one of the most basic tactics of evil-doers everywhere: hide in plain site.
Interestingly enough, I recently reformatted a computer and installed Windows on it. I loaded every update, then promptly downloaded Spybot and installed it, updated it, and ran it. This was prior to going to any other site (well other than Google to search for the Spybot site). By the time Spybot had finished running, I was given a perplexing message: I had 5 pieces of spyware on my system.
I say this to illustrate one point: no matter where you go, you are not safe. In my section on iFrames, I will better explain why this is and how hackers exploit this method to install malware on your system using sites millions of people trust and rely on every day.
But I get ahead of myself.
More Web Hosting Articles Articles
More By James Payne