Lurk An Exemplary Company In Cybercrime

Ask questions here, report about problems.
Post Reply
parboti77
Posts: 1
Joined: Tue Dec 13, 2022 7:08 am

Lurk An Exemplary Company In Cybercrime

Post by parboti77 » Tue Dec 13, 2022 8:10 am

The trial of the creators of the Lurk banking Trojan is finally over. They were arrested during an unprecedented joint operation between several authorities and our experts. The criminals were arrested in 2016 but the investigation and the case have dragged on for five years. This is not really surprising since the number of suspects and victims was exceptional. It took an entire bus to bring all the members of Lurk to court, and the files were 4000 volumes. The workload was colossal and time-consuming. Suspects analyzed every report and statement with a fine-toothed comb, but 27 defendants went to trial in 2018. Kaspersky had been monitoring the group's activities since.

You will have done a good job and you can end your career. Compared to typical cybercriminals, they were very sophisticated, both technically and organizationally. That being said, if I detected Lurk today, I would certainly be less impressed and just see them as a group that adopted excellent methods. The court verdict is a Job Function Email Database good excuse to look back and understand why their criminal activity was so special. Their infection tactic We should start with the attack vector. The cybercriminals used the method of the watering hole attack , posting a page that redirected to an exploit kit on several media company sites. This method was not new, but in this case, for the computer to be infected, the victim still an accountant) had to visit the site during his lunch break only.

Image

The exploit kit downloaded an intangible Trojan onto the computer which was only used for spying purposes. Cybercriminals would first investigate what programs were running on the machine, if there were traces of banking software or research programs, and what subnets the device was using. Banking and government networks were the primary focus. In other words, they determined if the computer was interesting and knew exactly who they wanted to infect. The main malware was downloaded only if the computer was really fascinating.

Post Reply