Law Enforcement Agencies Shut Down Genesis Market

One of the largest criminal marketplaces which is used by on-line fraudsters has been closed down by law enforcement. An international operation has taken down an important hacker forum and the US Federal Bureau of Investigation (FBI) has seized Genesis Market, a notorious hacker marketplace used to acquire compromised credentials and digital browser fingerprints.

This FBI action was the result of “Operation Cookie Monster” a reference to the stolen website cookies sold on Genesis Market in huge volumes over the past five years, along with other data needed for logging in to third-party machines. 

In addition to the FBI, the takedown involved law enforcement agencies from the United Kingdom, Europe, Australia, Canada, Germany, Poland and Sweden.

A number of different domain names are tied to Genesis Market, a very active cyber crime store that sold access to passwords and other data stolen from millions of computers infected with malicious software. Genesis Market sold login details, IP addresses and other data some of which often only cost less than a US dollar.

Genesis Market has been working since March 2018 using the marketing slogan “Our store sells bots with logs, cookies, and their real fingerprints,” and it was notable for its user-friendly interface. 

Customers could search for infected systems with a variety of options, including by Internet address or by specific domain names associated with stolen credentials. Genesis criminals were mainly using it for fraud as the hackers could use the data for sale there to deliver ransomware attacks, where hackers use the data to block a legitimate business’s website and data access and demand payment for its release.

Genesis Market had at least 80m sets of victims entre details for sale and it operated on the Open Web as well as the Dark Web.

This law enforcement operation also saw 120 people arrested and 200 searches carried out globally, according to the British National Crime Agency (NCA). NCA officers have arrested 19 suspected users of the site in the UK,  who are being held on suspicion of fraud and computer misuse. And while these arrests take some alleged cyber criminals offline, the acute demand for stolen personal data means that other hackers will take their place.

These arrests won't stop criminal websites from selling bootleg logins and many of Genesis Market's customers will probably just move on to smaller marketplaces. This in, nevertheless, a significant action that could make it harder for attackers to simply buy the login data they need.

Krebs On Security:    BBC:     Endgadget:    Techcrunch:   CNN:      Infosecurity Magazine:

The FBI’s Advice On Ransomware:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Phishing Kits: The New Frontier For Hackers
If It’s Convenient Be Suspicious – The Human Aspect »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Becrypt

Becrypt

Becrypt is a trusted provider of endpoint cybersecurity software solutions. We help the most security conscious organisations to protect their customer, employee and intellectual property data.

Cyberkov

Cyberkov

Cyberkov services include Pentesting, Vulnerability Assessments, Digital Forensics, Incident Response, Source Code Analysis and Security Training.

Crossword Cybersecurity

Crossword Cybersecurity

We work with research intensive European university partners to identify promising cyber security intellectual property from research that meets emerging real-world challenges.

CodeSealer

CodeSealer

CodeSealer provide invisible end-to-end user interface protection with a unique web security solution to eliminate Man-in-the-Middle and Man-in-the-Browser vulnerabilties.

Invensity

Invensity

INVENSITY is an interdisciplinary technology and innovation consulting company. Centres of excellence include Cyber Security and Data Privacy.

Cloud Managed Networks

Cloud Managed Networks

Cloud Managed Networks provides enterprise grade IT network solutions for cloud-based and on premise network security, Wi-Fi, data switching, collaboration, device management and more.

CyberFortress

CyberFortress

CyberFortress is an insuretech startup offering a new kind of online business interruption policy designed for small business.

White & Black

White & Black

White & Black are specialist corporate & technology lawyers based in London & Oxford.

ThriveDX

ThriveDX

ThriveDX, the world’s premier EdTech provider (formerly HackerU), champions digital transformation training as a means of empowering individuals to thrive in the age of digital disruption.

Globant

Globant

Globant is an It and software development company. We leverage the latest technologies and methodologies to help organizations transform in every aspect, including software security.

Pionen

Pionen

Pionen are a specialist information security consultancy with excellent people and proven security delivery methodologies at its core.

SolidRun

SolidRun

SolidRun is a leading provider of computing and network technology designed to streamline the deployment of edge computing infrastructure and support embedded and IoT markets.

Mitigo Group

Mitigo Group

Mitigo offers a well considered and effective approach to keeping businesses completely secure from any digital attacks.

Kong

Kong

Kong - powering the API world. Increase developer productivity, security, and performance at scale with the unified platform for API management, service mesh, and ingress controller.

Mobilen Communications

Mobilen Communications

Mobilen are dedicated to providing our customers with the highest level of secure data in transit and to bring privacy back to a mobile world.

Fortress SRM

Fortress SRM

Fortress SRM protects companies from the financial, operational, and emotional trauma of cybercrime by improving the security performance of its people, processes, and technology.