Law Enforcement Agencies Shut Down Genesis Market

One of the largest criminal marketplaces which is used by on-line fraudsters has been closed down by law enforcement. An international operation has taken down an important hacker forum and the US Federal Bureau of Investigation (FBI) has seized Genesis Market, a notorious hacker marketplace used to acquire compromised credentials and digital browser fingerprints.

This FBI action was the result of “Operation Cookie Monster” a reference to the stolen website cookies sold on Genesis Market in huge volumes over the past five years, along with other data needed for logging in to third-party machines. 

In addition to the FBI, the takedown involved law enforcement agencies from the United Kingdom, Europe, Australia, Canada, Germany, Poland and Sweden.

A number of different domain names are tied to Genesis Market, a very active cyber crime store that sold access to passwords and other data stolen from millions of computers infected with malicious software. Genesis Market sold login details, IP addresses and other data some of which often only cost less than a US dollar.

Genesis Market has been working since March 2018 using the marketing slogan “Our store sells bots with logs, cookies, and their real fingerprints,” and it was notable for its user-friendly interface. 

Customers could search for infected systems with a variety of options, including by Internet address or by specific domain names associated with stolen credentials. Genesis criminals were mainly using it for fraud as the hackers could use the data for sale there to deliver ransomware attacks, where hackers use the data to block a legitimate business’s website and data access and demand payment for its release.

Genesis Market had at least 80m sets of victims entre details for sale and it operated on the Open Web as well as the Dark Web.

This law enforcement operation also saw 120 people arrested and 200 searches carried out globally, according to the British National Crime Agency (NCA). NCA officers have arrested 19 suspected users of the site in the UK,  who are being held on suspicion of fraud and computer misuse. And while these arrests take some alleged cyber criminals offline, the acute demand for stolen personal data means that other hackers will take their place.

These arrests won't stop criminal websites from selling bootleg logins and many of Genesis Market's customers will probably just move on to smaller marketplaces. This in, nevertheless, a significant action that could make it harder for attackers to simply buy the login data they need.

Krebs On Security:    BBC:     Endgadget:    Techcrunch:   CNN:      Infosecurity Magazine:

The FBI’s Advice On Ransomware:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Phishing Kits: The New Frontier For Hackers
If It’s Convenient Be Suspicious – The Human Aspect »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Navista

Navista

Navista's hardware and software modules are especially designed to ease the deployment of secure networks.

Avatu

Avatu

Avatu specialise in providing clients the advice, technology and tools they need to fight cyber and insider threats.

CionSystems

CionSystems

CionSystems provides identity, access and authentication solutions to improve security and streamline IT infrastructure management.

PeCERT

PeCERT

PeCERT is the national Computer Emergency Response Team for Peru.

PlainID

PlainID

PlainID provides IAM teams with a simple and intuitive means to control their organization’s entire authorization process.

CSI

CSI

CSI is a Managed Service Provider (MSP) delivering Hybrid Multi-Cloud, Data Protection, and Cyber Security solutions to highly regulated industries.

Qatar Computing Research Institute (QCRI)

Qatar Computing Research Institute (QCRI)

QCRI perform cutting-edge research in such areas as Arabic language technologies, social computing, data analytics, distributed systems, cyber security and computational science and engineering.

Physec

Physec

Physec offers innovative security products and solutions for the Internet of Things ecosystem.

Lirex

Lirex

Lirex offer consulting and outsourcing services, complete design, construction and maintenance of ICT solutions and systems including cybersecurity.

MedCrypt

MedCrypt

MedCrypt are a team of medical device experts focused on bringing modern cybersecurity features to the next generation of healthcare technology.

MassMutual Ventures

MassMutual Ventures

Mass Mutual ventures backs companies building category-defining businesses in markets including enterprise software, digital health, cybersecurity, and fintech.

Strike Graph

Strike Graph

The Strike Graph GRC platform enables Security Audits & Certifications.

Zyston

Zyston

Zyston's solutions provide end-to-end management of your cybersecurity needs. Our range of services help protect your business where it needs it the most.

Silk Security

Silk Security

Silk is the first platform that enables enterprises to take a strategic, sustainable approach to resolving code, infrastructure and application risk.

Frontier Technology Inc. (FTI)

Frontier Technology Inc. (FTI)

Frontier Technology Inc provides the technology and deep data expertise to drive the best defense and intelligence solutions.

SOC-E

SOC-E

SOC-E is a leading technology provider for high-availability and deterministic networking, sub-microsecond synchronization and cybersecurity solutions for critical sectors.