Spyware Website Taken Down

A website selling hacking tools in 124 countries, that let attackers take over victims' computers, has been closed down after an international investigation. The UK's National Crime Agency (NCA) said 14,500 people had bought spying tools from the Imminent Methods site. 

Police searched more than 80 properties across the world to find those selling the tools and were also able to trace people who had bought the software and charge them with computer misuse offences.

Serious Criminality
Imminent Methods sold a tool known as the Imminent Monitor Remote Access Trojan (Imrat) for about $25 (£19).
It gave the attacker full access to an infected device, letting them steal data, monitor what the victim was doing and even access their webcam. The NCA said properties in Hull, Leeds, London, Manchester, Merseyside, Milton Keynes, Nottingham, Somerset and Surrey were among those searched.The international operation was led by the Australian Federal Police.

The authorities were able to take down the website selling the software, which subsequently stopped the cyber-stalking tools from working.

The NCA's Phil Larratt told reporters that the tools had been used "to commit serious criminality" including "fraud, theft and voyeurism".  Police said 14 people had been arrested worldwide in connection with the sale and use of the software. Europe-wide there were 85 warrants executed, with more than 400 items seized. 

By seizing control of the website, police will have been able to "take a good look at what the site has been up to, including who has bought the illegal items", said Prof Alan Woodward, a cyber-security expert from the University of Surrey.
"The authorities now know how many users bought the malware on offer. They will now be working to unmask the 14,500 who were daft enough to buy this malware."

Crime as a Service
"Organised crime gangs, as well as more petty criminals, are switching their attention to cyber-crime rather than, say, drugs, because it is perceived there will be a significant return on their investment and much lower risk," said Prof Woodward.

In addition to selling hacking tools, criminals also provide access to the infrastructure to power their malware, including so-called bulletproof hosting. "They set themselves up in jurisdictions and in such a technical manner that they think they are untouchable by law enforcement agencies in the countries where their clients conduct their crimes," he told the BBC. "All of the above is called crime as a service, and has been a significant trend in recent years." 

GoTechDaily          BBC:           PlanetRadio:

You Might Also Read:


What’s On The Dark Web?:

Easy Cyber Knowledge Ch.2  Deep Web And The Dark Web (£):

« The Kids Cyber Protection Code
Free Speech And The Detention Of Julian Assange »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DCL Search & Select

DCL Search & Select

DCL Search & Selection connect candidates to the best companies in the IT Security, Telco, UC, Outsourcing, ERP, Audit & Control markets.

National Cyber Security Centre (NCSC) - United Kingdom

National Cyber Security Centre (NCSC) - United Kingdom

The NCSC acts as a bridge between industry and government, providing a unified source of advice, guidance and support on cyber security, including the management of cyber security incidents.

Carbonite

Carbonite

Carbonite offers all the tools necessary for protecting data from the most common forms of data loss, including ransomware, accidental deletions, hardware failures and natural disasters.

BigPanda

BigPanda

BigPanda is the first provider of Autonomous Operations solutions that empower IT Operations at large, complex enterprises.

Secura B.V.

Secura B.V.

Secura is an independent specialized cybersecurity expert, providing insights to protect valuable assets and data.

DataSixth Security Consulting

DataSixth Security Consulting

DataSixth delivers Cybersecurity Intelligence. With our unique capabilities, we’re able to deliver value, deliver answers, and deliver actionable security intelligence.

Apono

Apono

Apono enables DevOps and security teams to manage access to sensitive cloud assets and data repositories in a frictionless and compliant way.

Grindstone Ventures

Grindstone Ventures

Grindstone Ventures is a post-seed fund that supports post-seed equity and quasi-equity investments in early-stage innovation-driven and/or technology companies.

Acora

Acora

Acora provide a range of best-in-class managed services, Microsoft-centric business software, and cloud solutions designed to help mid-market organisations succeed in the digital economy.

European Union Agency for Network and Information Security (ENISA)

European Union Agency for Network and Information Security (ENISA)

The European Union Agency for Cybersecurity, ENISA, is the Union’s agency dedicated to achieving a high common level of cybersecurity across Europe.

ASPIA InfoTech

ASPIA InfoTech

ASPIA Infotech is a leading Information and cybersecurity organization focused on innovative approaches to avert targeted attacks.

OpenAI

OpenAI

OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity.

CyXcel

CyXcel

CyXcel is a cyber security consulting business grounded in the law which natively fuses crises, legal, technical, and consulting expertise digital networks, information and operational technology.

VAST Data

VAST Data

The VAST Data Platform delivers scalable performance, radically simple data management and enhanced productivity for the AI-powered world.

CertX

CertX

CertX is a Swiss functional safety, cybersecurity and artificial intelligence certification body.

Infrassist Technologies

Infrassist Technologies

We're Infrassist - a trusted white label Managed IT & Professional Services partner for MSP businesses.