Spyware Website Taken Down

A website selling hacking tools in 124 countries, that let attackers take over victims' computers, has been closed down after an international investigation. The UK's National Crime Agency (NCA) said 14,500 people had bought spying tools from the Imminent Methods site. 

Police searched more than 80 properties across the world to find those selling the tools and were also able to trace people who had bought the software and charge them with computer misuse offences.

Serious Criminality
Imminent Methods sold a tool known as the Imminent Monitor Remote Access Trojan (Imrat) for about $25 (£19).
It gave the attacker full access to an infected device, letting them steal data, monitor what the victim was doing and even access their webcam. The NCA said properties in Hull, Leeds, London, Manchester, Merseyside, Milton Keynes, Nottingham, Somerset and Surrey were among those searched.The international operation was led by the Australian Federal Police.

The authorities were able to take down the website selling the software, which subsequently stopped the cyber-stalking tools from working.

The NCA's Phil Larratt told reporters that the tools had been used "to commit serious criminality" including "fraud, theft and voyeurism".  Police said 14 people had been arrested worldwide in connection with the sale and use of the software. Europe-wide there were 85 warrants executed, with more than 400 items seized. 

By seizing control of the website, police will have been able to "take a good look at what the site has been up to, including who has bought the illegal items", said Prof Alan Woodward, a cyber-security expert from the University of Surrey.
"The authorities now know how many users bought the malware on offer. They will now be working to unmask the 14,500 who were daft enough to buy this malware."

Crime as a Service
"Organised crime gangs, as well as more petty criminals, are switching their attention to cyber-crime rather than, say, drugs, because it is perceived there will be a significant return on their investment and much lower risk," said Prof Woodward.

In addition to selling hacking tools, criminals also provide access to the infrastructure to power their malware, including so-called bulletproof hosting. "They set themselves up in jurisdictions and in such a technical manner that they think they are untouchable by law enforcement agencies in the countries where their clients conduct their crimes," he told the BBC. "All of the above is called crime as a service, and has been a significant trend in recent years." 

GoTechDaily          BBC:           PlanetRadio:

You Might Also Read:


What’s On The Dark Web?:

Easy Cyber Knowledge Ch.2  Deep Web And The Dark Web (£):

« The Kids Cyber Protection Code
Free Speech And The Detention Of Julian Assange »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Davis Wright Tremaine (DWT)

Davis Wright Tremaine (DWT)

Davis Wright Tremaine is a full-service law firm with offices throughout the US and in Shanghai, China. Practice areas include Technology, Privacy & Security.

Sysdig

Sysdig

With Sysdig teams find and prioritize software vulnerabilities, detect and respond to threats, and manage cloud configurations, permissions and compliance.

Baffin Bay Networks

Baffin Bay Networks

Baffin Bay Networks operates globally distributed Threat Protection Centers™, offering DDoS protection, Web Application Protection and Threat Inspection.

Blaze Information Security

Blaze Information Security

Blaze Information Security is a privately held, independent information security firm born from years of combined experience and international presence.

ProofID

ProofID

ProofID is a specialist provider of Identity Access Management (IAM) solutions. We focus on the solving the complex needs of the modern enterprise.

Centraleyes

Centraleyes

Centraleyes (formerly CyGov) is a cutting-edge integrated cyber risk management platform that gives organizations unparalleled understanding of their cyber risk and compliance.

CYOSS

CYOSS

CYOSS, an ESG Group company, is a specialist in Cyber Security and Data Analytics. We focus on the opportunities of a networked world and make security risks manageable.

DeNexus

DeNexus

DeNexus is the leading provider of cyber risk modeling for industrial networks. Our Mission is to build the Global Standard for Industrial Cyber Risk Quantification.

CyberCatch

CyberCatch

CyberCatch provides an innovative cybersecurity Software-as-a-Service (SaaS) platform designed for SMBs.

TuxCare

TuxCare

TuxCare make Linux more secure. We take care of Linux so that organizations can use Linux to support environments that require high levels of Cybersecurity, stability, and availability.

CXI Solutions

CXI Solutions

CXI Solutions: Your trusted partner in cybersecurity. We offer a full range of cybersecurity solutions to protect your business from digital attacks and virtual threats.

Lakera

Lakera

Lakera empowers developers and organizations to build GenAI applications without worrying about AI security risks.

Liberty Technology

Liberty Technology

Liberty Technology has a host of highly trained, certified experts who assist our clients with immediate remote support as well as on-site service.

eGyanamTech (EGT)

eGyanamTech (EGT)

eGyanamTech provides robust security solutions tailored for Operational Technology (OT) and Supervisory Control and Data Acquisition (SCADA) systems used in critical infrastructure systems.

Cork

Cork

Cork is a purpose-built cyber warranty company for managed service providers (MSPs) serving small businesses (SMBs) and the software solutions they manage.

SafeLiShare

SafeLiShare

SafeLiShare’s data security platform unifies encryption strategies for organizations with hybrid and multi-cloud infrastructures, ensuring data is secure regardless of its location.