Skip to Main Content
Malicious Bots
book

Malicious Bots

by Ken Dunham, Jim Melnick
August 2008
Intermediate to advanced content levelIntermediate to advanced
168 pages
4h 55m
English
Auerbach Publications
Content preview from Malicious Bots
71
Chapter 5
Botnets and the eCrime
Cycle: The iSIGHT
Partners’ Approach
By 2008, eCrime was taking place through three distinct phases: credential col-
lection, monetization, and laundering. Figure 5.1 illustrates how these three are
related in a constant cycle of eCrime operations. ese three phases are the pillars of
the criminal underground marketplace where illicit goods and services are bought
and sold.
What used to be child’s play, Trojan “fun stuff,” petty theft, and denial of ser-
vice attacks against adversary hacker sites have turned into sophisticated organized
c
rime activities and massive profits in the twenty-first century. Understand
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Detecting and Combating Malicious Email

Detecting and Combating Malicious Email

Julie JCH Ryan, Cade Kamachi

Publisher Resources

ISBN: 9781420069068