Iraqi Dinar
Would you like to react to this message? Create an account in a few clicks or log in to continue.

Electronic financial crimes tools

Go down

Electronic financial crimes tools Empty Electronic financial crimes tools

Post  Admin Wed May 02, 2018 8:34 am




02/5/2018 12:00 am

Was the result of the communications revolution and the development of its network

Ali Thamer Al Waeli
Modern technological methods have emerged as one of the fastest means of money laundering operations, which makes it difficult to control the source of such funds. It highlights the importance of the advanced electronic means that came as a result of the communications revolution and the evolution of its network by comparing traditional means and modern methods in the stages of money laundering. Deposits with banks and smuggling across unsecured borders are based on deposit operations, while modern means such as smart cards, computers and the Internet are used through a system of protection and curing To ensure confidentiality of deposit operations.

In terms of employment, traditional means are through remittances or through non-monetary means of payment such as checks and bills drawn on banks abroad. In modern electronic means, they are carried out through a series of complex, rapid and successive operations that can separate them from their illicit sources.

With regard to the merger phase, they are in the traditional means through fake transactions and counterfeit bills and gambling and brokering activities. In electronic means, through the purchase of physical assets and gambling by credit cards, by personal computer without the mediation of banks, Accuracy, speed and confidentiality so that it is difficult to trace them, and enables the clearance of modern technological tools:

1 - Electronic banking services: can be used in the stages of coverage and integration of the stages of money laundering operations.
2 - Internet banks: used in electronic remittance operations without the possibility of identifying the identity of dealers accurately if the other bank in another country.
3 - Electronic money (electronic currency) and encryption.
4 - Electronic communications over the Internet without the need for a telephone for this type of communication.
5 - smart electronic payment cards.
Common methods that are used by hackers


Denial of service attacks
A simple traditional process in its concept is powerful in its impact. It depends on sending a number of requests that the server can not carry. Suppose that the capacity of a server is 1000 information per second and the number of attackers at the same time is five thousand attackers focusing their attacks on the same server. Causing very slow and damaging and then the server falls down and stops working until the attack is over


Security vulnerabilities
In this case, the hacker examines the server in all its aspects and collects information related to it, such as the type of operating system, the open ports in the server, the programs installed on it, and other important things that help it to identify and create a gap within the system that enables it to access the server management .


Spyware (malware):
The hacker implants within the target device a disguised program in the form of management software files, where the latter opens a back door that enables the hacker to infiltrate in secret through it to the server, as well as spy on the keyboard and steal passwords and other things, it became easy for a young man under the age of twenty Can cause the same losses caused by an army on the ground in a full year, and a particular organization made up of a group of infiltrators could threaten the security of a state and paralyze all sensitive sectors such as financial sectors, education and security, and government sites, making them in a state of extreme emergency. Periods of brotherhood .


Get paid
Huge by the Internet
Many hackers exploit their ability to hack into collecting valuable financial wealth from the Internet, whether in legal or illegal ways. Either in this paragraph we will address the most common ways the hacker exploits to become a millionaire through the use of their skills and in the field of protection, security and penetration.
Let us look at the most prominent methods and methods used in our time with the following examples:


Phishing fraud
The hacker relies on sending millions of messages "the same message often" to millions of people as an important message from someone with authority or an important location or bank or sovereign. This message often contains a warning to the victim and then tries to catch him and catch him by exploiting his weaknesses Lack of experience in the virtual world and the Internet, and then direct the victim to a fake page exactly like the bank of the person or according to the text.


(B) through financial institutions;
The hacker can collect thousands and millions of dollars through financial institutions. The hacker relies on collecting money by breaking through a database of financial institutions and withdrawing all user data and information from "credit cards, emails and passwords." There is also a breach of bank ATM regulations or a bank employee being tricked into obtaining important information about the bank or its customers and using it against them.


C. Purchase security vulnerabilities
There are many hackers who discover very serious security holes in the websites, of course, these sites provide important financial rewards for detecters of these vulnerabilities and add the hacker name in the list of hackers ethical white hat hacker sites. But some sell these loopholes in specialized sites, the price of the gap starts from $ 200 to $ 10,000 or more depending on the severity of the vulnerability and its importance.


(D) Buying and selling websites
Many hackers target websites that purchase and sell products online. Most of these sites store their customers' data in a database without encryption such as credit cards, passwords and bank accounts. So in recent years a group of famous sites have been known to penetrate and pull millions of information from
Database such as eBay. And that these data are exploited by Hackers or sell them on the black market, which we will talk about in the next point.


Black market:
There is so-called hidden Internet, which can not be accessed in the normal way and it is difficult for the security authorities to follow the owners of the transactions that take place inside it, whether for hackers or anything else. Many hackers turn to the Internet to view databases for sale. These rules contain thousands of credit cards, passwords and other important information, or as previously mentioned, to sell security holes, whether in well-known scripts such as wordpress or popular sites or accounts. Banking and even personal accounts at sites paid at a lower price than normal.


And (f) threats and coercion
It is possible for the hacker to set a goal as a large electronic shopping site and after hacking hacker site begins to negotiate with the owner to take money from him in order to fill the gaps and not scan the database containing thousands, but millions of dollars and does not announce that he hacked this site and these works Terrorism "and very dangerous because it is an explicit threat and blackmail to manage the site, and the threat is more serious if the products of this site are not tangible and tangible, such as electronic systems and programs .... and so on, where the hacker can be leaked to the Internet or return Sell ​​them.


G - penetrating server sites
It is possible for the attacker to penetrate the sites of servers that serve as the heart of the pulse of the Web in general, many of these servers and extensions contain hundreds or even thousands of sites, the hacker benefits more than the sites of the extension to withdraw their products and sell them also in the black market that we talked about previously, Was a company for integrated web services and software.

http://www.alsabaah.iq/ArticleShow.aspx?ID=156478

Admin
Admin

Posts : 29357
Join date : 2012-04-30
Location : Arizona

https://iraqidinar.forumotion.com

Back to top Go down

Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum