This analysis outlines the financial and infrastructural requirements for launching a credential theft campaign, highlighting that it's a complex endeavor beyond simple phishing. Zynap analyzes the key costs include renting infostealer malware, obtaining malware hosting services, securing delivery mechanisms like phishing kits, and utilizing evasion services such as crypters to avoid detection. The study also explores the use of social media platforms like YouTube for malware distribution, noting associated costs for accounts and promotional services. Furthermore, the text examines the structure and potential earnings within organized cybercriminal groups known as "traffers teams", indicating that while operational costs exist, potential profits can vary significantly. Overall, the research provides an estimate of the minimum financial investment needed to initiate this type of cybercrime.
続きを読む
一部表示