Close Menu
    Facebook X (Twitter) Instagram
    SciTechDaily
    • Biology
    • Chemistry
    • Earth
    • Health
    • Physics
    • Science
    • Space
    • Technology
    Facebook X (Twitter) Pinterest YouTube RSS
    SciTechDaily
    Home»Technology»Organized Cybercrime – Hacker Networks Are Not Your Average Mafia
    Technology

    Organized Cybercrime – Hacker Networks Are Not Your Average Mafia

    By Michigan State UniversityMarch 7, 2020No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn WhatsApp Email Reddit
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email Reddit
    Organized Cybercrime Hacker Networks
    Research from Michigan State University found cybercriminals work in organizations that differ by offense, but they are not sophisticated, long-established groups like traditional organized crime networks.

    Does the common stereotype for “organized crime” hold up for organizations of hackers? Research from Michigan State University is one of the first to identify common attributes of cybercrime networks, revealing how these groups function and work together to cause an estimated $445-600 billion of harm globally per year.

    “It’s not the ‘Tony Soprano mob boss type’ who’s ordering cybercrime against financial institutions,” said Thomas Holt, MSU professor of criminal justice and co-author of the study. “Certainly, there are different nation states and groups engaging in cybercrime, but the ones causing the most damage are loose groups of individuals who come together to do one thing, do it really well – and even for a period of time – then disappear.”

    In cases like New York City’s “Five Families,” organized crime networks have historic validity, and are documented and traceable. In the online space, however, it’s a very difficult trail to follow, Holt said.

    “We found that these cybercriminals work in organizations, but those organizations differ depending on the offense,” Holt said. “They may have relationships with each other, but they’re not multi-year, multi-generation, sophisticated groups that you associate with other organized crime networks.”

    Holt explained that organized cybercrime networks are made up of hackers coming together because of functional skills that allow them to collaborate to commit a specific crime. So, if someone has specific expertise in password encryption and another can code in a specific programming language, they work together because they can be more effective – and cause greater disruption – together than alone.

    “Many of these criminals connected online, at least initially, in order to communicate to find one another,” Holt said. “In some of the bigger cases that we had, there’s a core group of actors who know one another really well, who then develop an ancillary network of people who they can use for money muling or for converting the information that they obtained into actual cash.”

    Holt and lead author E. R. Leukfeldt, researcher at the Netherlands Institute for the Study of Crime and Law Enforcement, reviewed 18 cases from the Netherlands in which individuals were prosecuted for cases related to phishing. Data came directly from police files and was gathered through wire and IP taps, undercover policing, observation and house searches.

    Beyond accessing credit cards and banking information, Holt and Leukfeldt found that cybercriminals also worked together to create fake documents so they could obtain money from banks under fraudulent identities.

    The research, published in International Journal of Offender Therapy and Comparative Criminology, also debunks common misconceptions that sophisticated organized criminal networks – such as the Russian mafia – are the ones creating cybercrime.

    Looking ahead as law enforcement around the world takes steps to crack down on these hackers, Holt hopes his findings will help guide them in the right direction.

    “As things move to the dark web and use cryptocurrencies and other avenues for payment, hacker behaviors change and become harder to fully identify, it’s going to become harder to understand some of these relational networks,” Holt said. “We hope to see better relationships between law enforcement and academia, better information sharing, and sourcing so we can better understand actor behaviors.”

    Reference: “Examining the Social Organization Practices of Cybercriminals in the Netherlands Online and Offline” by E. R. Leukfeldt and Thomas J. Holt, 27 December 2020, International Journal of Offender Therapy and Comparative Criminology.
    DOI: 10.1177/0306624X19895886

    Never miss a breakthrough: Join the SciTechDaily newsletter.
    Follow us on Google and Google News.

    Behavioral Science Crime Cybersecurity Michigan State University
    Share. Facebook Twitter Pinterest LinkedIn Email Reddit

    Related Articles

    Cybersecurity Breakthrough: New Cipher System Protects Computers Against Spy Programs

    MIT’s Cybersecurity Metior: A Secret Weapon Against Side-Channel Attacks

    Researchers Reveal What Happens When Your Phone Is Spying on You

    The Security System of the Future – Electronic Devices Could Use “Logic Locks” To Fend Off Malicious Attacks

    The Million Dollar Problem That Could Break Cryptography

    New Method Can Stop Cyberattacks in Less Than a Second

    Smartphones Are Digital Truth Serum – Here’s Why

    World’s Most Popular Websites’ Inconsistent and Misleading Password Advice Could Increase Risk of Cyber Attacks

    Your Car May Be Vulnerable to Cyberattacks – Even the Smartest of Smart Cars Have Issues

    Leave A Reply Cancel Reply

    • Facebook
    • Twitter
    • Pinterest
    • YouTube

    Don't Miss a Discovery

    Subscribe for the Latest in Science & Tech!

    Trending News

    Scientists Say This Natural Hormone Reverses Obesity by Targeting the Brain

    35-Million-Year-Old Mystery: Strange Arachnid Discovered Preserved in Amber

    Is AI Really Just a Tool? It Could Be Altering How You See Reality

    JWST Reveals a “Forbidden” Planet With a Baffling Composition

    The Protein “Sabotaging” Aging Muscle Recovery Could Be Key to Surviving Aging

    This Diet–Gut Interaction Could Transform Fat Into a Calorie-Burning Machine

    Scientists Discover Hidden Virus Linked to Colorectal Cancer

    Scientists Discover 132-Million-Year-Old Dinosaur Tracks on South Africa’s Coast

    Follow SciTechDaily
    • Facebook
    • Twitter
    • YouTube
    • Pinterest
    • Newsletter
    • RSS
    SciTech News
    • Biology News
    • Chemistry News
    • Earth News
    • Health News
    • Physics News
    • Science News
    • Space News
    • Technology News
    Recent Posts
    • 5 Things Experts Say You’re Getting Wrong About Protein
    • Scientists Create “Optical Tornadoes” That Twist Light Into a Swirling Vortex
    • Scientists Uncover Hidden Superconductivity in Material Once Thought Only Magnetic
    • Scientists Baffled by Bizarre “Living Fossil” From 275 Million Years Ago
    • 500 Million Years Ago, Life Changed Forever: Scientists Reveal the DNA Changes That Helped Animals Move Onto Land
    Copyright © 1998 - 2026 SciTechDaily. All Rights Reserved.
    • Science News
    • About
    • Contact
    • Editorial Board
    • Privacy Policy
    • Terms of Use

    Type above and press Enter to search. Press Esc to cancel.