Chapter
Exploring the Layers of the Cybercrime Supply Chain
This podcast delves into the various layers of the cybercrime supply chain, whereby stolen data is sold by hackers to brokers, who then find buyers through trusted third parties, with the data often used for spamming or promoting other illicit businesses.
Clips
The cybercrime supply chain involves multiple layers such as brokers and underground escrow agents who negotiate deals between hackers and buyers of stolen data.
00:00 - 01:20 (01:20)
Summary
The cybercrime supply chain involves multiple layers such as brokers and underground escrow agents who negotiate deals between hackers and buyers of stolen data. The ultimate use of stolen data can vary from sending spam to promoting other businesses on the internet.