• XRATOR
  • Contact Us
  • Privacy & Policy
Conquer your risk
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
Conquer your risk
No Result
View All Result
Home Cybercrime

Operation Cookie Monster: FBI Takes Down Cybercrime Forum Facilitating Identity Theft

A worldwide law enforcement operation arrested over 100 people as part of a massive crackdown on Genesis Market, a leading crime forum.

Gert Van de VenbyGert Van de Ven
April 11, 2023
in Cybercrime, News
0
Operation Cookie Monster: FBI Takes Down Cybercrime Forum Facilitating Identity Theft

The FBI, in conjunction with law enforcement agencies worldwide, recently carried out a massive operation targeting Genesis Market, an invitation-only crime forum that facilitated large-scale identity theft. This operation is the latest in a series of international law enforcement stings that increasingly involve coordinated arrests and raids on multiple continents. While the operation has been successful in taking down one of the most popular marketplaces for stolen network and user information, the void will inevitably be filled by those who were not arrested, according to experts.

Genesis Market and Its Role in Facilitating Cybercrime

Genesis Market is a crime forum that has enabled cybercriminals to access hacked computers for carrying out other forms of fraud such as identity theft and ransomware attacks. Cybersecurity researchers suggest that the crime forum grew out of research that hackers did on anti-fraud technologies used by hundreds of banks and payment systems. It advertised login details for personal bank accounts and has offered data stolen from more than 1.5 million computers worldwide, containing login details for over 80 million user accounts.

The FBI’s Operation Cookie Monster

The FBI dubbed the takedown of Genesis Market as “Operation Cookie Monster,” a play on the forum’s sale of web browser information known as “cookies.” The bureau seized the web domains of Genesis Market pursuant to a court order from the US District Court for the Eastern District of Wisconsin. The operation involved taking down one of the primary websites used by the cybercrime forum and involved more than a dozen countries in raids and other measures against the alleged cybercriminals. Victims of Genesis incurred losses that “exceed tens of millions of dollars,” according to official sources.

The Impact of Genesis Market’s Takedown on Cybercrime

While the FBI’s and Europol takedown of Genesis Market is a significant win for law enforcement, the demand for stolen personal data remains high, and other cybercriminals may emerge to take its place. Data sellers that used Genesis Market could turn to other platforms such as Telegram or Discord until a successor to Genesis emerges, according to experts. The FBI’s seizure of Genesis Market is the latest in a series of international law enforcement stings that increasingly involve coordinated arrests and raids on multiple continents.

Conclusion

The FBI’s operation against Genesis Market is an unprecedented win for law enforcement in the fight against cybercrime. While the takedown of one of the most popular marketplaces for stolen network and user information is a significant win, it is not a permanent solution to the problem of cybercrime. As long as there is a demand for stolen personal data, cybercriminals will continue to exploit vulnerabilities in computer systems to access and steal valuable information.

Tags: CookiescybercriminalscybersecurityData SellersEuropolFBIGenesis MarketIdentity TheftLaw Enforcement

Categories

  • Cybercrime
  • Malware
  • Vulnerability & Weakness
  • Threat Intelligence
  • Cyber Attacks
  • Cybersecurity
  • Offensive Security
  • Risk Management
  • Cyberdefense
  • Cyber Insurance

Popular News

  • Cybercriminals regularly hack into individual and organization network. They may steal password to sell them on the darkweb.

    4 websites to check if your password is in the darkweb

    0 shares
    Share 0 Tweet 0
  • 10 Essential Tools for IoT Pentesting

    0 shares
    Share 0 Tweet 0
  • Threat Modeling : from Software Security to Cyber Risk Management

    0 shares
    Share 0 Tweet 0
  • 8 TV Shows and Movies about Personal Data Abuse

    0 shares
    Share 0 Tweet 0
  • The Code Knight: Mastering the Craft of Defensive Programming

    0 shares
    Share 0 Tweet 0

"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.

Categories

  • Articles
  • Cyber Attacks
  • Cyber Insurance
  • Cybercrime
  • Cyberdefense
  • Cybersecurity
  • Malware
  • News
  • Offensive Security
  • Research
  • Risk Management
  • Scams
  • State of the art
  • Threat Intelligence
  • Uncategorized
  • Vulnerability & Weakness

Quick Links

  • XRATOR
  • Our Experts
  • Privacy Policy
  • Contact Us

XRATOR® – copyright 2020-2021

No Result
View All Result
  • Contact Us
  • Homepages

© 2018 JNews by Jegtheme.

Manage Cookie Consent
We use cookies to optimize our website and our service.
By closing this windows, you automatically deny non-functionals cookies.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}