From SafeBreach: The Perfect Cyber Crime

Tomer Bar of SafeBreach recently posted an article about the “Perfect Cyber Crime”

Criminals typically approach data theft with one goal in mind: to invest as little effort as possible in order to collect as much sensitive, money-generating user data as possible. Cryptocurrency wallets, banking credentials, extortion, and identity theft are just a few examples.

Towards this end, criminals can develop trojans and then build an infrastructure, including Command and Control (C2) servers, to infect victims, send commands to the malware, and store the exfiltrated data. This requires them to purchase a VPS and domain names for the C2 servers, renew them every year, and purchase a proxy to anonymize their activities. Alternatively, criminals can invest their efforts in attacking legitimate unprotected sites, like unpatched WordPress sites, and launch attacks from there. Finally, a more expensive option is for criminals to purchase malware-as-a-service (MaaS). Regardless of the option they select, this illegal activity can take time, requires money, and involves the risk of getting caught…

Read more https://www.safebreach.com/blog/2022/the-perfect-cyber-crime/