What is interesting about the group, is the really tight age grouping, something that rarely occurs with the spread of the internet. This would suggest all of them joined during a similar timed activity. I wonder if they were all attending various universities during a similar time period.
Four Brits cuffed as global cyber-crime forum Darkode busted
Coordinated action from law enforcement and judicial authorities across the world has succeeded in taking down Darkode, an English-language cybercriminal forum. Darkode.com was established in 2007 and was as notable for its size and popularity as for the malicious activities transacted there, which included carding, selling …
COMMENTS
-
-
Thursday 16th July 2015 12:33 GMT Cuddles
"really tight age grouping"
I'm not sure ages ranging from 20 to 53 counts as particularly tight. The latter is old enough to be the former's grandfather (only just, but entirely legally). Even ignoring the eldest, just a range of 20-26 is a big enough range that they'd be unlikely to have met in school or university.
-
-
Thursday 16th July 2015 10:42 GMT Anonymous Coward
Until next time
Does anyone keep count how many of these forums were closed? It's obviously not doing much to eliminate the threat, since there will always be people to leverage their skills for ill gotten gains until such opportunities exist with the current state of the internet and its services.
How about instead of coordinating a multinational raid which takes years and millions, use those resources and time to fund audits and patch vulnerabilities, instead of hogging 0days for snooping on 'terrorists'.
-
-
-
Friday 24th July 2015 18:50 GMT Cynic_999
Re: Low hanging fruit
"
... didn't go to a hacking-orientated website via an anonymising VPN service ...
"
I had assumed that the website in question was an .onion site like Silkroad was, in which case it would only have been accessible via Tor, but I don't know whether that was or was not the case. Users of .onion sites are usually exposed after law enforcement manage to locate the server and take it over without the users' knowledge. They then use social engineering techniques or use exploits of their own to expose users' real IP addresses.
Commercial VPN services are useless to hide the identity of criminals, because law enforcement agencies can issue a warrant to the VPN company to hand over their logs (all or almost all VPN providers keep logs that can be used to match outgoing to incoming IP addresses even if they say that they don't).
-