How Cybercrime Fuels Human Trafficking and Playing Scams

[ad_1]

Black Hat
,
Cybercrime
,
Events

Infoblox Researchers on Hyperlinks Between Human Trafficking, Cybercrime and Playing



Renée Burton, vice president of threat intelligence, and Maël Le Touz, senior threat researcher, Infoblox

Illegal gambling operations rely on cybercrime and human trafficking, and trafficked individuals are often forced to work in online casinos and scams, said Infoblox threat researchers.

See Also: Webinar | 2024 Phishing Insights: What 11.9 Million User Behaviors Reveal About Your Risk

Human traffickers exploit folks for labor in unlawful playing operations and scams equivalent to pig-butchering, and trafficked people are sometimes compelled into servitude in Southeast Asia, mentioned Renée Burton and Maël Le Touz. Cybercriminals arrange shell firms to safe sponsorship offers with European soccer groups, utilizing the publicity to drive visitors to unlawful playing web sites, significantly in Asia (see: Infoblox CEO on Bringing DNS Protection to Domain Monitoring).

“In that individual case of unlawful playing, they will depend on a community of human-trafficked folks to do their customer support, to run each form of worthwhile operation they will consider,” Le Touz mentioned. “In a on line casino, when you’ve got some downtime, you should use the identical folks to do pig-butchering or crypto scans or all types of cash laundering as a result of you have to hold profitability up.”

On this video interview with Data Safety Media Group at Black Hat 2024, Burton and Le Touz additionally mentioned:

  • The function of cryptocurrency in laundering income from illicit actions;
  • The challenges for legislation enforcement in concentrating on transnational felony networks;
  • Why DNS blocking might be an efficient instrument to fight unlawful on-line playing.

Burton is a topic skilled in DNS-based threats and leads the algorithm improvement and analysis in DNS intelligence.

Le Touz specializes within the detection of threats as they manifest within the DNS. His background is in monetary fraud investigation, and he has sturdy expertise in reverse engineering.



[ad_2]

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *