Long ago,Ā the term “goods” referredĀ toĀ necessities likeĀ wheat, milk, sugar, and petroleum, but our necessities have changed.Ā  Now “goods”Ā can refer toĀ broad band or smartphones or computers or–cybercrime?

As seen in the RSA’s report about the Current State of Cybercrime, experts confirm what we already know: malware and the tools cybercriminals useĀ are evolving. Although malwareĀ comesĀ from differentĀ places,Ā they haveĀ identical capabilities and continue to procreate.Ā Ā The amount of stolen information continues to grow, and cybercriminals are capitalizing onĀ it. The stolen information acquired by cybercriminals hasĀ joined the other goods available in our competitive market.

The internet and its on-growing innovations keep us adapting.Ā  Next time you buy gourmet-pasta-on-a-Tuesday-and-eat-it-on-a-Wednesday, remember that cybercriminals could be capitalizing on the private information you divulge forĀ such”conveniences”.Ā While you are checking your email, they may be stealing and selling your log-in information for your email accounts, social media sites,Ā and favoriteĀ online shops. Even very detailed information like medical histories from hospital patients are highly demanded and can be bought online, in bulk.

Every kind of personal information is online and has diverse buyers and sellers

But cybercriminals aren’t stooping to the deep-dark-web anymore, now they use public and open communication channels, like social media sites,Ā for these illegal sales transactions.Ā In fact, results fromĀ theĀ six-month long study show that theĀ RSA discovered more than 500 groups dedicated to fraud on social media, with an estimatedĀ 220,000 total members, and more than 60% (133,000 members), found each other on Facebook.

Financial information circulates within these online communities, including credit card information with access codes and authorization numbers, tutorials for how to perform a cyberattack, malware tools,Ā and even zoomed-in conversations that teach users how to move money without being detected.

It is important for businesses toĀ set aside sufficient resources to detect threats, attacks and frauds that now exist on multiple channelsĀ Ā (Windows, Android, iOS, Mac, etc.). Since the variants can multiply andĀ tailor themselves to theĀ malware,Ā  prevention and protection efforts should also increase.