How to be a successful online fraudster
Ever wanted to know how easy it is to be an identity thief and earn a fortune? IT PRO reveals all…

Take advantage of an employee. Often this is the easiest way to get hold of information which could be left open due to negligence or even rogue ones who are willing to sell information. Poorly protected back-end servers? You can probably find many other ways to find data.
Three - Malware and trojans
Trojan technology
This is for the harvester fraudsters out there those who want to get their hands dirty with the tech and steal personal information direct from the consumer.
Trojans are invisible, and you can get these on anybody's computer without them being aware of it. They'll collect information everything that you do online, and deliver it to the trojan operator.
One of the more common ways to get a trojan on a computer at present is a blend of phishing and trojan attack. Users will often receive an email which takes you to a fake website which is playing a video which freezes.
It will then ask you to run an application which will enable you to run the video. Once you click on the application hey presto! You've got a trojan on somebody's machine. In some cases you won't have to get the user to click on the application prompt they'll be automatically infected.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Crimeware
Cash-out fraudsters will be interested in buying a ready-made trojan because instead of fiddling around with the technology, all you need is to purchase one, leave it running, and collect data at your leisure.
The price of malware and trojans is dropping. A good example is Zeus, a dangerous and effective trojan which has the ability to do many nasty things and is available for about $700 to $1000.
There are infection kits, building your own botnet kits, as well as beginner' trojans which you can practice with for less money.
If you are going to go for the technical route then you will have to deal with several factors you'll need to find hosting servers, install the botnet on machines, install SQL databases, encryption packages as well as other components.
You'll also have to deal with anti-virus companies sending out signatures against your trojans which means additional builds and upgrades. You'll need to make new patches as well. You'll also need knowledge of how to do the actual infection of all the computers.
-
Enterprises face delicate balancing act with data center sustainability goals
News High energy consumption, raw material requirements, and physical space constraints are holding back data center sustainability efforts, according to new research from Seagate.
By Emma Woollacott
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
The IT Pro Podcast: The front line of fraud tech
IT Pro Podcast With tools such as deepfakes, the future of fraud tech relies on cutting edge AI as much as good security practice
By IT Pro
-
Podcast transcript: The front line of fraud tech
IT Pro Podcast Read the full transcript for this episode of the IT Pro Podcast
By IT Pro
-
LAPSUS$ breached T-Mobile systems, stole source code
News T-Mobile has denied that the hackers obtained customer or government information
By Sabina Weston
-
Exclusive: Former Shiseido staff say company was aware of data breach weeks before official notice
News Fake companies were created using the stolen identities of hundreds of Shiseido employees, former staff claim
By Sabina Weston
-
What is smishing?
In-depth A closer look at one of the most perilous forms of phishing
By Praharsha Anand
-
FBI warns scammers are using cryptocurrency ATMs to siphon cash
News Criminals will stay on phone with victims as they make payments, says advisory
By Danny Bradbury
-
Hackers fake DocuSign and offer fraudulent signing methods
News Criminals impersonate the e-signing company to steal credentials
By Rene Millman
-
Account takeovers rise nearly threefold during pandemic
News Financial services hit hardest by account hijackers, says Sift report
By Danny Bradbury