How to be a successful online fraudster
Ever wanted to know how easy it is to be an identity thief and earn a fortune? IT PRO reveals all…

This is probably the best way to go if you're just starting out, because rather than dealing with kits and installation you can get it done as a service, with somebody else sending out the trojan for you.
Buy a package which contains the latest version of the trojan, already installed in bulletproof hosting, it will be live for years. It will be updated with all the latest anti anti-virus patches as well as have a command control centre.
Subscribe, and it will also be hooked into an infection service where you sit back and relax while you watch computers being infected and credentials being collected. Within a few minutes after being supplied with a username and password, you'll be able to carry out your attack.
It's Fraud as a Service' at its best. In fact it's now it's possible to cut out the harvesting fraudster and do it all yourself. Prices all available on the internet...
Four - Communicating and making your reputation
Once you've decided on your career path and understood the technology, the next step is to build your reputation in the underground community as a fraudster with a nickname.
This is necessary because you'll need to make people trust you and believe that you will be able to do a good job in harvesting or cashing out, rather than messing up or god forbid be law enforcement in disguise.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
There are different types of communication channels which you can use, such as an IRC channel. Usually these places will be like marketplaces where you will be able to see what your fellow fraudsters are doing, as well as communicate with them.
Here you are free to haggle as well as wheel and deal, and whether you are a cash-out or harvesting fraudster, you're sure here to make arrangements to suit you exactly.
It's even possible to talk with your fellow fraudsters about the banks which are easier to commit fraud against and ask for pointers about how to perform successful illegal money transfers.
Fraud discussion forums are different in that they are less of a free for all and a place to advertise what you can offer. You can communicate and let others know what you are interested in such as services, partners, what you are selling, and what kind of tools you are looking for.
If you are a harvesting fraudster and working with tools such as trojans and malware, fraud forums will have reviews on different products, so you can be up to date with the latest technology, features and what you can buy on the black market.
To make your reputation you could get other fraudsters to test your wares, rate you and rank you, just like eBay's e-commerce system. If you get good remarks, you'll be able to get a better reputation which will allow you to make better deals. It's even possible to get other fraudsters to vouch for you.
This is important if you don't build your reputation, others won't do business with you...
-
Global cybersecurity spending is set to rise 12% in 2025 – here are the industries ramping up investment
News Global cybersecurity spending is expected to surge this year, fueled by escalating state-sponsored threats and the rise of generative AI, according to new analysis from IDC.
By Ross Kelly Published
-
Google Cloud is leaning on all its strengths to support enterprise AI
Analysis Google Cloud made a big statement at its annual conference last week, staking its claim as the go-to provider for enterprise AI adoption.
By Rory Bathgate Published
-
The IT Pro Podcast: The front line of fraud tech
IT Pro Podcast With tools such as deepfakes, the future of fraud tech relies on cutting edge AI as much as good security practice
By IT Pro Published
-
Podcast transcript: The front line of fraud tech
IT Pro Podcast Read the full transcript for this episode of the IT Pro Podcast
By IT Pro Published
-
LAPSUS$ breached T-Mobile systems, stole source code
News T-Mobile has denied that the hackers obtained customer or government information
By Sabina Weston Published
-
Exclusive: Former Shiseido staff say company was aware of data breach weeks before official notice
News Fake companies were created using the stolen identities of hundreds of Shiseido employees, former staff claim
By Sabina Weston Published
-
What is smishing?
In-depth A closer look at one of the most perilous forms of phishing
By Praharsha Anand Published
-
FBI warns scammers are using cryptocurrency ATMs to siphon cash
News Criminals will stay on phone with victims as they make payments, says advisory
By Danny Bradbury Published
-
Hackers fake DocuSign and offer fraudulent signing methods
News Criminals impersonate the e-signing company to steal credentials
By Rene Millman Published
-
Account takeovers rise nearly threefold during pandemic
News Financial services hit hardest by account hijackers, says Sift report
By Danny Bradbury Published