
목차
Key findings 4
Introduction 6
Methodology 7
1. Data: What are criminals going after? 8
2. How is data exploited? 10
2.1 Data as a target
2.2 Data as a means
2.3 Data as a commodity
3. How are data and access acquired? 12
3.1 Exploiting human vulnerabilities: social engineering techniques
3.2 Exploiting system vulnerabilities
4. Who are the criminal actors? 16
5. Where are data and access commodified? 19
5.1 Fraud-related data
5.2 Initial access (Access brokers)
5.3 Breached data (data brokers)
5.4 Culture
Discussion 23
Open society
Access to data
Abuse of AI
Dispersion of intelligence, crime and punishment
Conclusions
Endnotes 25