{"id":15888,"date":"2014-02-07T14:44:12","date_gmt":"2014-02-07T21:44:12","guid":{"rendered":"https://www.webroot.com/blog/?p=15888"},"modified":"2023-12-08T06:59:53","modified_gmt":"2023-12-08T13:59:53","slug":"market-leading-standardized-cybercrime-friendly-e-shop-service-brings-2500-boutique-e-shops-online","status":"publish","type":"post","link":"https://www.webroot.com/blog/2014\/02\/07\/market-leading-standardized-cybercrime-friendly-e-shop-service-brings-2500-boutique-e-shops-online\/","title":{"rendered":"Market leading &#8216;standardized cybercrime-friendly E-shop&#8217; service brings 2500+ boutique E-shops online"},"content":{"rendered":"<p>The rise of\u00a0<strong><a href=\"https://www.webroot.com/blog/2013\/01\/07\/a-peek-inside-a-boutique-cybercrime-friendly-e-shop-part-six\/\">boutique cybercrime-friendly E-shops<\/a>, <\/strong>which we&#8217;ve extensively profiled in our &#8220;A Peek Inside a Boutique Cybercrime-Friendly E-Shop&#8221; series, continues further expanding as a market segment within the underground marketplace. Driven by the proliferation of public\/commercially obtainable DIY (do it yourself) type of malware\/botnet generating tools along side the ongoing <a href=\"https://www.webroot.com/blog/2014\/01\/24\/newly-launched-managed-compromisedhacked-accounts-e-shop-hosting-service-standardizes-monetization-process\/\"><strong>standardization of the monetization process<\/strong><\/a>\u00a0offered by opportunistic cybercriminals acting as intermediaries between those possessing the fraudulently obtained assets and their prospective customers, the market segment is prone to expand.<\/p>\n<p>Having already profiled a managed hosting service, empowering novice cybercriminals possessing compromised\/hacked accounting information with efficient ways to monetize the stolen data, we continue finding factual evidence that further confirms an ongoing standardization of the monetization process. In this post, I&#8217;ll discuss a market leading managed hosting service that is currently hosting 2500+ boutique E-shops offering access to a vast amount of compromised\/hacked accounting data, with hosting services, through a convenient Web-based E-shop management interface.<\/p>\n<p><!--more--><\/p>\n<p><strong>Sample screenshot of the entry page for the managed cybercrime-friendly managed E-shop hosting service:<\/strong><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_07.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"1808\" class=\"size-full wp-image-15896 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_07.png\" alt=\"Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_07\" \/><\/a><\/p>\n<p><strong>Sample screenshots of the Web based management interface, that potential cybercriminals get access to for the purpose of configuring their E-shops+sample E-shop:<\/strong><strong><br \/>\n<\/strong><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"414\" class=\"size-large wp-image-15899 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data-1024x414.png\" alt=\"Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data-1024x414.png 1024w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data-300x121.png 300w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data.png 1339w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_01.png\"><img decoding=\"async\" loading=\"lazy\" width=\"899\" height=\"615\" class=\"size-full wp-image-15901 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_01.png\" alt=\"Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_01\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_01.png 899w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_01-300x205.png 300w\" sizes=\"(max-width: 899px) 100vw, 899px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_03.png\"><img decoding=\"async\" loading=\"lazy\" width=\"891\" height=\"627\" class=\"size-full wp-image-15904 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_03.png\" alt=\"Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_03\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_03.png 891w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_03-300x211.png 300w\" sizes=\"(max-width: 891px) 100vw, 891px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_04.png\"><img decoding=\"async\" loading=\"lazy\" width=\"903\" height=\"569\" class=\"size-full wp-image-15905 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_04.png\" alt=\"Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_04\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_04.png 903w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_04-300x189.png 300w\" sizes=\"(max-width: 903px) 100vw, 903px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_05.png\"><img decoding=\"async\" loading=\"lazy\" width=\"893\" height=\"599\" class=\"size-full wp-image-15907 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_05.png\" alt=\"Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_05\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_05.png 893w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_05-300x201.png 300w\" sizes=\"(max-width: 893px) 100vw, 893px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_06.png\"><img decoding=\"async\" loading=\"lazy\" width=\"873\" height=\"625\" class=\"size-full wp-image-15908 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_06.png\" alt=\"Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_06\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_06.png 873w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Cybercrime_Eshop_Boutique_Standardized_Managed_Hosting_Service_Hacked_Compromised_Malware_Accounts_Data_06-300x214.png 300w\" sizes=\"(max-width: 873px) 100vw, 873px\" \/><\/a><\/p>\n<p>Next to its core feature, basically consisting of a sub domain based on the cybercriminal&#8217;s preferences, the service also allows potential customers to use their own domains, insisting they use a Russian domain registration service and CloudFlare as the DNS provider. The monthly price for hosting an E-shop is\u00a0333 rubles ($9.55). The simplistic Web-based interface provides cybercriminals with an easy way to integrate their compromised\/hacked accounting data into the service. Not surprisingly, due to the relatively low price, the service has already positioned itself as a market leader in the newly emerging standardized monetization model, having already empowered 2500+ boutique E-shops with the necessary infrastructure. The evident standardization of the monetizing process is a trend aiming to directly\/indirectly centralize what was once a largely decentralized market segment, case in point, virtually all the <a href=\"https://www.webroot.com/blog/2013\/01\/07\/a-peek-inside-a-boutique-cybercrime-friendly-e-shop-part-six\/\"><strong>boutique cybercrime-friendly E-shops<\/strong><\/a> that we&#8217;ve profiled and tracked throughout 2012.<\/p>\n<p>The market leading service discussed in this post is currently relying on CloudFlare&#8217;s legitimate infrastructure, something we believe is definitely prone to change over time, largely due to the trade off between centralization and the service&#8217;s ability to remain online. As such, we expect them &#8212; including the competition &#8212; to start exclusively utilizing the ubiquitous for the cybercrime ecosystem, bulletproof hosting providers.<\/p>\n<p>As always, we&#8217;re keeping an eye on the future development of the service, the E-shops it&#8217;s hosting, and will be posting updates as soon as new developments take place.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The rise of\u00a0boutique cybercrime-friendly E-shops, which we&#8217;ve extensively profiled in our &#8220;A Peek Inside a Boutique Cybercrime-Friendly E-Shop&#8221; series, continues further expanding as a market segment within the underground marketplace. Driven by the proliferation of public\/commercially obtainable DIY (do it yourself) type of malware\/botnet generating tools along side the ongoing standardization of the monetization process\u00a0offered [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[17273,17261,5973,10767,17267,17145,17001,16985,10931,8753,17277,17269,17279,6045,17005,17275,17263,3947,17271,17265],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/15888"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=15888"}],"version-history":[{"count":22,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/15888\/revisions"}],"predecessor-version":[{"id":32477,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/15888\/revisions\/32477"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=15888"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=15888"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=15888"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=15888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}