Crime ❯ Cybercrime
Botnets Ransomware Remote Access Trojans Phishing Spyware Infostealers ATM Jackpotting Sabotage Data Theft Social Engineering
The case targets the back-end operators who keep password-stealing malware available for hire.