Russian Mob

thumbnail Russian Mob

Russian Mob The big bad wolves in the world of cybercrime, Russian mobsters control a huge hunk of the identity theft and fraud black market. Access to tokens that would get them more easily into banking and financial industry systems would further fuel their profitable enterprises. China When government types talk about cyberwarfare threats, the […]

Apr 7, 2011
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

1Russian Mob

The big bad wolves in the world of cybercrime, Russian mobsters control a huge hunk of the identity theft and fraud black market. Access to tokens that would get them more easily into banking and financial industry systems would further fuel their profitable enterprises.

2China

When government types talk about cyberwarfare threats, the "with China" is often implied. Our governments have been playing a cyber intelligence game of cat and mouse with China for years and access to the SecurID tokens that the Department of Homeland Security depends on so heavily would give Chinese hackers an edge.

3Iran

China isn’t the only foreign state looking to wreak damage from afar, though. Iran also has an active hacking contingent and that country’s leadership has been unequivocal about their distaste for America.

4Anonymous

With an axe to grind against the same type of government and corporate entities that use SecurID to protect their assets, it’s not entirely out of the realm of possibility for some members of this rag-tag group to go after the tokens to embarrass these organizations.

5Corporate Spies

Even if many of the consultants who help their clients fend off and deal with competitors can’t disclose much, they all agree that corporate espionage is alive and well these days. Depending on the objective of a corporate spy, the gaming of SecurID could get them untraceable access to high-value systems.

6Malware Kit Developer

These days there a many black hat developers who create automated malware kits that allow non-techie criminals to perpetrate attacks and subsequent fraud. A malware kit developer with the SecurID goods could create even more powerful kits.

7Terrorist Hackers

Token information that would allow a terrorist to authenticate as a "real" user within, say, a nuclear power plant’s remote access systems would be valuable information to perpetrate sabotage.

Recommended for you...

Galactic Advisors Wins Credential-Free Assessment Patent

Galactic Advisors patents a user-activated, credential-free pen testing tool, boosting MSP security with risk-free, forensic-grade assessments.

Jordan Smith
Aug 6, 2025
Flashpoint Mid-Year Report: Cyber Threats are Escalating

Flashpoint’s 2025 Midyear Index reveals an 800% rise in info-stealing malware and significant surges in ransomware, vulnerabilities, and breaches.

Franklin Okeke
Aug 5, 2025
Cloudbrink Adds Native ID Management, Crowdstrike Integration

Cloudbrink expands Personal SASE with identity services and Crowdstrike integration, unifying user and device security for zero-trust access control.

Jordan Smith
Aug 5, 2025
Malwarebytes Launches New Email Security Module

Malwarebytes adds AI-powered email protection to ThreatDown, unifying endpoint and email security for MSPs via IRONSCALES tech and Nebula console.

Jordan Smith
Jul 23, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.