Users with the uppermost levels ofaccess are able topurchaserootkits to engage infraudulentactivityand contract out phases of their fraudoperations to a large network ofwilling participants.
Credit-card companies monitor every purchase and can identify fraudulent ones with a high degree of accuracy, using rules derived by crunching through billions of transactions.