INTERNET SECURITY SEMINAR

Similar documents
An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants

Network Security & Network Virtualization

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report:

Where every interaction matters.

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09

Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy

ACCEPTABLE USE AND TAKEDOWN POLICY

Identity Theft and Medical Theft. *Christine Stagnetto-Sarmiento, Oglala Lakota College, USA

Tax Identity Theft. Identity Theft as of 2010 has become the most prevalently reported crime in the world exceeding credit card theft

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

A Critical Investigation of Botnet

The anatomy of an online banking fraud

Introduction The Case Study Technical Background The Underground Economy The Economic Model Discussion

Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers. Privacy, Governmental Liaison and Disclosure May 9, 2012

Evolving Threats and Attacks: A Cloud Service Provider s viewpoint. John Howie Senior Director Online Services Security and Compliance

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Cloud Services Prevent Zero-day and Targeted Attacks Tom De Belie Security Engineer. [Restricted] ONLY for designated groups and individuals

Fraud and Abuse Policy

What is Identity Theft?

The HoneyNet Project Scan Of The Month Scan 27

An Efficient Methodology for Detecting Spam Using Spot System

Whose IP Is It Anyways: Tales of IP Reputation Failures

SAC 025 SSAC Advisory on Fast Flux Hosting and DNS

Modeling the economic incentives of DDoS attacks: femtocell case study 1

Security Challenges and Solutions for Higher Education. May 2011

Property of Secure Network Technologies-Do Not Distribute or Post Without Written Permission-Copyrights and Trademark Apply

Do s & Don ts Reference website.

At Cambrian, Your Privacy is Our Priority. Regardless of how you deal with us on the phone, online, or in person we have strict security measures

Author: Kai Engert, kaie at redhat dot com or kaie at kuix dot de For updates to this document, please check

The Growing Problem of Outbound Spam

Acceptable Use Policy ("AUP")

Advanced Security Methods for efraud and Messaging

USING SEARCH ENGINES TO ACQUIRE NETWORK FORENSIC EVIDENCE

Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

TERMS AND CONDITIONS OF SERVICE

Cablelynx Acceptable Use Policy

CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP

WYANDOTTE ONLINE ACCEPTABLE USE POLICY

A TASTE OF HTTP BOTNETS

Botnet Detection by Abnormal IRC Traffic Analysis

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Information Security Threat Trends

Employment Internet Fraud FABRICS4YOU Textiles

Identity Theft Don t Be a Victim How IRS and Tax Professionals Can Prevent Identity Theft and Assist Taxpayers Who Are Victims

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

Implementation of Botcatch for Identifying Bot Infected Hosts

Network Security - ISA 656 Review

National Cyber Security Month 2015: Daily Security Awareness Tips

UNITED STATES OF AMERICA BEFORE THE FEDERAL TRADE COMMISSION. Julie Brill Maureen K. Ohlhausen Joshua D. Wright Terrell McSweeny

IRS Identity Theft Efforts and 2013 Filing Season. Dennis Bell February 6, 2013

Arkansas Small Business Forum. IRS Identity Theft Prevention Efforts

RED FLAGS RULE. Identifying, Detecting, & Mitigating Possible Identity Theft

M 3 AAWG Compromised User ID Best Practices

Identity Theft and Tax Administration

How to Prevent It What to Do If You Are a Victim

Countermeasures against Bots

2010 Carnegie Mellon University. Malware and Malicious Traffic

PROTECT YOURSELF A CONSUMER PROTECTION PAMPHLET

PRIVACY POLICY (Update 1) FOR ONLINE GIVING FOR THE UNITED METHODIST CHURCH

LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains

March 22, Tennessee State Employees Association 627 Woodland Street Nashville, TN 37206

We may collect the following types of information during your visit on our Site:

Preventing, Insuring, and Surviving Fund Transfer Fraud... and Other Cyber Attacks

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

(For purposes of this Agreement, "You", " users", and "account holders" are used interchangeably, and where applicable).

Protect Your Business and Customers from Online Fraud

How To Run A Realtime Blackhole List (Rbl) In Hkong Kong Ken Kong

THE CYBER-CRIME BLACK MARKET: UNCOVERED

DESTINATION MELBOURNE PRIVACY POLICY

Reclaiming your identity

Deputy Mike Butler Deputy Leslie Fox Dane County Sheriff s Office

Broadband Acceptable Use Policy

Distributed Denial of Service Attack Tools

Stop Identity Theft. with Transparent Two-Factor Authentication. e-lock Corporation Sdn Bhd

Extended SSL Certificates

Examining How The Great Firewall Discovers Hidden Circumvention Servers

Federal and State Government Identity Theft and Protection Initiatives

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2

When visiting online banking's sign-on page, your browser establishes a secure session with our server.

Anti-Malware Technologies

Trafficking Fraudulent Accounts

Vishing (and SMiShing ) Countermeasures

Security A to Z the most important terms

MALWARE TOOLS FOR SALE ON THE OPEN WEB

The risks borne by one are shared by all: web site compromises

Cutting the Cost of Application Security

White paper. Business Success in a Dark Market: An Inside Look at How the Fraud Underground Operates

VICARS VICTIMS INITIATIVE FOR COUNSELING, ADVOCACY, AND RESTORATION OF THE SOUTHWEST

Benefits of LifeLock Ultimate Plus. About LifeLock. 3 Layers of Protection DETECT ALERT RESTORE FACT SHEET LIFELOCK ULTIMATE PLUS

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

2015 Identity Theft Guide

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

Corona Police Department

escan Anti-Spam White Paper

Practical tips for a. Safe Christmas

Identity Theft. What it is and How to Protect Yourself

Acceptable Use Policy

Transcription:

INTERNET SECURITY SEMINAR Paper : An inquiry into the nature and causes of the wealth of internet miscreants By Jason Franklin &Vern Paxson presented by Matimbila Lyuba at University of Birmingham 28/01/2013

Structure of presentation Underground Market Research analysis Countermeasures Conclusion

SECTION I: UNDERGROUND ECONOMY Underground economy - commoditization of activities like credit card fraud Identity theft Spamming Phishing Online credit theft Compromised host What other illegal activities.? -Underground market internet as the backbone of communication Internet Relay Chat(IRC) networks Web forums

IRC Provide buyers and sellers a meeting place. How IRC works? A standard protocol for real-time message exchange over internet. Employes a client/server architecture/model Client lookup for server then connect to a network via server

IRC terminologies Seller A person capable to provide goods or service Buyer A person who needs good or service Cashier Convert accounts credentials into funds Confirmer Pretends to be card owner Can be a buyer if reside in the same country where the victim account exist Ripper Dishonest seller or buyer Participant Any of the above

Playing a game

The game Hence fund is transferred through western union or E- Gold Demo for accessing the channel What parameters can you easily identify? What is track1 & track 2? Data with all information?

Accessing the market Market administrator Insure participants have identifiers Notify participants about rippers Client participation Start client program then connect to the network via server Provide nickname Provided with a seal of approval +v Choose channel Can PM Verified status Attain to be trusted Provide sample of valid data Approximate 95% of participants post less than 18 sample to attain +v flag

Access the market Data samples posted by participants to attain +v flag

Market activities Question: What do you think is sold on these channels?

Market activities Advertisement Types(Goods)

Market activities

SECTION II Research analysis How study was conducted Data collection Connect to particular channel on different IRC networks Logging all subsequent public messages Format {timestamp, IRC server IP address, source identifier, channel name, message} Why not logging private messages? Why logging in this format..? Dataset collected 2.4GB over a period of 7 months. Messages collected 13 million from a total of more than 100,000 distinct nick names!!

Market analysis Most sensitive data Credit card data Financial data Identity data

Credit card data No repetition Checked against Luhn digit: a checksum value guide against simple error in transmission A necessary condition for a card validity A total of 100,490 unique cards numbers

Credit card arrival Valid Luhn cards arrive at a rate of 402 cards per day Invalid Luhn cards arrive at a rate of 145 cards per day

Credit card arrival Why many valid Luhn cards? Implies miscreants: Continuously collect data Posses large number of stolen then release in batches bases Why invalid Luhn cards.? Novice miscreants Need to buy Gold for a price of Silver!!

New vs repeated cards With the channel Between channels 95% of card repeats

Global data source

Financial data Checking and saving account numbers with their balances Copied from the access webpage of banks Effectiveness of phishing attacks..? Demonstrating ability to access the stated accounts Gain buyers trust Validity Dynamicity of account! Valid user can withdraw money at any time.

Financial data Assume all amount is valid and successfully remove from the account.!!!!

Identity data Social Security Number (SSNs) SSN==individual identity Falls with the issued range listed by Social Security Administration. No proof whether they have issued Majority are repeated Why?

Market service Activity level 64,000 messages are seen per day Average of new messages per day is greater than 19,000 Repeated messages arrives at a rate of 45,000 per day How? automated scripts are used.. Why? Participants joins the channel at different time

Participants identification Lurkers Idle sending zero public messages Can monitor the channel ads and contacts seller via private messages Leechers Looking for free financial data Preventions services eg CardCops http://www.adcops.com/account_takeover.htm

Participants An average of 1,500 nicks participate per day New nicks arrives at an average rate of 553 nicks per day Active Lifetime Time between the nick s first and last message Measure the extend of building relationship by maintaining a nick over a long period versus creating the new identity

Participants 95% of nicks have an active lifetime of 112.5 days The longer you maintain nick the more relationship and credibility you build

Channel services Run by channel administrator Executed through command Provides useful services: Credit card limit check Access to BIN list

Channel service bot commands No service for free!!chk,!cclimit,!cvv2 are fallacious Returns deterministic results without querying the database or attempting a transaction to infer the card s limit! possible..? Bot administrator use to steal other credit card numbers..! Does it mean Return on investment? Target: naïve participants

Pricing Price for compromised host varies For DDoS you can get 1,000 hosts for $10,000 Helps to analyse threat model

Client IP lookup 10% in CBL (Composed Block List) Compromised host are used to connect to the market 1% in SBL(Spamhaus Block List) Spamming activities

Total wealth of Miscreants Estimation base on assumptions Add total loss from credit card frauds and financial theft Include only cards with valid Luhn digit check Some are still retained by miscreants Removal repetitions Only collection from public messaging Reasons Account dynamicity

Results Average funds loss per card credit/debit fraud $427.50 according to Internet Crime Complaint Centre Report (2006) Total wealth from credit card only $37M Financial frauds $56M Total $93M

SECTION III Countermeasures Enforce laws such as: Locating and disabling hosting infrastructures Identifying and arresting market participants Challenges Multi-national cooperation may be time and resource consuming Cooperation to foreign law enforcement agencies is difficult Market can re-merge under new administration with new bulletproof Political differences Who will be in-charge.?

Low cost countermeasures Sybil attack to the market Undercutting participant verification system How..? Sybil generation register as many nickname as equal to number of verified-sellers in the market Achieve verified status build the status for each identity for low-cost post or replay credit card seen in one channel to other channels

Low cost countermeasures deceptive sales advertise goods and services for sale rapping -request payment and fail providing goods or service make buyer unwilling to pay since can't differentiate honest sellers lemon market buyer can't distinguish the quality of goods

Low cost countermeasures Slander attack Eliminate the verified status of buyers and sellers through false defamation reduce the status of honest seller so buyers can turn to dishonest who fails to deliver hence discourage the market Principals of economy What are measures.?

Learning with security in mind Quantifying the security of systems Forecasting and predict future state of internet security Understanding the true costs and benefits of deployed security technologies, data breeches and new security protocols Analysing the threat model 1,000 compromised hosts for $10,000 =DDoS Estimate global trends that are difficult to measure Total number of compromised hosts on the internet What else?

SECTION IV Conclusion MORE QUESTIONS AND DISCUSSION

Special thanks Tom Chothia You all End of presentation