Fraud Trends in 2010: Top Threats from a Growing Underground Economy
Total Page:16
File Type:pdf, Size:1020Kb
A First Data White Paper April 2010 Fraud Trends in 2010: Top Threats From a Growing Underground Economy Fraud is big business, accounting for more than $200 billion in losses each year in the U.S. alone. Today’s criminals are not operating out of seedy boiler rooms. They are sophisticated and smart. Learning how they operate gives you a better chance of mitigating risks and avoiding fraud. By: Rick Van Luvender Director, First Data InfoSec Incident Response Center © 2010 First Data Corporation. All trademarks, service marks and trade names referenced in this material are the property of their respective owners. Fraud Trends in 2010: A First Data White Paper Top Threats From a Growing Underground Economy Introduction: The Thriving Underground Fraud Economy When Albert Gonzalez was arrested in May 2008, he owned a luxury condo in Miami, a BMW and had $1.65 million in cash.1 Surprisingly, his crime was not drug related. Rather, he was charged with orchestrating one of the most publicized cyberattacks of the time—hacking into the networks of major retailers such as TJ MAXX, Barnes and Noble, and Sports Authority, to name a few, and stealing 45 million credit and debit card numbers. Gonzalez didn’t work alone. Like many entrepreneurs, he had a big idea and then sought out experts and contractors who could help him execute his plan. Eleven other individuals from the U.S. and around the world were indicted for the crime, including Stephen Watt, the man responsible for providing Gonzalez with the “packet sniffing” application that was used to steal the data. The sniffing application was hosted on a remote server in Latvia, according to reports, where Gonzalez also set up bank accounts to hide the money garnered from selling the card information on the underground market. He and his crew were able to fraudulently initiate over $10 million in credit and debit card transactions before their arrests.2 While in jail on the TJ MAXX charges, Gonzalez was indicted in August 2009 for an even bigger attack that compromised Heartland Payment Systems, Citibank-branded 7-Eleven ATMs and Hannaford Brothers computer systems, resulting in another 140 million stolen card numbers.3 As illustrated by Gonzalez and his co-conspirators, today’s cybercriminals are more likely to be running high- stakes, organized and sophisticated businesses rather than operating out of seedy boiler rooms. The Internet has allowed the underground economy to gain momentum and become an efficient, global marketplace where it is relatively easy to buy and sell fraudulent goods and services online, hire contractors and exchange useful industry information. This increasingly mature underground marketplace is providing cybercriminals a profitable environment for buying and selling millions of dollars’ worth of stolen goods and fraud-related services. It is clear that today’s cybercriminals are more sophisticated than ever in their operations and their attacks, and that they are always on the lookout for ways to exploit vulnerabilities in the global payments system. According to the 2009 Verizon Business Data Breach Investigations Report, 285 million consumer records were compromised in 2008—more than the previous four years combined.4 The continued emergence of highly advanced fraud techniques means this number will only continue to grow. While it is impossible to anticipate or prevent every attack, one way to stay a step ahead of these criminals is to have a thorough understanding of how they operate their business, both on the frontlines and behind the scenes. Knowing how they attack, how they sell data and where the vulnerabilities are in the system gives those affected by fraud a better chance of mitigating the risks and stopping the criminals in their tracks. ©2010 First Data Corporation. All rights reserved. firstdata.com page 2 Fraud Trends in 2010: A First Data White Paper Top Threats From a Growing Underground Economy An Efficient System of Supply and Demand Primarily using Web-based forums and chat rooms, potential buyers and sellers of stolen data negotiate deals, contract for the services and share information. Yet even though it is “underground,” the fraud-based economy is subject to the same supply-and-demand pressures of any other economy. According to Report on the Underground Economy, a study from Symantec Corp., which followed a year in the life of the underground economy, between July 2007 and June 2008, the Credit cards top the list as value of the advertised goods on underground economy Web the underground economy’s servers was in excess of $276 million.5 Among the most popular most popular item: goods that cybercriminals routinely buy and sell are credit card data and bank account credentials. J Price for stolen credit card data: At the top of the list of most popular items for sale, as well as the from 10 cents to $25 per card most requested for purchase, is credit card data, the Symantec J Discounts offered for bulk purchases study found. That’s because credit cards are inexpensive to buy and have the potential for high profit. With a wide variety of J Average stolen credit card has a ways to steal credit card information, such as phishing schemes, credit limit of $4,000 skimming magnetic stripes and breaking into databases, credit card data is plentiful and relatively easy to convert to cash. For example, stolen cards are easy to use for online shopping and may go undetected by merchants long enough for fraudsters to complete transactions and receive goods that can be resold for cash. The potential worth of all credit cards observed for sale during Symantec’s yearlong reporting period was estimated to be $5.3 billion. Stolen financial account information comes in second place on the list of most popular items for sales in the underground economy, selling for $10 to $1,000 per account (with an average account balance of nearly $40,000). Financial accounts include bank account credentials, online stock trading accounts and data from magnetic-stripe skimming devices. Financial accounts are attractive targets because the process of cashing out can be easier than retrieving cash from credit or debit cards via ATMs. Withdrawals from a bank account also have the advantage of an immediate payout, while stolen credit cards are often used for purchasing goods that must be sold later. The potential value of all bank accounts advertised on underground economy servers during the reporting period was $1.7 billion. Rank Item Percentage Range of prices 1 Credit card information 18% $1-$100 2 Bank account credentials 13% $2-$1000 3 E-mail accounts 9% $5-$12 4 E-mail addresses 9% $5/MB–$20/MB 5 R57 & C99 shells 6% $1-$13 6 Full identities 6% $0.50-$60 7 Credit card dumps 6% $11-$140 8 Mailers 5% $3-$17 9 Cash-out services 4% $200-$600 per account, plus 60% of total value 10 Scams 3% $1-$10 for hosting services Figure 1: Top 10 goods and services for sale on underground economy servers Source: Symantec ©2010 First Data Corporation. All rights reserved. firstdata.com page 3 Fraud Trends in 2010: A First Data White Paper Top Threats From a Growing Underground Economy Delivering Fraud as a Service (FaaS) Considering that the underground economy is subject to the same economic pressures as legitimate businesses, it is no wonder that fraudsters adopt and adapt practices from the real world to meet their underground needs. For example, just as corporate IT managers have come to rely on the Internet to satisfy on-demand software needs in the form of Software as a Service (SaaS), so has the underground economy developed a similar infrastructure for delivering Fraud as a Service (FaaS), according to fraud experts from the InfoSec Incident Response Center at First Data. SaaS gives users a fast and efficient way to gain access to a wide range of applications while offloading the need to have knowledge of, expertise in or control over the technology infrastructure that supports them. FaaS does the same for cybercriminals as illustrated in the following chart created by First Data. Technical Infrastructure Operational Infrastructure Malware/ Phishers/ Money Drop Botnets Carders Trojans Spam Mules Specialists Harvesters Fraud Cash-Out (IT Specialist) Forums (Personnel) Lower Risk/Lower RewardHigher Risk/Higher Reward At the center of FaaS are the online Fraud Forums, where individuals, groups and organizations active in the trade of fraudulent Fraud on Google Search goods and services gather to collaborate, offer their skills, and buy and sell stolen goods. A simple Google search using the term “credit card dumps” A popular means of trading stolen information, takes you to sites such as The Ethical Hacker Network Web-based forums post advertisements that (http://rahulhackingarticles.wetpaint.com/thread) and a are visible to anyone visiting and often only Google group set up for selling trading cards that includes require registration with a username. In order numerous posts selling stolen credit card data (http:// to attract visitors, many forums even offer groups.google.com/group/rec.games.trading-cards. marketplace.magic.sales). tutorials, how-to guides or even specialized venues for goods from specific countries or regions. ©2010 First Data Corporation. All rights reserved. firstdata.com page 4 Fraud Trends in 2010: A First Data White Paper Top Threats From a Growing Underground Economy In the FaaS model, the forums provide the opportunity for access to specialists who can help design methods for harvesting (or stealing) data such as malware, skimmers, botnets, and various other nefarious applications, depending on what the criminal is trying to accomplish. Figure 3: Malware for sale on now-defunct fraud forum DarkMarket Source: F-Secure.com Because no fraudulent act is finished until there is a cash-out on the stolen data, to help complete the transaction, “cashiers” and “money mules” are available for hire to act as intermediaries in converting information into true currency.