Criminals Become Tech Savvy
Total Page:16
File Type:pdf, Size:1020Kb
Attack Trends Elias Levy, [email protected] Ivan Arce, [email protected] Criminals Become Tech Savvy n this installment of Attack Trends, I’ll look at the growing 2003 alone. Fraud schemes are usu- ELIAS LEVY ally peddled by individuals who Symantec convergence of technically savvy computer crackers with spam potential victims (www. brightmail.com/brc_fraud-stats. financially motivated criminals. Historically, most com- html), such as the Nigerian, or 419, scam (see the 419 Coalition’s Web puter crime on the Internet has not been financially moti- site at http://home.rica.net/alphae/ I 419coal/). But as the number of vated: it was the result of either curious or malicious technical fraud cases has increased, so has the public’s awareness of them; fraudsters attackers, called crackers. This changed Increasingly on the defensive, are increasingly forced to resort to as the Internet became more com- spammers are fighting back by be- more intricate schemes. mercialized and more of the public has coming more sophisticated, generat- We’re now seeing the practice of gone online. Financially motivated ing unique messages, and finding new “phishing” gaining popularity with actors in the fauna of the Internet’s open proxies or SMTP relays to send fraudsters. Using this scheme, crimi- seedy underbelly—spammers and messages and hide their true sources. nals create email messages with re- fraudsters—soon joined crackers to turn addresses, links, and branding exploit this new potential goldmine. Fraud that seem to come from trusted, Internet fraud has also become a se- well-known organizations; the hope Spam rious problem. In the past three is to convince the victim to disclose As anyone with a computer can tell years, Consumer Sentinel, a com- sensitive information. This practice you, the spam problem has grown plaint database developed and main- is rooted in crackers’ first attempts to to immense proportions. It now tained by the US Federal Trade fool America Online users into part- represents more than 50 percent of Commission (www.consumer.gov/ ing with their screen names and pass- all email transmitted over the Inter- sentinel/), has recorded more than words in the mid-1990s. net (see MessageLabs’ December 300,000 Internet-related fraud com- The goal these days is to extract in- 2003 Monthly View, www.messagelabs. plaints, which accounted for nearly formation from a victim that crackers com/binaries/Dec03.pdf, and US$200 million personal losses in can use for financial gain more than BrightMail’s January 2004 Spam Statistics update, www.brightmail. com/spamstats.html). Its costs, which Internet service providers (ISPs) pass on to their customers, are enormous. With spam’s ubiquity comes a whole culture and industry devoted to fighting it. Large groups of people, such as the Spamhaus Project, spend lots of effort to identify spams’ sources so as to shut down spammers’ Internet access. They’ve even created new technology to flag its sources (DNS or border gateway protocol- [BGP]- based blacklists) and spam messages (Bayesian networks, distrib- uted checksum databases, and heuristics) for filtering purposes. PUBLISHED BY THE IEEE COMPUTER SOCIETY I 1540-7993/04/$20.00 © 2004 IEEE I IEEE SECURITY & PRIVACY 65 Attack Trends Worms and viruses used in scams his is an incomplete list of malicious code that has been used by spammers and fraudsters. It is a testament to their increased sophisti- Tcation in committing online crime. Spam relays: Backdoor.Hogle—http://securityresponse.symantec.com/avcenter/venc/data/backdoor.hogle.html DDoS attacks: W32.Mimail.F—http://securityresponse.symantec.com/avcenter/venc/data/[email protected] W32.Mimail.G—http://securityresponse.symantec.com/avcenter/venc/data/[email protected] W32.Mimail.L—http://securityresponse.symantec.com/avcenter/venc/data/[email protected] Phishing scams: W32.Mimail.I—http://securityresponse.symantec.com/avcenter/venc/data/[email protected] W32.Mimail.J—http://securityresponse.symantec.com/avcenter/venc/data/[email protected] W32.Mimail.P—http://securityresponse.symantec.com/avcenter/venc/data/[email protected] W32.Mimail.Q—http://securityresponse.symantec.com/avcenter/venc/data/[email protected] W32.Mimail.S—http://securityresponse.symantec.com/avcenter/venc/data/[email protected] Trojan Septer.Trojan—http://securityresponse.symantec.com/avcenter/venc/data/septer.trojan.html Reverse HTTP proxies: Backdoor.Migmaf—http://securityresponse.symantec.com/avcenter/venc/data/backdoor.migmaf.html W32.HLLW.Fizzer—http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.fi[email protected] Stealing sensitive information: PWSteal.Bancos—http://securityresponse.symantec.com/avcenter/venc/data/pwsteal.bancos.html W32.Bibrog—http://securityresponse.symantec.com/avcenter/venc/data/[email protected] W32.Dumuru.Y—http://securityresponse.symantec.com/avcenter/venc/data/[email protected] W32.Dumuru.Z—http://securityresponse.symantec.com/avcenter/venc/data/[email protected] PWSteal.Tarno—http://securityresponse.symantec.com/avcenter/venc/data/pwsteal.tarno.html PWSteal.Banpaes—http://securityresponse.symantec.com/avcenter/venc/data/pwsteal.banpaes.html PWSteal.Banpaes.B—http://securityresponse.symantec.com/avcenter/venc/data/pwsteal.banpaes.b.html Others Download.Trojan.PSK—http://securityresponse.symantec.com/avcenter/venc/data/download.trojan.psk.html W32.Mimail.A—http://securityresponse.symantec.com/avcenter/venc/data/[email protected] Downloader.Mimail—http://securityresponse.symantec.com/avcenter/venc/data/downloader.mimail.html for tweaking AOL users. A com- Malicious code Criminals have also used dialers, monly targeted item is victims’ credit- In the past, we’ve seen spammers oc- programs designed to use victims’ card information (number, expiration casionally use worms and trojans to computer modems to dial national date, card-validation value, and so on). hijack a victim’s Web browsers. They or international “premium services” Criminals also want access to Internet replace the victims’ home and search phone numbers, generating un- payment systems such as e-Bullion, e- pages with links to Web spam, as well wanted charges. (Dialers are some- gold, Evocash, INT Gold, Gold- as drop links to the spam in the vic- times used legitimately; porno- Money, PayPal, and Swiftpay; online tims’ bookmarks and on their desk- graphic Web sites use them to charge transaction services such as Autho- tops. To make money, they infect customers for access to their service.) rize.Net, iBill, and Verotel; and Inter- computers with malicious code that More recently, the line between net accessible banks such as Bank of generates fraudulent ad views (by re- spammers, fraudsters, and crackers America, Barclays Bank, Citibank, peatedly visiting Web pages with spe- has continued to blur as the former Halifax Bank, Lloyds Bank, Nation- cific ads for which the criminals are become more sophisticated and the wide Bank, and Wells Fargo. paid for driving users to view the ads). latter become financially motivated. 66 IEEE SECURITY & PRIVACY I MARCH/APRIL 2004 Attack Trends As noted in “The Making of a Spam Backdoor.Migmaf also acted as a phishing scams, so fraudsters have Zombie Army: Dissecting the Sobig SOCKS proxy server, which per- upped the ante: instead of asking re- Worms” (IEEE Security & Privacy’s mitted the spammer to send out cipients for information, they ob- Malware Recon department, July/ anonymous spam. Infected ma- tain it either from the victims’ com- August 2003, pp. 58–59), spammers chines participated in a PayPal puter system or by monitoring their now can design worms that use in- phishing scam by acting as a proxy Web activity. fected computers to send out spam. for the scam’s Web site (www. The W32.Mimail.Q worm securityfocus.com/archive/1/ steals E-Gold information stored in Spam relays 328772). Evidence suggests that users’ systems and emails it to the One trick in the spammer’s arsenal spammers similarly used an earlier worm’s author. Backdoor.Lala and is to use worms and trojans to cre- worm, W32.HLLW.Fizzer, to point Backdoor.Lala.B steal authentica- ate spam relays. Backdoor.Hogle’s to their spam Web sites. tion cookies for PayPal, e-Bullion, creator designed it specifically for Evocash and eBay, among others, this purpose. After infecting a sys- DDoSs for example. tem, it checks to see whether the Spammers also resort to using The PWSteal.Bancos series of tro- host’s IP address is listed in the worms to create armies of comput- jans and the W32.Bibrog series of blacklists that spamcop.net and ers to launch massive distributed de- worms monitor which Web pages abuse.net maintain; if it’s listed, the nial-of-service (DDoS) attacks users visit. When they detect users program terminates. Several other against spam-fighting resources on viewing a page on certain banks’ sites, worms are suspected vehicles for the Internet. (For URLs with more they display a fake Web page that looks installing proxies that spammers information, see the sidebar.) The identical to that of the banks’. This can use (for example, the current W32.Mimail.F, W32.Mimail.G, and page then directs users to enter their fi- crop of MyDoom worms). W32.Mimail.L worms, for example, nancial information and steals it. attacked spamhaus.org (www.spam Several other trojans and worms Reverse HTTP proxies haus.org/cyberattacks/), spews.org, log keystrokes (such as W32.Du- Spam sometimes points the recipient and spamcop.net. Additionally, the muru.Y, W32.Dumuru.Z, PW- back to a Web site. Antispam cru- W32.Mimail.L worm launched a joe Steal.Tarno, PWSteal.Banpaes, PW- saders attempt to track down these job attack, also called a reputation at- Steal.Banpaes.B, and the TROJ Web sites, contact the responsible tack, against the same sites. These at- _WINCAP series) or record data in ISPs, and have them shut down.