Towards Automatic Discovery of Cybercrime Supply Chains

Total Page:16

File Type:pdf, Size:1020Kb

Towards Automatic Discovery of Cybercrime Supply Chains Towards Automatic Discovery of Cybercrime Supply Chains Rasika Bhalerao∗, Maxwell Aliapoulios∗, Ilia Shumailovy, Sadia Afrozz, Damon McCoy∗ ∗ New York University, y University of Cambridge, z International Computer Science Institute, [email protected], [email protected], [email protected], [email protected], [email protected], Abstract—Cybercrime forums enable modern criminal en- [28], [29], [38]. However, we as a community do not have trepreneurs to collaborate with other criminals into increasingly any systematic methods of identifying these supply chains that efficient and sophisticated criminal endeavors. Understanding the enable more sophisticated and streamlined attacks. Currently connections between different products and services can often illuminate effective interventions. However, generating this un- analysts often manually investigate cybercrime forums to derstanding of supply chains currently requires time-consuming understand these supply chains, which is a time-consuming manual effort. process [19]. In this paper, we propose a language-agnostic method to In this paper, we propose, implement, and evaluate a automatically extract supply chains from cybercrime forum posts framework to systematically identify relevant supply chains and replies. Our supply chain detection algorithm can identify 36% and 58% relevant chains within major English and Russian present in cybercrime forums. Our framework is composed of forums, respectively, showing improvements over the baselines of several components which include automated methods based 13% and 36%, respectively. Our analysis of the automatically on supervised Natural Language Processing (NLP) techniques generated supply chains demonstrates underlying connections and a graph-traversal algorithm. Our approach classifies the between products and services within these forums. For example, product category from a forum post, identifies the replies the extracted supply chain illuminated the connection between hack-for-hire services and the selling of rare and valuable indicating that a user bought or sold a product, then builds ‘OG’ accounts, which has only recently been reported. The an interaction graph and uses a graph traversal algorithm to understanding of connections between products and services discover links of related product buying and subsequent selling exposes potentially effective intervention points. posts. Our approach is language agnostic and does not require Index Terms—Security, Cybercrime, Natural Language Pro- manual categorizations of products, an improvement over prior cessing work on product detection [33]. We used our end-to-end supply chain identification pipeline I. INTRODUCTION to analyze two publicly available cybercrime forums and are Cybercrime-as-a-Service lowers the barrier to entry for able to identify 36% and 58% relevant links in our English new cybercriminals by commoditizing different parts of at- language and Russian language forums, respectively. These tacks [37]. For example, without commoditization, a spammer are supply chain links where users are buying products that needs to find a way to send e-mails, acquire mailing lists, are likely used to facilitate subsequent product offerings (i.e., create storefront websites, contract with web hosting, register a user buying OSN reputation boosting services to groom domains, manage product fulfillment, accept online payments, accounts that are then sold to scammers) or users reselling and provide customer service. With commoditization, the products after they are no longer useful to their original owner. spammer can outsource different responsibilities to different This is an increase from our baselines of 13% and 36%, criminals specialized in one specific task. Cybercriminals often respectively. rely on underground cybercrime forums to establish these The main contributions of our paper are the following: arXiv:1812.00381v2 [cs.CR] 4 Dec 2018 trade relationships that can facilitate the exchange of illicit * We develop, implement and evaluate an automated goods and services. These cybercrime forums thus play a approach for discovering the cybercrime supply chain crucial role in increasing efficiency and promoting innovation (Section IV). Our method uses language agnostic NLP in the cybercrime ecosystem. However, these dependencies can methods and graph traversal to automate the discovery also provide opportunities to undermine a spammer at more of the supply chains. vulnerable points such as the online payment channel [25]. * We perform an analysis of our automatically generated The supply chain of a cybercrime can illuminate the se- supply chains to provide an understanding of how some quence of processes involved in the criminal activities. Prior commodity cybercrime products depend on other offer- work has shown that analyzing these supply chains can result ings within these forums (Section VI). in identifying weak points which could enable effective inter- * We distill our findings from the detected supply chains ventions [8]. There have been several studies exploring specific into several qualitative case studies (Section VII). These instance of these commoditized cybercrime offerings [4], [7], case studies highlight that we were efficiently able to dis- [40] and how some attacks can be more effectively undermined cover supplies chains exposing the connection between once their dependencies to other services are understood [18], the purchasing of hack-for-hire services and the selling of valuable online accounts. Despite this connection longitudinal data from eight structured online anonymous being present in the forums for years, it has only recently marketplaces over six years to understand the value change been discovered based on manual analysis [22]. This and commoditization of the criminal markets as “cybercrime- connection suggests a potentially more effective method as-a-service”. They concluded that commoditization in the of mitigating the theft of valuable online accounts by cybercrime market is still limited. Our work complements avoiding account authentication and recovery methods and extends this line of research by providing a method for based on mobile phone numbers. detecting connections between products. The rest of this paper is structured in the following way. Our approach goes beyond understanding the trust estab- Section II discusses background and related work in this area, lishment, organization, aggregate activity, and classification including past work which uses the same data. Section III performed in prior work. We use the results of our classifiers outlines the data used to validate our approach. Section IV to identify semantically meaningful forum interactions and outlines our approach and contributions in classification and automatically discover supply chains of the products that can supply chain discovery. We evaluate our work empirically improve our understanding of how these markets function in to demonstrate how our approach performs better than the practice. We analyzed the connections between products in baseline in Section V, and analyze the forums using our unstructured cybercrime forums and noticed mostly business- results in Section VI. Section VII outlines several real world to-business (we scope this to mean “sale to the trade” where scenarios where the generated supply chains add value to an the products being bought and sold often have no value except investigation. Section VIII identifies limitations and discusses as a building block to enable an attack) transactions. This the implication of our results. We conclude in Section IX. allows us to study the criminal-to-criminal supply chains that enable attacks. Some of these were previously studied from II. BACKGROUND AND RELATED WORK the direct attackers and victims’ perspectives, such as romance Cybercriminal forums provide a unique opportunity to un- scams [15]. Our new understanding of the underlying supply derstand how criminal markets operate. Criminals rely on these chains can illuminate different and potentially more effective forums to establish trade relationships and facilitate exchanges methods of undermining these threats [25]. of goods and information. The typical forum structure follows the subforum > thread > post > reply hierarchy. III. FORUMS A subforum typically pertains to a particular subject: for To evaluate our approach, we chose two popular forums: example, marketplace or introductions. Users then Antichat (Russian) and Hack Forums (English) (Table I). We can create threads within subforums where a thread is a chose these forums because they are large, publicly avail- collection of messages. Each thread will always contain a first able, and have been used to evaluate cybercrime analysis post, which in this paper, we will use interchangeably with methodologies in prior studies [10], [33]. We also have access product post. We will also use the term reply post to more recent data from these two forums and other large to refer to the posts which come after the product post in each cybercrime forums through an agreement with a security thread. This is a key part of detecting relevant supply chains company. However, this data is private and our agreement based on public information. prevents us from publicly sharing these datasets. Thus, in this Several prior works studied the organization of the cyber- paper we chose to limit our evaluation to public datasets so crime forums [1], [24], [26], [30], profiling key actors [31], as to enable reproducibility of our major findings.
Recommended publications
  • Key Player Identification in Underground Forums Over
    Session: Long - Graph Nerual Network II CIKM ’19, November 3–7, 2019, Beijing, China Key Player Identification in Underground Forums over Atributed Heterogeneous Information Network Embedding Framework Yiming Zhang, Yujie Fan, Liang Zhao Chuan Shi Yanfang Ye∗ Department of IST School of CS Department of CDS, Case Western George Mason University Beijing University of Posts and Reserve University, OH, USA VA, USA Telecommunications, Beijing, China ABSTRACT ACM Reference Format: Online underground forums have been widely used by cybercrimi- Yiming Zhang, Yujie Fan, Yanfang Ye, Liang Zhao, and Chuan Shi. 2019. nals to exchange knowledge and trade in illicit products or services, Key Player Identifcation in Underground Forums over Attributed Hetero- geneous Information Network Embedding Framework. In which have played a central role in the cybercriminal ecosystem. In The 28th ACM order to combat the evolving cybercrimes, in this paper, we propose International Conference on Information and Knowledge Management (CIKM ’19), November 3–7, 2019, Beijing, China. ACM, New York, NY, USA, 10 pages. and develop an intelligent system named iDetective to automate https://doi.org/10.1145/3357384.3357876 the analysis of underground forums for the identifcation of key players (i.e., users who play the vital role in the value chain). In 1 INTRODUCTION iDetective, we frst introduce an attributed heterogeneous informa- tion network (AHIN) for user representation and use a meta-path As the Internet has become one of the most important drivers in the based approach to incorporate higher-level semantics to build up global economy (e.g., worldwide e-commerce sales reached over relatedness over users in underground forums; then we propose $2.3 trillion dollars in 2017 and its revenues are projected to grow to $4.88 trillion dollars in 2021 [31]), it also provides an open and Player2Vec to efciently learn node (i.e., user) representations in shared platform by dissolving the barriers so that everyone has AHIN for key player identifcation.
    [Show full text]
  • Supervised Discovery of Cybercrime Supply Chains
    Mapping the Underground: Supervised Discovery of Cybercrime Supply Chains Rasika Bhalerao∗, Maxwell Aliapoulios∗, Ilia Shumailov†, Sadia Afroz‡, Damon McCoy∗ ∗ New York University, † University of Cambridge, ‡ International Computer Science Institute [email protected], [email protected], [email protected], [email protected], [email protected], Abstract—Understanding the sequences of processes needed expertise and connections. Machine learning has been used to perform a cybercrime is crucial for effective interventions. to automate some analysis of cybercrime forums, such as However, generating these supply chains currently requires time- identifying products that are bought and sold [26], however, consuming manual effort. We propose a method that leverages machine learning and graph-based analysis to efficiently extract using it to discover the trade relationship between products supply chains from cybercrime forums. Our supply chain de- has not been explored yet. tection algorithm can identify 33% and 42% relevant chains In this paper, we propose an approach to systematically within major English and Russian forums, respectively, showing identify relevant supply chains from cybercrime forums. Our improvements over the baselines of 11% and 5%, respectively. approach classifies the product category from a forum post, Our analysis of the supply chains demonstrates underlying connections between products and services that are potentially identifies the replies indicating that a user bought or sold the useful understanding and undermining the illicit activity of these product, then builds an interaction graph and uses a graph forums. For example, our extracted supply chains illuminate cash traversal algorithm to discover links between related product out and money laundering techniques and their importance to buying and subsequent selling posts.
    [Show full text]
  • Measuring Cybercrime As a Service (Caas) Offerings in a Cybercrime Forum
    Measuring Cybercrime as a Service (CaaS) Offerings in a Cybercrime Forum Ugur Akyazi Michel van Eeten Carlos H. Gañán Delft University of Technology Delft University of Technology Delft University of Technology [email protected] [email protected] [email protected] ABSTRACT could be purchased for around $200 and a month of SMS spoofing The emergence of Cybercrime-as-a-Service (CaaS) is a critical evo- for only $20. In addition to technical tools, it is also possible to hire lution in the cybercrime landscape. A key area of research on CaaS services, such as targeted account takeover [35]. The overall impact is where and how the supply of CaaS is being matched with demand. of CaaS is to make cybercrime more accessible to new criminals, Next to underground marketplaces and custom websites, cyber- as well as to support business models for advanced criminals via crime forums provide an important channel for CaaS suppliers to specialized business-to-business services [22]. attract customers. Our study presents the first comprehensive and A key area of research on CaaS is where and how the supply longitudinal analysis of types of CaaS supply and demand on a of these services is being matched with demand. This question is cybercrime forum. We develop a classifier to identify supply and critical for developing effective disruption strategies by law enforce- demand for each type and measure their relative prevalence and ment. Simply put: how do CaaS suppliers find their customers? One apply this to a dataset spanning 11 years of posts on Hack Forums, of the promises of CaaS is that it is accessible for new entrants, so one of the largest and oldest ongoing English-language cybercrime it cannot operate effectively within old and constrained model of forum on the surface web.
    [Show full text]
  • Hackers Gonna Hack: Investigating the Effect of Group Processes and Social Identities Within Online Hacking Communities
    Hackers gonna hack: Investigating the effect of group processes and social identities within online hacking communities Helen Thackray Thesis submitted for the degree of Doctor of Philosophy Bournemouth University October 2018 This copy of the thesis has been supplied on condition that anyone who consults it is understood to recognise that its copyright rests with its author and due acknowledgement must always be made of the use of any material contained in, or derived from, this thesis. 1 2 Hackers gonna hack: Investigating the effect of group processes and social identities within online hacking communities Helen Thackray Abstract Hacking is an ethically and legally ambiguous area, often associated with cybercrime and cyberattacks. This investigation examines the human side of hacking and the merits of understanding this community. This includes group processes regarding: the identification and adoption of a social identity within hacking, and the variations this may cause in behaviour; trust within in the social identity group; the impact of breaches of trust within the community. It is believed that this research could lead to constructive developments for cybersecurity practices and individuals involved with hacking communities by identifying significant or influencing elements of the social identity and group process within these communities. For cybersecurity, the positive influence on individual security approaches after the hacker social identity adoption, and the subsequent in-group or out-group behaviours, could be adapted to improve security in the work place context. For individuals involved in the communities, an increase in the awareness of the potential influences from their adopted social identities and from other members could help those otherwise vulnerable to manipulation, such as new or younger members.
    [Show full text]
  • The Gateway Trojan
    THE GATEWAY TROJAN Volume 1, Version 1 TABLE OF CONTENTS About This Report ....................................................................................................................................1 Why This Malware?..................................................................................................................................2 The Basic Questions About RATs..........................................................................................................2 Different Breeds of RATs ........................................................................................................................5 Symantec’s Haley Subcategories of RATs .........................................................................................6 Dissecting a RAT .......................................................................................................................................7 Category II: Common RATs ....................................................................................................................9 Back Orifice ...........................................................................................................................................9 Bifrost ................................................................................................................................................. 10 Blackshades ....................................................................................................................................... 11 DarkTrack .........................................................................................................................................
    [Show full text]
  • Automatic Detection of Cybercrime-Suspected Threads in Online Underground Forums
    Graduate Theses, Dissertations, and Problem Reports 2018 Automatic Detection of Cybercrime-suspected Threads in Online Underground Forums Jian Liu Follow this and additional works at: https://researchrepository.wvu.edu/etd Recommended Citation Liu, Jian, "Automatic Detection of Cybercrime-suspected Threads in Online Underground Forums" (2018). Graduate Theses, Dissertations, and Problem Reports. 7204. https://researchrepository.wvu.edu/etd/7204 This Thesis is protected by copyright and/or related rights. It has been brought to you by the The Research Repository @ WVU with permission from the rights-holder(s). You are free to use this Thesis in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you must obtain permission from the rights-holder(s) directly, unless additional rights are indicated by a Creative Commons license in the record and/ or on the work itself. This Thesis has been accepted for inclusion in WVU Graduate Theses, Dissertations, and Problem Reports collection by an authorized administrator of The Research Repository @ WVU. For more information, please contact [email protected]. Automatic Detection of Cybercrime-suspected Threads in Online Underground Forums Jian Liu Thesis submitted to the Benjamin M. Statler College of Engineering and Mineral Resources at West Virginia University in partial fulfillment of the requirements for the degree of Master of Science in Computer Science Yanfang Ye, Ph.D., Committee Chairperson Xin Li, Ph.D. Elaine M.
    [Show full text]
  • The Internet of Things in the Cybercrime Underground
    The Internet of Things in the Cybercrime Underground Stephen Hilt, Vladimir Kropotov, Fernando Mercês, Mayra Rosario, and David Sancho TREND MICRO LEGAL DISCLAIMER Contents The information provided herein is for general information and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all 4 situations and may not reflect the most current situation. Nothing contained herein should be relied on or acted Introduction upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing herein should be construed otherwise. Trend Micro reserves the right to modify the contents of this document 7 at any time without prior notice. The IoT in Underground Communities Translations of any material into other languages are intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise related to the accuracy of a translation, please refer to 40 the original language official version of the document. Any Case Studies on IoT Underground discrepancies or differences created in the translation are not binding and have no legal effect for compliance or Criminals enforcement purposes. Although Trend Micro uses reasonable efforts to include accurate and up-to-date information herein, Trend Micro 43 makes no warranties or representations of any kind as to its accuracy, currency, or completeness. You agree Predictions that access to and use of and reliance on this document and the content thereof is at your own risk. Trend Micro disclaims all warranties of any kind, express or implied.
    [Show full text]
  • The Internet of Things in the Cybercrime Underground
    The Internet of Things in the Cybercrime Underground Stephen Hilt, Vladimir Kropotov, Fernando Mercês, Mayra Rosario, and David Sancho TREND MICRO LEGAL DISCLAIMER Contents The information provided herein is for general information and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all 4 situations and may not reflect the most current situation. Nothing contained herein should be relied on or acted Introduction upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing herein should be construed otherwise. Trend Micro reserves the right to modify the contents of this document 7 at any time without prior notice. The IoT in Underground Communities Translations of any material into other languages are intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise related to the accuracy of a translation, please refer to 40 the original language official version of the document. Any Case Studies on IoT Underground discrepancies or differences created in the translation are not binding and have no legal effect for compliance or Criminals enforcement purposes. Although Trend Micro uses reasonable efforts to include accurate and up-to-date information herein, Trend Micro 43 makes no warranties or representations of any kind as to its accuracy, currency, or completeness. You agree Predictions that access to and use of and reliance on this document and the content thereof is at your own risk. Trend Micro disclaims all warranties of any kind, express or implied.
    [Show full text]
  • Towards a New Cyber Threat Actor Typology
    Mark de Bruijne, Michel van Eeten, Carlos Hernández Gañán, Wolter Pieters Towards a new cyber threat actor typology A hybrid method for the NCSC cyber security assessment Towards a new cyber threat actor typology A hybrid method for the NCSC cyber security assessment By Mark de Bruijne, Michel van Eeten, Carlos Hernández Gañán, Wolter Pieters Faculty of Technology, Policy and Management Delft University of Technology 1 Preface This report could not have been made without the help of a large number of people. We cannot mention all of these people by name, but our thanks extends to all of them. First of all, the researchers would like to thank all the interviewees, who were promised anonymity, for their precious time and valuable feedback. They have contributed a lot to the report and our understanding of cyber actors and the methods which can be used to classify them. We, furthermore, would like to extend these thanks to the members of the supervisory committee. The committee consisted of Prof. Stijn Ruiter (chair), drs. Olivier Hendriks, drs. Noortje Henrichs, dr. Jan Kortekaas, Prof. Eric Verheul, and drs. Wytske van der Wagen. We appreciated their critical and highly constructive feedback during the entire process. Needless to say, the usual disclaimer applies: The contributions from respondents or members of the supervisory committee do not mean that the respondents, members of the supervisory committee or these institutions automatically agree with the complete content of the report. Also, we would like to emphasize that the report does not necessarily reflect the opinion of or the Minister or the Ministry of Security and Justice.
    [Show full text]
  • Lord of the Flies
    LORD OF THE FLIES: AN OPEN-SOURCE INVESTIGATION INTO SAUD AL-QAHTANI Table of Contents Introduction .................................................................................................................................................................................................... 1 I. Key Findings...............................................................................................................................................................................................3 II. From Poet To Enforcer ........................................................................................................................................................................ 4 III. Leaked Contact Information Owned By Al-Qahtani ............................................................................................................8 Al-Qahtani Twitter Connected To [email protected] And Cell Number ....................................................................8 Royal Court Email Used To Provide Al-Qahtani Phone Number, Email ................................................................... 10 Gmail Linked To Same Al-Qahtani Phone Number And Email As Twitter .............................................................. 11 IV. Hack Forums Activity ....................................................................................................................................................................... 15 Scammed On Day One .....................................................................................................................................................................
    [Show full text]
  • U. C. Berkeley Dissertation
    The Dark Net: De-Anonymization, Classification and Analysis by Rebecca Sorla Portnoff A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor David Wagner, Chair Professor Vern Paxson Professor David Bamman Spring 2018 The Dark Net: De-Anonymization, Classification and Analysis Copyright c 2018 by Rebecca Sorla Portnoff 1 Abstract The Dark Net: De-Anonymization, Classification and Analysis by Rebecca Sorla Portnoff Doctor of Philosophy in Computer Science University of California, Berkeley Professor David Wagner, Chair The Internet facilitates interactions among human beings all over the world, with greater scope and ease than we could have ever imagined. However, it does this for both well-intentioned and malicious actors alike. This dissertation focuses on these malicious persons and the spaces online that they inhabit and use for profit and plea- sure. Specifically, we focus on three main domains of criminal activity on the clear web and the Dark Net: classified ads advertising trafficked humans for sexual services, cy- ber black-market forums, and Tor onion sites hosting forums dedicated to child sexual abuse material (CSAM). In the first domain, we develop tools and techniques that can be used separately and in conjunction to group Backpage sex ads by their true author (and not the claimed author in the ad). Sites for online classified ads selling sex are widely used by human traffickers to support their pernicious business. The sheer quantity of ads makes manual exploration and analysis unscalable.
    [Show full text]
  • Selling “Slaving”
    SELLING “SL AV ING” OUTING THE PRINCIPAL ENABLERS THAT PROFIT FROM PUSHING MALWARE AND PUT YOUR PRIVACY AT RISK JULY 2015 TABLE OF CONTENTS TABLE OF CONTENTS ..................................................................................................................................................I TABLE OF IMAGES ..........................................................................................................................................................II ABOUT THIS REPORT ..................................................................................................................................................1 EXECUTIVE SUMMARY .............................................................................................................................................3 Dirty Rats: How Hackers Are Peeking Into Your Bedroom ...............................................3 WHAT CAN RATTERS DO? .................................................................................................................................... 6 SELLING “SLAVING” ......................................................................................................................................................7 CHEAP, EASY-TO-USE MALWARE THAT PAYS FOR ITSELF............................................... 8 STORIES OF CRUELTY—“RATS” ON THE ATTACK .......................................................................10 YOUTUBE HAS A RAT PROBLEM................................................................................................................
    [Show full text]