Having Your Cake and Eating It: an Analysis of Concession-Abuse-As-A-Service

Having Your Cake and Eating It: an Analysis of Concession-Abuse-As-A-Service

Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service Zhibo Sun∗, Adam Oest∗, Penghui Zhang∗, Carlos Rubio-Medrano‡ Tiffany Bao∗, Ruoyu Wang∗, Ziming Zhao¶, Yan Shoshitaishvili∗, Adam Doupé∗, Gail-Joon Ahn ∗§ ∗Arizona State University, ‡Texas A&M University - Corpus Christi ¶Rochester Institute of Technology, §Samsung Research ∗{zhibo.sun, aoest, penghui.zhang, tbao, fishw, yans, doupe, gahn}@asu.edu ‡[email protected], ¶[email protected] Abstract companies in the difficult position of choosing between scam mitigation and the happiness of legitimate customers. Concession Abuse as a Service (CAaaS) is a growing scam A perception by vendors who fall victim to concession service in underground forums that defrauds online retailers abuse may be that these attacks are isolated incidents and through the systematic abuse of their return policies (via social can thus be resolved in an ad-hoc fashion. However, through engineering) and the exploitation of loopholes in company a comprehensive analysis of underground forums and a protocols. Timely detection of such scams is difficult as they concession abuse provider, we find that such attacks operate are fueled by an extensive suite of criminal services, such at scale, target merchants across multiple industry sectors, as credential theft, document forgery, and fake shipments. involve complex coordination between different underground Ultimately, the scam enables malicious actors to steal arbitrary actors, and overcome current industry best practices and goods from merchants with minimal investment. mitigations to reliably yield success for the criminals. In this paper, we perform in-depth manual and automated In this paper, we show that concession abuse is, in fact, analysis of public and private messages from four large a prevalent criminal business service to which even unso- underground forums to identify the malicious actors involved phisticated cybercriminals can subscribe and subsequently in CAaaS, carefully study the operation of the scam, and profit with minimal investment. We refer to this ecosystem as define attributes to fingerprint the scam and inform mitigation Concession Abuse as a Service (CAaaS). The unsophisticated strategies. Additionally, we surveyed users to evaluate their customers of CAaaS (scam initiators) request that attackers attitudes toward these mitigations and understand the factors (service providers) engage with a targeted merchant to execute that merchants should consider before implementing these the scam. The scam initiator’s ultimate goal is to obtain money strategies. We find that the scam is easy to scale—and can from a purchased order via a concession from the merchant bypass traditional anti-fraud efforts—and thus poses a notable after paying a nominal commission to the service provider. threat to online retailers. Despite its surface simplicity, CAaaS is a sophisticated 1 Introduction online criminal industry that coordinates a diverse range of parties to facilitate key stages of the scam. An end-to-end In concession abuse attacks, scammers leverage social supply chain of illicit services underpins CAaaS and provides engineering techniques to exploit the return policies of components such as stolen account credentials [42], forged targeted merchants and obtain a concession (in the form documents [17], and reshipping services [15]. Given the fact of a refund or a replacement item) without returning any that existing mitigation approaches cannot effectively protect originally purchased products. Recent news of Amazon being merchants from CAaaS [14, 45], and the wide range of threat scammed out of e 300,000 and $1.2M in 2017 and 2019 in actors that the scam entails, the research community must seek two targeted concession abuse attacks reveals the tremendous systematic and proactive mitigations to stop concession abuse (and growing) damage that such attacks can cause [14, 45]. across the entire ecosystem. To propose such mitigations, we These attacks become particularly heinous when scammers first carefully study CAaaS to understand the economics and obtain such refunds using stolen accounts that belong to implementation of the attacks, and then conduct a survey as legitimate customers. Once successful, scammers monetize a preliminary evaluation of the proposed mitigations. the refunds (often gift cards or replacement goods from To this end, we performed an in-depth analysis of criminal the retailer) through services in the underground economy. communications on four popular underground forums, where Because offering concessions to appease distressed customers we discovered 2,251 service providers of CAaaS scams is a crucial business practice for retailers, these scams place who, collectively, target 264 merchants. Both scammers and targeted merchants are distributed globally, and we found been greatly lowered such that even unskilled criminals can that CAaaS has not only remained active but is becoming leverage and profit from concession abuse. more prevalent in recent years, despite the evolution of retailer In this paper, we study the ecosystem of concession abuse as return policies to prevent fraud. We identified underground a service (CAaaS). In particular, we investigate the following communities in which users discuss scam questions, share research questions: their success and failure experiences, and even post tutorials 1. How does concession abuse work as a service (Section3)? for beginners. We found that these resources help train 2. What are the characteristics of CAaaS, and on what scale ill-intentioned users to become CAaaS service providers does it operate (Section4)? within months. Additionally, we joined a private discussion 3. What do criminals do to execute concession abuse group run by a service provider and found the provider helped successfully, and when do certain scams fail (Section5)? refund at least $81,159.27 over three months. 4. How can merchants prevent concession abuse from Prior work has examined social engineering skills [18, 20] succeeding at scale (Section6)? and their applicability to traditional web-based phishing Analysis Approach. We used a qualitative approach for attacks, as well as persuasion techniques that manipulate Question 1, a quantitative approach for Question 2, and hybrid people into performing actions or divulging confidential approaches for Questions 3 and 4. For clarity, we describe information [3, 8, 12, 29] and the phenomenon of criminal each approach in its respective section. reshipping services [15]. General exploitation of merchants’ Data Sources We base our analysis of CAaaS on four return policies was studied in an offline context [37], and distinct data sources discussed throughout the remainder CAaaS combines and enhances these areas of cybercrime to of this paper: threads and posts from underground forums, target a unique part of the attack surface against retailers. messages in private criminal groups, interviews with two large By performing the first such study of CAaaS, we help (undisclosed) US-based merchants, and a user survey about identify ways to disrupt the economics of the scam and possible mitigation strategies. empower vulnerable retailers to implement proactive defenses. We sought to identify underground forums with a significant Our contributions are thus as follows: focus on topics related to retail scams (the presence of which • We present the first study of the operations of an emerging might imply the respective community’s interest in concession threat, Concession Abuse as a Service, by examining the abuse). We started with a large forum that had recently suffered wide range of actors and supporting services involved in a database breach: Nulled.io [33]. Using this database, we could the scam and its economics. analyze public threads and private messages. We then crawled • We characterize techniques that allow CAaaS to effectively all the URLs therein to compile a list of candidate forum URLs. defraud merchants, as well as failure cases and limitations We manually analyzed each publicly accessible forum on of such techniques. this list, and for each that was still online and had at least • We identify attributes to fingerprint CAaaS, propose mit- 100 threads in scam-related sections, we (1) exhaustively igation approaches usable by merchants, and evaluate these crawled its public content and (2) recursively applied the approaches through merchant interviews and a user survey. same process to discover other candidate forum URLs. We 2 Overview ultimately identified and crawled four forums suitable for our analysis: Nulled.io (NULLED), SocialEngineered.net (SENet), Concession abuse is a type of cybercrime that typically Sinister.ly (SIN), and MPGH.net (MPGH). We summarize targets online merchant services.1 In such scams, a malicious the relative popularity of these forums, at the time of our data customer seeks to receive a concession—a free replacement or collection in early 2019, in Table1. a refund—from a targeted merchant by socially engineering Given the fact that commoditized criminal services cater the Customer Service Representative (CSR) and exploiting to less sophisticated criminals [30], we believe that our choice the return process. If the scam succeeds, the criminal will get a of clearnet forums was appropriate for the analysis of CAaaS. free replacement or a refund, either of which can be monetized Ethics. We proactively addressed ethical concerns by through additional intermediaries (see Section 3.4). working closely with our Institutional

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    18 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us