The Underground Economy: Difference between revisions
(10 intermediate revisions by 2 users not shown) | |||
Line 9: | Line 9: | ||
==Categorization== | ==Categorization== | ||
* Threats and Actors: [[Criminals and Criminal Organizations]]; [[Financial Institutions and Networks]] | |||
* Issues: [[Cybercrime]] | * Issues: [[Cybercrime]]; [[Economics of Cybersecurity]] | ||
==Key Words== | ==Key Words== | ||
Line 42: | Line 42: | ||
The underground economy is fertile ground for the pursuit and prosecution of the miscreants. Most of the underground economy servers are public, advertised widely, and easy to find (standard IRC ports, very descriptive DNS RRs, etc.). There is absolutely no presumption of privacy in the underground economy; the channels aren’t hidden, the channels have no keys, and the servers have no passwords. There is evidence of physical crime as well as online crime, and admissions of guilt, and all are readily available. Although the data in this article is obfuscated, these stanzas of gross fraud come with the name, address, phone number, SSN, and mother’s maiden name of the victim. That seems ready-made for a complaint. It is time to use the miscreants’ greatest asset, the underground economy, against them: | The underground economy is fertile ground for the pursuit and prosecution of the miscreants. Most of the underground economy servers are public, advertised widely, and easy to find (standard IRC ports, very descriptive DNS RRs, etc.). There is absolutely no presumption of privacy in the underground economy; the channels aren’t hidden, the channels have no keys, and the servers have no passwords. There is evidence of physical crime as well as online crime, and admissions of guilt, and all are readily available. Although the data in this article is obfuscated, these stanzas of gross fraud come with the name, address, phone number, SSN, and mother’s maiden name of the victim. That seems ready-made for a complaint. It is time to use the miscreants’ greatest asset, the underground economy, against them: | ||
Most of the underground economy servers are public, advertised widely, and easy to find (standard IRC ports, very descriptive DNS RRs, etc.). There is absolutely no presumption of privacy in the underground economy; the channels aren’t hidden, the channels have no keys, and the servers have no passwords. The clients in these channels are widely divergent | Most of the underground economy servers are public, advertised widely, and easy to find (standard IRC ports, very descriptive DNS RRs, etc.). There is absolutely no presumption of privacy in the underground economy; the channels aren’t hidden, the channels have no keys, and the servers have no passwords. The clients in these channels are widely divergent. There is no need to hide, period. | ||
* ''PRINCIPAL ACTORS AND THREATS:'' | * ''PRINCIPAL ACTORS AND THREATS:'' | ||
Line 57: | Line 51: | ||
chants and the miscreant consumers regarding compromised financial | chants and the miscreant consumers regarding compromised financial | ||
accounts, drops (compromised financial accounts used to launder funds), | accounts, drops (compromised financial accounts used to launder funds), | ||
and cashiers (those who can clean them out) | and cashiers (those who can clean them out). | ||
The miscreant spammers are some of the most highly paid individuals in | The miscreant spammers are some of the most highly paid individuals in | ||
Line 112: | Line 98: | ||
have many more accounts to sell, and they offer up the samples as adver- | have many more accounts to sell, and they offer up the samples as adver- | ||
tising. All amounts are in U.S. dollars, and some of these account totals are | tising. All amounts are in U.S. dollars, and some of these account totals are | ||
impressive, while others are quite small. | impressive, while others are quite small. | ||
With one channel, one 24-hour period, and just a few samples, at least | |||
US$1,599,335.80 has gone to fund multinational criminals. | US$1,599,335.80 has gone to fund multinational criminals. | ||
==Additional Notes and Highlights== | ==Additional Notes and Highlights== | ||
Expertise Required: Technology - Low |
Latest revision as of 15:04, 28 July 2010
Full Title of Reference
The Underground Economy: Priceless
Full Citation
Rob Thomas and Jerry Martin, The Underground Economy: Priceless, 31 USENIX ;login: 6 (2006). Web
Categorization
- Threats and Actors: Criminals and Criminal Organizations; Financial Institutions and Networks
- Issues: Cybercrime; Economics of Cybersecurity
Key Words
Botnet, Internet Relay Chat (IRC), Credit Card Fraud, Hacker, Identity Fraud/Theft, Keylogger, Malware, SPAM
Synopsis
An analysis of the ways in which miscreants in the underground economy monetize stolen credit card data, bot networks, compromised hosts and other spoils of cybercrime.
The greatest failure of new technology is a rush to market, without consideration of the risks and a cost/benefit analysis. This is at the heart of the security problem. Certainly, that is not to say that industries should not capitalize on technological advances but, rather, that they should consider risk and threat mitigation strategies prior to bringing any product to market.
Those who actively participate in the underground economy have another problem—how to move the significant quantity of illegally obtained funds. There are a variety of solutions they discuss, such as offshore trusts to protect their financial assets against lawsuits. Lawsuits, prying eyes, and seizure are all mitigated through the use of offshore banking. Several offshore banks will wittingly accept such accounts.
The underground economy is fertile ground for the pursuit and prosecution of the miscreants. Most of the underground economy servers are public, advertised widely, and easy to find (standard IRC ports, very descriptive DNS RRs, etc.). There is absolutely no presumption of privacy in the underground economy; the channels aren’t hidden, the channels have no keys, and the servers have no passwords. There is evidence of physical crime as well as online crime, and admissions of guilt, and all are readily available. Although the data in this article is obfuscated, these stanzas of gross fraud come with the name, address, phone number, SSN, and mother’s maiden name of the victim. That seems ready-made for a complaint. It is time to use the miscreants’ greatest asset, the underground economy, against them:
Most of the underground economy servers are public, advertised widely, and easy to find (standard IRC ports, very descriptive DNS RRs, etc.). There is absolutely no presumption of privacy in the underground economy; the channels aren’t hidden, the channels have no keys, and the servers have no passwords. The clients in these channels are widely divergent. There is no need to hide, period.
- PRINCIPAL ACTORS AND THREATS:
SPAMMERS:
One can readily see the plethora of advertisements by the miscreant mer- chants and the miscreant consumers regarding compromised financial accounts, drops (compromised financial accounts used to launder funds), and cashiers (those who can clean them out).
The miscreant spammers are some of the most highly paid individuals in the underground. It’s easy to see why—spam works, and yields high prof- its.
CASHIERS:
The miscreants advertise for cashiers for both logical and physical (e.g., go collect the money at a Western Union site) account cleanups. Cashing out these accounts often must be accomplished from within the country where the account resides. Enter the bank broker, the miscreant who will cash out the account. Demand is high for these miscreants, and they never ask questions. When a cashier attempts to clean out a bank account (50% always goes to the cashier) on behalf of another miscreant, that cashier must have some semblance of legitimacy with the bank. Increasingly, the miscreants are finding that a male voice attempting to clean out an account obviously belonging to a female isn’t accepted by the banks. Thus is born a new skill set: gender-based cashiers. There are plenty of female miscreants, willing to clean out accounts both virtually and physically.
DROPS:
One of the hottest commodities in the underground economy is the drop. A drop can have one of two definitions. The first definition of a drop is a location to which goods or cash can be sent. The person who owns the drop will then resend the items or hold them for pickup. There is a charge for this service, of course, ranging from a 70/30 (30% to the drop owner) split to a 50/50 split. Drops include homes and businesses, and often the drop owner is clueless about the contents of the dropped package. In this case, the drop owner is paid a flat fee by the shipper or the broker. The second definition of a drop is a bank account through which money can be moved. This is a convenient way to cash out bank accounts, online finan- cial accounts such as PayPal, and credit cards. The drop owner almost always receives 50% of the take, although competition in this space is reducing that percentage. The location of the drop is critical, as some com- panies won’t ship overseas.
DATA STOLEN:
How much money do the miscreants make in the underground economy? More to the point, how much money do they steal? Here’s a snapshot from one underground economy trading channel over a 24-hour period. These are the total account values for financial accounts to which these criminals have obtained access. These are just the samples; these miscreants claim to have many more accounts to sell, and they offer up the samples as adver- tising. All amounts are in U.S. dollars, and some of these account totals are impressive, while others are quite small.
With one channel, one 24-hour period, and just a few samples, at least US$1,599,335.80 has gone to fund multinational criminals.
Additional Notes and Highlights
Expertise Required: Technology - Low