Sunday, April 26, 2009

Cybercrime

By Ryan Blitstein - San Jose Mercury News

Somewhere in St. Petersburg, Russia’s second largest city, a tinystartup has struck Internet gold. Its dozen-odd employees are barelyold enough to recall the demise of the Soviet Union, but industryanalysts believe they’re raking in well over $100 million a year fromthe world’s largest banks, including Wells Fargo and Washington Mutual.

Their two-year rise might be the greatest success story of theformer Eastern Bloc’s high-tech boom — if only it weren’t so illegal.But the cash may be coming from your bank account, and they could beusing the computer in your den to commit their crimes.

The enigmatic company, which the security community has dubbed “RockPhish,” has rapidly grown into a giant of the Internet underground byperfecting a common form of Internet crime known as “phishing.” Thethieves capture people’s personal computers, then use them to sendphony e-mails that trick other users into revealing private financialinformation.

“Rock is the standard. They’re the Microsoft. Everyone else is a bitplayer,” said Jose Nazario, a researcher at security company ArborNetworks.

As big as has become, though, it is a sliver of a much larger problem.



During the past few years, a professional class bent on stealthyonline fraud has transformed Internet crime, rendering obsolete thehobbyist hackerswho sought fun and fame. These Al Capones of the information age arelike ghosts in our Web browsers, silently taking over our computers,stealing digital bits, and turning our data into cash. Take cyber-bite out of crime…  Read the rest


Editor's Note:  Below are some of the more famous procerdures found lurking in the cybercriminal mind.  When you realize that 93% of attacks target financial institutions, 92% target software applications and 90%  are conducted by "organized crime" then add the fact that graphical user interfaces can be cloned, as can bank websites, the future of a software PIN debit application is behind the eight ball. 


Vocabulary of cybercrime


  • Bot-herders: Those who control the armies of computers known as botnets.
  • Botnet: A “robot network,” or collection of zombie PCs, usually controlled by Internet crooks who have surreptitiously installed malware on people’s computers
  • DNS Hijacking: Users type in a website and unbeknowst to them, they are taken to a cloned site whereby they enter their private information which is then used at the genuine website to log-in.  Usually targeted at financial institutions.
  • Drive-by download: A user visits a Web site containing that installs itself on the user’s PC.
  • The Bad GUI:  A cloned Graphical User Interface which replicates the genuine and fools user's into entering their valuable financial information like PIN's or Username's and Passwords. (see picture on right and below left)
  • Keylogging: Software that records a user's keystrokes to steal passwords, usernames, credit card numbers, etc. (see picture below right)
  • Malware: Any computer software created with malicious intent.
  • Phishing: Sending that appear to come from a trusted entity (such as a bank or well-knowncompany) that trick people into giving up personal and financialinformation.
  • Spam: Unwanted e-mails sent to users to get them to buy something, take an action or reveal information.
  • Trojan: Malicious computer software disguised as a useful program that tricks users into opening or installing it.
  • Virus: Computer code that infects a file or program, then takes actions and spreads when the user opens that file or program. 
  • Worm: A self-replicating computer program that transfers itself between PCs, often clogging the network as it spreads
  • Zombies: What makes your financial information the walking dead...here's more on Cybercrime from Symantec:
You hear a lot about cybercrime, but what exactly is it? The simple answer is, "It's complicated!"

Liketraditional crime, cybercrime can take many shapes and can occur nearlyanytime or anyplace. Criminals committing cybercrime use a number ofmethods, depending on their skill-set and their goal. This should notbe surprising: cybercrime is, after all, simply 'crime' with some sortof 'computer' or 'cyber' aspect.

The Council of Europe's Cybercrime Treaty uses the term'cybercrime' to refer to offenses ranging from criminal activityagainst data to content and copyright infringement [Krone, 2005].However, others [Zeviar-Geese, 1997-98] suggest that the definition isbroader, including activities such as fraud, unauthorized access, childpornography, and cyberstalking. The United Nations Manual on thePrevention and Control of Computer Related Crime includes fraud,forgery, and unauthorized access [United Nations, 1995] in itscybercrime definition.

As you can see from these definitions, cybercrime can cover avery wide range of attacks. Understanding this wide variation in typesof cybercrime is important as different types of cybercrime requiredifferent approaches to improving your computer safety.

Symantec draws from the many definitions of cybercrime and defines it concisely as any crime that is committed using a computer or network, or hardware device.The computer or device may be the agent of the crime, the facilitatorof the crime, or the target of the crime. The crime may take place onthe computer alone or in addition to other locations. The broad rangeof cybercrime can be better understood by dividing it into two overallcategories, defined for the purpose of this research as Type I and TypeII cybercrime.

Type I cybercrime has the following characteristics:
  • It is generally a single event from the perspective of the victim.For example, the victim unknowingly downloads a Trojan horse whichinstalls a keystroke logger on his or her machine. Alternatively, thevictim might receive an e-mail containing what claims to be a link toknown entity, but in reality is a link to a hostile website.
  • It is often facilitated by crimeware programs such as keystroke loggers, viruses, rootkits or Trojan horses.
  • Softwareflaws or vulnerabilities often provide the foothold for the attacker.For example, criminals controlling a website may take advantage of avulnerability in a Web browser to place a Trojan horse on the victim'scomputer.

Examples of this type of cybercrime include but are not limited to phishing, theft or manipulation of data or services via hacking or viruses, identity theft, and bank or e-commerce fraud.

Type II cybercrime, at the other end of the spectrum,includes, but is not limited to activities such as cyberstalking andharassment, child predation, extortion, blackmail, stock marketmanipulation, complex corporate espionage, and planning or carrying outterrorist activities. The characteristics of Type II cybercrime are:
  • It is generally an on-goingseries of events, involving repeated interactions with the target. Forexample, the target is contacted in a chat room by someone who, overtime, attempts to establish a relationship. Eventually, the criminalexploits the relationship to commit a crime. Or, members of a terroristcell or criminal organization may use hidden messages to communicate ina public forum to plan activities or discuss money launderinglocations, for example.

  • It is generally facilitated by programs that do notfit into under the classification crimeware. For example, conversationsmay take place using IM (instant messaging) clients or files may betransferred using FTP.




Reblog this post [with Zemanta]

ATM Card Skimming & PIN Capturing Guide




Below is a link to a report titled "ATM Card Skimming and PIN capturing Awareness Guide". This document was put together by Commonwealth Bank in Australia.  I've included four of the 20 slides, each of which you may click to enlarge. 


Here's the First of the four slides:





















Reblog this post [with Zemanta]

Saturday, April 25, 2009

SafeTPIN Side Effects

Here's yet "another" reason why banks should utilize HomeATM's SafeTPIN for authentication. 

SafeTPIN securely authenticates the user by allowing them to swipe their bank issued card and enter their bank issued PIN.  No data other than the information contained on the magnetic stripe is collected so the privacy issue being discussed below is moot.  End result? 

Fraud elimination, consumer privacy protection AND it enables the online banking customer to securely pay bills, transfer money and conduct safe eCommerce transactions, all with 2FA, 3DES end to end encryption and DUKPT key management. 


CAUTION: If your financial institution employs a "Username:/Password" style authentication,
side effects from using our 2FA (two factor authentication) PCI 2.0 certified SafeTPIN PED may include: enhanced image for the bank, elimination of the threat of a cloned website, DNS attacks, malicious code, malware, keylogging, click jacking, worms and zombies.  Be aware that Cloned cards won't work in our SafeTPIN and phishing attacks are useless.  Pregnable transactions should not use SafeTPIN.  Please consult with your technician!      

Device identification in online banking is privacy threat, expert says | Security - CNET News

SAN FRANCISCO--A widely used technology to authenticate users when they log in for online banking may help reduce fraud, but it does so at the expense of consumer privacy, a civil liberties attorney said during a panel at the RSA security conference on Thursday.


When logging into bank Web sites, users are typically asked for their user name and password. But that's not all that is happening. Behind the scenes, the server is taking measures to identify the device being used in an attempt to verify that the person logging in is the person whose account is being accessed under the assumption that most people use the same computer for banking.

Wachovia, which recently merged with Wells Fargo, tags the consumer's computer with a unique identifier, said Chris Mathes, an information technology specialist in online customer protection at the bank.

The technology not only can be used to allow legitimate customers into Web sites, but also to block computers that have been targeted as "bad actors," said Todd Inskeep, a senior vice president for the Center for the Future of Banking at Bank of America.

Even though none of the information gathered during a log-in is personally identifiable, the bank shouldn't have to collect regular data on when, how often and from where a consumer accesses a bank account, said Jennifer Granick of the Electronic Frontier Foundation. Such information can be compiled with other more sensitive information to create profiles and cross referenced to learn more about consumers, she said.

For instance, the bank could learn who a consumer's roommate is if the same computer is used regularly to access different accounts, Granick said. Consumers also could be deemed suspicious for breaking with their patterns on deposits or withdrawals or the information could be sold to advertisers, she added.

Continue Reading at CNET





Reblog this post [with Zemanta]

RSA Conference Keynotes Available

RSA 2009 Webcasts grid
Choose a keynote speaker below. Click "View Interactive Webcast" to see the version with slides and video,
or click "View Video Only" if you only wish to view the video. The webcast version requires Flash Player 9 and
a broadband connection for optimum playback performance.
MINIMUM REQUIREMENTS
RECOMMENDATIONS FOR BEST PERFORMANCE

TUESDAY, APRIL 21
Opening Ceremony
RSA® Conference 2009
Duration: 7 Minutes
View Interactive Webcast
View Video Only
Art Coviello
Executive Vice President, EMC Corporation
and President, RSA, The Security Division of EMC Corporation
Duration: 33 Minutes
View Interactive Webcast
View Video Only
Enrique T. Salem
Chief Operating Officer
Symantec Corporation
Duration: 35 Minutes
View Interactive Webcast
View Video Only
Scott Charney
Corporate Vice President
Trustworthy Computing (TwC), Microsoft Corporation
Duration: 33 Minutes
View Interactive Webcast
View Video Only
Panel Discussion
Chief Scientist and Director
The Cryptographers Panel
Duration: 50 Minutes
View Interactive Webcast
View Video Only
Lieutenant General Keith B. Alexander
Director of the National Security Agency (NSA)
and Chief of the Central Security Service (CSS)
Duration: 30 Minutes
View Interactive Webcast
View Video Only

WEDNESDAY, APRIL 22
Melissa E. Hathaway
Acting Senior Director for Cyberspace
National Security and Homeland Security Councils
Duration: 20 Minutes
View Interactive Webcast
View Video Only
Panel Discussion
Information Governance Goes to Court
Duration: 50 Minutes
View Interactive Webcast
View Video Only
John Chambers
Chairman and CEO
Cisco Systems, Inc.
Duration: 33 Minutes
View Interactive Webcast
View Video Only
Dave DeWalt
Chief Executive Officer and President
McAfee, Inc.
Duration: 29 Minutes
View Interactive Webcast
View Video Only
Brian Smith, Ph.D.
Chief Technology Officer
TippingPoint
Duration: 30 Minutes
View Interactive Webcast
View Video Only
James Bamford
Author
The Shadow Factory: The Ultra-Secret NSA, from 9/11 to the Eavesdropping on America
Duration: 47 Minutes
View Interactive Webcast
View Video Only

THURSDAY, APRIL 23
Brian J. Truskowski
General Manager
Internet Security Systems (ISS), IBM Global Technology Services (GTS)
Duration: 31 Minutes
View Interactive Webcast
View Video Only
Philippe Courtot
Chairman and CEO
Qualys, Inc.
Duration: 33 Minutes
View Interactive Webcast
View Video Only
Dave Hansen
Corporate Senior Vice President and General Manager
Security Management Business Unit, CA, Inc.
Duration: 25 Minutes
View Interactive Webcast
View Video Only

FRIDAY, APRIL 24
Herbert Thompson, Ph.D.
Chief Security Strategist
People Security
Duration: 40 Minutes
View Interactive Webcast
View Video Only
Jamie Hyneman & Adam Savage
Hosts
MythBusters
Duration: 40 Minutes
View Interactive Webcast
View Video Only



MINIMUM REQUIREMENTS
Adobe Flash Player 8+ to view "Interactive Webcasts" Get Flash Player Get Windows Media Player
Windows Media Player 9+ to view "Video Only"
PC: Windows 2000+, Internet Explorer 5.5+, Firefox 1.5+
MAC: OSX+, Safari, Firefox 1.5+
RECOMMENDATIONS FOR BEST PERFORMANCE
Broadband internet connection, Adobe Flash Player 8+


Reblog this post [with Zemanta]

Disqus for ePayment News