Wednesday, August 6, 2014

Hacker's White Label Money Laundering Services

Laundering the spoils from cybercrime can be a dicey affair, fraught with unreliable middlemen and dodgy, high-priced services that take a huge cut of the action. But large-scale cybercrime operations can avoid these snares and become much more profitable when they’re able to disguise their operations as legitimate businesses operating in the United States, and increasingly they are doing just that.

The typical process of “cashing out” stolen credit card accounts
Today’s post looks at one such evolution in a type of service marketed to cybercrooks that has traditionally been perhaps the most common way that thieves overseas “cash out” cybercrimes committed against American and European businesses, banks and consumers: The reshipping of goods purchased through stolen credit cards.




Cybercrooks very often rely on international reshipping services to help move electronics and other goods that are bought with stolen credit cards, shipped abroad, and then sold for cash. Many fraudsters use stolen credit cards to pay for U.S. Postal Service and FedEx shipping labels a.k.a. “black labels” but major shipping providers appear to be getting better at blocking or intercepting packages sent with stolen credit cards (at least according to anecdotal evidence from the cybercrime forums).

As a result, crooks increasingly are turning to a more reliable freight: So-called “white label” shipping services that are paid for with cybercrime-funded bank accounts via phony but seemingly legitimate companies in the United States.

CASHING OUT
In the case of a breach at an online merchant that exposes the card number, expiration and card verification value (CVV), the compromised card numbers typically are used to purchase high-priced electronics at online stores that are known to be “cardable” that is, the stores will ship to an address that is different from the billing address.

In the case of “card present” breaches (such as at those that have hit Target, Neiman Marcus, P.F. Chang’s and others) where attackers use malicious software to compromise cash register transactions and gather data that can be used to fabricate new cards fraudsters employ teams of “runners” who use the card data to create counterfeit cards and buy high-priced merchandise at big box retailers.

In either card-present or card-not-present fraud, one of the most lucrative ways for fraudsters outside of the United States to cash out stolen credit cards is to have carded goods shipped overseas, where electronics and other luxury items typically sell for a much higher price than in the United States.

The hardest step in this whole process is successfully getting the goods out of the United States, because a large percentage of retailers simply refuse to ship to areas like Russia and Ukraine due to high rates of fraud associated with those regions.

Traditionally, fraudsters get around this restriction by turning to reshipping services that rely on “mules,” people in the United States who get recruited to reship packages after responding to work-at-home job scams. These reshipping mules are sent multiple packages containing electronics that have been purchased with stolen credit and debit cards. They’re also sent prepaid and pre-addressed shipping labels, and the mules are responsible for making sure the goods are reshipped quickly and accurately.

Over the past year, however, more and more users of reshipping services advertised in the cybercrime underground have reported problems with a greater share of their packages being intercepted or canceled. Apparently, the shipping companies are getting better at detecting shipping labels that are paid for with stolen credit cards and hijacked accounts.

LABEL CITY
Enter LabelCity, a “white label” service that advertises “corporate rates” for shipping Priority Mail International through the U.S. Postal Service (USPS) rates that come in slightly below the rates that the USPS charges retail on its shipping calculator.

LabelCity’s “corporate” rates for its “white label” USPS International shipping service.

“Our service provides 100% guarantee on delivery of the goods. Return of funds to 30 days,” the proprietor of LabelCity promises in an online advertisement. “We started doing white labels (i.e., cash disbursed-for)! Our labels are made automatically through the admin panel, and automatic replenishment! Our corporate rates will surprise you, minus 15-20% of the price of USPS!”

Services like LabelCity explain why reshipping operations remain among the most popular methods of cashing out many different forms of cybercrime: Buying luxury goods that can be resold overseas at a significant markup amplifies the fraudster’s “profit.”

A slightly redacted ad for LabelCity’s services pimps black and white labels.

Take, for example, the scourge of IRS tax refund fraud, an increasing form of cybercrime that has been documented extensively on this blog. With refund fraud, the IRS is tricked into sending the fraudsters prepaid credit cards that can be used like cash. But rather than merely pulling the cash from those cards out of ATMs all around the world, it makes more sense for the crooks to take that cash and reinvest it into purchasing goods here in the United States that can often sell for twice the purchase price in countries like Russia and Ukraine.

LabelCity is a great reminder that cybercrime is seldom an isolated event or a single-victim crime: Much of it is connected in some way. In most cases, one fraud begets another, and thieves particularly those perpetrating such crimes from across international borders often string together multiple forms of fraud in a bid to extract maximum value from their activities.



Thursday, July 10, 2014

Can India defend Cyber Security threats?

India is becoming most vulnerable for cyber attacks like ransomware and spear-phishing has cost Indian individuals and companies some $4 billion According to Symantec’s 2013 Norton Report. A research report found an alarming 136 percent increase in cyber threats and attacks against Indian government organizations and a 126 percent spike in attacks targeting financial services organizations.

Last year brought a marked increase in the frequency of cyber attacks on Indian assets, with government and private infrastructure equally affected. A research report found an alarming 136 percent increase in cyber threats and attacks against Indian government organizations and a 126 percent spike in attacks targeting financial services organizations. According to Symantec’s 2013 Norton Report, by July 2013, sophisticated cyber assaults like ransomware and spear-phishing has cost Indian individuals and companies some $4 billion.

At a time of heightened online breaches phishing, defaced websites, network break-ins, virus attacks the Indian government published its first ever National Cyber Security Policy (NCSP), in early July, 2013.

Cyber attacks:
1. Cyber attacks were reported on the Indian Navy’s Eastern Command systems in June 2012. The Eastern Naval Command oversees the maritime activities in the South China Sea, as well as the development of ballistic missile submarines.

2. On July 12, 2013, just days after the NCSP was released, several high-level officials of the GOI reported their emails had been hacked. A subsequent investigation put the total number of hacked accounts at roughly 12,000, including systems from the Ministry of External Affairs, Ministry of Home Affairs, Defence Research and Development Organisation (DRDO), and the Indo-Tibetan Border Police Force (ITBP). Even the main National Informatics Centre email server, which serves as the nexus for all government departments, was believed to have been affected.

According to the officers from the National Technical Research Organization (NTRO), India’s premier technical intelligence agency under the NSA, believed that the hacks were directed at networks hosting state secrets.

While any number of countries could be after secrets from the foreign and home ministries and DRDO, only one would be interested in ITBP: China, with which India has a long-running boundary dispute. This, along with the PLA’s recent involvement in cross-globe cyber espionage, should be ringing alarm bells in New Delhi. The U.S. recently indicated five People’s Liberation Army officers for hacking and economic espionage, in what is known as the Unit 61398 case. Although Beijing has repeatedly denied state involvement, a 2009 executive summary prepared for the American Congress by Northrop Grumman states that the nature of the malicious software being used was designed to steal data only a nation-state would want, primarily seeking defense-engineering specifications, military operational information, and U.S.-China policy documents.

There are few reports of Pakistan and India indulging in overtly threatening cyber warfare, although in recent times, hacker groups based out of Lahore and Karachi have managed to break into the websites of the Central Bureau of Investigation (CBI) and the Bharat Sanchar Nigam Limited (BSNL), mostly to deface the sites and leave hate mail. However, it is widely speculated that regional terrorist outfits, such as the Indian Mujahideen (IM), make heavy use of social media sites to not only communicate effectively, but also to conduct recruitment drives, all under the government’s nose. Any cyber policy instituted by the GOI will need to actively deal with these issues.


NORTON REPORT 2013 ON CYBER CRIME

NORTON HAS RELEASED ITS 2013 CYBER SECURITY REPORT AND THIS REPORT COVERS 24 COUNTRIES LIKE:

AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND, RUSSIA, SAUDI ARABIA, SINGAPORE, SOUTH AFRICA, SWEDEN, TURKEY, UNITED ARAB EMIRATES, UNITED KINGDOM, UNITED STATES OF AMERICA

WHO IS AFFECTED MOST BY CYBERCRIME?
CYBERCRIME VICTIMS MORE LIKELY TO BE: MALE 64% (COMPARED to 58% OF FEMALES)
MILLENNIAL 66% (COMPARED TO 54% OF BABY BOOMERS)

AND:
• MOBILE DEVICE OWNERS – 63%
• SOCIAL NETWORK USERS – 63%
• PUBLIC / UNSECURED WI-FI USERS – 68%
• EMERGING MARKET – 68%
• PARENT OF CHILDREN 8-17 – 65%

HIGHEST NUMBER OF CYBERCRIME VICTIMS FOUND IN: 
85% CHINA
77% RUSSIA
73% SOUTH AFRICA

KEY THEMES
TABLET AND SMARTPHONE CONSUMERS LEAVE SECURITY BEHIND ALMOST 1/2 DON’T USE BASIC PRECAUTIONS SUCH AS PASSWORDS, SECURITY SOFTWARE OR BACK UP FILES FOR THEIR MOBILE DEVICE MORE THAN ONE-THIRD HAVE EXPERIENCED MOBILE CYBERCRIME LAST YEAR

THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME
US$113 BILLION ANNUALLY, COST PER CYBERCRIME VICTIM UP 50 PERCENT
THE SCALE OF CONSUMER CYBERCRIME 1 MILLION+ VICTIMS DAILY, 12 VICTIMS PER SECOND.


READ MORE DETAILED REPORT AT: http://www.yle.fi/tvuutiset/uutiset/upics/liitetiedostot/norton_raportti.pdf