A deep walk on the dark side of information security

DSS_ITSEC 154 views 172 slides Nov 27, 2018
Slide 1
Slide 1 of 172
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77
Slide 78
78
Slide 79
79
Slide 80
80
Slide 81
81
Slide 82
82
Slide 83
83
Slide 84
84
Slide 85
85
Slide 86
86
Slide 87
87
Slide 88
88
Slide 89
89
Slide 90
90
Slide 91
91
Slide 92
92
Slide 93
93
Slide 94
94
Slide 95
95
Slide 96
96
Slide 97
97
Slide 98
98
Slide 99
99
Slide 100
100
Slide 101
101
Slide 102
102
Slide 103
103
Slide 104
104
Slide 105
105
Slide 106
106
Slide 107
107
Slide 108
108
Slide 109
109
Slide 110
110
Slide 111
111
Slide 112
112
Slide 113
113
Slide 114
114
Slide 115
115
Slide 116
116
Slide 117
117
Slide 118
118
Slide 119
119
Slide 120
120
Slide 121
121
Slide 122
122
Slide 123
123
Slide 124
124
Slide 125
125
Slide 126
126
Slide 127
127
Slide 128
128
Slide 129
129
Slide 130
130
Slide 131
131
Slide 132
132
Slide 133
133
Slide 134
134
Slide 135
135
Slide 136
136
Slide 137
137
Slide 138
138
Slide 139
139
Slide 140
140
Slide 141
141
Slide 142
142
Slide 143
143
Slide 144
144
Slide 145
145
Slide 146
146
Slide 147
147
Slide 148
148
Slide 149
149
Slide 150
150
Slide 151
151
Slide 152
152
Slide 153
153
Slide 154
154
Slide 155
155
Slide 156
156
Slide 157
157
Slide 158
158
Slide 159
159
Slide 160
160
Slide 161
161
Slide 162
162
Slide 163
163
Slide 164
164
Slide 165
165
Slide 166
166
Slide 167
167
Slide 168
168
Slide 169
169
Slide 170
170
Slide 171
171
Slide 172
172

About This Presentation

Raoul Chiesa, Selene Giupponi https://dssitsec.eu


Slide Content

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security BrokersWorkshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
A Deep Walk on the Dark Side of Information Security
MappingCybercrime’s new threats
Raoul «Nobody» Chiesa
Eng. Selene Giupponi
PUBLIC RELEASE

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Agenda
The trainers
Kick-off
Premises, Introductions
Underground Economy: Scenariosand Actors
«Hackers»?
Profiling
The evolutionof 0days market
Bitcoins
Underground currencies
Social Networks
Case study
Conclusions
Reading room
Q&A

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Disclaimer
●Theinformationcontainedwithinthispresentationdonotinfringeonany
intellectualpropertynordoesitcontaintoolsorrecipethatcouldbeinbreachwith
knownlaws.
●ThestatisticaldatapresentedbelongstotheHackersProfilingProjectbyUNICRIand
ISECOM.
●Quotedtrademarksbelongstoregisteredowners.
●Theviewsexpressedarethoseoftheauthor(s)andspeaker(s)anddonotnecessary
reflecttheviewsofUNICRIorothersUnitedNationsagenciesandinstitutes,nor
theviewsofENISAanditsPSG(PermanentStakeholdersGroup),neitherSecurity
Brokersones.
●Contentsofthispresentationmaynotbequotedorreproducedbutpartially(10%),
providedthatthesourceofinformationisacknowledged.

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Introductions

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Raoul «Nobody» Chiesa
President, Founder, The Security Brokers
IndependentSpecial Senior Advisor on Cybercrime @ UNICRI
(United Nations Interregional Crime & Justice Research Institute)
PSG Member, ENISA(PermanentStakeholdersGroup @ EuropeanUnion
Network & Information Security Agency)
Founder, Board of Directors and Technical CommiteeMember@ CLUSIT
(Italian Information Security Association)
SteeringCommittee, AIP/OPSI, Privacy & Security Observatory
Board of Directors, ISECOM
Board of Directors, OWASPItalianChapter
Cultural Attachè. ScientificCommittee, APWGEuropeanChapter
Supporter atvarioussecurity communities

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Eng. Selene Giupponi
Founder, Head of Digital ForensicsUnit, Security Brokers
Computer EngineeringDegree+ Master in Computer Forensics& Digital Investigations
Active Member of the IT Engineer Commission, Engineers Association of the Latina Province
CLUSIT Member(ITALIAN INFORMATION SECURITY ASSOCIATION)
IISFAMember(INFORMATION SYSTEM FORENSICS ASSOCIATION, ITALIAN CHAPTER)
Technical Assessor/Expert Witness at Civil Court
Technical Assessor/Expert Witnessat Criminal Court
CyberWorldWorkingGroup formerMember-@CASD ( HigherStudiesDefenceCenter) / OSN
(National Security Observatory) atthe ItalianMinistryof Defense

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Ourcompany
The Security Brokers
Wedeal with extremelyinterestingtopics, givingourstrong know-hows gainedfrom +20 yearsof fieldexperienceand from our
+30 experts, verywellknownallover the world in the’InformationSecurityand Cyber Intelligencemarkets.
OurKeyAreasof servicescan be resumedas:
ProactiveSecurity
With a deepspecializationon TLC & Mobile, SCADA & IA, ICN & Trasportation, Space & Air, Social Networks, e-health,
*…+
Post-Incident
Attacker’sprofiling, Digital Forensics(Host, Network, Mobile, GPS, etc..), Trainings
Cyber Security Strategic Consulting(Technical, Legal, Compliance, PR, Strategy)
On-demand «Ninja Teams»
Security Incident PR Handling & Management
Psychological, social and behaviouraspects(appliedto cyber environments)
CybercrimeIntelligence
Botnet takeovers, takedowns, Cybercriminalsbounting, Cyber Intelligence Reports, interfacciamento con CERTse
LEAs/LEOs,*…+
Information Warfare & Cyber War(onlyfor MoDs)
0-day ed Exploits –Digital Weapons
OSINT

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Cybercrime

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
• Carder-Slang used to describe individuals who use stolen credit card account information to conduct fraudulent transactions.
• Carding -Trafficking in and fraudulent use of stolen credit card account information.
• Cashing-The act of obtaining money by committing fraud. This act can be committed in a variety of ways: The term can stand for cashing out Western Union wires, Postal
money orders and WebMoney; using track data with PINs to obtain cash at ATMs, from PayPal accounts, or setting up a bank account with a fake ID to withdraw cash on a credit
card account.
• CC -Slang for credit card.
• Change of Billing (COB or COBs)-Term used to describe the act of changing the billing address on a credit account to match that of a mail drop. This act allows the carder full
takeover capability of the compromised credit card account and increases the probability that the account will not be rejected when being used for Internet transactions.
• CVV2-CVV2 stands for credit card security code. Visa, MasterCard, and Discover require this feature. It is a 3 digit number on theback of the card.
• DDoS-Acronym for Distributed Denial of Service Attack. The intent when conducting a DDOS attack is to shut down a targeted website,at least for a period of time, by flooding
the network with an overflow of traffic.
• DLs-A slang term that stands for counterfeit or novelty driver's licenses.
• Drop-An intermediary used to disguise the source of a transaction (addresses, phones etc.)
• Dumps-Copied payment card information, at least Track 1 data, but usually Track 1 and Track 2 data.
• Dump checking-Using specific software or alternatively encoding track data on plastic and using a point of sale terminal to test whether the dump is approved or declined. This
provides carders a higher sense of security for obtaining quality dumps fro those who offer them and also a sense of securitywhen doing in store carding.
• Full info(s)-Term used to describe obtaining addresses, phone numbers, social security numbers, PIN numbers, credit history reports and soon. Full Info(s) are synonymous with
carders who wish to take over the identity of a person or to sell the identity of a person.
• Holos-Slang for the word Holograms. Holograms are important for those who make counterfeit plastic credit cards to emulate an existing security feature.
• ICQ-An abbreviation for "I Seek You". ICQ is the most widely used instant messaging system for carders. Popular among Eastern Europeans in their Internet culture, it
continues to be used for carding activity.
• IRC-An abbreviation for "Internet Relay Chat". IRC is a global system of servers through which users can conduct real-time text-based chat, exchange files, and interact in other
ways.
• IDs -Slang for identification documents. Carders market a variety of IDs, including bills, diplomas, driver's licenses, passports,or anything that can be used as an identity
document.
• MSR (Magnetic Strip Reader) -Device that can be used for skimming payment card information and/or encoding track information on plastic.
• Phishing -The extraction of information from a target using a hook (usually an e-mail purporting to be from a legitimate company). Phishersspam the Internet with e-mails in
hopes of obtaining information that can be used for fraudulent purposes.
• POS (Point of Sale)-Acronym for a terminal through which credit cards are swiped in order to communicate with processors who approve or decline transactions.
• Proxies -Term used for proxy servers. The use of proxy servers to mask ones identity on the Internet is widely practiced amongst carders. Many vendors sell access to proxy
servers, socks, http, https, and VPN (Virtual Private Networks), which aide in hiding the user's actual IP address when committing fraud or other illegal activity on the Internet.
• Track 1/Track 2 data-Track 1 and Track 2 data is the information stored on the magnetic stripe of a payment card that contains the account information.
Digital Underground slang (cybercrime): example

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
The evolutionof the so-called«hacker’sunderground»
led to new criminalmodelsand approachesin the
Cybercrimeworld.
This lesson will analyze the so-called "Underground
Economy", its players and scenarios, then zooming in the
Bitcoins -as well as different "cybercrime currencies.
We will bring to the audience our own experiences on
these critical research areas.
Premise

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Videoclip: Will yoube ready? (DidYouknow, 2011)
Facingthe «new world» with 2020

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
UnexpectedEscalation –«Insecurityby Default»
2011: the «blackyear» of information leak: GOVs, MILs, InfoSec, IT Industry
2012, 2013, 2014: trends are more thanscary
2012: the yearof «missionimpossible»
2013: the yearof Cryptolockers
2014: the yearof Mobile & CloudHacking
2015, 2016, 2017, 2018: just nameit….
Impressive sequencesof IT incidents
No onehasbeenableto foreseenthisescalation
«Impossible» targets havebeenhacked
Domino effect
The bordersamongCybercrime, Hacktivism, Cyber Espionage, Information Warfareand Cyber War
are lessand lessclear
Strong needto reviewthe criminalprofiles
Wemust weightin the right way the psychologicaldynamicsfrom attack’smodalities
Wemust learnto be proactive
Wemust learnhowto managea security incident, atonce, in a professionalmanner.

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
SCADA & Industrial
Automation Security,
Defense in-depth
Anti-DDoS,
(basic) Application
Security
Cyber Intelligence,
Black Ops
Human Factor, 0days
Insider’sprofiling, DLP
CybercrimeIntelligence,
Compliances

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Let’sstop dreaming!
In orderto «outperformyouradversaries», youmust knowwhotheyare.
And, over the last 10 years, the conceptof «attacker» hasdramaticallychanged.
Also, the conceptof a «securesystem» doesn’texistanymore.(IMHO).
Well, actually, itneverexisted…..? 
Vulnerabilitiesbrought-in by vendors
0days market
State-Sponsoredattacks
DDoSpowershot
Cybercrime& Underground Economy
That’swhythispresentationwillfocus on somethingdifferent, tryingto walk
youby new perspectives, providingcase studiesaswell.

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
From «words»…

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
…to «Terminologies»
In the Information Security (InfoSec) world, we have a tremendous problem: the
terminology.
Each termhas different meanings, depending on the contexts and the actors.
This is not enough, tough: in the last years a new trend come out, which is adding
the prefix “cyber” to most of the terms:
Cybersecurity
Cyber Drills
Cyber Exercises
Cyber Lawyer (OMG!!)
Cyber War
Cyber Terrorism
Cyber Diplomacy (cool!)
Cyber Espionage
Cyber Bullism
Cyber Stalking
Cybersex

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Furtherissues…
No common spelling…
„Cybersecurity, Cyber-security, Cyber Security ?”
No common definitions…
Cybercrime is…?
No clear actors…
Cyber –Crime/war/terrorism ?
No common components?…
In those non English-speaking countries, problems with correctly understanding words
and terms rise up..

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Once upona time….
I joinedthe wonderfulworld of hackingaround
1985.
Back in 1996, afterthe operation«IceTrap» which
leadedto my(home) arrestin 1995, I jumpedback
to the underground «scene».
My hacker friends toldme theyjust begandoing
somethingnamed«PenetrationTest».
I hadno idea WTH «thatthing» was.
ThenI realizedsomeonewasgladto payyouin order
to «hack» intosomething.
With rules, tough. Itwaslegal.
Paidin orderto do whatI mostlyliked?!? Risks-free??
«Youmust be kidding!!!!!!!», LOL 

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Hacker generations
Firstgeneration(70’s)wasinspiredbytheneedforknowledge
Secondgeneration(1980-1984)wasdrivenbycuriosityplusthe
knowledgestarving:theonlywaytolearnOSswastohackthem;later
(1985-1990)hackingbecomesatrend.
TheThirdone(90’s)wassimplypushedbytheangerforhacking,
meaningamixofaddiction,curiosity,learningnewstuff,hackingIT
systemsandnetworks,exchanginginfowiththeunderground
community.Herewesawnewconceptscoming,suchashacker’se-zines
(Phrack,2600Magazine)alongwithBBS
Fourthgeneration(2000-today)isdrivenbyangernessandmoney:
oftenwecanseesubjectswithaverylowknow-how,thinkingthatit’s
“cool&bragging”beinghackers,whiletheyarenotinterestedinhacking
&phreakinghistory,cultureandethics.Herehackingmeetswithpolitics
(cyber-hacktivism)orwiththecriminalworld(cybercrime).

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Crime -> Past
“Everynew technology,
opensthe door to new criminalapproaches”.
Therelationshipbetweentechnologiesandcriminalityhasalwaysbeen–
sincetheverybeginning–characterizedbyakindof“competition”between
thegoodandthebadguys,justlikecatsandmice.
Asanexample,atthebeginningof1900,whencarsappeared,the“badguys”
startedstealingthem(!)
….thepolice,inordertocontrastthephenomenon,definedthemandatory
useofcarplates…
….andthethievesbeganstealingthecarplatesfromthecars(and/or
“cloning”them).

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Crime -> Today
Those “cars” have been substituted by ITand ICT
Today’s “universal currency” is the information.
Yougotthe information, yougotthe power..
(atleast, in politics, in the business world, in ourpersonal relationships…)
•Simply put, thishappensbecausethe “information” can be transformedatonce into“somethingelse”:
1.Competitive advantage
2.Sensible/criticalinformation (blackmailing)
3.Money
… that’swhyallof uswewantto “be secure”.
It’snotby chance thatit’snamed“IS”: Information Security
Examples? (of coursewith cyber*asthe «mainactor»)
USA, China, ……
Stuxnet, Shamoon, etc..
LTT Lybia
Telecom Italia/SISMI affair
Vodafone Greece
Belgacom…………….

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
AboutCybercrime: mainmistake
We are speaking about an ecosystem which too often is underevaluated:
most of times, it is the starting or the transit point towards different ecosystems:
Information Warfare
Black Ops
Industrial Espionage
Hacktivism
(private) Cyber Armies
Underground Economy and Black Markets
Organized Crime
Carders
Botnet owners
0days
Malware factories (APTs, code-writing outsourcing)
Lonely wolves
“cyber”-mercenaries, Deep Web, etc

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Evolutionof cyber attacks

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Bandwidthand DDoS(2002-2009)
125 Gbit/s
(US Gov, 4 Luglio 2009)
300 Gbit/s,
Spamhaus/
CyberBunker(2011)
http://it.wikipedia.org/wiki/
CyberBunker

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Once upona time
Stillon thoseyears, weusedto findbugson ourown:
SunSolaris(we[still] love youso much)
HP/UX (harder)
VAX/VMS, AXP/OpenVMS(veryfewones)
Linux (plentyof)
etc…
No onewaspayingusfor thosefindings. Itwasjust phun.
No onewas«selling» thatstuff.
Weusedto keep‘emfor us, and occasionally«exchange» the exploits
with some other(trusted) hackers.

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Yearslater…
A coupleof thingshappened.
Money slowlygotinvolvedin thisresearch-
basedthing.
And, the wholeworld got«always-on»,
«interconnected», IT&TLC fully-addicted.
Then, Cybercrimemovedto itsprime-time age.
Money quicklygotinvolvedin thisexploits-race
thing.

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Original«profiles»
Black-hat:thosewhoviolateinformationsystems,withorwithoutpersonaladvantage.Theyare
ralliedonthe"bad"side,crossingoverthecleardemarcationlinebetween"loveforhacking"and
thedeliberateexecutionofcriminalactions.Fortheseactors,itisnormaltoviolateaninformation
systemandtopenetrateititsmostsecretmeanders,stealinginformationand,giventheirhacker’s
profile,resellingthemtoforeigncountries.
Grey-hat:thosewhodon'twanttobelabeledas"blackorwhite"andcanconsiderthemselves
"ethicalhackers."Theyoftencouldhaveperformedintrusionsininformationsystems,butthey
havedecidednottousethisapproach.
White-hat:alsodefined"hunters",theyhavethenecessaryskilltobeablack-hat,buttheyhave
decidedtosidewith“thegoodguys”.TheycollaboratewiththeAuthoritiesandthePolice,they
areinthefirstrowinanticomputer-crimeoperations,theyareadvisorsforgovernmentsand
companies;intheirlifetheydon'tusuallyviolatecomputersystems,oriftheydo,itisneverfor
criminalpurposesorforeconomicgain.

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Whatthe heckhaschangedthen?
What’s reallychangedisthe attacker’stypology.
From“boredteens”, doingitfor“hobby and
curiosity” (obviously: duringnight, pizza-hut’s
box on the floorand cansofRed Bull)….
...toteenagersand adultsnotmandatory“ICT”
or “hackers”: theyjust do itforthe money.
What’s changedisthe attacker’sprofile, along
with itsjustifications, motivationsand reasons.
And, OrganizedCrime tookallof thisover 

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
The actors? Profiling«hackers»

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Sharedaspects
Seriality:bothITattacksandserialcrimesare“serial”.
Virtuality:bothfromapsychologicalandamoral-ethicalperspective,theactorssomehowgeta«mind
distance»fromthecrimestheyareexecuting.
Differentaspects
Ahacker’smodusoperandiisnoteasytoidentify
•Thesimplenesswhengettingaccesstodedicatedsoftwareresources(tools)ratherthan
infrastructuresandresources«readytogo»makesmuchhardertoperformacompleteanalysis
oftheattackandprofilingthethreatagent;
•Thelegislationdoesnotallowarealbacktracingontheattacker(Attribution)
Strategiesandattackmethodologiesaredifferentandtheyreflectheterogenousmotivationsofthe
offendersoffender.
Crimesceneisnotaphysicalplace.
CriminalProfilingVS Hacking

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
HPP v1.0
Back in 2004welaunchedthe Hacker’sProfiling
Project -HPP:
http://www.unicri.it/special_topics/cyber_threats/
Sincethatyear:
+1.200 questionnairescollected& analyzed
9 Hackers profilesemerged
Twobooks (onein English)
Profilo Hacker, Apogeo, 2007
ProfilingHackers: the Science of CriminalProfilingas
Appliedto the World of Hacking, Taylor&FrancisGroup,
CRC Press (2009)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Evaluation and Correlationstandards
Modus Operandi (MO)
Lonehackerorasa
memberofagroup
Motivations
Selected targets
Relationship between
motivations and targets
Hacking career
Principles of the hacker's ethics
Crashed or damaged systems
Perception of the illegality of
their own activity
Effect of laws, convictions and
technical difficulties as a deterrent
Mainly from:
USA
Italy
UK
Canada
Lithuania
Australia
Malaysia
Germany
Brazil
Romania
China

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
HPP v1.0 -Zoom: correlationstandards
Gender and age group
Background and place of residence
How hackers view themselves
Family background
Socio-economic background
Social relationships
Leisure activities
Education
Professional environment
Psychological traits
To be or to appear: the level of self-esteem
Presence of multiple personalities
Psychophysical conditions
Alcohol & drug abuse and dependencies
Definition or self-definition: what is a real hacker?
Relationship data
Handle and nickname
Starting age
Learning and training modalities
The mentor's role
Technical capacities (know-how)
Hacking, phreaking or carding: the reasons behind the choice
Networks, technologies and operating systems
Techniques used to penetrate a system
Individual and group attacks
The art of war: examples of attack techniques
Operating inside a target system
The hacker’s signature
Relationships with the System Administrators
Motivations
The power trip
Lone hackers
Hacker groups
Favourite targets and reasons
Specializations
Principles of the Hacker Ethics
Acceptance or refusal of the Hacker Ethics
Crashed systems
Hacking/phreaking addiction
Perception of the illegality of their actions
Offences perpetrated with the aid of IT devices
Offences perpetrated without the use of IT devices
Fear of discovery, arrest and conviction
The law as deterrent
Effect of convictions
Leaving the hacker scene
Beyond hacking

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
OFFENDER ID LONE / GROUP HACKER TARGET MOTIVATIONS /
PURPOSES
WannaBe Lamer 9-16 years
“I would like to be a hacker,
but I can’t”
GROUP End-User For fashion, It’s “cool” => to
boast and brag
Script Kiddie 10-18 years
The script boy
GROUP: but they act alone SME / Specific security flawsTo give vent of their anger /
attract mass-media attention
Cracker 17-30 years
The destructor, burned
ground
LONE Business company To demonstrate their power /
attract mass-media attention
Ethical Hacker 15-50 years
The “ethical” hacker’s world
LONE /
GROUP (only for fun)
Vendor / Technology For curiosity (to learn) and
altruistic purposes
Quiet, Paranoid, Skilled
Hacker
16-40 years
The very specialized and
paranoid attacker
LONE On necessity For curiosity (to learn) =>
egoistic purposes
Cyber-Warrior 18-50 years
The soldier, hacking for
money
LONE “Symbol” business company
/ End-User
For profit
Industrial Spy 22-45 years
Industrial espionage
LONE Business company /
Corporation
For profit
Government Agent 25-45 years
CIA, Mossad, FBI, etc.
LONE / GROUP Government / Suspected
Terrorist/
Strategic company/
Individual
Espionage/
Counter-espionage
Vulnerability test
Activity-monitoring
Military Hacker 25-45 years LONE / GROUP Government / Strategic
company
Monitoring /
controlling /
crashing systems
The 9 profiles

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
PROFILE MAY BE LINKED TO WILL CHANGE ITS
BEHAVIOR?
TARGET (NEW) MOTIVATIONS
& PURPOSES
Wanna Be Lamer No
Script Kiddie Urban hacks No Wireless Networks, Internet
Café, neighborhood, etc..
Cracker
Phishing
Spam
Black ops
Yes Companies, associations,
whatever
Money, Fame, Politics,
Religion, etc…
Ethical Hacker
Massive
Vulnerabilities
Probably Competitors (Telecom
Italia Affair), end-users
Bigmoney
Quiet, Paranoid, Skilled
Hacker
Black ops
Yes High-level targets Hesotericrequest (i.e.,
hack “Thuraya” for us)
Cyber-Warrior
CNIs attacks
Gov. attacks
Yes “Symbols”: from Dali Lama
to UN, passing through
CNIs and business
companies
Intelligence ?
Industrial Spy Yes Business company /
Corporation
For profit
Government Agent Probably Government / Suspected
Terrorist/
Strategic company/
Individual
Espionage/
Counter-espionage
Vulnerability test
Activity-monitoring
Military Hacker Probably Government / Strategic
company
Monitoring /
controlling /
crashing systems

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security BrokersDETERRENCE
EFFECT OF:
LAWS
CONVICTIONS
SUFFERED BY
OTHER
HACKERS
CONVICTIONS
SUFFERED BY
THEM
TECHNICAL
DIFFICULTIES
Wanna Be Lamer NULL NULL ALMOST NULL HIGH
Script Kiddie NULL NULL
HIGH: they stop
after the 1st
conviction
HIGH
Cracker NULL NULL NULL MEDIUM
Ethical Hacker NULL NULL
HIGH: they stop
after the 1st
conviction
NULL
Quiet, Paranoid,
Skilled Hacker
NULL NULL NULL NULL
Cyber-Warrior NULL NULL NULL
NULL: they do it
as a job
Industrial Spy NULL NULL NULL
NULL: they do it
as a job

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
HPP v2.0: whathappened?
VERY simple:
Lackof funding: for phases3&4 weneedsupport!
HW, SW, Analysts, Translators
Westartedback in 2004: «romantichackers», + weforeseenthose
«new» actorstough: .GOV, .MIL, Intelligence.
Wemissedout:
Hacktivism (!);
Cybercriminalsout of the «hobbystic» approach;
OC;
The financialaspects(Followthe Money!!);
Cyberterrorists(do theyreallyexist?)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
HPP v2.0: nextenhancements
Going after Cybercriminals:
Kingpins & Master minds (the “Man at the Top”)
oOrganized Crime
oMO, Business Model, Kingpins –“How To”
Techies hired by the Organized Crime (i.e. Romania & skimming at the very beginning;
Nigerian cons 419-like; Ukraine Rogue AV; Pharma ADV Campaigns; ESTDomainsin Estonia;
POS malware; etc..)
Structure, Infrastructures (links with Govs& Mils?)
Money Laundering: Follow the money (E-mules & new ways to “cash-out”: mPOS, vPOS,
etc..)
Outsourcing: malware factories (Stuxnet? DuQu?? Lingbo? Regint? What about
all of the rest…??)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
And, it’snotjust
«hackers»

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
→ Why“Cybercrime”?
Cybercrime
“2011Cybercrime financialturnover apparentlyscoredup more
thanDrugsdealing, Human
Traffickingand WeaponsTraffickingturnovers”
Varioussources(UN, USDOJ, INTERPOL, 2011)
Financial Turnover, 2011 estimation: 6-12 BLN USD$/year
«Cybercrime
ranksasone
ofthe top
foureconomic
crimes»
PriceWaterhouseCoopersLLC
Global EconomicCrime
Survey2011
2018: (at least) 80B USD$/year

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
CybercrimeKeypoints
Cybercrime:
“The use of IT tools and telecommunication networks
in order to commit crimes in different manners”.
The axiom of the whole model:
“acquiring different types of data (information),
which can be transformed into money.”
Key points:
Virtual(pyramidal approach, anonymity, C&C, flexible and scalable, moving quickly and rebuilding fast, use of
“cross” products and services in different scenarios and different business models)
Transnational
Multi-market (buyers)
Differentiating products and services
Low “entry-fee”
ROI/Return of Investment (on each single operation, which means that, exponentially, it can be industrialized)
Tax & (cyber) Law heaven

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Cybercrime’sscenario
HIGHLY COMPLEX
Actors
oWe’llspeakaboutthislater
Motivations
oFame
oMoney
oIdeals
oNothing(?)
Products/Services
oCampaignson Affiliation, TrafficGeneration/Boosting, Advertising, etc…
oDozensof servicesand productsavailable: human creativitydefinetelyworks!
oWe’llseemanyof themtoday
Legislations
oNotpresentin allthe Countriesfor allof the crimes
oLackof internationalcooperation
oCybercrime: deeppresencein Countrieswith internalissues

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
«Deliverables» of Cybercrime
ID theft
oPersonal Infos
Credit Identity theft
oFinancial Info: e-banking logins, CC/CVV, «fullz», etc
Hacking
oTowardse-commerce, e-banking, Credit Processing Centers
Industrial Espionage
Malware
oVirus, Worm, Spyware, Key Loggers, RogueAV, Botnets, Mobile
Hackingon-demand
DDoSattacks
oBlackmail, Hacktivism
Spam
Counterfeiting
omedicines, luxury, products& services
Gambling
oMoney laundering
oFakesites/ notauthorizedby National authorities
Genericporn
ofakesites, etc
Minorsand Infantspornography

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Scenario odierno(cybercrime)
ABN AMRO
case study

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
GettingCybercrime’sROI

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Whyisallof thishappening?
Becauseusersare stupid(or «naive», uneducated, notaware,
etc…)
Videoclip: the «wizard» from Belgium

Cybercrime: reasons
1. Thereare new users, more and more every
day: thismeansthe totalamountof potential
victimsand/or attackvectorsisincreasing.
2. Makingmoney, “somehowand straight
away”.
3. Technical know-how public availability&
ready-to-go, evenwhentalkingaboutaverage-
high skills: that’swhatI name“hackingpret-à-
porter”
Thanks to broadband,
3G/LTE and «always-on»
WW Economical
crisis…
0-days, Internet
distribution system /
Black Markets

Cybercrime: reasons/2
4. It’s extremely easy to recruit “idiots” and set up groups, molding those adepts upon
the bad guy’s needs (think about e-mules)
5. “They will never bust me”
6. Lack of violent actions
Newbies,
Script Kids
Psychology, Criminology
Psychologyand Sociology

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
CybercrimeBusiness Model
→ The «RBN model» (Russian Business Network)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
OC (OrganizedCrime) meetswith Cybercrime
→ Commandchain(and operatingphases)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
→ Approachby «operative macro-units»
OC (OrganizedCrime) meetswith Cybercrime

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
CybercrimeBusiness Model 2

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Examples(realones)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
In order to certify their own credibility, “vendors”
often provide “demo” credit cards.
This means that the buyer is able to verify the
seller is “in good faith”.
Here we can see that the demoprovided by the
seller includes every kind of data related to the
owner of the credit card (“Fullz”).
Examples(realones)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Esempi (reali)
BOA, CITI, CHASE.COM LOGIN
EMAIL+PASS
FULLS COMPLETE
BALANCE: $25000 verified
PRICE: $525
US visa/US master $2.5 Random
ITALY cc $17

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Dieboldand Russia
…whilenot
forgettingabout
the malwareon
DieboldATMs
(2009-2012?)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Examples(realones)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
$146K USD/Week
Examples(realones)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Examples(realones)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Recently a cybercrooksgang has been
accused of a Fake AV Fraud campaign:
investigators said the revenue has been
around 100 USD Millions, over one year.
Examples(realones)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Examples(realones)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Examples(realones)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security BrokersAdmin

Admin

Admin

Admin

Global
Moderator
Moderator

Reviewer

Reviewer

Reviewer

Reviewer

Reviewed
Vendor
Reviewed
Vendor
Reviewed
Vendor
Reviewed
Vendor
Reviewed
Vendor
Member

Member

Member

Member

Member

Member

Member

Member

Member

Member

Member

Member

Member

Member

Member

Member

Member

Member

Member

Member

Member

Member

Member

Member

Member

Member

Member

Member

Member

Member

Member

Member

Member

Member

Member

Member

Run Escrow Service and
Control Membership
Supervises Content
Arbitrates Disputes
Monitor Individual
Topic Areas
Assess Quality of
Vendor Products
Have Permission
to Sell Goods/Services
To Forum Members
Moderator

Moderator

Trial
Vendor
Trial
Vendor
Fraudsters
Hackers/Coders/Data Thieves
Site Management (1
st
Level)
Examples(realones)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Templates used to
manufacture cloned
cards
Blanks produced
High quality holograms
“Dumps” data used to
encode on magstripe,
embosser used to print
card details on front
Examples(realones)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Early
Arrests
Markus Kellerer aka
Matrix001
& Five Others, May 2007-Oct.
2007
Germany
Co-Founder
Renu Subramaniam aka
JiLsi
July 2007
United Kingdom
Founder
Examples(realones)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Max Butler, aka Iceman
September 2007
San Francisco/Richmond
Founder of CardersMarket
$86 Million in actual Fraud Loss
Examples(realones)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Esempi (reali)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Esempi (reali)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Examples(realones)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Examples(realones): March / May2010
March/May2010, Turin(North-West of Italy)
Turinhasgotthe biggestRomania’scommunity of Italy.
Wealsohavea verybig Nigeria’scommunity.
Historically, Romeniangangsdrive the business of ATM skimmers…
…and Nigerianthe Cocaine business.
Aftera joinedFBI/US Secret Service/Interpol/ItalianPostal Police operation,
the Romaniansdecidedto “sell” the business to Nigerians.
Clonedcardswerepaidwith Cocaine.
This happensbecausethe Romeniansalsorunthe prostitutes
business…
…and, prostitute’scustomerswantcoke aswell.
Comparedto theseguys, Scarfacewasnearlya kid

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
→ Cybercrime≠ “hackers”
Differences

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Whatcameup in 2015?
«Malwareevolution» on POS systems»

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Malwareevolutionon POS

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Malwareevolutionon POS

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Point-of-Sales relatedCrimes

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Malwareevolutionon POS

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Malwareevolutionon POS

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Malwareevolutionon POS

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Malwareevolutionon POS

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Malwareevolutionon POS

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Cashingout

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Malwareevolutionon POS

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Malwareevolutionon POS

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Malwareevolutionon POS

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Malwareevolutionon POS

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
NFC, the nextnightmare

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
NFC, the nextnightmare

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
NFC, the nextnightmare

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Who’swho

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
…From RBN up to now… thingsevolved

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Videoclip time!

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
0days market

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
The pricingdebate
Source: Forbes, “Shopping For Zero-Days: A Price List For Hackers’ Secret Software Exploits”, 2012, in
http://www.forbes.com/sites/andygreenberg/2012/03/23/shopping-for-zero-days-an-price-list-for-hackers-secret-
software-exploits
I thinkallof yourememberthis:

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
The pricingdebate
Whataboutthis? (CHEAP butLAME, India’sones)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Where’sthe truth?
What’sthe right approach
with «pricing»?

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
0-days scenarios
Whowouldbuy/trade/whateverthisstufffrom someonewhofounda vuln-> exploit ->
0day?
Some hacker folks.
(which, eventually, mayresellitto oneof the following):
ITVendors
Security Vendors
Big Internet players
0days «brokers»
LI private companies
Law EnforcementAgencies(LEAs)
Intelligence Agencies(IAs)
Cybercrime/ OrganizedCrime (drugscartels in Mexico, everheardabout?)
Pwoningcontests, CTFs, etc.
(Hacktivists?)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
→ 0-day Markets
0-day
Software
«Bug»
Vendors
CERT (ICS-CERT)
National Institutions
Patch
Software Rel
x.y.z
Black Market
(Cybercrime)
Black Market
(underground)
White (?)
Market
Gettingthe big picture

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
A different(more serious?) approach
Public Knowledge
of the vulnerability
Buyer’stypology
IS = IT Security companies
INT= Intelligence Agencies
for Governmentaluse
(National Security protection)
MIL = MoD/relatedactors
for warfareuse
OC = Cybercrime
0-day Exploit code +
PoCCost: Min/Max
Y IS 10K –50K USD
Y INT 30K –150K USD
Y MIL 50K –200K USD
Y OC 5K –80K USD
N ALL X2–X10

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
A different(more serious?) approach
Public
Knowledge
of the
vulnerability
Vulnerability relayson:
Operating System ( OS)
Major General Applications
(MGA)
SCADA-Industrial
Automation (SCADA)
Buyer’stypology
IS = IT Security companies
INT= Intelligence Agencies
for Governmentaluse
(National Security protection)
MIL = MoD/relatedactors
for warfareuse
OC = Cybercrime
0-day Exploit
code + PoC
Cost: Min/Max
Y OS OC 40K –100K
Y MGA INT 100K –300K
Y SCADA MIL 100K –300K
N OS MIL 300K –600K
N SCADA MIL 400K –1M

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Nota «verywellknown» world

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Finfisher

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Global, dirtybusiness
“Mass interception of entire populations is not
only a reality, it is a secret new industry
spanning 25 countries.”
“It's estimated that the global computer
surveillance technology market is worth $5
billion a year.”

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Whodo youwannasell (your0days) to?

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
On Bitcoins

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Bitcoins
A peer-to-peer digital currency that is pseudo-anonymous.
The identity of the individual is disguised, but his/her transactions are open to
the public.
It is anonymous to the extent that it is difficult to relate a digital identity to
an actual person.
Bitcoins have huge implications on money laundering.
Various government institutions around the world are starting to view it as an
area requiring regulation.

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Bitcoins
Bitcoins are created through a process of ‘mining’, in
which users who provide their computing power, verify
and record payments into a public ledger in exchange for
transaction fees in newly minted bitcoins.
This process is akin to a central bank printing new money,
but is less centralised.

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
On Bitcoins: whyisitimportantto business?
Botnets steal your computing power to either:
1) ‘Mine’ more bitcoins. Similar to SETI, but more nefarious.
2) Conduct various cyber crimes
If your networks are insecure, you are indirectly facilitating cyber criminals.

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Bitcoins

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Bitcoins

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Bitcoins

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Round-trippingwith Bitcoins
The full presentationof this
projectisavailablein the Annexes
(WEF –BitcoinsTrackingProject)
Illegal
Money
Aquired
through clic
fraud,
carding…etc
Exchanger
Verified exchanger
or peers
E.g. Mt Gox,
Coinbase, Bitstamp
or anyone else
willing
Bitcoin
Account
Bitcoin
“Smurfed”
Account
Cash out
Money
transferred
or taken out
from
Exchanger

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Round-trippingcon Bitcoins
The full presentationof this
projectisavailablein the Annexes
(WEF –BitcoinsTrackingProject)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Summarizingon Bitcoins
While Bitcoins can be used legitimately, they are used by cyber criminals to
launder money.
An unsecured network can be used by the same cyber criminals, thereby
indirectly increasing their gains.
More regulation is required in the area.
We would like to use international credit card fraud datato further examine
to extent to which Bitcoins are related to fraud.
The data has been difficult to obtain so far.

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
How do youpayfor cybercrimeservices/products?
CASH (F2F)
Offshore bankaccounts
Underground currencies(digital)
NOTE: it’snotjust aboutBitcoins!

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
HAWALA

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Learning from terrorismfinancialmodels

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Underground currencies

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
“Underground” currencies

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
“Underground” currencies

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
“Underground” currencies

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
“Underground” currencies

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
“Underground” currencies

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
“Underground” currencies

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
“Underground” currencies

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
“Underground” currencies

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
“Underground” currencies

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
“Underground” currencies

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Badguyshackingbadguys

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Cashingout

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Investigativeopportunities

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
«Followthe money»
JudgeGiovanni Falcone, killedby Italianmafia with a bombon
the highwayin Sicilyon May23rd, 1992.

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
«Followthemoney!»

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
CreditCards&goods

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Mainapproachestocash-out

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Insights

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Click-Fraudcampaigns
ClickForensicsstatstellusthatback in
2008, the Cybercrimegained33$
Millionsfrom Click Fraudcampaigns.

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
«Traffic»re/sellers
Trafficfrom web sites/usersin US, UK,
AU, CA and DE.
1000 visitsat7$
Minimum buy: 5.000 visits.
In thiscase «Traffic» issold, meaningthe quantityof HTTP requestsof unawareuserson regular but
compromised(hacked) web sites.
Thoserequestsare redirectedto maliciousdomains(ownedby the buyer of the service), which
usuallyhost«Exploit Kits».
Veryoftentheyproduce soldtrafficvia MSN, FB and Linkedinspam aswell.

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
«Traffic»re/sellers

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Spamcampaigns
Amongthe higherrevenuebusiness models
for a Botnetmaster, thereisSpam.
Here wecan seea organizationnamed
«EvaPharmacy» whichoffers
«affiliationsfor Botnets».
In exchangefor a spam campaign, theyoffer
45% on everysoldproductbetween60$
and 100$whichiscomingfrom theirown
campaign.
85% of global Spam’ssource is
estimatedasBotnets.

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
GlobalBusiness

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
MoneyMules:«verynormalpeople?»

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Complexmanagement
Phisher

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
OSINTandinvestigations
“Open sources can provide up to
90% of the information needed to
meet most U.S. intelligence needs”
--Deputy Director of National Intelligence, Thomas Fingar

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
OSINTandinvestigations

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
OSINT,socialandmules

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Sometimes,easytocatch…
Criminal Persona Real Persona
Money Mule Yulia Klepikova

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Sometimes,easytocatch…

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Going«social»

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Social media
“Social Media are a set of Web 2.0 platforms, thanksto whichusers
interactdirectly, producingand sharingcontentsfrom theirown
and/or editing otherones, in realtime”. (wikipedia)
This iscertainlytrue, but….
Why are they (mostly) free?
Who owns them (really?)
Who controls them (really?)
What do they do with everybody’s social graphs
and behaviours?
And with all of that information?
What about all of those pictures?
What’s written inside their EULAs?
Are they filtered?
Are they neutral?
Are they secure?

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Social Networks asweapons?

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
SN = Cybercrimeheaven(and IAs!)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Social as(possible) business risk

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Social and the risksfor the users(unawared, newbies…)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Phishingvia FB

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Spearphishing(«sender»: Facebook)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Spearphishingon professionalSN (Linkedin)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Twitterand PsyOps

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
AssociatedPress, Twitterand NYSE
The hijackingotAP twitteraccount causesa lossof 53B$ atthe NYSE….
Whogainedfrom this??

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
The «Alpitour» case study

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Gang # 1 (North Africa) hacks on September 11, 2013, the Facebook profile of the Travel Company Group (Viaggidea,
Francorosso, VillaggiBravo, Alpitour) gaining full control (Spear Phishing attack).
oThey start posting fake offers (look at those irresistible beach imagesand those special prices you can’t miss!); the
links drove the users to a new variant of Zeus malware
oAverage of 120.000 users exposed to serious risks
oOver the next48 hours, manymessageswerepostedon differentsocial profilesof the Group; laterthe Group
canceledthosemessagesfrom FB, whiletheyhadbeenvisiblefor weeks from the Alpitour Twitter, sincethey
configuredatauto-post feature).
Gang # 2 (Gulf area) 13-14 September, 2013
oThosepostsfrom thesedateslook muchdifferent(grammar, contents).
oProbablyGang #1 soldthe accessto Gang #2. Postsshow a verybadItalianlanguageand grammar. Later, the
attacker(s) publishedsomepostsin Arabic, and committedgrammarmistakeswhenwritingin English(i.e. "bages"
ratherthanpages).
oIn thissecondabusecase, the gang usedthe infectedaccounts in orderto send«trusted» maliciouslinks, thus
gainingthe full control of the target devicesin orderto sendmassive spam.
The «Alpitour» case study: MO and goals

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Web reputation, indexing, media/press, posts, social…

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Oneyearlater

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Wrap up: solutions
Full review of your own approaches and models (new threats, new scenarios)
Risk Management “2.0”and Crisis Management policies(cyber): PR, Legal, Security, Board
Social Networks
Web Applications (OWASP, S-SDLC, Secure Coding!!!)
Apps (especially if from the banking industry)
In-security on e-banking customer’s client-side (OS, routers, Phishing)
Anti-DDoSprocedures
Security Testing (stop “low budget” = low quality!)
Use of methodologies! (OSSTMM + RAVs)
Talk each others (IT, Security, PR and Marketing: all together…)
“Cyber” crisis simulations
Procedures and Dedicated Teams on Digital Forensics (aheadof a incident, not later!!)
Cybercrime Intelligence
IPv6

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Acknowledgements
(Bitcoinresearchand Underground currencies)
DrGeorge Li, BSc (Syd), BCom(Syd, Hons. I), PhD (Syd)
Antonio Guerrero, PG Dip Management, MGSM, MBA (2014), MGSM
Fyodor Yarochkin(the “Xprobe2” guy”)

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
●The commercialization of Digital Spying, Morgan Marquis-Boire, Claudio Guarnieri, Bill Marczak, John Scott-Railton, Citizen Lab,
Canada Centerfor Global Security Studies, MunkSchool of Global Affairs (University of Toronto), 2013
●No Place to Hide: Edward Snowden, the NSA and Surveillance State, Glenn Greenwald, Penguin Books, 2014
●Kingpin, Kevin Poulsen, HoepliEditore, 2012
●Profiling Hackers: the Science of Criminal Profiling as applied to the world of hacking, Raoul Chiesa, StefaniaDucci, Silvio Ciappi,
CRC Press/Taylor & Francis Group,2009
●H.P.P. Questionnaires2005-2010
●Fatal System Error: the Hunt for the new Crime Lords who are bringing down the Internet, Joseph Menn,Public Affairs, 2010
●Stealing the Network:How to 0wn a Continent, (an Identity), (a Shadow) (V.A.), SyngressPublishing, 2004, 2006, 2007
●Stealing the Network: How to 0wn the Box, (V.A.), SyngressPublishing, 2003
●Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier, SueletteDreyfus, Random House Australia,
1997
●The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage, Clifford Stoll, DoubleDay(1989), Pocket (2000)
●Masters of Deception:the Gang that Ruled Cyberspace, Michelle Stalalla& Joshua Quinttner, Harpercollins, 1995
●Kevin Poulsen, Serial Hacker, Jonathan Littman, Little & Brown, 1997
●Takedown, John Markoffand Tsutomu Shimomura, Sperling& Kupfler, (Hyperion Books), 1996
●The Fugitive Game: online with Kevin Mitnick, Jonathan Littman, Little & Brown, 1997
●The Art of Deception, Kevin D. Mitnick& William L. Simon, Wiley, 2002
●The Art of Intrusion, Kevin D. Mitnick& William L. Simon, Wiley, 2004
●@ Large: the Strange Case of the World’s Biggest Internet Invasion, Charles Mann & David Freedman,Touchstone, 1998
Reading Room /1

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
●The Estonia attack: Battling Botnets and online Mobs, GadiEvron, 2008 (white paper)
●Who is “n3td3v”?, by Hacker Factor Solutions, 2006 (white paper)
●Mafiaboy: How I cracked the Internet and Why it’s still broken, Michael Calcewith Craig Silverman, 2008
●The Hacker Diaries: Confessions of Teenage Hackers, Dan Verton, McGraw-Hill Osborne Media, 2002
●Cyberpunk: Outlaws and Hackers on the Computer Frontier, Katie Hafner, Simon & Schuster, 1995
●Cyber Adversary Characterization: auditing the hacker mind, Tom Parker, Syngress, 2004
●Inside the SPAM Cartel: trade secrets from the Dark Side, by Spammer X, Syngress, 2004
●Hacker Cracker, EjovuNuwerewith David Chanoff, Harper Collins, 2002
●Compendiodi criminologia, PontiG., RaffaelloCortina, 1991
●Criminalitàdacomputer,TiedemannK.,inTrattatodicriminologia,medicinacriminologicaepsichiatriaforense,vol.X,Il
cambiamentodelleformedicriminalitàedevianza,FerracutiF.(acuradi),Giuffrè,1988
●UnitedNationsManualonthePreventionandControlofComputer-relatedCrime,inInternationalReviewofCriminalPolicy–Nos.
43and44
●CriminalProfiling:dall’analisidellascenadeldelittoalprofilopsicologicodelcriminale,MassimoPicozzi,AngeloZappalà,McGraw
Hill,2001
●DeductiveCriminalProfiling:ComparingAppliedMethodologiesBetweenInductiveandDeductiveCriminalProfilingTechniques,
TurveyB.,KnowledgeSolutionsLibrary,January,1998
●MaliciousHackers:aframeworkforAnalysisandCaseStudy,LauraJ.Kleen,Captain,USAF,USAirForceInstituteofTechnology
●CriminalProfilingResearchSite.ScientificOffenderProfilingResourceinSwitzerland.Criminology,Law,Psychology,Täterpro
Reading Room /2

Workshop Riga –Latvia26/10/2018 –© 2012-2018 Security Brokers
Contacts, Q&A
Needanything, gotdoubts, wannaaskussmth?
rc[at] security-brokers [dot] com
sg[at] security-brokers[dot] com
Thanksfor yourattention!
QUESTIONS?