cyber crime workshop (1)

Upload: dandisdandis

Post on 04-Jun-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 Cyber Crime Workshop (1)

    1/15

    CYBER CRIMES

    WORKSHOP

    .

    1

  • 8/13/2019 Cyber Crime Workshop (1)

    2/15

    2

  • 8/13/2019 Cyber Crime Workshop (1)

    3/15

    3

  • 8/13/2019 Cyber Crime Workshop (1)

    4/15

    Peteris Sahurovs Utilized a computer virus that involved the online sale of fraudulent computer

    security programs that defrauded Internet users of more than $2 million. Sahurovs contacted an online newspaper claiming to work for an online

    advertising agency that represented a hotel chain that was seeking to placeadvertisements on the paper's website. Sahurovs utilized fraudulent referencesand bank accounts to deceive the newspaper into believing he represented alegitimate advertising agency.

    Sahurovs provided electronic files containing the fictitious hotel advertisements tothe newspaper, which began running the advertisements on its website. He thenreplaced the hotel advertisements with a file containing a malicious computercode, or malware, which infected the computers of people who visited the websiteand required them to purchase antivirus software for $49.95 to regain control oftheir computers. If the users did not purchase the software, their computersimmediately became inundated with pop-ups containing fraudulent "security

    alerts," and all information, data and files stored on the computers becameinaccessible. Sahurovs allegedly conducted the same fraudulent advertising and infection

    scheme against numerous online businesses.

    4

  • 8/13/2019 Cyber Crime Workshop (1)

    5/15

    5

  • 8/13/2019 Cyber Crime Workshop (1)

    6/15

    Artem Semenov

    is wanted for his alleged participation in an Eastern European

    cyber crime ring, operating out of New York, which is known

    for recruiting money mules to open bank accounts, cashing out

    money received through unauthorized money transfers, and then

    transferring the money overseas.

    An arrest warrant was issued for Semenov in the Southern

    District of New York on September 29, 2010, after he was

    charged with conspiracy to commit bank fraud; conspiracy to

    possess false identification documents; and false use ofpassport.

    6

  • 8/13/2019 Cyber Crime Workshop (1)

    7/15

    Bjorn Sundin & Shaileshkumar Jain Involved in an international cybercrime scheme that caused internet

    users in more than 60 countries to purchase more than one millionbogus software products, resulting in consumer loss of more than$100 million.

    Used fake advertisements placed on legitimate companieswebsites, they deceived internet users into believing that theircomputers were infected with malware or had other critical errors

    in order to encourage them to purchase scareware softwareproducts that had limited or no ability to remedy the purporteddefects.

    They allegedly deceived victims, through browser hijacking, multiplefraudulent scans and false error messages, into purchasing full paidversions of software products offered by their company, InnovativeMarketing, Inc. The proceeds of these credit card sales were

    allegedly deposited into bank accounts controlled by the defendantand others around the world, and were then transferred to bankaccounts located in Europe. When customers complained that theirpurchases were actually fraudulent software, call centerrepresentatives were allegedly instructed to lie or provide refunds inorder to prevent fraud reports to law enforcement or creditcompanies.

    7

  • 8/13/2019 Cyber Crime Workshop (1)

    8/15

    8

  • 8/13/2019 Cyber Crime Workshop (1)

    9/15

    Business and Sales 1

    Contact Via ICQ, Messenger or similar or via email (generic addresses).

    Try & Buy Most offer tests or free demos. They also use online sites for

    checking algorithms to guarantee the authenticity of the carddetails.

    Minimum orders and bulk discounts Minimum orders are established (5 or 10 units in the case of credit

    card or bank details). There are discounts for bulk buying. Specialized online stores

    Once contact has been made, many use online sites set up asstores for distributing their products (which cant be accessed

    without a username and password).

    9

  • 8/13/2019 Cyber Crime Workshop (1)

    10/15

    Business and Sales 2

    Methods of payment

    Western Union, Liberty Reserve, WebMoney or similar.

    Customer services and support

    They offer service guarantees. If the product does not work (if the numbers, logincredentials are not valid, etc.), they will be changed for others that are operative.

    Promotion These services are mainly advertised through underground forums, although some

    of the boldest use social media and have accounts on Facebook and Twitter, etc.

    10

  • 8/13/2019 Cyber Crime Workshop (1)

    11/15

    Black Market Prices

    11

  • 8/13/2019 Cyber Crime Workshop (1)

    12/15

    Black Market Structure 1

    Programmers Who develop the exploits and malware used to commit cyber-crimes.

    Distributors Who trade and sell stolen data and act as vouchers for the goods

    provided by other specialists.

    Tech experts Who maintain the criminal enterprises IT infrastructure, including

    servers, encryption technologies, databases, and the like.

    Hackers

    Who search for and exploit applications, systems and networkvulnerabilities.

    Fraudsters Who create and deploy various social engineering schemes, such as

    phishing and spam.

    12

  • 8/13/2019 Cyber Crime Workshop (1)

    13/15

    Black Market Structure 2

    Hosted systems providers Who offer safe hosting of illicit content servers and sites.

    Cashiers Who control drop accounts and provide names and accounts to other

    criminals for a fee.

    Money mules Who complete wire transfers between bank accounts. The money

    mules may use student and work visas to travel to the U.S. to openbank accounts.

    Tellers Who are charged with transferring and laundering illicitly gained

    proceeds through digital currency services and different worldcurrencies.

    Organization Leaders Often people persons without technical skills. The leaders assemble

    the team and choose the targets.

    13

  • 8/13/2019 Cyber Crime Workshop (1)

    14/15

    14

  • 8/13/2019 Cyber Crime Workshop (1)

    15/15

    Demo

    Steal user credentials and credit card numbers Using Facebook and Email Fishing

    Using Key Loggers

    Using Malware

    Disrupting websites Botnets

    15