Download - Cyber Crime Workshop (1)
-
8/13/2019 Cyber Crime Workshop (1)
1/15
CYBER CRIMES
WORKSHOP
.
1
-
8/13/2019 Cyber Crime Workshop (1)
2/15
2
-
8/13/2019 Cyber Crime Workshop (1)
3/15
3
-
8/13/2019 Cyber Crime Workshop (1)
4/15
Peteris Sahurovs Utilized a computer virus that involved the online sale of fraudulent computer
security programs that defrauded Internet users of more than $2 million. Sahurovs contacted an online newspaper claiming to work for an online
advertising agency that represented a hotel chain that was seeking to placeadvertisements on the paper's website. Sahurovs utilized fraudulent referencesand bank accounts to deceive the newspaper into believing he represented alegitimate advertising agency.
Sahurovs provided electronic files containing the fictitious hotel advertisements tothe newspaper, which began running the advertisements on its website. He thenreplaced the hotel advertisements with a file containing a malicious computercode, or malware, which infected the computers of people who visited the websiteand required them to purchase antivirus software for $49.95 to regain control oftheir computers. If the users did not purchase the software, their computersimmediately became inundated with pop-ups containing fraudulent "security
alerts," and all information, data and files stored on the computers becameinaccessible. Sahurovs allegedly conducted the same fraudulent advertising and infection
scheme against numerous online businesses.
4
-
8/13/2019 Cyber Crime Workshop (1)
5/15
5
-
8/13/2019 Cyber Crime Workshop (1)
6/15
Artem Semenov
is wanted for his alleged participation in an Eastern European
cyber crime ring, operating out of New York, which is known
for recruiting money mules to open bank accounts, cashing out
money received through unauthorized money transfers, and then
transferring the money overseas.
An arrest warrant was issued for Semenov in the Southern
District of New York on September 29, 2010, after he was
charged with conspiracy to commit bank fraud; conspiracy to
possess false identification documents; and false use ofpassport.
6
-
8/13/2019 Cyber Crime Workshop (1)
7/15
Bjorn Sundin & Shaileshkumar Jain Involved in an international cybercrime scheme that caused internet
users in more than 60 countries to purchase more than one millionbogus software products, resulting in consumer loss of more than$100 million.
Used fake advertisements placed on legitimate companieswebsites, they deceived internet users into believing that theircomputers were infected with malware or had other critical errors
in order to encourage them to purchase scareware softwareproducts that had limited or no ability to remedy the purporteddefects.
They allegedly deceived victims, through browser hijacking, multiplefraudulent scans and false error messages, into purchasing full paidversions of software products offered by their company, InnovativeMarketing, Inc. The proceeds of these credit card sales were
allegedly deposited into bank accounts controlled by the defendantand others around the world, and were then transferred to bankaccounts located in Europe. When customers complained that theirpurchases were actually fraudulent software, call centerrepresentatives were allegedly instructed to lie or provide refunds inorder to prevent fraud reports to law enforcement or creditcompanies.
7
-
8/13/2019 Cyber Crime Workshop (1)
8/15
8
-
8/13/2019 Cyber Crime Workshop (1)
9/15
Business and Sales 1
Contact Via ICQ, Messenger or similar or via email (generic addresses).
Try & Buy Most offer tests or free demos. They also use online sites for
checking algorithms to guarantee the authenticity of the carddetails.
Minimum orders and bulk discounts Minimum orders are established (5 or 10 units in the case of credit
card or bank details). There are discounts for bulk buying. Specialized online stores
Once contact has been made, many use online sites set up asstores for distributing their products (which cant be accessed
without a username and password).
9
-
8/13/2019 Cyber Crime Workshop (1)
10/15
Business and Sales 2
Methods of payment
Western Union, Liberty Reserve, WebMoney or similar.
Customer services and support
They offer service guarantees. If the product does not work (if the numbers, logincredentials are not valid, etc.), they will be changed for others that are operative.
Promotion These services are mainly advertised through underground forums, although some
of the boldest use social media and have accounts on Facebook and Twitter, etc.
10
-
8/13/2019 Cyber Crime Workshop (1)
11/15
Black Market Prices
11
-
8/13/2019 Cyber Crime Workshop (1)
12/15
Black Market Structure 1
Programmers Who develop the exploits and malware used to commit cyber-crimes.
Distributors Who trade and sell stolen data and act as vouchers for the goods
provided by other specialists.
Tech experts Who maintain the criminal enterprises IT infrastructure, including
servers, encryption technologies, databases, and the like.
Hackers
Who search for and exploit applications, systems and networkvulnerabilities.
Fraudsters Who create and deploy various social engineering schemes, such as
phishing and spam.
12
-
8/13/2019 Cyber Crime Workshop (1)
13/15
Black Market Structure 2
Hosted systems providers Who offer safe hosting of illicit content servers and sites.
Cashiers Who control drop accounts and provide names and accounts to other
criminals for a fee.
Money mules Who complete wire transfers between bank accounts. The money
mules may use student and work visas to travel to the U.S. to openbank accounts.
Tellers Who are charged with transferring and laundering illicitly gained
proceeds through digital currency services and different worldcurrencies.
Organization Leaders Often people persons without technical skills. The leaders assemble
the team and choose the targets.
13
-
8/13/2019 Cyber Crime Workshop (1)
14/15
14
-
8/13/2019 Cyber Crime Workshop (1)
15/15
Demo
Steal user credentials and credit card numbers Using Facebook and Email Fishing
Using Key Loggers
Using Malware
Disrupting websites Botnets
15