' Hackers hope businesses will have to redeem their data ' (Kaminsky).
A recent report by Internet Security Systems (owned by IBM last year) warns the industry's emergence of 'vulnerability exploitation service' with sophisticated distribution and production networks similar to Legal product channel of the computer industry. ' Vulnerability vendors often buy faulty code from the black market, encrypt it to prevent piracy or piracy, sell it to top spammers .'
For any market economy, the highest value goods will control the highest price. In December, a flaw found in Microsoft's new operating system Vista was found and sold on the Romanian Web forum for $ 50,000. Raimund Genes, chief technology officer of security firm Trend Micro, makes sure the malware industry controls more than $ 26 billion of the 2005 security firm.
That huge amount of money appeals to an equal number of criminals. The ze-ro day vulnerability was discovered last year and sold for between $ 20,000 and $ 30,000. Zero-day is a dangerous flaw, always creating new enhanced variants as soon as it is discovered, and before manufacturers can patch their products.
Although warned about the dangers of ze-ro and other security holes for companies and their customers, very few legal organizations can prevent someone from writing a chapter. process to exploit these vulnerabilities. You can't accuse someone of committing crimes when ' pointing out unpatched holes on the Internet ' - Marc Maiffret, founder and director of hacking department at eEye Digital Security said.
Phishing escalates
Phishing is also becoming an expensive underground business. Spammers often search for e-mail addresses on the Web to sell to hackers. Hackers rely on it to find a potentially exploitable vulnerability, create phishing websites and tell spammers who send e-mail phishing. Meanwhile, carders buy information stolen from hackers, create fake credit cards, fake debit cards to steal money or sell to many other crimes. Of course a terrorist activity can do many other things.
The Anti-Phishing Working Group, a consortium of community and private organizations, says the tools used by phishing scammers are now becoming more sophisticated. The December report of this group recorded more than 340 new variants of keylogger (keyboard stealing software) and Trojan hours used by phisher in just one month. The number of days increased by 'better use of automated tools to create and test new variants,' the report said.
Potentially, these tools were spawned from Eastern Europe with phishing programs and automatic spam distribution mechanisms. Those who create them are mostly young, only in their twenties. Some are educated and educated, but others are not. Some live in countries like Romania, where Internet bandwidth is more in households than some companies in the US. They grew up on the Internet more than 10 years ago and the laws there are less strict than places like the United States.
Sophisticated technology is not the only aid tool for phishing commerce. It's unbelievable, but the '419' Nigerian scammers continue their work successfully with many users using e-mail. Those e-mails usually start with the phrase 'I need your help' and describe the situation that makes them need a lot of money to save someone and move to a country. That money is called an 'advanced fee' because they may require victims to send money to help them free up some huge account with the promise of double or a large amount of compensation. The number 419 is the criminal code Negerian once once caused fever and stormed famous scams.
Last month, Michigan's former treasurer Alcona County was arrested and forced to pay $ 1.2 million he had "tackled" and at least sent some to the infamous Nigerian e-mail scammer. The US Federal Trade Commission had to issue this warning on its website: ' If you receive an email saying that you need help with a sum outside Nigeria or any other country, please send it to the Trade Council (FTC) at spam@uce.gov '.
'Pump and Dump' - Information and profit
On January 25, the Securities and Exchange Commission seized a 21-year-old boy in Florida when he destroyed a series of online brokerage accounts, then had to eliminate many names. his item. Investors say that the Aleksey Kamardin of Tampa, during the last five weeks of the summer, has earned more than $ 82,000 when using compromised accounts funds in Charles Schwab, E-Trade, JPMorgan Chase, TD Ameritrade. and many other online brokerage agencies to gently buy shares of trading companies. These purchases create a virtual craze for legitimate commercial activity, raising stock prices. After that, Kamardin sold the shares he bought first at high prices and caused the stock market to decline.
That's the new bottle of old wine 'pum and dump', a form of stock fraud based on secret information. Thieves will invest in cheap stocks, using accounts on the Cayman Island or somewhere far away from land that can set up anonymous account information. When a thief buys or steals identity information, he will set up a fake account, or infiltrate someone else's account (as in the case of Kamardin) and buy large quantities of cheap stocks, hold price control.
This creates a sensitive situation for financial services providers. ' They do not want to prevent everyone's business. Therefore, creating these fraudulent accounts has become a risky part of their businesses, 'said Marc Gaffan, marketing director of RSA consumer solutions. Likewise, it is difficult to scrutinize the business order because they are strongly influenced by time. Delay causes investors to lose money and hesitate to invest in that company. Last year, E-Trade encountered a similar dilemma when a computer was attacked, open to terrorists running pump-and-dump on the E-Trade client, leading to fraudulent activity. on the $ 18 million loss reported in the third quarter.
What to do before this situation?
The New York Electronic Crimes Task Force of Secret Service conducted the largest search in 2002 when claiming a former database administrator of Prudential Insurance, Donald McNeese stole identity and fraud information. Credit card and money laundering. McNeese stole the logs on a Prudential database containing information of 60,000 employees. When he tried to sell this information through the Web, Bill Moylan, a former inspector of Long Island's Nassau County Police Department, who performed secret missions discovered and contacted him. McNeese sent Moylan about 20 employee identification information and advised him to use it to create fake credit cards, some of which were sent to McNeese's home in Florida. McNeese was finally sentenced to three years in prison and forced him to spend $ 3,000.
Secret Service is a US federal organization responsible for investigating terrorist plots and economic hackers. In 2004, the organization found a group of hackers using the Shadowcrew.com website for illegal purposes. Six years later they were brought to federal court and forced to hire defense attorneys to steal credit cards, bank codes and identity information. Last March, Secret Service announced the capture of seven out of 21 suspects three months under Operation Rolling Stone, a program to investigate identity theft and online fraud "through Web criminal forums."
Even so, economic hackers still don't falter. At the RSA Security Conference, which took place in San Francisco last week, RSA Art Coviello chairman said that the identity theft market has reached one billion dollars and malware has increased by 10 in five years.
' The fundamental problem is that we have geographic enforcement organizations geographically, but there are no geographic elements on the Internet, ' said Dan Kaminsky, a security researcher at DoxPara Research. And: ' We can't eavesdrop on phones through the ocean or surprise someone's home in Romania without local cooperation. We only have talent and personnel in our country. '
As a result, law enforcement must be based on close cooperation of many private sectors such as financial institutions, Internet service providers and telecommunications companies. There are many criminals operating in local legal organizations throughout the country. Many of them have access to FBI InfraGard, the information sharing system between FBI and private areas. InfraGard has been a subsidiary of the FBI in the intellectual field since 1996 to support IT professionals and academia, serving as FBI-related terrorist investigations.
IT companies are also partly responsible for opening up the 'underground' online market with malicious codes and stolen data when releasing software with vulnerabilities. security. IBM's ISS has recorded a total of 7247 software vulnerabilities in 2006, an increase of nearly 40% compared to 2005. In particular, the vulnerability comes from Microsoft, Oracle and Apple as the largest.
Businesses and end users must stand together with some loose responsibility or security, sometimes simply storing too much data. In the case of TJX, the reason is that storing credit card data against Vista's regulations. ' The operating system will assume that it is wrong for everyone to leave the data '.
Companies need to carefully provide the data they are managing and assess the actual ability to protect it. If not, they may see these data on a black market website.