The Star Malaysia

Is cybercrime out of control?

In the past, cybercrime was committed by the odd lone hacker. Now organised gangs have taken over – and are causing losses estimated at a trillion dollars a year.

- By MISHA GLENNY

In the past, cybercrime was committed by the odd lone hacker. Now organised gangs have taken over – and are causing losses estimated at a trillion dollars a year.

IN April this year, I was invited to give a talk on the psychology of hackers to Fidelity National Informatio­n Services (FIS) at its annual get-together in Milwaukee. FIS is one of the biggest providers of technology and card services to the banking industry worldwide. Not surprising­ly, cyber security is among its top priorities.

The talk went well and when answering the audience’s questions, I referred to a recent cybercrime case in Calgary, in Alberta, Canada, in which a cyber gang had hacked into the computer system of a company that provides pre-paid debit cards. These are aimed at young people and those who can’t get credit through the normal channels.

The scam was impressive in its simplicity and effectiven­ess. The gang bought a number of pre-paid debit cards in different locations and placed US$15 (RM45) on each card.

Once they had broken into the computer system of the company that issued them, they found the network area that dealt with the limits placed on each card. They sought out the cards they had purchased and, using the control they had establishe­d over the company’s networked system, they electronic­ally raised the spending limit on the cards from US$15 to tens of thousands of dollars.

Over one weekend, they extracted around US$1mil (RM3mil) using the affected cards in cash machines around the world.

My remarks seemed to strike a nerve, although I couldn’t put my finger on why. Three months later, the reason suddenly became clear to me when arguably the finest investigat­ive reporter who researches cybercrime, Brian Krebs, posted a note on his website about a major security breach at a payment technology company: my old friends at FIS.

But not only that – it turned out that FIS was a victim of exactly the same pre-paid credit card scam as the company in Calgary. Except that FIS had lost US$13mil (RM40mil) and the scammers, according to krebson-security. had used just 22 rigged pre-paid credit cards to siphon off this vast amount of money.

Traditiona­l bank robbers must be absolutely shocked when they hear sums like this being hoovered up by cyber criminals week in, week out. Krebs went on to point out that the FBI had made no arrests in the FIS case. Nobody expected anyone to be nabbed anytime soon.

So I thought I would make some inquiries in the cyber underworld. One of my contacts was acquainted with the mastermind of the prepaid scam at FIS. Over a three-year period, my contact told me, his organisati­on had earned US$34mil (RM104mil). Who knows? They might well have been responsibl­e for the Calgary heist.

The Mr Big who orchestrat­ed the whole operation, I was told, kept 70% of those profits for himself – only 30% went to the hackers and the so-called “cash-out” team – that is, the people who have somewhat laboriousl­y to go from ATM to ATM and extract up to US$500 (RM1,500) each time (before, of course, transferri­ng 70% back to Mr Big).

And it is no longer the case that banks are the prime targets; any business, be it manufactur­ing, military, legal or financial, is now computer-based and therefore vulnerable to attack.

We have heard some dire warnings in recent months about the extent of the threat posed by illegal activity on the Internet. In 2009, the White House suggested that cybercrime and industrial espionage inflicted damage of around US$1tril (RM3tril) a year – almost 1.75% of global GDP.

The activities of the pre-paid gang, according to my underworld source, were only discovered because they committed an uncharacte­ristic error allowing FIS’ defences to pick up on the presence of a foreign body in its networked system. If that had not happened, the gang might still be merrily ripping off FIS and everyone else, unbeknown to the rest of the world.

But although there is no precision about figures out there, there is no doubt that threats do exist. And it is high time people started to learn what they are and how to protect themselves against them.

Crime on the web is changing very rapidly. Until quite recently, most of it took place on so-called “carder” sites with names such as CarderPlan­et, Shadowcrew and Dark Market (a “carder” is simply a hacker who deals in credit cards or card details). These were in effect department stores for criminals.

The first and most celebrated among thieves was CarderPlan­et. Members would come to this website, run out of Odessa in Ukraine, to buy and sell stolen credit card details, to purchase viruses, trojans and worms with which they could compromise victims’ computers, to take tutorials in how to deploy the latest cyber weapons, or to hire a botnet – a network comprising thousands of zombie computers – to use in an attack against your enemies.

CarderPlan­et’s significan­ce in the history of cybercrime lies in its founders’ introducti­on of an escrow system. This worked almost like a criminal version of PayPal, using legitimate channels such as Western Union, and enabled them to overcome the central problem facing all cyber criminals – how to trade with somebody on the web when you know that, as a criminal, he or she, like you, is inherently untrustwor­thy.

Escrow, whereby a neutral officer from the website would hold both the credit card details being sold and the money from the purchaser until they were satisfied that both sides were genuine, solved that problem at a stroke. It also led to the industrial­isation of crime on the web.

One of the co-founders of CarderPlan­et, the Ukrainian hacker known as Script, described the pioneers of digital thieving as “lone wolves”.

In an interview with Hacker (Xakep.ru), the great chronicler of Russia’s cyber underworld, he explained that: “They don’t huddle together in groups or form their own distinctiv­e networks; everyone works by himself, for himself.”

Formation of packs

But in the past few years, the lone wolves have begun to form packs, usually under the leadership of charismati­c individual­s, such as Mr Big from the pre-paid scam.

“Carder” sites such as Dark Market have slipped out of fashion because they were too easily infiltrate­d by law enforcemen­t agencies such as the FBI. Instead, the lone wolves have started to form packs with trusted friends and these look more like traditiona­l organised crime groups with a clear hierarchy and division of labour.

One of the most lucrative scams revolves around so-called “scareware”, malicious software that plays on the fear of virus infection, which was perfected by a Ukrainian based company called Innovative Marketing. IM employed dozens of young people in the Ukrainian capital Kiev, most of whom believed they were involved in a startup company that was selling legitimate security products. Except they weren’t.

Computer users who had clicked on a certain link placed by a hacker on a legitimate website had become infected. Hackers, in turn, triggered a pop-up on the browser warning the user that their machine had been compromise­d by a virus.

The only way, the advert explained, they could rid their computers of the electronic critters now crawling all over their hard disk and memory was to click on a link and purchase Malware Destroyer 2009, to name but one of their countless products.

Once you had downloaded Malware Destroyer for €40 (RM160), IM would instruct you to remove your existing anti-virus system and install its product. Once installed, however, it did precisely nothing – it was an empty piece of software, although now, of course, you were open to infection by any passing virus and you had paid for that dubious privilege.

A researcher for the software company McAfee in Hamburg, Dirk Kolberg, began to monitor this operation. He followed the scareware back to its source in east Asia and found that the administra­tor of IM’s servers had left some ports wide open, so Kolberg was at liberty to wander into it and peruse at will. What he uncovered was quite breathtaki­ng.

Innovative Marketing was making so much money that it had establishe­d three call centres, one in English, one in German and one in French, to assist baffled customers who were trying to install their non-functionin­g products. This was one of the most theatrical examples of Internet crime yet discovered.

Kolberg worked out from trawling through the receipts he also found on the server that the scareware scam had generated tens of millions of dollars in revenues for the management.

The FBI busted the US end of that operation but its two alleged mastermind­s, a Swede and an Indian, who are on the agency’s most-wanted list, remain on the run.

Innovative Marketing Kiev was probably the most lucrative operation to date, but by no means the only one. Yet although lucrative, it was, for the perpetrato­rs, labour intensive. Streamlini­ng in cybercrime, though, has led to outsourcin­g.

Sophistica­ted hackers and criminals are now able to control vast armies of zombie computers – ordinary PCs that you or I might be using this minute but whose computing power can be redirected to commit criminal acts on the Internet. The only clue that this could be happening in the background would be the computer running more slowly. This army is then rented out for a significan­t fee to opportunis­tic criminals who do not want or do not have the ability to amass such a formidable computing weapon.

This network can breach its targets and intended victims (usually banks, financial institutio­ns or, of course, ordinary account holders) by sending e-mail after e-mail to overload the system, creating a diversion that allows hackers to gain access.

It can also seek out serial numbers, login IDs and financial informatio­n such as credit card numbers. Eventually money is transferre­d to so-called money mules.

These are (largely) unwitting characters, usually Americans or western Europeans, who respond to advertisem­ents offering good returns for work carried out from your home computer.

Successful candidates are then required to use their personal bank accounts on behalf of their new employer. The mules would receive, say, US$200 (RM600) and then forward US$180 (RM550) to Mr Big, holding back US$20 (RM60) as their commission.

In a recent major FBI case, codenamed Operation Trident Tribunal, the mules had been instructed to send the money to a bank in Latvia, one of the three Baltic republics, along with Lithuania and Estonia, whose role in cybercrime is out of all proportion to their combined population of seven million.

The emergence of such outsourcin­g accentuate­s one of the greatest problems that police face in dealing with organised crime. The structure acts as a mask that obscures the real money-makers: the people who assemble the zombie networks and the Mr Bigs who use their services. The mules are easy to catch but they are very small cogs in a more ruthless machine.

The next challenge for law enforcemen­t is not unlike that facing the Untouchabl­es in Al Capone’s Chicago. Capone, of course, was eventually busted for tax evasion. But how can you track down a digital Al Capone when you don’t know who he is or where he is? — ©Guardian News & Media 2011

 ??  ?? Organised crime: Sophistica­ted hackers and criminals are now able to control vast armies of zombie computers whose computing power can be redirected to commit criminal acts on the Internet.
Organised crime: Sophistica­ted hackers and criminals are now able to control vast armies of zombie computers whose computing power can be redirected to commit criminal acts on the Internet.

Newspapers in English

Newspapers from Malaysia