SlideShare a Scribd company logo
1 of 5
Download to read offline
page 1R S A M O N T H LY F R A U D R E P O R T
F R A U D R E P O R T
2014 CYBERCRIME ROUNDUP
The Year of the POS Breach
More than any other cybercrime or fraud threat, the breach of retail chain Point of Sale
systems and the theft of credit card data from millions of shoppers was in the headlines
most in 2014. The vast majority of those breaches can be attributed to POS malware
attacks.
Despite the ease of targeting payment cards and banking information of individual users,
fraudsters are finding that compromising retailers is much more lucrative and that smaller
merchants can also be easily breached. A common attack/infection method is to leverage
the POS vendor’s remote access connection (via RDP/VNC) to run routine maintenance on
the device. Most of the POS malware attackers enumerate running processes and use
pattern matching (mostly RegEx) to identify and extract payment card information from
the running process memory.
Figure 1: Colorful Chewbacca admin
panel login screen
page 2R S A M O N T H LY F R A U D R E P O R T
Featured POS Malware include:
Chewbacca – a private Trojan featuring two distinct data-stealing mechanisms: a generic
keylogger and a memory scanner designed to specifically target POS systems. Identified as
a possible agent of the enormous scale POS system breaches that hit retail chains in 2014.
Backoff POS – features a keylogger, memory scraper, and magnetic Track1/Track2
harvester, with added support for integrated keyboard magnetic card readers.
LusyPOS – features a magnetic Track1/Track2 harvester that communicates over the TOR
network, making the communications and the C&C servers harder to detect.
MOBILE MALWAVE EVOLVES
With the steady adoption of mobility and BYOD, mobile threats continued to gain
significant traction in 2014. The combined amount of mobile malware/high risk apps has
reached 2 million, a growth of 170,000 per month.
In Q2, 2014, 85% of the mobile device market was occupied by Android, and 98% of all
existing mobile malware targeted the users of Android devices.
Featured Mobile Malware Cases:
iBanking mobile bot – an SMS hijacker designed to work in conjunction with banking
Trojans. Discovered in underground chat rooms by the RSA Research Team in February,
2014 leaked source code revealed advanced capabilities and anti-SDK protection
mechanisms.
The bot has several features including enumeration of all installed apps on the infected
device, harvesting images from the device, and collection of precise geo-location data.
An added feature is the growing support for additional targeted entities – recent analysis
identified nearly 30 graphic templates for iBanking.
Mobile BOT APK – In May, an update to an Android mobile application package (APK) was
discovered to be a malware bot application. The app disguised as a token generator for
mobile online customers of an Eastern European bank. New features include SQLite table
for stolen data saved on the victim’s phone.
Figure 2: Control panel for iBanking –
available in various colors and themes
Figure 3: Example of fake token
generator mobile app
page 3R S A M O N T H LY F R A U D R E P O R T
THE UNDERGROUND MARKETPLACE DEVELOPS
The underground marketplace is continuing to develop, allowing fraudsters to outsource
services with increasing ease. The RSA Research Team has identified notable trends over
the year: the emergence of forum specific currencies (MUSD, UAPS, United Payment
System); a new, anonymous payment system knows as LessPay; a supply and demand
that is not only driving down the cost of credentials, but also bringing about the advent
of a CC store mobile app.
REGION SPECIFIC LOCALIZED FRAUD
One trend that seems to continue developing is region specific fraud that targets a
particular geographic region and/or language. LATAM countries seem to be experiencing
a rise in financial fraud in 2014, with fraudsters beginning to develop the sophistication
of their tools and methods.
Featured LATAM fraud case:
Bolware and Boleto fraud – In July, the RSA Research Team discovered a large fraud ring had
compromised the popular Boleto payment method in Brazil, deploying malware that is
estimated to facilitate the theft of billions of Dollars from innocent victims. Bolware and
Boleto fraud continue to evolve, as an ‘Onyx’ version of Bolware, and a non-malware related
DNS poisoning method that compromised Boleto transactions was also uncovered.
FRAUDSTERS LEVERAGE LEGITIMATE FINANCIAL PORTALS
Fraudsters searching for vulnerabilities or weaknesses in a financial system occasionally
find ways of abusing legitimate services or portals to perform fraudulent transactions or
gather background information on their intended victims.
Abused legitimate financial portals:
Voxis Team – a team of fraudsters created an automated cash-out platform that enables
automatic online transactions using stolen credit card data and forged or stolen
transaction IDs to make purchases via the compromised merchant IDs, and transfer the
payment funds to fraudster mule accounts. The fraud platform includes a control panel
and uses algorithms that imitate real online consumer behavior – staggering purchases
and fund transfers, as well as randomizing the amounts of each transaction to minimize
suspicion and detection.
Financial Data Aggregators – the RSA Research Team reported on fraudsters who use
legitimate financial data aggregation (personal money management) services to gain
insight into a potential victim’s financial profile and balance, as well as their online
transaction behavior patterns.
page 4R S A M O N T H LY F R A U D R E P O R T
Phishing Attacks per Month
RSA identified 46,747 phishing attacks in
December, marking a 24% decrease from
November. Based on this figure, RSA
estimates phishing cost global
organizations $453 million in losses.
US Bank Types Attacked
Regional banks were targeted by one-quarter
of all phishing volume in December while
U.S. nationwide banks experienced an 8%
increase in phishing volume – from 50%
to 58%.
Top Countries by Attack Volume
The U.S and Canada accounted for over
75% of attack volume in December,
followed by the UK, India, and Spain.
46,747
Attacks
Credit Unions
Regional
National
64%
12%
8%
4%
UK
India
Canada
U.S.
DECEMBER 2014
Source: RSA Research Team
www.emc.com/rsa
CONTACT US
To learn more about how RSA products, services, and solutions help solve your
business and IT challenges contact your local representative or authorized reseller –
or visit us at www.emc.com/rsa
Top Hosting Countries
US hosted 48% of phishing attacks in
December, followed by UK, Germany and
China. 5%7% 3%
48%
GLOBAL PHISHING LOSSES
DECEMBER 2014
©2015 EMC Corporation. EMC, RSA, the RSA logo, and FraudAction are trademarks or registered trademarks of EMC
Corporation in the U.S. and/or other countries. All other trademarks mentioned are the property of their respective
holders. JAN RPT 0115

More Related Content

What's hot

What's hot (18)

IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Jon handout 2
Jon handout 2Jon handout 2
Jon handout 2
 
Jon handout 3
Jon handout 3Jon handout 3
Jon handout 3
 
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-ThreatsThe Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
 
Rise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScanRise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScan
 
RSA Online Fraud Report - August 2014
RSA Online Fraud Report - August 2014RSA Online Fraud Report - August 2014
RSA Online Fraud Report - August 2014
 
User authentication-info-graphic
User authentication-info-graphicUser authentication-info-graphic
User authentication-info-graphic
 
Cybercriminality
CybercriminalityCybercriminality
Cybercriminality
 
08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector
 
Article is your organisation ready for the next ransomware attack - paul wr...
Article   is your organisation ready for the next ransomware attack - paul wr...Article   is your organisation ready for the next ransomware attack - paul wr...
Article is your organisation ready for the next ransomware attack - paul wr...
 
Online payment gateway service providers testware informatics
Online payment gateway service providers testware informaticsOnline payment gateway service providers testware informatics
Online payment gateway service providers testware informatics
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector
 
Wultra: Mobile Application Security
Wultra: Mobile Application SecurityWultra: Mobile Application Security
Wultra: Mobile Application Security
 
Risk analytics to fight fraud - cio applications europe
Risk analytics to fight fraud  - cio applications europeRisk analytics to fight fraud  - cio applications europe
Risk analytics to fight fraud - cio applications europe
 
Mobile Banking and Lurking Security Threats for 2022
Mobile Banking and Lurking Security Threats for 2022Mobile Banking and Lurking Security Threats for 2022
Mobile Banking and Lurking Security Threats for 2022
 
ThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted Egan
 
2015 Internet Crime Report
2015 Internet Crime Report 2015 Internet Crime Report
2015 Internet Crime Report
 

Viewers also liked

Zero Turn Radius Report - Team Panache (1)
Zero Turn Radius Report - Team Panache (1)Zero Turn Radius Report - Team Panache (1)
Zero Turn Radius Report - Team Panache (1)
Siddhesh Ozarkar
 
Keeping a Marriage Healthy and Happy
Keeping a Marriage Healthy and HappyKeeping a Marriage Healthy and Happy
Keeping a Marriage Healthy and Happy
Muslims4Marriage
 
Выпускники 2011
Выпускники 2011Выпускники 2011
Выпускники 2011
lexa0784
 
発券機のNFC対応
発券機のNFC対応発券機のNFC対応
発券機のNFC対応
Hirokuma Ueno
 
Fri evaluate crusades
Fri evaluate crusadesFri evaluate crusades
Fri evaluate crusades
Travis Klein
 
Weapons for peace
Weapons for peaceWeapons for peace
Weapons for peace
vicolombia
 
Insaat kursu-beykoz
Insaat kursu-beykozInsaat kursu-beykoz
Insaat kursu-beykoz
sersld54
 

Viewers also liked (20)

Zero Turn Radius Report - Team Panache (1)
Zero Turn Radius Report - Team Panache (1)Zero Turn Radius Report - Team Panache (1)
Zero Turn Radius Report - Team Panache (1)
 
Keeping a Marriage Healthy and Happy
Keeping a Marriage Healthy and HappyKeeping a Marriage Healthy and Happy
Keeping a Marriage Healthy and Happy
 
Выпускники 2011
Выпускники 2011Выпускники 2011
Выпускники 2011
 
発券機のNFC対応
発券機のNFC対応発券機のNFC対応
発券機のNFC対応
 
Excursiones en Matalascañas
Excursiones en MatalascañasExcursiones en Matalascañas
Excursiones en Matalascañas
 
SME Estudio Marcas que Marcan 2012
SME Estudio Marcas que Marcan 2012SME Estudio Marcas que Marcan 2012
SME Estudio Marcas que Marcan 2012
 
InBicocca, non si cerca, si trova!
InBicocca, non si cerca, si trova!InBicocca, non si cerca, si trova!
InBicocca, non si cerca, si trova!
 
White Paper: Sageza - Strategic Snapshot
White Paper: Sageza - Strategic SnapshotWhite Paper: Sageza - Strategic Snapshot
White Paper: Sageza - Strategic Snapshot
 
The EMC Isilon Scale-Out Data Lake
The EMC Isilon Scale-Out Data LakeThe EMC Isilon Scale-Out Data Lake
The EMC Isilon Scale-Out Data Lake
 
Day 3 mon world
Day 3 mon worldDay 3 mon world
Day 3 mon world
 
Tue law of demand
Tue law of demandTue law of demand
Tue law of demand
 
การนำเสนอในการประชุม
การนำเสนอในการประชุมการนำเสนอในการประชุม
การนำเสนอในการประชุม
 
Fri evaluate crusades
Fri evaluate crusadesFri evaluate crusades
Fri evaluate crusades
 
Weapons for peace
Weapons for peaceWeapons for peace
Weapons for peace
 
Insaat kursu-beykoz
Insaat kursu-beykozInsaat kursu-beykoz
Insaat kursu-beykoz
 
What’s in Windows Server 8 for the ITPro – a demo tour
What’s in Windows Server 8 for the ITPro – a demo tourWhat’s in Windows Server 8 for the ITPro – a demo tour
What’s in Windows Server 8 for the ITPro – a demo tour
 
Freddy bolivar
Freddy bolivarFreddy bolivar
Freddy bolivar
 
Barrokko
BarrokkoBarrokko
Barrokko
 
Creative examples of origami logo design for inspiration
Creative examples of origami logo design for inspirationCreative examples of origami logo design for inspiration
Creative examples of origami logo design for inspiration
 
What's New in VMware Virtual SAN
What's New in VMware Virtual SANWhat's New in VMware Virtual SAN
What's New in VMware Virtual SAN
 

Similar to 2014 Cybercrime Roundup: The Year of the POS Breach

Hi-Tech Crime Trends 2015
Hi-Tech Crime Trends 2015Hi-Tech Crime Trends 2015
Hi-Tech Crime Trends 2015
Group-IB
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
Microsoft Asia
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
bkbk37
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
write12
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
deanmtaylor1545
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
bradburgess22840
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
erlindaw
 

Similar to 2014 Cybercrime Roundup: The Year of the POS Breach (20)

Ransomware-as-a-Service: The business of distributing cyber attacks
Ransomware-as-a-Service: The business of distributing cyber attacksRansomware-as-a-Service: The business of distributing cyber attacks
Ransomware-as-a-Service: The business of distributing cyber attacks
 
The Current State of Cybercrime 2013
The Current State of Cybercrime 2013The Current State of Cybercrime 2013
The Current State of Cybercrime 2013
 
RSA Monthly Online Fraud Report -- December 2014
RSA Monthly Online Fraud Report -- December 2014RSA Monthly Online Fraud Report -- December 2014
RSA Monthly Online Fraud Report -- December 2014
 
Hi-Tech Crime Trends 2015
Hi-Tech Crime Trends 2015Hi-Tech Crime Trends 2015
Hi-Tech Crime Trends 2015
 
Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017
 
RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
Ransomware Review 2017
Ransomware Review 2017Ransomware Review 2017
Ransomware Review 2017
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013
 
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
 
RSA Online Fraud Report - July 2014
RSA Online Fraud Report - July 2014RSA Online Fraud Report - July 2014
RSA Online Fraud Report - July 2014
 

More from EMC

Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
EMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
EMC
 

More from EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

2014 Cybercrime Roundup: The Year of the POS Breach

  • 1. page 1R S A M O N T H LY F R A U D R E P O R T F R A U D R E P O R T 2014 CYBERCRIME ROUNDUP The Year of the POS Breach More than any other cybercrime or fraud threat, the breach of retail chain Point of Sale systems and the theft of credit card data from millions of shoppers was in the headlines most in 2014. The vast majority of those breaches can be attributed to POS malware attacks. Despite the ease of targeting payment cards and banking information of individual users, fraudsters are finding that compromising retailers is much more lucrative and that smaller merchants can also be easily breached. A common attack/infection method is to leverage the POS vendor’s remote access connection (via RDP/VNC) to run routine maintenance on the device. Most of the POS malware attackers enumerate running processes and use pattern matching (mostly RegEx) to identify and extract payment card information from the running process memory. Figure 1: Colorful Chewbacca admin panel login screen
  • 2. page 2R S A M O N T H LY F R A U D R E P O R T Featured POS Malware include: Chewbacca – a private Trojan featuring two distinct data-stealing mechanisms: a generic keylogger and a memory scanner designed to specifically target POS systems. Identified as a possible agent of the enormous scale POS system breaches that hit retail chains in 2014. Backoff POS – features a keylogger, memory scraper, and magnetic Track1/Track2 harvester, with added support for integrated keyboard magnetic card readers. LusyPOS – features a magnetic Track1/Track2 harvester that communicates over the TOR network, making the communications and the C&C servers harder to detect. MOBILE MALWAVE EVOLVES With the steady adoption of mobility and BYOD, mobile threats continued to gain significant traction in 2014. The combined amount of mobile malware/high risk apps has reached 2 million, a growth of 170,000 per month. In Q2, 2014, 85% of the mobile device market was occupied by Android, and 98% of all existing mobile malware targeted the users of Android devices. Featured Mobile Malware Cases: iBanking mobile bot – an SMS hijacker designed to work in conjunction with banking Trojans. Discovered in underground chat rooms by the RSA Research Team in February, 2014 leaked source code revealed advanced capabilities and anti-SDK protection mechanisms. The bot has several features including enumeration of all installed apps on the infected device, harvesting images from the device, and collection of precise geo-location data. An added feature is the growing support for additional targeted entities – recent analysis identified nearly 30 graphic templates for iBanking. Mobile BOT APK – In May, an update to an Android mobile application package (APK) was discovered to be a malware bot application. The app disguised as a token generator for mobile online customers of an Eastern European bank. New features include SQLite table for stolen data saved on the victim’s phone. Figure 2: Control panel for iBanking – available in various colors and themes Figure 3: Example of fake token generator mobile app
  • 3. page 3R S A M O N T H LY F R A U D R E P O R T THE UNDERGROUND MARKETPLACE DEVELOPS The underground marketplace is continuing to develop, allowing fraudsters to outsource services with increasing ease. The RSA Research Team has identified notable trends over the year: the emergence of forum specific currencies (MUSD, UAPS, United Payment System); a new, anonymous payment system knows as LessPay; a supply and demand that is not only driving down the cost of credentials, but also bringing about the advent of a CC store mobile app. REGION SPECIFIC LOCALIZED FRAUD One trend that seems to continue developing is region specific fraud that targets a particular geographic region and/or language. LATAM countries seem to be experiencing a rise in financial fraud in 2014, with fraudsters beginning to develop the sophistication of their tools and methods. Featured LATAM fraud case: Bolware and Boleto fraud – In July, the RSA Research Team discovered a large fraud ring had compromised the popular Boleto payment method in Brazil, deploying malware that is estimated to facilitate the theft of billions of Dollars from innocent victims. Bolware and Boleto fraud continue to evolve, as an ‘Onyx’ version of Bolware, and a non-malware related DNS poisoning method that compromised Boleto transactions was also uncovered. FRAUDSTERS LEVERAGE LEGITIMATE FINANCIAL PORTALS Fraudsters searching for vulnerabilities or weaknesses in a financial system occasionally find ways of abusing legitimate services or portals to perform fraudulent transactions or gather background information on their intended victims. Abused legitimate financial portals: Voxis Team – a team of fraudsters created an automated cash-out platform that enables automatic online transactions using stolen credit card data and forged or stolen transaction IDs to make purchases via the compromised merchant IDs, and transfer the payment funds to fraudster mule accounts. The fraud platform includes a control panel and uses algorithms that imitate real online consumer behavior – staggering purchases and fund transfers, as well as randomizing the amounts of each transaction to minimize suspicion and detection. Financial Data Aggregators – the RSA Research Team reported on fraudsters who use legitimate financial data aggregation (personal money management) services to gain insight into a potential victim’s financial profile and balance, as well as their online transaction behavior patterns.
  • 4. page 4R S A M O N T H LY F R A U D R E P O R T Phishing Attacks per Month RSA identified 46,747 phishing attacks in December, marking a 24% decrease from November. Based on this figure, RSA estimates phishing cost global organizations $453 million in losses. US Bank Types Attacked Regional banks were targeted by one-quarter of all phishing volume in December while U.S. nationwide banks experienced an 8% increase in phishing volume – from 50% to 58%. Top Countries by Attack Volume The U.S and Canada accounted for over 75% of attack volume in December, followed by the UK, India, and Spain. 46,747 Attacks Credit Unions Regional National 64% 12% 8% 4% UK India Canada U.S. DECEMBER 2014 Source: RSA Research Team
  • 5. www.emc.com/rsa CONTACT US To learn more about how RSA products, services, and solutions help solve your business and IT challenges contact your local representative or authorized reseller – or visit us at www.emc.com/rsa Top Hosting Countries US hosted 48% of phishing attacks in December, followed by UK, Germany and China. 5%7% 3% 48% GLOBAL PHISHING LOSSES DECEMBER 2014 ©2015 EMC Corporation. EMC, RSA, the RSA logo, and FraudAction are trademarks or registered trademarks of EMC Corporation in the U.S. and/or other countries. All other trademarks mentioned are the property of their respective holders. JAN RPT 0115