SlideShare a Scribd company logo
1 of 14
SALAMI ATTACK
Prepared by: Santosh Kavhar
Sumit Bharsawde
True Meaning
The thin
slice here
is a part of
“SALAMI”
Looks Yummy !!!
Definition
• One type of computer crime that gets mentioned in
introductory courses or in conversations among
security experts is the salami fraud. In the salami
technique, criminals steal money or resources a bit at a
time. Two different etymologies are circulating about
the origins of this term.
• One school of security specialists claim that it refers to
slicing the data thin – like a salami.
• Others argue that it means building up a significant
object or amount from tiny scraps – like a salami.
Origin
How It’s Done
• The classic story about a salami attack is the old “collect-
the-round off” trick. In this scam, a programmer modifies
the arithmetic routines such as interest computations.
Typically, the calculations are carried out to several decimal
places beyond the customary 2 or 3 kept for financial
records.
• For example, when currency is in Rupee, the round off goes
up to the nearest paisa about half the time and down the
rest of the time. If the programmer arranges to collect
these fractions of paisa in a separate account, a sizable
fund can grow with no warning to the financial institution.
• Statutory Warning: Don’t try it until you are an expert or
you love Indian Jails.
The Difference
• Remember 1.01365 =37.78...
• While 0.99365 =0.02…
Salami Attack In Student’s Life
• There is this person who
Eats from everybody's tiffin
Leaving his own at home, its
kind of Partial Salami Attack,
but it is definitely an Attack.
• Writing Research or Assignments without
mentioning the Researchers.
Past Cases
• In January 1993, four executives of a rental-car
franchise in Florida were charged with defrauding at
least 47,000 customers using a salami technique.
• In Los Angeles, in October 1998, district attorneys
charged four men with fraud for allegedly installing
computer chips in gasoline pumps that cheated
consumers by overstating the amounts pumped.
• In 2008, a man was arrested for fraudulently creating
58,000 accounts which he used to collect money
through verification deposits from online brokerage
firms a few cents at a time.
Movies on SALAMI Attack
• Office Space
• Blackhat
• Hackers
• Superman III
Prevention or Cure
• There is no Prevention for this!!!
• Its because normal humans will always stay vulnerable to attacks for
whatsoever reasons.
• There are cures however.
Cure from SALAMI Attack
• Unfortunately, salami attacks are designed to be difficult to detect. The
only hope is that random audits, especially of financial data, will pick up
a pattern of discrepancies and lead to discovery.
• As any accountant will warn, even a tiny error must be tracked down,
since it may indicate a much larger problem.
• For example, Cliff Stoll's famous adventures tracking down spies in the
Internet began with an unexplained $0.75 discrepancy between two
different resource accounting systems on UNIX computers at the Keck
Observatory of the Lawrence Berkeley Laboratories. Stoll's
determination to understand how the problem could have occurred
revealed an unknown user; investigation led to the discovery that
resource-accounting records were being modified to remove evidence of
system use. The rest of the story is told in Stoll’s book.
Trying to Avoid the
SALAMI Attack
• The main resolution for this attack is educating the user.
Only through user awareness, we can avoid this.
• Users should report back to the bank or the concerned
authority if they notice any deductions without their
knowledge even if it is a small amount.
• Don’t store any personal bank information like credit card,
debit card number in any of the online websites, these days
we are getting an option of saving our card details in
different websites.
• Another important thing is to track your money, most
people don’t know their remaining balance in the account.
Conclusion
• SALAMI Attack is a type of serious cyber
crime, can be financial or data theft related.
• Moral: Don’t ignore what appear to be errors
in computer-based financial or other
accounting systems.
• Boond Boond se hi Samandar banta hai…
• Satark rahe, Savdhan rahe. Kyuki JURM aapki
chaukhat pe dastak de sakta hai. Jai Hind.
References
• Salami fraud By M. E. Kabay Network World
Security Newsletter, 07/24/02.
• "Hacker takes $50,000 a few cents at a time". PC
Pro. 2008-05-28.
• "The Salami Technique“
• Salami Fraud by M. E. Kabay, PhD, CISSP,
Associate Professor, Computer Information
Systems, Norwich University, Northfield VT.
• www.fraudfighting.org
• Images from various sources.

More Related Content

What's hot (20)

System Security
System SecuritySystem Security
System Security
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Spamming as cyber crime
Spamming as cyber crimeSpamming as cyber crime
Spamming as cyber crime
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Email phising and spoofing hurting your business
Email phising and spoofing hurting your businessEmail phising and spoofing hurting your business
Email phising and spoofing hurting your business
 
Steganography
SteganographySteganography
Steganography
 
Spam
SpamSpam
Spam
 
A survey on Session Hijacking
A survey on Session HijackingA survey on Session Hijacking
A survey on Session Hijacking
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
Ransomware
RansomwareRansomware
Ransomware
 
Cryptography
CryptographyCryptography
Cryptography
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 

Similar to Detecting Tiny Fraudulent Transactions

McKonly & Asbury Webinar - Skimming: What the Auditor's Miss
McKonly & Asbury Webinar - Skimming: What the Auditor's MissMcKonly & Asbury Webinar - Skimming: What the Auditor's Miss
McKonly & Asbury Webinar - Skimming: What the Auditor's MissMcKonly & Asbury, LLP
 
Fraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsFraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsEMAC Consulting Group
 
The Future of ATO
The Future of ATOThe Future of ATO
The Future of ATOpm123008
 
Life As A Fraudster: Carding 101
Life As A Fraudster: Carding 101Life As A Fraudster: Carding 101
Life As A Fraudster: Carding 101Kount
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 
Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101David J Rosenthal
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Matt Hathaway
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Alexandre Sieira
 
Foregenix the eCommerce threatscape
Foregenix   the eCommerce threatscapeForegenix   the eCommerce threatscape
Foregenix the eCommerce threatscapeMax Dodson
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 
Track 1 Session 4_ AIM02 企業如何透過機器學習進行詐欺偵測.pptx
Track 1 Session 4_ AIM02 企業如何透過機器學習進行詐欺偵測.pptxTrack 1 Session 4_ AIM02 企業如何透過機器學習進行詐欺偵測.pptx
Track 1 Session 4_ AIM02 企業如何透過機器學習進行詐欺偵測.pptxAmazon Web Services
 
EFTRAC_Canada.pdf
EFTRAC_Canada.pdfEFTRAC_Canada.pdf
EFTRAC_Canada.pdfAnisunB
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charitiesBlake Morgan LLP
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraudtomciolkosz
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!tomciolkosz
 

Similar to Detecting Tiny Fraudulent Transactions (20)

McKonly & Asbury Webinar - Skimming: What the Auditor's Miss
McKonly & Asbury Webinar - Skimming: What the Auditor's MissMcKonly & Asbury Webinar - Skimming: What the Auditor's Miss
McKonly & Asbury Webinar - Skimming: What the Auditor's Miss
 
Fraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsFraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management Consultants
 
Employee Theft
Employee Theft Employee Theft
Employee Theft
 
How to Prevent and Detect Fraud in Your Organization
How to Prevent and Detect Fraud in Your OrganizationHow to Prevent and Detect Fraud in Your Organization
How to Prevent and Detect Fraud in Your Organization
 
The Future of ATO
The Future of ATOThe Future of ATO
The Future of ATO
 
Payment fraud
Payment fraudPayment fraud
Payment fraud
 
Life As A Fraudster: Carding 101
Life As A Fraudster: Carding 101Life As A Fraudster: Carding 101
Life As A Fraudster: Carding 101
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
 
Foregenix the eCommerce threatscape
Foregenix   the eCommerce threatscapeForegenix   the eCommerce threatscape
Foregenix the eCommerce threatscape
 
10 types of_hackers
10 types of_hackers10 types of_hackers
10 types of_hackers
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
Track 1 Session 4_ AIM02 企業如何透過機器學習進行詐欺偵測.pptx
Track 1 Session 4_ AIM02 企業如何透過機器學習進行詐欺偵測.pptxTrack 1 Session 4_ AIM02 企業如何透過機器學習進行詐欺偵測.pptx
Track 1 Session 4_ AIM02 企業如何透過機器學習進行詐欺偵測.pptx
 
Fraud motivation Triangle.pptx
Fraud motivation Triangle.pptxFraud motivation Triangle.pptx
Fraud motivation Triangle.pptx
 
EFTRAC_Canada.pdf
EFTRAC_Canada.pdfEFTRAC_Canada.pdf
EFTRAC_Canada.pdf
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charities
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraud
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Detecting Tiny Fraudulent Transactions

  • 1. SALAMI ATTACK Prepared by: Santosh Kavhar Sumit Bharsawde
  • 2. True Meaning The thin slice here is a part of “SALAMI” Looks Yummy !!!
  • 3. Definition • One type of computer crime that gets mentioned in introductory courses or in conversations among security experts is the salami fraud. In the salami technique, criminals steal money or resources a bit at a time. Two different etymologies are circulating about the origins of this term. • One school of security specialists claim that it refers to slicing the data thin – like a salami. • Others argue that it means building up a significant object or amount from tiny scraps – like a salami.
  • 5. How It’s Done • The classic story about a salami attack is the old “collect- the-round off” trick. In this scam, a programmer modifies the arithmetic routines such as interest computations. Typically, the calculations are carried out to several decimal places beyond the customary 2 or 3 kept for financial records. • For example, when currency is in Rupee, the round off goes up to the nearest paisa about half the time and down the rest of the time. If the programmer arranges to collect these fractions of paisa in a separate account, a sizable fund can grow with no warning to the financial institution. • Statutory Warning: Don’t try it until you are an expert or you love Indian Jails.
  • 6. The Difference • Remember 1.01365 =37.78... • While 0.99365 =0.02…
  • 7. Salami Attack In Student’s Life • There is this person who Eats from everybody's tiffin Leaving his own at home, its kind of Partial Salami Attack, but it is definitely an Attack. • Writing Research or Assignments without mentioning the Researchers.
  • 8. Past Cases • In January 1993, four executives of a rental-car franchise in Florida were charged with defrauding at least 47,000 customers using a salami technique. • In Los Angeles, in October 1998, district attorneys charged four men with fraud for allegedly installing computer chips in gasoline pumps that cheated consumers by overstating the amounts pumped. • In 2008, a man was arrested for fraudulently creating 58,000 accounts which he used to collect money through verification deposits from online brokerage firms a few cents at a time.
  • 9. Movies on SALAMI Attack • Office Space • Blackhat • Hackers • Superman III
  • 10. Prevention or Cure • There is no Prevention for this!!! • Its because normal humans will always stay vulnerable to attacks for whatsoever reasons. • There are cures however.
  • 11. Cure from SALAMI Attack • Unfortunately, salami attacks are designed to be difficult to detect. The only hope is that random audits, especially of financial data, will pick up a pattern of discrepancies and lead to discovery. • As any accountant will warn, even a tiny error must be tracked down, since it may indicate a much larger problem. • For example, Cliff Stoll's famous adventures tracking down spies in the Internet began with an unexplained $0.75 discrepancy between two different resource accounting systems on UNIX computers at the Keck Observatory of the Lawrence Berkeley Laboratories. Stoll's determination to understand how the problem could have occurred revealed an unknown user; investigation led to the discovery that resource-accounting records were being modified to remove evidence of system use. The rest of the story is told in Stoll’s book.
  • 12. Trying to Avoid the SALAMI Attack • The main resolution for this attack is educating the user. Only through user awareness, we can avoid this. • Users should report back to the bank or the concerned authority if they notice any deductions without their knowledge even if it is a small amount. • Don’t store any personal bank information like credit card, debit card number in any of the online websites, these days we are getting an option of saving our card details in different websites. • Another important thing is to track your money, most people don’t know their remaining balance in the account.
  • 13. Conclusion • SALAMI Attack is a type of serious cyber crime, can be financial or data theft related. • Moral: Don’t ignore what appear to be errors in computer-based financial or other accounting systems. • Boond Boond se hi Samandar banta hai… • Satark rahe, Savdhan rahe. Kyuki JURM aapki chaukhat pe dastak de sakta hai. Jai Hind.
  • 14. References • Salami fraud By M. E. Kabay Network World Security Newsletter, 07/24/02. • "Hacker takes $50,000 a few cents at a time". PC Pro. 2008-05-28. • "The Salami Technique“ • Salami Fraud by M. E. Kabay, PhD, CISSP, Associate Professor, Computer Information Systems, Norwich University, Northfield VT. • www.fraudfighting.org • Images from various sources.