SlideShare a Scribd company logo
1 of 81
The Grugq | COSEINC
 Fyodor Y | ARMORIZE
Meet the “authors”.. :)
Outline

• Tools and methods
• Introduction: Geeks or Gangsters?
• Underground economy: what u never
  knew
• Future trends and our research
• Lining up
Интернете не нужно
             ничего и даже
My favorite quote:
                   мозгов
             ничего и даже
                   мозгов
  “To make money on Internet you don’t need much, not
    even brain” - from online tutorial on how to make
                         money
Brief: Tools
And methods
And methods
Sources

• Dealing with large volume of data (public
  forums, bbs, manual follow up)
• Mostly public data
• Often: post mortem analysis of
  compromised systems
Intelligence Gathering


• Automated and manual analysis of publicly
  available data
Automation:
          difficulties
          difficulties
• Language: complicated for automated
  processing (slang, misspellings, multiple
  spellings)
• Context evaluation for new items of trade
  requires manual analysis
Ex.: What does this say?
automated translation
Slang sources
• Fenya - Russian prison slang
• Anglonims - English loan words
• Rhyming slang - Sounds like the English word
• Direct translation
Tools of trade


• Mostly open-source. With custom
  extensions
Tools: Nutch
• Content Fetcher; extended with custom
  Indexers
• Changes to Spider behavior (“proper”
  robots.txt handling etc)
• Custom “Seeders”
• Distributed Indexing (w/ hadoop)
Tools: RSS feeds “eater”


• A bunch of python scripts thrown together
  to fetch rss feeds
Tools: SOLR

• Customized Data indexing and search
• Custom schema and search fields
• JSON output used
• Language “projection” (lingo/slang support)
Tools: Web UI/Maltego


• Web UI: easier
• Visualization: Maltego Custom Transforms
Overall picturesque
Maltego
Introduction:
Geeks or gangsters? :)
Geeks or gangsters? :)
From Russia with
        love..?

• What is the biggest export from Russia
  except for oil, gas, and nuclear scientists..? :)
-Malware -
Stuff that lives in your PC
   Against your will :)
Typical export sample:
• Targets MS platforms
• Often - multi-component (loader, payload
  functions in form of DLL etc)
• Sensitive information collection (data,
  keystrokes and credential information)
• Turns computer into web proxy, smtp
  proxy, socks etc (useful for rent, spamming
  etc)
• May extort money from end user
Looks familiar?
Моscow arest
           (31/08/2010)
Annual income: over One unlock charged at
  500,000 rubles     300 rubles (10USD)
  (100,000USD)             Via SMS
Scale: big
“export” through
  legimate sites
Which end up in
Google blacklist
Google blacklist
Why such spike?


• Fun?
• Profit!
But there’s much
     more..
     malware


      OTHER
      COOL
      STUFF
        :-)
That’s not a russian
       hax0r
This is closer..
Russian Underground
      Economy
      Economy
Where is the money!
• Banking credentials
• Credit cards
• Shops and goods
• Online goods and services
• Online currencies
• Monetization via Carrier providers and
  more
Disclaimer:

  We don’t sell or
advertize any service
   We simply look at the trades :-)
“Ликбез”
   Some terminology
   Some money - one wmz = one USD
            terminology
• WMZ - web
• Drop - money mule
• CC - creditcards
• Abuse resistant - Safe to host any kind of
  fraudulent service
• Partnerka - partnership program
Online currencies

• Web Money (WMZ)
• Yandex Money
• LR (liberty reserve)
Exchange points
Credit cards
 Very accessible
Money washing
Drop:
Another way to turn dirty cash into profit
Mass domain
   theft
   theft
Traffic generation
    As big biz
    As big biz
Costs
Per 1000 Unique visitors
•   AU - 300-550$

•   UK - 220-300$

•   IT - 200-350$

•   NZ - 200-250$

•   ES,DE,FR - 170-250$

•   US - 100-150$

•   RU, UA, KZ, KG .. 10-40$
Other
Online goods
Online goods
Looks familiar?
Cards, burners
And more
Passport scans
“Business package” Pa
            Includes..
            Includes..
Под средства любой загрязненности! For money of any state of dirtiness
В комплект входит: Pack includes
1.Банковскийакк(online доступ Online bank account access
                             )
2.АТМ картa(Дневнойлимитна снятиесредств1000$/6000$ В МЕСЯЦ-Возможноувеличение
лимита +30$-) ATM card (1000/6000USD per month withdrawal limit)
3.Картакодов (дляonline доступа online access passwords
                               )
4.Копия паспортадропаPassport copy of “poor john”
5.Sim-ka SIM card


 Also can be pre-ordered on custom
       passport scan (25USD)
DDOS
       Very affordable
We remove sites of affordable
       Very your concurrents with
DDOS attack. Fast and effective. Supported:



            Prices (in WMZ ~= USD)




          Discounts for bulk
DDOS 911
Abuse resistant hosting
Malware A/V QA
Hash cracking
  In cloud
  In cloud
Captcha
In cloud
In cloud
Exploit packs
With nice stats
Stats per country
Clicks, loads (pwned ;), percentage)
Need to build
  Botnet?
Welcome
TDS system
TDS system
Seller
Buyer
Owner
“Game” rules :)
  Iframe traff.    No bot traf (ruclicks)
4USD/1000 clicks   Payday - every monday
Making money together
Fake AV affiliation program
Fake AV payouts

Login   Balance
Crimeware: thrends
   And research
   And research
Moving mobile

• Steal a dollar from million - still a million
  dollars
• WAP sites spreading trojaned games are
  very popular
Mobile Malware
SEO spam
<*bad* word (rus)
Now - delivered
proffesionally :)
Malware through
  Infected ads
  Infected ads
Hidden behind login
              screens
  Hidden behind login
              screens
• Frequent in banking or other online
  credential targeted attacks
• Effectively prevents services like google
  blacklist, HA and other from identifying
  infections
Research

• Monetization schemes
• Taking over the existing ifrastructures for
  forensics analysis and statistics
• Hunt the hunters
Hunt the hunter
• Pwnkit - automated exploitkit pwner
 • Automated exploit kit fingerprinting
 • Password bruteforce
 • Exploiting bugs and common
    misconfigurations
 • Generates statistics on exploit pack
    usage :in the wild:
Misc. Case studies :)
Botnet DIY ;)
• Goal: 1000000 nodes botnet
• No skills required
• Buy these (available on sale):
 • Traffic
 • Abuse-resistant service
 • Exploitpack
 • Botnet gear
How much it costs
• Traffic - 10-15KUSD (mixed) infection ratio
  arond 10-20% (depending on exploit pack)
• Abuse resistant server 300USD/month
• Exploitpack 200-2000USD
• Botnet gear 500- 10,000USD
• = 15-20,000USD total + 1-2 months of
  work
Conclusions
• You can be victim, even if you paid for
  Kaspersky and apply patches regulary :)
• While malware is what you mostly see,
  cybercrime is not about malware, it is
  about money
• Global economy - global fraud
• 0day is not important.Volume is important
• (Mostly) not organized crime but
  ecosystem
What’s next?
Questions?


• Fyodor.y@armorize.com

More Related Content

Similar to From russia final_bluehat10

Automation Attacks At Scale
Automation Attacks At ScaleAutomation Attacks At Scale
Automation Attacks At ScaleMayank Dhiman
 
Surfing with Sharks KS ED TECH 2012
Surfing with Sharks   KS ED TECH 2012Surfing with Sharks   KS ED TECH 2012
Surfing with Sharks KS ED TECH 2012inf8nity
 
Threat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonBen Boyd
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyb coatesworth
 
Hitbkl 2012
Hitbkl 2012Hitbkl 2012
Hitbkl 2012F _
 
Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"
Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"
Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"StHack
 
2012: The End of the World?
2012: The End of the World?2012: The End of the World?
2012: The End of the World?Saumil Shah
 
Hacking as eSports
Hacking as eSportsHacking as eSports
Hacking as eSportsbeched
 
The Personal and Website Security Mindset
The Personal and Website Security MindsetThe Personal and Website Security Mindset
The Personal and Website Security MindsetAdam W. Warner
 
Log Stealers - Shopping time for Threat Actors!
Log Stealers - Shopping time for Threat Actors!Log Stealers - Shopping time for Threat Actors!
Log Stealers - Shopping time for Threat Actors!Speck&Tech
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Vibrant Event
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and DefenseAndrew McNicol
 
Discover advanced threats with threat intelligence - Jeremy Li
Discover advanced threats with threat intelligence - Jeremy LiDiscover advanced threats with threat intelligence - Jeremy Li
Discover advanced threats with threat intelligence - Jeremy LiJeremy Li
 
Hunting on the cheap
Hunting on the cheapHunting on the cheap
Hunting on the cheapAnjum Ahuja
 
Hunting on the Cheap
Hunting on the CheapHunting on the Cheap
Hunting on the CheapEndgameInc
 
CSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
CSF18 - The Digital Threat of the Decade (Century) - Sasha KranjacCSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
CSF18 - The Digital Threat of the Decade (Century) - Sasha KranjacNCCOMMS
 

Similar to From russia final_bluehat10 (20)

Automation Attacks At Scale
Automation Attacks At ScaleAutomation Attacks At Scale
Automation Attacks At Scale
 
Surfing with Sharks KS ED TECH 2012
Surfing with Sharks   KS ED TECH 2012Surfing with Sharks   KS ED TECH 2012
Surfing with Sharks KS ED TECH 2012
 
Threat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting season
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
Hitbkl 2012
Hitbkl 2012Hitbkl 2012
Hitbkl 2012
 
Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"
Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"
Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"
 
2012: The End of the World?
2012: The End of the World?2012: The End of the World?
2012: The End of the World?
 
Hacking as eSports
Hacking as eSportsHacking as eSports
Hacking as eSports
 
The Personal and Website Security Mindset
The Personal and Website Security MindsetThe Personal and Website Security Mindset
The Personal and Website Security Mindset
 
Log Stealers - Shopping time for Threat Actors!
Log Stealers - Shopping time for Threat Actors!Log Stealers - Shopping time for Threat Actors!
Log Stealers - Shopping time for Threat Actors!
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
Discover advanced threats with threat intelligence - Jeremy Li
Discover advanced threats with threat intelligence - Jeremy LiDiscover advanced threats with threat intelligence - Jeremy Li
Discover advanced threats with threat intelligence - Jeremy Li
 
Hunting on the cheap
Hunting on the cheapHunting on the cheap
Hunting on the cheap
 
Hunting on the Cheap
Hunting on the CheapHunting on the Cheap
Hunting on the Cheap
 
CSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
CSF18 - The Digital Threat of the Decade (Century) - Sasha KranjacCSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
CSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

More from F _

Rsa2016
Rsa2016Rsa2016
Rsa2016F _
 
Hitcon 2014: Surviving in tough Russian Environment
Hitcon 2014: Surviving in tough Russian EnvironmentHitcon 2014: Surviving in tough Russian Environment
Hitcon 2014: Surviving in tough Russian EnvironmentF _
 
Honeycon2014: Mining IoCs from Honeypot data feeds
Honeycon2014: Mining IoCs from Honeypot data feedsHoneycon2014: Mining IoCs from Honeypot data feeds
Honeycon2014: Mining IoCs from Honeypot data feedsF _
 
Indicators of Compromise Magic: Living with compromise
Indicators of Compromise Magic: Living with compromiseIndicators of Compromise Magic: Living with compromise
Indicators of Compromise Magic: Living with compromiseF _
 
Incident Response Tactics with Compromise Indicators
Incident Response Tactics with Compromise IndicatorsIncident Response Tactics with Compromise Indicators
Incident Response Tactics with Compromise IndicatorsF _
 
whats wrong with modern security tools and other blurps
whats wrong with modern security tools and other blurpswhats wrong with modern security tools and other blurps
whats wrong with modern security tools and other blurpsF _
 
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
Hunting The Shadows: In Depth Analysis of Escalated APT AttacksHunting The Shadows: In Depth Analysis of Escalated APT Attacks
Hunting The Shadows: In Depth Analysis of Escalated APT AttacksF _
 
Phd III - defending enterprise
Phd III - defending enterprise Phd III - defending enterprise
Phd III - defending enterprise F _
 
2011 hk fyodor-anthony_ppt
2011 hk fyodor-anthony_ppt2011 hk fyodor-anthony_ppt
2011 hk fyodor-anthony_pptF _
 

More from F _ (9)

Rsa2016
Rsa2016Rsa2016
Rsa2016
 
Hitcon 2014: Surviving in tough Russian Environment
Hitcon 2014: Surviving in tough Russian EnvironmentHitcon 2014: Surviving in tough Russian Environment
Hitcon 2014: Surviving in tough Russian Environment
 
Honeycon2014: Mining IoCs from Honeypot data feeds
Honeycon2014: Mining IoCs from Honeypot data feedsHoneycon2014: Mining IoCs from Honeypot data feeds
Honeycon2014: Mining IoCs from Honeypot data feeds
 
Indicators of Compromise Magic: Living with compromise
Indicators of Compromise Magic: Living with compromiseIndicators of Compromise Magic: Living with compromise
Indicators of Compromise Magic: Living with compromise
 
Incident Response Tactics with Compromise Indicators
Incident Response Tactics with Compromise IndicatorsIncident Response Tactics with Compromise Indicators
Incident Response Tactics with Compromise Indicators
 
whats wrong with modern security tools and other blurps
whats wrong with modern security tools and other blurpswhats wrong with modern security tools and other blurps
whats wrong with modern security tools and other blurps
 
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
Hunting The Shadows: In Depth Analysis of Escalated APT AttacksHunting The Shadows: In Depth Analysis of Escalated APT Attacks
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
 
Phd III - defending enterprise
Phd III - defending enterprise Phd III - defending enterprise
Phd III - defending enterprise
 
2011 hk fyodor-anthony_ppt
2011 hk fyodor-anthony_ppt2011 hk fyodor-anthony_ppt
2011 hk fyodor-anthony_ppt
 

From russia final_bluehat10