Rafel Ivgi,
CEO @ Defensia
• Introduction
• The Cyber Crime World
• The Major Players
• Payments and Money Laundering
• Live Demonstration
• Break
• Anonymous Global Purchasing
• Summary
Agenda
• Computer crime refers to any crime that involves a computer and
a network.
• Internationally, both governmental and non-state actors engage
in cybercrimes, including espionage, financial theft, and other
cross-border crimes.
• Activity crossing international borders and involving the interests
of at least one nation state is sometimes referred to as cyber
warfare.
• The international legal system is attempting to hold actors
accountable for their actions through the International Criminal
Court.
What is Cyber Crime?
• “It takes 4 weeks to get the legal paperwork to
investigate a single server inside Germany”
• “After 4 weeks the attacking server moves to
France, to get Interpol involvement the paper
work takes 8 weeks”
• After these 12 weeks the attackers have already
moved again, evidence are gone…
Getting Court Orders: Raymond Genes
(CTO -Trend Micro)
• Africa
• East Asia
• Some Place In South America
PlayingWhereThereAre No Anti Cyber
Crime Laws/Legislation and No Logs
• Kids in Forums (ages 15 to 25)
• Carders (Credit Card and Fraudsters)
• Individuals - “a single hacker”
• FreelanceTeams & “Small Hacking Defense Contractors”/”Semi-
Government” HackingTeams
• Mostly Chinese, Russians, Indians, Pakistanis, Bangladeshis
The Players
Just Infecting Machines UseThem As Anonymous Proxies
UseThemTo Send SPAM UseThemTo Sell DDos
Use MoneyToCreateVPN Services Steal Data And Banking Info From Hacked Machines
Build More BotsTo Infect More Build More Crypters For Bot Survival
Build AV LabToTest Crypted Bots Build Infection/Attack Distribution Platform
Build Anonymous Financial SystemsTo Keep and UseThis Money Attach Debit CardsTo e-Currencies
Cyber Crime Market Evolvement
• Document Producers (Passports, Utility Bills, Driver’s
License, National ID)
• VPNs and Proxies – Anonymity Services
• SMS & Call Receiving Service (For Anonymous
Registrations)
• Offshore Services & Private Banking
• Exchangers & Money Laundering
Cyber Crime
Most Common Products and Services
• Prepaid Visa Credit Card and Debit Card Providers (Liberty
Reserve, Perfect Money, Pecunix, C-Gold, Bit-Coin)
• Automatic & Anonymous DNS Registrars – “Website
Names ‘xyz.com’ ”
• Anonymous and/or Bullet Proof Hosting – “Buying a server
with an IP that the law can’t enforce down”
• Reverse Proxy Services (Infection Server Anonymization)
• Exploit Traders (Usually Former Penetration Testers)
Cyber Crime
Most Common Products and Services
• Trojan/Keylogger/BotnetTraders (usually Russian
criminals)
• Crypters (and some of what used to be called
“Packers”)
• Online Private Anti-Virus Multi-Engine Scanners
• PPI (Pay Per Install) & Exploit Kit Rental (Online
Control Panel)
Cyber Crime
Most Common Products and Services
• Social Network Services (Facebook,Twitter,
LinkedIn manipulations)
• Spy Phone (Mobile Rootkits)
• DDos, Booters and Stressors
• HaaS - Hacking As A Service
• Carders (Credit CardThieves/Fraudsters)
Cyber Crime
Most Common Products and Services
• HLR Lookup Services (Cheap IP based Country Level Cellular LocationTrace)
• Rootkits
• Skype Resolver (IP Revealer)
• Shell Selling (AccessTo Hacked Computers)
• Reverse Phone Lookup
• Fake Academic Diplomas/Degrees
• ExtremelyVirtual Currencies (Second Life and etc.)
Cyber Crime
Most Common Products and Services
The Evolvement of P2P File Sharing
and the birth of anonymity
Law
Suite
Napster
Kazaa
Emule
DC
BitTorrent
Crypto-anarchism
Crypto-anarchism: RansomWare
Encrypt Data For
Dark Node 1
(knows me but
doesn’t know what I
send to whom)
Encrypt Data For
Dark Node 2
(Only knows to pass
forward)
Encrypt Data For
Exit Node
(KnowsThe
Destination and
Data but not me)
TOR (The Onion Router)
The Basic Idea
My
Computer
Internet
Server
TOR – Anonymity On!
CombiningTOR andVPNs – Anonymity
and “Low Profile Activity”
• VPN
• DoubleVPN
• QuadVPN
Most Cyber Crime Used e-Currencies
(+PerfectMoney +C-Gold)
• All payments to and from a liberty reserve account are IRREVESIBLE, NON-REVOKABLE,
“DONE IS DONE”.
• The identity of the payee and the identity of the payer are completely anonymous and
unknown. All that is visible is the liberty account number and the account name (nickname).
• Transactions in the LR system are only kept/browse-able 31 days backwards, anything beyond
that is deleted.
• Even if someone purely steals money by not providing a service/product or hacking your
account, the LR support team WILL NOT PROVIDE ANY ASISTANCE OR DETAILS ABOUTTHE
THIEF.
• Money transfer is instant and receiving is automatic, once the payer clicks “confirm”, a second
later the money appears to the payee.
• The fees of using the system for accepting money and sending money are the lowest of all
known financial system to date.
The New Rules Of MoneyTransfer
Fraud Everywhere – No Reason ForThieves
To Fear Is No ReasonTo Be Honest
Virtual Financial Brands – “Non Existing
Financial Institutions”
“Non Existing Financial Institutions” –
Registered Like Any OtherWebsite
• Their Skype account is connected from a server in Germany
“Non Existing Financial Institutions” –
• A regular credit card has a money trail
leading to a normal bank account
• A reloadable/pre-paid debit card traces
back to the person registered/CCTV for
buying it cash
• A liberty reserve reloadable credit card
allows all normal activities with no
physical contact and using
fake/anonymous identity and internet
connection.
Liberty Reserve
Reloadable Credit Cards
Accepting UnlimitedWireTransfers
(SWIFT) – Example 25000$ - no questions
Money goes to a “Cash Collection
Service” – Not RelatedToThe Company
Ordering a Liberty Reserve Debit Card
Anonymous Payment ForThe Card –
From Any Liberty ReserveAccount
After paying for the card you get an email
from the “RealWorld Bank” who produced it
Physical Delivery – “What you really get” (no
relation to “Goldexpay” or “Technocash”)
Where is this bank?
Offshore Island “St.Vincent & the Grenadines”
Anonymous Login Into “LoyalBank” Using
TOR
Anonymous Login Into “LoyalBank” Using
TOR
• “Goldexpay.com” is anonymously registered in “GoDaddy”.
• Clients can access “Goldexpay” anonymously viaTOR
• “Goldexpay” collects/gets wire transfers via Technocash, Australia
• The client get’s a physical MasterCard with support numbers in Hungary
(+36)
• The MasterCard is made by “LoyalBank”
• “LoyalBank” Bank head office registered in the island of
“St.Vincent & the Grenadines”
Entity Chain - Summary
Post 04.06.2013 – “DomainWars”
Post 04.06.2013 – “DomainWars”
Post 04.06.2013 – “DomainWars”
WebMoney - Reloadable Credit Cards (Russian
eCurrency – Can withdraw via MC/China UnionPay)
• Become Anonymous
• VPN +TOR
• Open Email Account
• Gmail
• Accept Authorization SMS
• Leida (Spain) + Mail MeTrash
• Open New Liberty For Email
• Transfer Money From My LibertyTo New Liberty
• Pay someone for a service (DDos?)
Demonstration
Buying Hardware Anonymously
Get a “Virtual Shipping Address”
Finding Passports Using Google
Buying Passports – Fake Passports
Buying “Do-It-Yourself” Passport
Full PhotoshopTemplates
Getting a second passport legally
“Investors Second Passport Program”
Buying A Real Passport
A Passport SellerTrusted Anonymity
Platform
Opening An Offshore Company + Bank
+ Credit Under A Fake Identity
TaxTreaties &TIEA:The Offshore Killer
• Latest Signed TIEA’s
Denmark - Guatemala (15 May 2012)
Greenland - Guatemala (15 May 2012)
Finland - Guatemala (15 May 2012)
Iceland - Guatemala (15 May 2012)
Faroe Islands - Guatemala (15 May 2012)
Norway - Guatemala (15 May 2012)
Sweden - Guatemala (15 May 2012)
Denmark - Uruguay (14 December 2011)
Faroe Islands - Uruguay (14 December 2011)
Greenland - Uruguay (14 December 2011)
Iceland - Uruguay (14 December 2011)
Norway - Uruguay (14 December 2011)
Sweden - Uruguay (14 December 2011)
Iceland - Mauritius (1 December 2011)
Denmark - Mauritius (1 December 2011)
A Good vs. Bad Example
Most Common Offshore Locations:
Breaking UnderThe Pressure
Buying Utility Bills For Passports
Buying Gun Parts Anonymously
BuyingWeapons OnlineWith Fake
Identity and Credit Card

Cyber crime

  • 1.
  • 2.
    • Introduction • TheCyber Crime World • The Major Players • Payments and Money Laundering • Live Demonstration • Break • Anonymous Global Purchasing • Summary Agenda
  • 3.
    • Computer crimerefers to any crime that involves a computer and a network. • Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. • Activity crossing international borders and involving the interests of at least one nation state is sometimes referred to as cyber warfare. • The international legal system is attempting to hold actors accountable for their actions through the International Criminal Court. What is Cyber Crime?
  • 4.
    • “It takes4 weeks to get the legal paperwork to investigate a single server inside Germany” • “After 4 weeks the attacking server moves to France, to get Interpol involvement the paper work takes 8 weeks” • After these 12 weeks the attackers have already moved again, evidence are gone… Getting Court Orders: Raymond Genes (CTO -Trend Micro)
  • 6.
    • Africa • EastAsia • Some Place In South America PlayingWhereThereAre No Anti Cyber Crime Laws/Legislation and No Logs
  • 7.
    • Kids inForums (ages 15 to 25) • Carders (Credit Card and Fraudsters) • Individuals - “a single hacker” • FreelanceTeams & “Small Hacking Defense Contractors”/”Semi- Government” HackingTeams • Mostly Chinese, Russians, Indians, Pakistanis, Bangladeshis The Players
  • 8.
    Just Infecting MachinesUseThem As Anonymous Proxies UseThemTo Send SPAM UseThemTo Sell DDos Use MoneyToCreateVPN Services Steal Data And Banking Info From Hacked Machines Build More BotsTo Infect More Build More Crypters For Bot Survival Build AV LabToTest Crypted Bots Build Infection/Attack Distribution Platform Build Anonymous Financial SystemsTo Keep and UseThis Money Attach Debit CardsTo e-Currencies Cyber Crime Market Evolvement
  • 9.
    • Document Producers(Passports, Utility Bills, Driver’s License, National ID) • VPNs and Proxies – Anonymity Services • SMS & Call Receiving Service (For Anonymous Registrations) • Offshore Services & Private Banking • Exchangers & Money Laundering Cyber Crime Most Common Products and Services
  • 10.
    • Prepaid VisaCredit Card and Debit Card Providers (Liberty Reserve, Perfect Money, Pecunix, C-Gold, Bit-Coin) • Automatic & Anonymous DNS Registrars – “Website Names ‘xyz.com’ ” • Anonymous and/or Bullet Proof Hosting – “Buying a server with an IP that the law can’t enforce down” • Reverse Proxy Services (Infection Server Anonymization) • Exploit Traders (Usually Former Penetration Testers) Cyber Crime Most Common Products and Services
  • 11.
    • Trojan/Keylogger/BotnetTraders (usuallyRussian criminals) • Crypters (and some of what used to be called “Packers”) • Online Private Anti-Virus Multi-Engine Scanners • PPI (Pay Per Install) & Exploit Kit Rental (Online Control Panel) Cyber Crime Most Common Products and Services
  • 12.
    • Social NetworkServices (Facebook,Twitter, LinkedIn manipulations) • Spy Phone (Mobile Rootkits) • DDos, Booters and Stressors • HaaS - Hacking As A Service • Carders (Credit CardThieves/Fraudsters) Cyber Crime Most Common Products and Services
  • 13.
    • HLR LookupServices (Cheap IP based Country Level Cellular LocationTrace) • Rootkits • Skype Resolver (IP Revealer) • Shell Selling (AccessTo Hacked Computers) • Reverse Phone Lookup • Fake Academic Diplomas/Degrees • ExtremelyVirtual Currencies (Second Life and etc.) Cyber Crime Most Common Products and Services
  • 14.
    The Evolvement ofP2P File Sharing and the birth of anonymity Law Suite Napster Kazaa Emule DC BitTorrent
  • 15.
  • 16.
  • 17.
    Encrypt Data For DarkNode 1 (knows me but doesn’t know what I send to whom) Encrypt Data For Dark Node 2 (Only knows to pass forward) Encrypt Data For Exit Node (KnowsThe Destination and Data but not me) TOR (The Onion Router) The Basic Idea My Computer Internet Server
  • 18.
  • 19.
    CombiningTOR andVPNs –Anonymity and “Low Profile Activity” • VPN • DoubleVPN • QuadVPN
  • 20.
    Most Cyber CrimeUsed e-Currencies (+PerfectMoney +C-Gold)
  • 21.
    • All paymentsto and from a liberty reserve account are IRREVESIBLE, NON-REVOKABLE, “DONE IS DONE”. • The identity of the payee and the identity of the payer are completely anonymous and unknown. All that is visible is the liberty account number and the account name (nickname). • Transactions in the LR system are only kept/browse-able 31 days backwards, anything beyond that is deleted. • Even if someone purely steals money by not providing a service/product or hacking your account, the LR support team WILL NOT PROVIDE ANY ASISTANCE OR DETAILS ABOUTTHE THIEF. • Money transfer is instant and receiving is automatic, once the payer clicks “confirm”, a second later the money appears to the payee. • The fees of using the system for accepting money and sending money are the lowest of all known financial system to date. The New Rules Of MoneyTransfer
  • 22.
    Fraud Everywhere –No Reason ForThieves To Fear Is No ReasonTo Be Honest
  • 23.
    Virtual Financial Brands– “Non Existing Financial Institutions”
  • 24.
    “Non Existing FinancialInstitutions” – Registered Like Any OtherWebsite
  • 25.
    • Their Skypeaccount is connected from a server in Germany “Non Existing Financial Institutions” –
  • 26.
    • A regularcredit card has a money trail leading to a normal bank account • A reloadable/pre-paid debit card traces back to the person registered/CCTV for buying it cash • A liberty reserve reloadable credit card allows all normal activities with no physical contact and using fake/anonymous identity and internet connection. Liberty Reserve Reloadable Credit Cards
  • 27.
    Accepting UnlimitedWireTransfers (SWIFT) –Example 25000$ - no questions
  • 28.
    Money goes toa “Cash Collection Service” – Not RelatedToThe Company
  • 29.
    Ordering a LibertyReserve Debit Card
  • 30.
    Anonymous Payment ForTheCard – From Any Liberty ReserveAccount
  • 31.
    After paying forthe card you get an email from the “RealWorld Bank” who produced it
  • 32.
    Physical Delivery –“What you really get” (no relation to “Goldexpay” or “Technocash”)
  • 33.
    Where is thisbank? Offshore Island “St.Vincent & the Grenadines”
  • 34.
    Anonymous Login Into“LoyalBank” Using TOR
  • 35.
    Anonymous Login Into“LoyalBank” Using TOR
  • 36.
    • “Goldexpay.com” isanonymously registered in “GoDaddy”. • Clients can access “Goldexpay” anonymously viaTOR • “Goldexpay” collects/gets wire transfers via Technocash, Australia • The client get’s a physical MasterCard with support numbers in Hungary (+36) • The MasterCard is made by “LoyalBank” • “LoyalBank” Bank head office registered in the island of “St.Vincent & the Grenadines” Entity Chain - Summary
  • 37.
    Post 04.06.2013 –“DomainWars”
  • 38.
    Post 04.06.2013 –“DomainWars”
  • 39.
    Post 04.06.2013 –“DomainWars”
  • 40.
    WebMoney - ReloadableCredit Cards (Russian eCurrency – Can withdraw via MC/China UnionPay)
  • 41.
    • Become Anonymous •VPN +TOR • Open Email Account • Gmail • Accept Authorization SMS • Leida (Spain) + Mail MeTrash • Open New Liberty For Email • Transfer Money From My LibertyTo New Liberty • Pay someone for a service (DDos?) Demonstration
  • 42.
  • 43.
    Get a “VirtualShipping Address”
  • 44.
  • 45.
    Buying Passports –Fake Passports
  • 46.
  • 47.
    Getting a secondpassport legally “Investors Second Passport Program”
  • 48.
    Buying A RealPassport
  • 49.
    A Passport SellerTrustedAnonymity Platform
  • 50.
    Opening An OffshoreCompany + Bank + Credit Under A Fake Identity
  • 51.
    TaxTreaties &TIEA:The OffshoreKiller • Latest Signed TIEA’s Denmark - Guatemala (15 May 2012) Greenland - Guatemala (15 May 2012) Finland - Guatemala (15 May 2012) Iceland - Guatemala (15 May 2012) Faroe Islands - Guatemala (15 May 2012) Norway - Guatemala (15 May 2012) Sweden - Guatemala (15 May 2012) Denmark - Uruguay (14 December 2011) Faroe Islands - Uruguay (14 December 2011) Greenland - Uruguay (14 December 2011) Iceland - Uruguay (14 December 2011) Norway - Uruguay (14 December 2011) Sweden - Uruguay (14 December 2011) Iceland - Mauritius (1 December 2011) Denmark - Mauritius (1 December 2011)
  • 52.
    A Good vs.Bad Example
  • 53.
    Most Common OffshoreLocations: Breaking UnderThe Pressure
  • 54.
    Buying Utility BillsFor Passports
  • 55.
    Buying Gun PartsAnonymously
  • 56.