SlideShare a Scribd company logo
Cybercrime: dall'hacking all'Underground
               Economy

                    Francesca Bosco
                       Project Officer
 Interregional Crime and Justice Research Institute (UNICRI)




                        31 Marzo 2011
         Università degli Studi di Milano Bicocca
Agenda
• Definitions,Trends & Statistics: why
  the topic is relevant
• The Underground Economy and
  Cybercrime
• Business models applied to
  Cybercrime
• Social Network and How to Protect
  Yourself
• Who are the criminals: Two case
  studies
Every new technology opens the doors to new
            criminal approaches




                                 3
Cybercrime
What do you know?
Cybercrime
What do you want
   to know?
What is cybercrime?
   Many possible definitions - no widely accepted definition
Any conduct proscribed by legislation and/or jurisprudence that
(a) is directed at computing and communications technologies
   themselves;
(b) involves the use of digital technologies in the commission of the
   offence; or
(c) involves the incidental use of computers with respect to the
   commission of other crimes

Forms
• crimes against the confidentiality, integrity or availability of
  computer systems (e.g. theft of computer services)
• crimes associated with the modification of data (e.g. theft of data)
• content-related crimes (e.g. dissemination of illegal and harmful
  material, child pornography)
• relation between terrorism and the Internet (e.g. terrorist
  propaganda, recruitment for terrorist organizations)
                                                     6
What is cybercrime?
The    Convention on Cybercrime - Budapest,
23.XI.2001- defines cybercrime in Articles 2-10 on
substantive criminal law in four different categories:
(1)offences against the confidentiality,
integrity and availability of computer data and
systems;
(2)computer-related offences;
(3)content-related offences;
(4)offences related to infringements of
copyright and related rights.
                                        7
Definition
According to the European Convention on Cybercrime,
cybercrimes are defined as
“offences against the confidentiality, integrity and availability
of computer data and systems”, thus considering as
offences:
“Illegal access” (art.2),
“Illegal interception”(art.3),
“Data & System Interference” (artt.4-5),
“Misuse of devices”(art.6),
“Computer-related fraud and forgery” (artt-7-8)
“Offences related to child pornography”(art.9)
“Offences related to infringements of copyright and related
rights” (art.10).
Attempt to categorize:
                                      Types of cybercrime
Financial - crimes which abuse businesses' ability to conduct 'e-commerce' (or electronic commerce).
Piracy - the act of copying copyrighted material. The personal computer and the Internet both offer new
mediums for committing an 'old' crime. Online theft is defined as any type of 'piracy' that involves the use of
the Internet to market or distribute creative works protected by copyright.
Hacking - the act of gaining unauthorized access to a computer system or network and in some cases
making unauthorized use of this access. Hacking is also the act by which other forms of cyber-crime
(e.g., fraud, terrorism, etc.) are committed.
Cyber-terrorism - the effect of acts of hacking designed to cause terror. Like conventional terrorism,
e-terrorism' is classified as such if the result of hacking is to cause violence against persons or property, or at
least cause enough harm to generate fear.
Online Pornography - There are laws against possessing or distributing child pornography.
Distributing pornography of any form to a minor is illegal. The Internet is merely a new medium for this ‘old‘
crime, but how best to regulate this global medium of communication across international boundaries and age
groups has sparked a great deal of controversy and debate.

Financial
Public confidence in the security of information processed and stored on computer networks and a
predictable environment of strong deterrence for computer crime is critical to the development of e- commerce,
or commercial transactions online. Companies' ability to participate in e-commerce depends heavily on their
ability to minimize e-risk.
Risks in the world of electronic transactions online include viruses, cyber attacks (distributed denial of Service
(DDOS) attacks) such as those which were able to bring Yahoo, eBay and other websites to a halt in February
2000, and e-forgery. There also have been other highly publicized problems of 'e-fraud' and theft of proprietary
information and in some cases even for ransom ('e-extortion').                      9
VIDEO
Is there any difference between Hackers and
               Cybercriminals?
What is Hacking ?
•   The act of gaining unauthorized
    access to computer systems for
    the purpose of stealing and
    corrupting data.
                                      -
Types Of Hackers:
•   Black Hats - Malicious hackers
•   White Hats - Ethical hackers
•   Grey Hats - Ambiguous
Hackers types
•   Low level hackers “script-kiddies”
•   Phishing, Remote low-level social engineering attacks
•   Insiders
•   Disgruntled Employees
•   High-level, sophisticated hackers,organized crime- medium/high level
•   Hobbyst Hackers
•   Unethical security guys (Telecom Italia and Vodafone Greece Scandals)
•   Structured/Unstructured Attacks
•   Industial Espionage-Terrorism
•   Foreign Espionage
•   Hacktivists
•   Terrorist Groups
•   State Sponsored Attacks
What is interesting for cybercriminals?
Data is more valuable than money. Once spent, money is gone, but data can
be used and reused to produce more money or for further leverage.
The ability to reuse data to access on-line banking applications, authorize and
activate credit cards, or access organization networks has enabled cyber
criminals to create an extensive archive of data for ongoing illicit activities.
Intellectual property: keep in mind a database of credit cards = easy to
monetize, a database of PII = more difficult, monetizing stolen IP is much
harder and also much more lucrative if done correctly
                                        Outcomes of cyberattacks and reactions
Several computer security consulting firms produce estimates of total worldwide losses
attributable to virus and worm attacks and to hostile digital acts in general. The reliability
of these estimates is often challenged; the underlying methodology is basically anecdotal.
A central issue, in both public and private sectors, is whether or not we are devoting
enough resources to information security.
Part of the answer must come from economic analysis. Investigations into the stock price
impact of cyber-attacks show that identified target firms suffer losses of 1%-5% in the
days after an attack.
Organizations of all sizes and industries have suffered losses at the hands of
cybercriminals – though only a low percentage report such incidents.
Concomitantly, cybercrimes offer high financial yields and can often be performed in a
manner that incurs only modest risks because of the anonymity it presents. The lack of
incident reporting and the ease of access to electronically stored data have led experts to
predict that cybercrime will continue to increase in the years to come. Accurate and
statistically comprehensive data on the incidence and costs of cyber-attacks are
                                                                       13
critical to the analysis of information security.
The Underground Economy
•   “Underground Economy” has historically been used to denote business that occurs outside
    of regulatory channels. Around the turn of the 21st century, Team Cymru adapted the term to
    the cyber locations and individuals who buy, sell, and trade criminal goods and services.

•    Today the Underground Economy can be found in IRC(6) networks, HTTP forums (web
    boards), various Instant Messaging services, and any other communications platform that
    lends itself to anonymous collaboration.

•   The Underground Economy is comprised of criminals who typically specialize in a specific
    criminal commodity. A few of the more common commodities include credit/debit cards,
    personal identities, hacked servers, hacked network equipment, malware (malicious code),
    Internet vulnerability scanners, e-mail spam lists, fictitious identification documents, and
    fraudulent money movement services

•   The higher levels of the Underground Economy involve technically talented actors who work
    with other criminals through private communication methods often involving encryption.
    The public criminal market place is contracting, but the criminal activity itself is increasing
    in both volume and sophistication

                                                       The State of Cybercrimes- FreedomFromFear , March 28, 2011
The day money became the focus of malware is the day
               the Internet changed.
              Graham Ingram, AusCERT GM
Malicious Activity        3%
Major Threats and Countries Subjected to Attacks                                                                                                                  Threat                 Rank
                                                                                                                                                                                          11
                                                                                                                                                                  Malware
• Malware (Malicious Code)                                                                                                                                                                   4
                                                                                                                 Malicious Activity   3%                          Spam
                                                                                                                                                                                             7
                                                                            Malicious Activity     6%
• Botnets                                                                                                        Threat               Rank
                                                                                                                                                                  Phishing
                                                                                                                                                                                            13
                                                                            Threat                Rank                                 19                         Botnets
                                                                                                                 Malware                                                                    n/a
                                                                                                   15
• Phishing                                                                  Malware                              Spam
                                                                                                                                       5                          SQL-injection
                                                                                                    7                                  10
                                                                            Spam                                 Phishing
• Spam                                                                      Phishing
                                                                                                    3                                  7
                                                                                                                 Botnets
                                                                                                    6                                 n/a
                                                                            Botnets
• SQL-Injection                                                    MaliciousSQL-injection 3 %
                                                                             Activity               5
                                                                                                                 SQL-injection


                                                                   Threat                 Rank
                                                                                           4
                                                                   Malware
                                                                                            22
                                                                   Spam
                                                                                            6
                                                                   Phishing
                                                                                            15
                                                                   Botnets
                                                                                            4
                                                                   SQL-injection


                                                                                                                                                                           Russia


                                                                              United Kingdom

                                                                                                       Poland
                                                                                                   Germany


Malicious Activity       18 %                                                                           Italy
                                          United States
Threat                 Rank
                        1                                                                                                                                                 China
Malware
                          10
Spam
                          1                                                                                                                                                                                       Malicious Activity   3%
Phishing                                                                                                                                                 India                                    Taiwan
                          1                                                                                                                                                                                       Threat               Rank
Botnets                                                                                                                                                                                                                                 22
                          2                                                                                                                                                                                       Malware
SQL-injection
                                                                                                                                                                                                                                        20
                                                                                                                                                                                                                  Spam
                                                                                                                                                                                                                                        16
                                                                                                                                                                                                                  Phishing
                                                                                                                                                                                                                                        2
                                                                                                                                                                                                                  Botnets
                                                                                                                                                                                                                                        7
                                                                                                                                                                                                                  SQL-injection
              Malicious Activity   7%
                                                          Brazil
              Threat               Rank
                                    8
              Malware
                                    1
              Spam
                                    9
              Phishing
                                    3
              Botnets
                                    6
              SQL-injection
                                                                                                 Malicious Activity       4%                 Malicious Activity     5%

                                                                                                 Threat                   Rank               Threat                Rank
                                                                                                                           13                                       2
                                                                                                 Malware                                     Malware
                                                                                                                            12                                       2
                                                                                                 Spam                                        Spam                                 Malicious Activity       7%
                                                                                                                            12                                      18
                                                                                                 Phishing                                    Phishing                             Threat                   Rank
                                                                                                                            4                                       19                                      3
                                                                                                 Botnets                                     Botnets                              Malware
                                                                                                                          n/a                                       n/a                                     9
                                                                                                 SQL-injection                               SQL-injection
                                                                                                                                                                                  Spam
                                                                                                                                                                                                            4
                                                                                                                                                                                  Phishing
                                                                                                                                                                                                            5
                                                                                                                                                                                  Botnets
New Malware Statistics




Top Malware Source Countries                                                  Top Attack Sectors




                                                                                                                             Source: Symantec, Kaspersky, McAfee, Sophos




    Malware: Hostile, intrusive, or annoying software or program code designed to infiltrate a computer system (virus/worms/Trojans/rootkit/backdoors/spyware).
    Botnets: Software agents/bots that run autonomously and automatically under a common command-and-control structure and perform malicious activities.
    Phishing: Fraudulent process of attempting to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication.
    Spamming: Abuse of electronic messaging systems to send unsolicited bulk messages indiscriminately in the form of e-mail, instant messaging etc .
    SQL injection: Code injection technique that exploits vulnerability in the database of an application resulting in unexpected execution of code.
Top 20 countries with
the highest rate of cybercrime attacks
Statistics




Source: Anti-Phishing Working Group, 2nd Quarter 2010 Trends Report   19
Damages, fraud, crime estimates
 Worldwide direct damage due to malware in 2006: $13.2 bn (Computer
  Economics)
    Decline from $17.5 bn in 2004
    Effects of anti-malware efforts and shift from direct to indirect costs
 U.S. Federal Bureau of Investigation estimated cost of computer crime to U.S.
  economy in 2005 to $67.2 bn (upper ceiling, not all malware-related)
 Global cost of spam in 2007: $100 bn, of which $ 35 bn U.S. (Ferris Research)
 Cost of spam management to U.S. businesses in 2007: $71 bn (Nucleus
  Research)
 Direct costs to U.S. consumers in 2007: $7.1 bn (Consumer Reports)
 Range of estimates on online consumer fraud
    $240-340 million for U.S.
    £33.6 for financial fraud in UK
 Cost of click fraud in 2007: $1 bn
  (Click Forensics)
Complaints of online crime, 2010
at the Internet Crime Complaint Center (USA)

   YEAR          COMPLAINTS               US$ LOSS
                  RECEIVED

    2010           303,809                 - million

    2009           336,655                560 million

    2008           275,284                265 million

    2007           206,884                239 million

    2006            207,492               198 million
OC activities shift

Original Activity                 Modern Version
Local numbers gambling            Internet gambling (international
                                     sites)
Heroin, cocaine trafficking       Synthetic drugs (less vulnerable
                                     to supply problem)
Street prostitution               Internet prostitution and
                                     trafficking in human beings.
Extortion of local businesses     Extortion of corporations,
  for protection                    kidnappings.
Loansharking                      Money laundering, precious
                                    stones, commodities.
Fencing stolen property           Theft of intellectual property.
Trends of organized crime:
         Transnational, Adaptive,
               Multifaceted
A.     Drug trafficking
B.     Illicit arms trade
C.     Trafficking and smuggling of human beings
D.     Traffic of human organs
E.     Counterfeiting
F.      Environmental-related crimes
G.     Maritime piracy
H.     Cyber crime
I.       Financial crimes: corruption, money laundering.



                                                     23
Why has Cybercrime become so pervasive?

– Extremely profitable

– Very low infrastructure cost and readily available attack tools

– Barriers to prosecution combined with weak laws and sentencing

– Anonymity and financial lure has made cyber-crime more
  attractive

– Separation between the physical and virtual world

– Organized cybercrime groups can conduct operations without
  ever making physical contact with each other
VIDEO
Underground update
Cybercrime today
How the black market works
UE Business Model

Organised crime borrows and copies business models from the legitimate economy
sector. Cyber-criminals employ models similar to the B2B (business-to-business) for
their operations, such as the highly sophisticated C2C (criminal-to-criminal) models,
which use very effective crime tools available through digital networks.
Let’s go shopping...
                            how much do they cost?
                        Credit card number with PIN

Change of billing data, including account number, billing address, SSN, name,
                             address and birth date

                          Driver's license number

                               Birth certificate

                            Social security card

          Credit card number with security code and expiration date

                      Paypal account ID and password
Items for sale
               A sampling of items for sale in typical cybercrime forums:


$1000 – 5000     Trojan program to steal online account information


       $500      Credit card number with PIN


     $80-300     Change of billing data, including account number,
                 billing address, SSN, name, address and birth date


       $150      Driver's license number


       $150      Birth certificate


       $100      Social security card


       $7-25     Credit card number with security code and expiration
                 date
The black market:what they offer
•In 2009, 60 percent of identities exposed
were compromised by hacking attacks.
•75 percent of enterprises surveyed,
experienced some form of cyber attack in
2009 (From Symantec State of the
Enterprise Report 2010)
•The top Web-based attacks observed in
2009 primarily targeted vulnerabilities in
Internet Explorer and applications that
process PDF files
•Mozilla Firefox had the most reported
vulnerabilities in 2009, with 169, while
Internet Explorer had just 45, yet Internet
Explorer was still the most attacked
browser.
•The United States was the top country of
origin for Web-based attacks in 2009,
accounting for 34 percent of the worldwide
total.
•In 2009, botnets were responsible for
sending approximately 85 percent of all
spam email.
•There were 321 browser plug-in
vulnerabilities identified in 2009, fewer
than the 410 identified in 2008.
•ActiveX technologies still constituted the
majority of new browser plug-in
vulnerabilities, with 134; however, this is a
53 percent decrease from the 287 ActiveX
vulnerabilities identified in 2008
TRENDING COMMODITIES IN
UNDERGROUND MARKETS
•In 2009 black market shift where email
accounts were the third most available
virtual good for sale.
•Online credentials are composed of
username/ password combinations in
order to gain access to different Internet
applications:
•Online banking service – the
credentials allow the attacker to transfer
funds from the victim’s account to
accounts controlled by the criminal
•Health-care      providers    –    stolen
accounts may be used for prescription
drug trading or for health information
compromise
•Webmail applications – a hacked
webmail account allows the hacker to
scrape the victim’s address book and
use those addresses in spam lists. The
criminal can then send the phishing
messages from the compromised
account, making the message all the
more credible.
•Social networks – the inherent viral
nature of social networks, together with
real-time updates in search engines,
make stolen social network accounts
most valuable. The price of these
credentials varies according to the
popularity of the application.
CRIMES & TECHNIQUES
       FOCUS
Malware/spam and the underground economy

 Players in the underground economy include (see slide 19):
    Malware writers and distributors (trojans, spyware,
      keyloggers, adware, riskware, …)
    Spammers, botnet owners, drops
    Various middlemen
 Emergence of institutional arrangements to enhance “trust”
  in the underground economy
    Service level agreements, warranties, etc.
 Steady stream of new attacks
  E.g.: spear-phishing, chained exploits, exploitation of
  social media.
Example of some of the possible
                                                  financial flows
                                                                       1:
                                                                       Extortion payments, click fraud,
                                                                       compensated costs of ID theft and phishing
                            Hardware,                                  2:
                             software                                  Uncompensated costs of ID theft and
                                                                       phishing, click through, pump and dump
          4                                             5              schemes, Nigerian 419 scams, and other
                            7          6                               forms of consumer fraud
                                                                       3, 4, 5, 6:
                        8    Security       9                          Hardware purchases by criminals,
                                                      Individual       corporate and individual users
     Business                 service
                                                        users          7, 8, 9, 10:
      users                  providers
                                                                       Security service purchases by hardware
                                                                           manufacturers, corporate and
                                  10       14                          individual users, ISPs
                                                                       11, 12, 13:
                   11                           12                     ISP services purchased by corporate and
                                ISPs                                       individual users, criminals
                                                                       14:
                                                                       Payments to compensate consumers for
                                   13                              3       damages from ID theft (if provided)

                                                2
                   1        Fraudsters,
                                                                              Legal financial flows
                             criminals
                                                                              Potentially illegal financial flows


                            Government
Society at large                                    Society at large
Financial aspects of malware and spam
                                  Cost of
                                prevention,
                                 adaptation
                            +          -       +
Benefits of                     Damage done,
              +
cybercrime                        fraud,
                                                         Total,
                                   crime
                  Malware   +                  +       direct and
                                       -
                  economy                               indirect
                            +   Cost of law    +          cost
 Costs of     -                 enforcement
cybercrime
                            +          -           +
                                  Indirect
                                   cost to
                                  society
Data Theft
(what data are we talking about?)
Personally Identifiable Information (PII):
Identifying information means any name or
number that may be used alone or with
other information to identify a specific
person:

Name, social security number, date of
birth, official State or government issued
driver’s license or identification number,
alien registration number, government
passport number, employer or taxpayer
identification number, biometric data, etc.

Likely one of the most valuable assets that
we have and one that businesses need to
protect. Why? Information is exponential
and reusable. Information can be sold to
multiple buyers and be can be used in
many profitable ways.
Credit card thefts, 2009
  Click to edit Master title style


  • Click to edit Master text styles
  – Second level
  • Third level
  – Fourth level
  »    Fifth level




Source: Kaspersky Lab

                     Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”,
 June 10th, 2009                                                                                  Event details (title, place)
                                                                                              Moscow, January 28-31, 2010
ID Theft is the fastest growing crime
              in the world.
•   Over 9 million victims a year on
    average worldwide
•   Only Top consumer complain to
    Police or the Federal Trade
    Commission
•   Studies on the total cost of identity
    theft vary. One study indicates that
    identity theft cost U.S. businesses and
    consumers $50 to $60 billion dollars a
    year
•   Individual victims lose an average of
    $1,500.00 each in out of pocket
    expenses and require tens or
    hundreds of hours to recover – some
    never do.
ID Theft

•   Identity theft and identity fraud are terms used to refer to all types of crime in
    which someone wrongfully obtains and uses another person's personal data in
    some way that involves fraud or deception, typically for economic gain.
•   Types of identity theft include, among others:
•   Account take over
•   Financial fraud – credit card or bank account (most common
•   New account
•   Social Security Number (SSN) identity theft. Someone steals your SSN and
    obtains employment in your name. The thief's employer reports wages earned to
    the IRS under your SSN leaving you to pay income taxes on these earnings.
•   Medical identity theft. Someone steals your identity and either obtains medical
    insurance in your name or uses your current medical insurance policy to obtain
    treatment or prescriptions.
•   Driver's license identity theft. Someone commits traffic related offenses in your
    name. When the identity thief fails to appear in court, warrants are issued in your
    name.
Phishing
• Use of email to trick someone
  into providing information or
  to go to a malicious Web
  sites by falsely claiming to be
  from a known entity. These
  attacks are becoming more
  and more sophisticated. Use
  of social networking sites will
  become an issue.
Botnets




                                            "At its peak in 2010, the total number
                                                           of unique botnet victims
                                                              grew by 654 percent,
                                                      with an average incremental
                                                growth of eight percent per week"
                                                             Danballa Report 2010.




Of the top 10 largest botnets in 2010, six did not exist in 2009. Only one (Monkif)
  was present, ranked among the 10 largest botnets of 2009. The top 10 largest
    botnets in 2010 accounted for approximately 47 % of all botnet compromised
    victims -- down from 2009, when the top 10 botnets accounted for 81% of all
                                                                          victims.
Botnet Definition

A Botnet is a network of compromised machines
(bots) remotely controlled by an attacker.


                B

                                       Attacks
            Commands           B                              Key
                                                 U
                                                     B   ot
 Attacker
                                   Attacks
                           B
            Commands                                 U   ncompromised Host
                                             U

                       B
Botnet C&C locations (all types):
Lifecycle of Botnet Infection
VIDEO
Social networking
Email and social networking
accounts
Facebook offers
Social network malware: distribution 2009
  Click to edit Master title style


  • Click to edit Master text styles
  – Second level
  • Third level
  – Fourth level
  »    Fifth level




Source: Kaspersky Lab

                     Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”,
 June 10th, 2009                                                                                  Event details (title, place)
                                                                                              Moscow, January 28-31, 2010
Cost depends on how many followers do you have and how
commercial your name is
Who are the criminals?
          Three case-studies
• Are financially-motivated cyber-criminals actively
  working with traditional organized crime groups?
  Or are they opportunistically organizing among
  themselves? Or, still, are they simply passively
  working with O.C. groups for support tasks eg:
  money laundering?
• Three case studies



                                       53
Case Study:
           Innovative Marketing Ukraine
• Formed circa 2002.
• 2008 revenue estimated at $180 million.
• Estimated to employ 200-500 staff (HR, call center operators to
  dissuade victims and avoid credit complaints, malware & scareware
  developers, etc…) in Ukraine, India, and the United States.
• Criminal activities: Scareware (or “Ransomware”, meant to frighten
  users into providing their credit card data in order not to lose their
  data), Adware, Credit Card Fraud (Reselling of the credit cards
  “customers” were ransomed into providing to IMU). Early activities
  included the selling of pirated media (music, pornography) and
  software as well as pharmaceuticals such as Viagra.
• 2010: F.T.C. persuades a U.S. federal judge to fine IMU and two
  associated individuals $163 million USD.

                                                        54
Case Study:
                                                          GlavMed
                                                       • Registered in 2006
                                        • Revenue estimated at 150 $ million
•                                         Glavmed is the public-facing affiliate
                                          program which sponsors spammers
                                         to promote what are generally known
       to be illegal pharmacy websites. It appears to be a cover for the real
      sponsor organization behind all of these sites: Spamit. These include
    Canadian Pharmacy, one of the most-spammed properties (2006-2008).
           • In September 2010, Russian authorities announced a criminal
      investigation. Around that same time, SpamIt.com was closed down.
         Consequently, the volume of spam flowing into inboxes around the
      world fell precipitously, likely because SpamIt.com affiliates fell into a
     period of transitioning to other partner networks. Meanwhile, Glavmed
          remains open for business, and is still paying affiliates to promote
                                                                pharma sites.

                                                            55
Case Study:
            Russian Business Network
• Based in St-Petersburg (RU). Operated as a host or Internet Service
  Provider for illicit services such as child pornography, malware
  distribution, etc…
• Domain names registered in 2006.
• 2006-2007 revenue estimated at $150 million.
• Criminal activities: Spam (estimated to have been actively involved
  with up to 50% of worldwide spam distribution at their height),
  malware, phishing scams (estimated to have been behind up to 50%
  of phishing spams throughout 2007), all the while providing hosting
  services for other criminal activities such as the dissemination of
  child pornography, identity theft, credit card fraud, etc...
• Alleged to have dispersed (but not suspended) its activities as of
  2008, due to increasing attention from international security
  vendors, media, and law enforcement.
                                                     56
RBN
RBN Operations

                  Services: Some external services are used by
                  RBN and affiliates. Those services can be MX
                  relay or NS hosting.
                  RBN: This is the core business of RBN. It is
                  used to offer Hosting for cybercrime. Inside this
                  part, we can identify the direct subsidiaries
                  from RBN : Nevacon and Akimon.
                  Hosting: This is the part used to host most of
                  RBN public websites, to register RBN domain
                  names… Hosting and registration is a really
                  strong partner for RBN. Incidentally, it could be
                  possible that those two blocks are under the
                  same company.
                  Telecom: This is the entity which aims at
                  providing the Internet access. It seems that
                  SBTel has obtained from Silvernet to access
                  Saint Petersburg Internet Exchange Point
                  (SPBIX).




                                                 11/21/07
                                              Ref: Bizeul.org -
© 2008 Craig A Schiller
What we can do
                               10 golden rules
•   Use a modern browser with anti-phishing protection
•   Isolate and regularly change key passwords
•   Use regularly updated anti-virus
•   Use a firewall
•   Update your operating system regularly
•   Check your bank statements regularly
•   Subscribe to a Credit Protection service
•   Use 2 factor authentication when you can
•   Be highly suspicious of anyone asking for personal info
    via email or any web 2.0 medium, even folks myou know
    as they may have had their own account compromised.
•   Be highly suspicious of anything that you receive
    electronically that is unsolicited.
Protect Yourself at Public Wi-Fi Hotspots
•   Any data transferred between a user and a Website using an
    HTTPS address and SSL encryption, such as online banking
    sites, is just as secure on a hotspot as it would be on a
    private secured network. Wi-Fi hackers or eavesdroppers
    sitting around the hotspot cannot capture a user’s login
    credentials or see any information from these secured sites.

•   Your risks increase, however, if you must login to sites that
    aren’t secured. Even if the site isn't all that sensitive, such
    as a discussion forum, eavesdroppers can capture your
    login credentials, which they may also use for other more
    important sites. That’s why it’s important to use unique
    usernames and passwords for every site

•   To secure any unencrypted Internet traffic that's sensitive
    (such as e-mail) on hotspots, the most simple, affordable
    solution is to implement a Virtual Private Network (VPN).
    Connecting to a VPN server or service would encrypt all of
    your Internet traffic, so local Wi-Fi eavesdroppers can’t
    capture it.

•   Practice defensive computing: use a VPN, vary your
    usernames and passwords, learn how to adjust the sharing
    and privacy settings on your device, and don’t enter login
    information if you’re unprotected at a public hotspot.
BRIGHT


BRIGHT is the first online magazine entirely focused on transnational organized
crime and is run by FLARE, an international research network (Fight, Learn, Act,
Report, Explore).
Get your own, FREE copy of the special issue of BRIGHT on “Digital Mafia: into the
Cybercrime World”.


Articles:
 Preface
 Cybercrime: reasons, evolution of the players and an analysis of their modus operandi
 Cybercrime & underground economy: operating and business model
 The power of networking: an insight on the Russian Business Network
 International cybercrime
 Innovative cybercrime: made in Ukraine?
 UNICRI : knowledge and information on emerging threats
Download:


http://www.flarenetwork.org/report/enquiries/article/digital_mafia_into_the_cyber
crime_world.htm
FREE copy of “F3” (Freedom from Fear,
the UNICRI magazine) issue #7, totally
focused on Cybercrimes!

DOWNLOAD:
www.FreedomFromFearMagazine.org
Ms. Francesca Bosco
Project officer on cybercrime
Emerging Crimes Unit


E-mail: bosco@unicri.it
           www.unicri.it



                                    Thank you
                                for your attention

                                        63

More Related Content

What's hot

Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
mharbpavia
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
Callum Craigie
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
24sneha
 

What's hot (20)

Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeand
 
Utilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and InvestigationUtilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and Investigation
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
 
Evil Geniuses: How organized cybercriminals could take over the world
Evil Geniuses: How organized cybercriminals could take over the worldEvil Geniuses: How organized cybercriminals could take over the world
Evil Geniuses: How organized cybercriminals could take over the world
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say? Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say?
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 

Viewers also liked

Adriana Per.1 Poison Dart Frog
Adriana Per.1 Poison Dart FrogAdriana Per.1 Poison Dart Frog
Adriana Per.1 Poison Dart Frog
buchmannbio2011
 
Location, Climate, and Natural Resources of the UK and Russia
Location, Climate, and Natural Resources of the UK and RussiaLocation, Climate, and Natural Resources of the UK and Russia
Location, Climate, and Natural Resources of the UK and Russia
Kelli Brooke
 
Alessandro Nicotra, Seminario Internet Governance
Alessandro Nicotra, Seminario Internet GovernanceAlessandro Nicotra, Seminario Internet Governance
Alessandro Nicotra, Seminario Internet Governance
Andrea Rossetti
 
rappresentazione dei numeri
rappresentazione dei numerirappresentazione dei numeri
rappresentazione dei numeri
carmen.ferro
 
Giovanna Stumpo, L’ESERCIZIO DELLA PROFESSIONE DI AVVOCATO
Giovanna Stumpo, L’ESERCIZIO DELLA PROFESSIONE DI AVVOCATOGiovanna Stumpo, L’ESERCIZIO DELLA PROFESSIONE DI AVVOCATO
Giovanna Stumpo, L’ESERCIZIO DELLA PROFESSIONE DI AVVOCATO
Andrea Rossetti
 
Reunio Pares 1 R (09 10)
Reunio Pares 1 R (09 10)Reunio Pares 1 R (09 10)
Reunio Pares 1 R (09 10)
marblocs
 
P 5 hem plantat enciams
P 5 hem plantat enciamsP 5 hem plantat enciams
P 5 hem plantat enciams
marblocs
 
Tools by Júlia Güell
Tools by Júlia GüellTools by Júlia Güell
Tools by Júlia Güell
marblocs
 
Marco Tullio Giordano, Digital Identity - part3
Marco Tullio Giordano, Digital Identity - part3Marco Tullio Giordano, Digital Identity - part3
Marco Tullio Giordano, Digital Identity - part3
Andrea Rossetti
 
Knoppix Vir
Knoppix VirKnoppix Vir
Knoppix Vir
kumee
 
07 ZamyšLení Irské šTěStí
07  ZamyšLení  Irské šTěStí07  ZamyšLení  Irské šTěStí
07 ZamyšLení Irské šTěStí
jedlickak07
 
Marco Mancarella, eVoting. Dalle esperienze sud-americane a quella salentina
Marco Mancarella, eVoting. Dalle esperienze sud-americane a quella salentinaMarco Mancarella, eVoting. Dalle esperienze sud-americane a quella salentina
Marco Mancarella, eVoting. Dalle esperienze sud-americane a quella salentina
Andrea Rossetti
 
Giuseppe Vaciago, Cybercrime, Digital Investigation e Digital Forensics
Giuseppe Vaciago, Cybercrime, Digital Investigation e Digital ForensicsGiuseppe Vaciago, Cybercrime, Digital Investigation e Digital Forensics
Giuseppe Vaciago, Cybercrime, Digital Investigation e Digital Forensics
Andrea Rossetti
 
Einführung In Video
Einführung In VideoEinführung In Video
Einführung In Video
Bertram Gugel
 

Viewers also liked (20)

Adriana Per.1 Poison Dart Frog
Adriana Per.1 Poison Dart FrogAdriana Per.1 Poison Dart Frog
Adriana Per.1 Poison Dart Frog
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
The ROI of Effective Recognition
The ROI of Effective RecognitionThe ROI of Effective Recognition
The ROI of Effective Recognition
 
Location, Climate, and Natural Resources of the UK and Russia
Location, Climate, and Natural Resources of the UK and RussiaLocation, Climate, and Natural Resources of the UK and Russia
Location, Climate, and Natural Resources of the UK and Russia
 
Alessandro Nicotra, Seminario Internet Governance
Alessandro Nicotra, Seminario Internet GovernanceAlessandro Nicotra, Seminario Internet Governance
Alessandro Nicotra, Seminario Internet Governance
 
rappresentazione dei numeri
rappresentazione dei numerirappresentazione dei numeri
rappresentazione dei numeri
 
Il Caso di Studio "Living Labs"
Il Caso di Studio "Living Labs"Il Caso di Studio "Living Labs"
Il Caso di Studio "Living Labs"
 
Giovanna Stumpo, L’ESERCIZIO DELLA PROFESSIONE DI AVVOCATO
Giovanna Stumpo, L’ESERCIZIO DELLA PROFESSIONE DI AVVOCATOGiovanna Stumpo, L’ESERCIZIO DELLA PROFESSIONE DI AVVOCATO
Giovanna Stumpo, L’ESERCIZIO DELLA PROFESSIONE DI AVVOCATO
 
Reunio Pares 1 R (09 10)
Reunio Pares 1 R (09 10)Reunio Pares 1 R (09 10)
Reunio Pares 1 R (09 10)
 
CBS Outdoor 3 of 5
CBS Outdoor 3 of 5CBS Outdoor 3 of 5
CBS Outdoor 3 of 5
 
P 5 hem plantat enciams
P 5 hem plantat enciamsP 5 hem plantat enciams
P 5 hem plantat enciams
 
Tools by Júlia Güell
Tools by Júlia GüellTools by Júlia Güell
Tools by Júlia Güell
 
Marco Tullio Giordano, Digital Identity - part3
Marco Tullio Giordano, Digital Identity - part3Marco Tullio Giordano, Digital Identity - part3
Marco Tullio Giordano, Digital Identity - part3
 
Knoppix Vir
Knoppix VirKnoppix Vir
Knoppix Vir
 
07 ZamyšLení Irské šTěStí
07  ZamyšLení  Irské šTěStí07  ZamyšLení  Irské šTěStí
07 ZamyšLení Irské šTěStí
 
Marco Mancarella, eVoting. Dalle esperienze sud-americane a quella salentina
Marco Mancarella, eVoting. Dalle esperienze sud-americane a quella salentinaMarco Mancarella, eVoting. Dalle esperienze sud-americane a quella salentina
Marco Mancarella, eVoting. Dalle esperienze sud-americane a quella salentina
 
Giuseppe Vaciago, Cybercrime, Digital Investigation e Digital Forensics
Giuseppe Vaciago, Cybercrime, Digital Investigation e Digital ForensicsGiuseppe Vaciago, Cybercrime, Digital Investigation e Digital Forensics
Giuseppe Vaciago, Cybercrime, Digital Investigation e Digital Forensics
 
Box.net
Box.netBox.net
Box.net
 
Einführung In Video
Einführung In VideoEinführung In Video
Einführung In Video
 
Creative Turtleheads
Creative TurtleheadsCreative Turtleheads
Creative Turtleheads
 

Similar to Francesca Bosco, Cybercrimes - Bicocca 31.03.2011

Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
Mohammad Ahmed
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 

Similar to Francesca Bosco, Cybercrimes - Bicocca 31.03.2011 (20)

UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptx
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber Crimes.pptx
Cyber Crimes.pptxCyber Crimes.pptx
Cyber Crimes.pptx
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 

More from Andrea Rossetti

Marco Vergani, E-commerce: shopping online e tutela del consumatore
 Marco Vergani, E-commerce: shopping online e tutela del consumatore  Marco Vergani, E-commerce: shopping online e tutela del consumatore
Marco Vergani, E-commerce: shopping online e tutela del consumatore
Andrea Rossetti
 
Stefano Ricci, Privacy & Cloud Computing
Stefano Ricci, Privacy & Cloud ComputingStefano Ricci, Privacy & Cloud Computing
Stefano Ricci, Privacy & Cloud Computing
Andrea Rossetti
 
Giuseppe Vaciago, Privacy e cloud computing nelle investigazioni digitali
Giuseppe Vaciago, Privacy e cloud computing nelle investigazioni digitaliGiuseppe Vaciago, Privacy e cloud computing nelle investigazioni digitali
Giuseppe Vaciago, Privacy e cloud computing nelle investigazioni digitali
Andrea Rossetti
 
Simone Aliprandi, Open source, open content, open data nell'ordinamento itali...
Simone Aliprandi, Open source, open content, open data nell'ordinamento itali...Simone Aliprandi, Open source, open content, open data nell'ordinamento itali...
Simone Aliprandi, Open source, open content, open data nell'ordinamento itali...
Andrea Rossetti
 
Dal checco Dezzani, Digital Evidence Digital Forensics
Dal checco Dezzani, Digital Evidence Digital ForensicsDal checco Dezzani, Digital Evidence Digital Forensics
Dal checco Dezzani, Digital Evidence Digital Forensics
Andrea Rossetti
 
Davide Gabrini, Cloud computing e cloud investigation
Davide Gabrini, Cloud computing e cloud investigationDavide Gabrini, Cloud computing e cloud investigation
Davide Gabrini, Cloud computing e cloud investigation
Andrea Rossetti
 
Sveva Avveduto, Gli italiani nella rete. Un popolo di "naviganti" nella soci...
Sveva Avveduto, Gli italiani nella rete.  Un popolo di "naviganti" nella soci...Sveva Avveduto, Gli italiani nella rete.  Un popolo di "naviganti" nella soci...
Sveva Avveduto, Gli italiani nella rete. Un popolo di "naviganti" nella soci...
Andrea Rossetti
 
Gianluigi Viscusi, Libertà e pluralismo dei valori II
Gianluigi Viscusi, Libertà e pluralismo dei valori IIGianluigi Viscusi, Libertà e pluralismo dei valori II
Gianluigi Viscusi, Libertà e pluralismo dei valori II
Andrea Rossetti
 
Gianluigi Viscusi, Libertà e pluralismo dei valori I
Gianluigi Viscusi, Libertà e pluralismo dei valori IGianluigi Viscusi, Libertà e pluralismo dei valori I
Gianluigi Viscusi, Libertà e pluralismo dei valori I
Andrea Rossetti
 
Giuseppe Vaciago, Digital Forensics: aspetti tecnici e profili processuali
Giuseppe Vaciago, Digital Forensics: aspetti tecnici e profili processualiGiuseppe Vaciago, Digital Forensics: aspetti tecnici e profili processuali
Giuseppe Vaciago, Digital Forensics: aspetti tecnici e profili processuali
Andrea Rossetti
 
Carlo Prisco, Profili giuridici della corrispondenza elettronica
Carlo Prisco, Profili giuridici della corrispondenza elettronicaCarlo Prisco, Profili giuridici della corrispondenza elettronica
Carlo Prisco, Profili giuridici della corrispondenza elettronica
Andrea Rossetti
 
Giuseppe Dezzani, Intercettazioni e VoIP
Giuseppe Dezzani, Intercettazioni e VoIPGiuseppe Dezzani, Intercettazioni e VoIP
Giuseppe Dezzani, Intercettazioni e VoIP
Andrea Rossetti
 
Simone aliprandi, La tutela giuridica dell'opera software e il modello open l...
Simone aliprandi, La tutela giuridica dell'opera software e il modello open l...Simone aliprandi, La tutela giuridica dell'opera software e il modello open l...
Simone aliprandi, La tutela giuridica dell'opera software e il modello open l...
Andrea Rossetti
 

More from Andrea Rossetti (20)

2015-06 Monica Palmirani, L'informazione giuridica nella società della conos...
2015-06 Monica Palmirani, L'informazione giuridica nella società della conos...2015-06 Monica Palmirani, L'informazione giuridica nella società della conos...
2015-06 Monica Palmirani, L'informazione giuridica nella società della conos...
 
2015 06 Stefano Ricci, Trattamento dati personali per finalità di informazio...
2015 06 Stefano Ricci, Trattamento dati personali per finalità di informazio...2015 06 Stefano Ricci, Trattamento dati personali per finalità di informazio...
2015 06 Stefano Ricci, Trattamento dati personali per finalità di informazio...
 
2015-06 Roberto Boselli, Dal dato non strutturato alle ontologie
2015-06 Roberto Boselli, Dal dato non strutturato alle ontologie2015-06 Roberto Boselli, Dal dato non strutturato alle ontologie
2015-06 Roberto Boselli, Dal dato non strutturato alle ontologie
 
Marco Vergani, E-commerce
Marco Vergani, E-commerceMarco Vergani, E-commerce
Marco Vergani, E-commerce
 
Rossetti-Silvi, Ontologia sociale del documento giuridico
Rossetti-Silvi, Ontologia sociale del documento giuridicoRossetti-Silvi, Ontologia sociale del documento giuridico
Rossetti-Silvi, Ontologia sociale del documento giuridico
 
Marco Vergani, E-commerce: shopping online e tutela del consumatore
 Marco Vergani, E-commerce: shopping online e tutela del consumatore  Marco Vergani, E-commerce: shopping online e tutela del consumatore
Marco Vergani, E-commerce: shopping online e tutela del consumatore
 
Stefano Ricci, Privacy & Cloud Computing
Stefano Ricci, Privacy & Cloud ComputingStefano Ricci, Privacy & Cloud Computing
Stefano Ricci, Privacy & Cloud Computing
 
Giuseppe Vaciago, Privacy e cloud computing nelle investigazioni digitali
Giuseppe Vaciago, Privacy e cloud computing nelle investigazioni digitaliGiuseppe Vaciago, Privacy e cloud computing nelle investigazioni digitali
Giuseppe Vaciago, Privacy e cloud computing nelle investigazioni digitali
 
Simone Aliprandi, Open source, open content, open data nell'ordinamento itali...
Simone Aliprandi, Open source, open content, open data nell'ordinamento itali...Simone Aliprandi, Open source, open content, open data nell'ordinamento itali...
Simone Aliprandi, Open source, open content, open data nell'ordinamento itali...
 
Dal checco Dezzani, Digital Evidence Digital Forensics
Dal checco Dezzani, Digital Evidence Digital ForensicsDal checco Dezzani, Digital Evidence Digital Forensics
Dal checco Dezzani, Digital Evidence Digital Forensics
 
Davide Gabrini, Cloud computing e cloud investigation
Davide Gabrini, Cloud computing e cloud investigationDavide Gabrini, Cloud computing e cloud investigation
Davide Gabrini, Cloud computing e cloud investigation
 
Alessio Pennasilico, Cybercrime e cybersecurity
Alessio Pennasilico, Cybercrime e cybersecurityAlessio Pennasilico, Cybercrime e cybersecurity
Alessio Pennasilico, Cybercrime e cybersecurity
 
Francesca Bosco, Cybercrime e cybersecurity. Profili internazionali
Francesca Bosco, Cybercrime e cybersecurity. Profili internazionaliFrancesca Bosco, Cybercrime e cybersecurity. Profili internazionali
Francesca Bosco, Cybercrime e cybersecurity. Profili internazionali
 
Sveva Avveduto, Gli italiani nella rete. Un popolo di "naviganti" nella soci...
Sveva Avveduto, Gli italiani nella rete.  Un popolo di "naviganti" nella soci...Sveva Avveduto, Gli italiani nella rete.  Un popolo di "naviganti" nella soci...
Sveva Avveduto, Gli italiani nella rete. Un popolo di "naviganti" nella soci...
 
Gianluigi Viscusi, Libertà e pluralismo dei valori II
Gianluigi Viscusi, Libertà e pluralismo dei valori IIGianluigi Viscusi, Libertà e pluralismo dei valori II
Gianluigi Viscusi, Libertà e pluralismo dei valori II
 
Gianluigi Viscusi, Libertà e pluralismo dei valori I
Gianluigi Viscusi, Libertà e pluralismo dei valori IGianluigi Viscusi, Libertà e pluralismo dei valori I
Gianluigi Viscusi, Libertà e pluralismo dei valori I
 
Giuseppe Vaciago, Digital Forensics: aspetti tecnici e profili processuali
Giuseppe Vaciago, Digital Forensics: aspetti tecnici e profili processualiGiuseppe Vaciago, Digital Forensics: aspetti tecnici e profili processuali
Giuseppe Vaciago, Digital Forensics: aspetti tecnici e profili processuali
 
Carlo Prisco, Profili giuridici della corrispondenza elettronica
Carlo Prisco, Profili giuridici della corrispondenza elettronicaCarlo Prisco, Profili giuridici della corrispondenza elettronica
Carlo Prisco, Profili giuridici della corrispondenza elettronica
 
Giuseppe Dezzani, Intercettazioni e VoIP
Giuseppe Dezzani, Intercettazioni e VoIPGiuseppe Dezzani, Intercettazioni e VoIP
Giuseppe Dezzani, Intercettazioni e VoIP
 
Simone aliprandi, La tutela giuridica dell'opera software e il modello open l...
Simone aliprandi, La tutela giuridica dell'opera software e il modello open l...Simone aliprandi, La tutela giuridica dell'opera software e il modello open l...
Simone aliprandi, La tutela giuridica dell'opera software e il modello open l...
 

Recently uploaded

Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdf
YibeltalNibretu
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
Avinash Rai
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 

Recently uploaded (20)

NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
Operations Management - Book1.p  - Dr. Abdulfatah A. SalemOperations Management - Book1.p  - Dr. Abdulfatah A. Salem
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdf
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Advances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfAdvances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdf
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 

Francesca Bosco, Cybercrimes - Bicocca 31.03.2011

  • 1. Cybercrime: dall'hacking all'Underground Economy Francesca Bosco Project Officer Interregional Crime and Justice Research Institute (UNICRI) 31 Marzo 2011 Università degli Studi di Milano Bicocca
  • 2. Agenda • Definitions,Trends & Statistics: why the topic is relevant • The Underground Economy and Cybercrime • Business models applied to Cybercrime • Social Network and How to Protect Yourself • Who are the criminals: Two case studies
  • 3. Every new technology opens the doors to new criminal approaches 3
  • 5. Cybercrime What do you want to know?
  • 6. What is cybercrime? Many possible definitions - no widely accepted definition Any conduct proscribed by legislation and/or jurisprudence that (a) is directed at computing and communications technologies themselves; (b) involves the use of digital technologies in the commission of the offence; or (c) involves the incidental use of computers with respect to the commission of other crimes Forms • crimes against the confidentiality, integrity or availability of computer systems (e.g. theft of computer services) • crimes associated with the modification of data (e.g. theft of data) • content-related crimes (e.g. dissemination of illegal and harmful material, child pornography) • relation between terrorism and the Internet (e.g. terrorist propaganda, recruitment for terrorist organizations) 6
  • 7. What is cybercrime? The Convention on Cybercrime - Budapest, 23.XI.2001- defines cybercrime in Articles 2-10 on substantive criminal law in four different categories: (1)offences against the confidentiality, integrity and availability of computer data and systems; (2)computer-related offences; (3)content-related offences; (4)offences related to infringements of copyright and related rights. 7
  • 8. Definition According to the European Convention on Cybercrime, cybercrimes are defined as “offences against the confidentiality, integrity and availability of computer data and systems”, thus considering as offences: “Illegal access” (art.2), “Illegal interception”(art.3), “Data & System Interference” (artt.4-5), “Misuse of devices”(art.6), “Computer-related fraud and forgery” (artt-7-8) “Offences related to child pornography”(art.9) “Offences related to infringements of copyright and related rights” (art.10).
  • 9. Attempt to categorize: Types of cybercrime Financial - crimes which abuse businesses' ability to conduct 'e-commerce' (or electronic commerce). Piracy - the act of copying copyrighted material. The personal computer and the Internet both offer new mediums for committing an 'old' crime. Online theft is defined as any type of 'piracy' that involves the use of the Internet to market or distribute creative works protected by copyright. Hacking - the act of gaining unauthorized access to a computer system or network and in some cases making unauthorized use of this access. Hacking is also the act by which other forms of cyber-crime (e.g., fraud, terrorism, etc.) are committed. Cyber-terrorism - the effect of acts of hacking designed to cause terror. Like conventional terrorism, e-terrorism' is classified as such if the result of hacking is to cause violence against persons or property, or at least cause enough harm to generate fear. Online Pornography - There are laws against possessing or distributing child pornography. Distributing pornography of any form to a minor is illegal. The Internet is merely a new medium for this ‘old‘ crime, but how best to regulate this global medium of communication across international boundaries and age groups has sparked a great deal of controversy and debate. Financial Public confidence in the security of information processed and stored on computer networks and a predictable environment of strong deterrence for computer crime is critical to the development of e- commerce, or commercial transactions online. Companies' ability to participate in e-commerce depends heavily on their ability to minimize e-risk. Risks in the world of electronic transactions online include viruses, cyber attacks (distributed denial of Service (DDOS) attacks) such as those which were able to bring Yahoo, eBay and other websites to a halt in February 2000, and e-forgery. There also have been other highly publicized problems of 'e-fraud' and theft of proprietary information and in some cases even for ransom ('e-extortion'). 9
  • 10. VIDEO Is there any difference between Hackers and Cybercriminals?
  • 11. What is Hacking ? • The act of gaining unauthorized access to computer systems for the purpose of stealing and corrupting data. - Types Of Hackers: • Black Hats - Malicious hackers • White Hats - Ethical hackers • Grey Hats - Ambiguous
  • 12. Hackers types • Low level hackers “script-kiddies” • Phishing, Remote low-level social engineering attacks • Insiders • Disgruntled Employees • High-level, sophisticated hackers,organized crime- medium/high level • Hobbyst Hackers • Unethical security guys (Telecom Italia and Vodafone Greece Scandals) • Structured/Unstructured Attacks • Industial Espionage-Terrorism • Foreign Espionage • Hacktivists • Terrorist Groups • State Sponsored Attacks
  • 13. What is interesting for cybercriminals? Data is more valuable than money. Once spent, money is gone, but data can be used and reused to produce more money or for further leverage. The ability to reuse data to access on-line banking applications, authorize and activate credit cards, or access organization networks has enabled cyber criminals to create an extensive archive of data for ongoing illicit activities. Intellectual property: keep in mind a database of credit cards = easy to monetize, a database of PII = more difficult, monetizing stolen IP is much harder and also much more lucrative if done correctly Outcomes of cyberattacks and reactions Several computer security consulting firms produce estimates of total worldwide losses attributable to virus and worm attacks and to hostile digital acts in general. The reliability of these estimates is often challenged; the underlying methodology is basically anecdotal. A central issue, in both public and private sectors, is whether or not we are devoting enough resources to information security. Part of the answer must come from economic analysis. Investigations into the stock price impact of cyber-attacks show that identified target firms suffer losses of 1%-5% in the days after an attack. Organizations of all sizes and industries have suffered losses at the hands of cybercriminals – though only a low percentage report such incidents. Concomitantly, cybercrimes offer high financial yields and can often be performed in a manner that incurs only modest risks because of the anonymity it presents. The lack of incident reporting and the ease of access to electronically stored data have led experts to predict that cybercrime will continue to increase in the years to come. Accurate and statistically comprehensive data on the incidence and costs of cyber-attacks are 13 critical to the analysis of information security.
  • 14. The Underground Economy • “Underground Economy” has historically been used to denote business that occurs outside of regulatory channels. Around the turn of the 21st century, Team Cymru adapted the term to the cyber locations and individuals who buy, sell, and trade criminal goods and services. • Today the Underground Economy can be found in IRC(6) networks, HTTP forums (web boards), various Instant Messaging services, and any other communications platform that lends itself to anonymous collaboration. • The Underground Economy is comprised of criminals who typically specialize in a specific criminal commodity. A few of the more common commodities include credit/debit cards, personal identities, hacked servers, hacked network equipment, malware (malicious code), Internet vulnerability scanners, e-mail spam lists, fictitious identification documents, and fraudulent money movement services • The higher levels of the Underground Economy involve technically talented actors who work with other criminals through private communication methods often involving encryption. The public criminal market place is contracting, but the criminal activity itself is increasing in both volume and sophistication The State of Cybercrimes- FreedomFromFear , March 28, 2011
  • 15. The day money became the focus of malware is the day the Internet changed. Graham Ingram, AusCERT GM
  • 16. Malicious Activity 3% Major Threats and Countries Subjected to Attacks Threat Rank 11 Malware • Malware (Malicious Code) 4 Malicious Activity 3% Spam 7 Malicious Activity 6% • Botnets Threat Rank Phishing 13 Threat Rank 19 Botnets Malware n/a 15 • Phishing Malware Spam 5 SQL-injection 7 10 Spam Phishing • Spam Phishing 3 7 Botnets 6 n/a Botnets • SQL-Injection MaliciousSQL-injection 3 % Activity 5 SQL-injection Threat Rank 4 Malware 22 Spam 6 Phishing 15 Botnets 4 SQL-injection Russia United Kingdom Poland Germany Malicious Activity 18 % Italy United States Threat Rank 1 China Malware 10 Spam 1 Malicious Activity 3% Phishing India Taiwan 1 Threat Rank Botnets 22 2 Malware SQL-injection 20 Spam 16 Phishing 2 Botnets 7 SQL-injection Malicious Activity 7% Brazil Threat Rank 8 Malware 1 Spam 9 Phishing 3 Botnets 6 SQL-injection Malicious Activity 4% Malicious Activity 5% Threat Rank Threat Rank 13 2 Malware Malware 12 2 Spam Spam Malicious Activity 7% 12 18 Phishing Phishing Threat Rank 4 19 3 Botnets Botnets Malware n/a n/a 9 SQL-injection SQL-injection Spam 4 Phishing 5 Botnets
  • 17. New Malware Statistics Top Malware Source Countries Top Attack Sectors Source: Symantec, Kaspersky, McAfee, Sophos Malware: Hostile, intrusive, or annoying software or program code designed to infiltrate a computer system (virus/worms/Trojans/rootkit/backdoors/spyware). Botnets: Software agents/bots that run autonomously and automatically under a common command-and-control structure and perform malicious activities. Phishing: Fraudulent process of attempting to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication. Spamming: Abuse of electronic messaging systems to send unsolicited bulk messages indiscriminately in the form of e-mail, instant messaging etc . SQL injection: Code injection technique that exploits vulnerability in the database of an application resulting in unexpected execution of code.
  • 18. Top 20 countries with the highest rate of cybercrime attacks
  • 19. Statistics Source: Anti-Phishing Working Group, 2nd Quarter 2010 Trends Report 19
  • 20. Damages, fraud, crime estimates  Worldwide direct damage due to malware in 2006: $13.2 bn (Computer Economics)  Decline from $17.5 bn in 2004  Effects of anti-malware efforts and shift from direct to indirect costs  U.S. Federal Bureau of Investigation estimated cost of computer crime to U.S. economy in 2005 to $67.2 bn (upper ceiling, not all malware-related)  Global cost of spam in 2007: $100 bn, of which $ 35 bn U.S. (Ferris Research)  Cost of spam management to U.S. businesses in 2007: $71 bn (Nucleus Research)  Direct costs to U.S. consumers in 2007: $7.1 bn (Consumer Reports)  Range of estimates on online consumer fraud  $240-340 million for U.S.  £33.6 for financial fraud in UK  Cost of click fraud in 2007: $1 bn (Click Forensics)
  • 21. Complaints of online crime, 2010 at the Internet Crime Complaint Center (USA) YEAR COMPLAINTS US$ LOSS RECEIVED 2010 303,809 - million 2009 336,655 560 million 2008 275,284 265 million 2007 206,884 239 million 2006 207,492 198 million
  • 22. OC activities shift Original Activity Modern Version Local numbers gambling Internet gambling (international sites) Heroin, cocaine trafficking Synthetic drugs (less vulnerable to supply problem) Street prostitution Internet prostitution and trafficking in human beings. Extortion of local businesses Extortion of corporations, for protection kidnappings. Loansharking Money laundering, precious stones, commodities. Fencing stolen property Theft of intellectual property.
  • 23. Trends of organized crime: Transnational, Adaptive, Multifaceted A.     Drug trafficking B.     Illicit arms trade C.     Trafficking and smuggling of human beings D.     Traffic of human organs E.     Counterfeiting F.      Environmental-related crimes G.     Maritime piracy H.     Cyber crime I.       Financial crimes: corruption, money laundering. 23
  • 24. Why has Cybercrime become so pervasive? – Extremely profitable – Very low infrastructure cost and readily available attack tools – Barriers to prosecution combined with weak laws and sentencing – Anonymity and financial lure has made cyber-crime more attractive – Separation between the physical and virtual world – Organized cybercrime groups can conduct operations without ever making physical contact with each other
  • 27.
  • 28. How the black market works
  • 29. UE Business Model Organised crime borrows and copies business models from the legitimate economy sector. Cyber-criminals employ models similar to the B2B (business-to-business) for their operations, such as the highly sophisticated C2C (criminal-to-criminal) models, which use very effective crime tools available through digital networks.
  • 30. Let’s go shopping... how much do they cost? Credit card number with PIN Change of billing data, including account number, billing address, SSN, name, address and birth date Driver's license number Birth certificate Social security card Credit card number with security code and expiration date Paypal account ID and password
  • 31. Items for sale A sampling of items for sale in typical cybercrime forums: $1000 – 5000 Trojan program to steal online account information $500 Credit card number with PIN $80-300 Change of billing data, including account number, billing address, SSN, name, address and birth date $150 Driver's license number $150 Birth certificate $100 Social security card $7-25 Credit card number with security code and expiration date
  • 32. The black market:what they offer
  • 33. •In 2009, 60 percent of identities exposed were compromised by hacking attacks. •75 percent of enterprises surveyed, experienced some form of cyber attack in 2009 (From Symantec State of the Enterprise Report 2010) •The top Web-based attacks observed in 2009 primarily targeted vulnerabilities in Internet Explorer and applications that process PDF files •Mozilla Firefox had the most reported vulnerabilities in 2009, with 169, while Internet Explorer had just 45, yet Internet Explorer was still the most attacked browser. •The United States was the top country of origin for Web-based attacks in 2009, accounting for 34 percent of the worldwide total. •In 2009, botnets were responsible for sending approximately 85 percent of all spam email. •There were 321 browser plug-in vulnerabilities identified in 2009, fewer than the 410 identified in 2008. •ActiveX technologies still constituted the majority of new browser plug-in vulnerabilities, with 134; however, this is a 53 percent decrease from the 287 ActiveX vulnerabilities identified in 2008
  • 34. TRENDING COMMODITIES IN UNDERGROUND MARKETS •In 2009 black market shift where email accounts were the third most available virtual good for sale. •Online credentials are composed of username/ password combinations in order to gain access to different Internet applications: •Online banking service – the credentials allow the attacker to transfer funds from the victim’s account to accounts controlled by the criminal •Health-care providers – stolen accounts may be used for prescription drug trading or for health information compromise •Webmail applications – a hacked webmail account allows the hacker to scrape the victim’s address book and use those addresses in spam lists. The criminal can then send the phishing messages from the compromised account, making the message all the more credible. •Social networks – the inherent viral nature of social networks, together with real-time updates in search engines, make stolen social network accounts most valuable. The price of these credentials varies according to the popularity of the application.
  • 36. Malware/spam and the underground economy  Players in the underground economy include (see slide 19):  Malware writers and distributors (trojans, spyware, keyloggers, adware, riskware, …)  Spammers, botnet owners, drops  Various middlemen  Emergence of institutional arrangements to enhance “trust” in the underground economy  Service level agreements, warranties, etc.  Steady stream of new attacks E.g.: spear-phishing, chained exploits, exploitation of social media.
  • 37. Example of some of the possible financial flows 1: Extortion payments, click fraud, compensated costs of ID theft and phishing Hardware, 2: software Uncompensated costs of ID theft and phishing, click through, pump and dump 4 5 schemes, Nigerian 419 scams, and other 7 6 forms of consumer fraud 3, 4, 5, 6: 8 Security 9 Hardware purchases by criminals, Individual corporate and individual users Business service users 7, 8, 9, 10: users providers Security service purchases by hardware manufacturers, corporate and 10 14 individual users, ISPs 11, 12, 13: 11 12 ISP services purchased by corporate and ISPs individual users, criminals 14: Payments to compensate consumers for 13 3 damages from ID theft (if provided) 2 1 Fraudsters, Legal financial flows criminals Potentially illegal financial flows Government Society at large Society at large
  • 38. Financial aspects of malware and spam Cost of prevention, adaptation + - + Benefits of Damage done, + cybercrime fraud, Total, crime Malware + + direct and - economy indirect + Cost of law + cost Costs of - enforcement cybercrime + - + Indirect cost to society
  • 39. Data Theft (what data are we talking about?) Personally Identifiable Information (PII): Identifying information means any name or number that may be used alone or with other information to identify a specific person: Name, social security number, date of birth, official State or government issued driver’s license or identification number, alien registration number, government passport number, employer or taxpayer identification number, biometric data, etc. Likely one of the most valuable assets that we have and one that businesses need to protect. Why? Information is exponential and reusable. Information can be sold to multiple buyers and be can be used in many profitable ways.
  • 40. Credit card thefts, 2009 Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Source: Kaspersky Lab Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, June 10th, 2009 Event details (title, place) Moscow, January 28-31, 2010
  • 41. ID Theft is the fastest growing crime in the world. • Over 9 million victims a year on average worldwide • Only Top consumer complain to Police or the Federal Trade Commission • Studies on the total cost of identity theft vary. One study indicates that identity theft cost U.S. businesses and consumers $50 to $60 billion dollars a year • Individual victims lose an average of $1,500.00 each in out of pocket expenses and require tens or hundreds of hours to recover – some never do.
  • 42. ID Theft • Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain. • Types of identity theft include, among others: • Account take over • Financial fraud – credit card or bank account (most common • New account • Social Security Number (SSN) identity theft. Someone steals your SSN and obtains employment in your name. The thief's employer reports wages earned to the IRS under your SSN leaving you to pay income taxes on these earnings. • Medical identity theft. Someone steals your identity and either obtains medical insurance in your name or uses your current medical insurance policy to obtain treatment or prescriptions. • Driver's license identity theft. Someone commits traffic related offenses in your name. When the identity thief fails to appear in court, warrants are issued in your name.
  • 43. Phishing • Use of email to trick someone into providing information or to go to a malicious Web sites by falsely claiming to be from a known entity. These attacks are becoming more and more sophisticated. Use of social networking sites will become an issue.
  • 44. Botnets "At its peak in 2010, the total number of unique botnet victims grew by 654 percent, with an average incremental growth of eight percent per week" Danballa Report 2010. Of the top 10 largest botnets in 2010, six did not exist in 2009. Only one (Monkif) was present, ranked among the 10 largest botnets of 2009. The top 10 largest botnets in 2010 accounted for approximately 47 % of all botnet compromised victims -- down from 2009, when the top 10 botnets accounted for 81% of all victims.
  • 45. Botnet Definition A Botnet is a network of compromised machines (bots) remotely controlled by an attacker. B Attacks Commands B Key U B ot Attacker Attacks B Commands U ncompromised Host U B
  • 46. Botnet C&C locations (all types):
  • 47. Lifecycle of Botnet Infection
  • 49. Email and social networking accounts
  • 51. Social network malware: distribution 2009 Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Source: Kaspersky Lab Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, June 10th, 2009 Event details (title, place) Moscow, January 28-31, 2010
  • 52. Cost depends on how many followers do you have and how commercial your name is
  • 53. Who are the criminals? Three case-studies • Are financially-motivated cyber-criminals actively working with traditional organized crime groups? Or are they opportunistically organizing among themselves? Or, still, are they simply passively working with O.C. groups for support tasks eg: money laundering? • Three case studies 53
  • 54. Case Study: Innovative Marketing Ukraine • Formed circa 2002. • 2008 revenue estimated at $180 million. • Estimated to employ 200-500 staff (HR, call center operators to dissuade victims and avoid credit complaints, malware & scareware developers, etc…) in Ukraine, India, and the United States. • Criminal activities: Scareware (or “Ransomware”, meant to frighten users into providing their credit card data in order not to lose their data), Adware, Credit Card Fraud (Reselling of the credit cards “customers” were ransomed into providing to IMU). Early activities included the selling of pirated media (music, pornography) and software as well as pharmaceuticals such as Viagra. • 2010: F.T.C. persuades a U.S. federal judge to fine IMU and two associated individuals $163 million USD. 54
  • 55. Case Study: GlavMed • Registered in 2006 • Revenue estimated at 150 $ million • Glavmed is the public-facing affiliate program which sponsors spammers to promote what are generally known to be illegal pharmacy websites. It appears to be a cover for the real sponsor organization behind all of these sites: Spamit. These include Canadian Pharmacy, one of the most-spammed properties (2006-2008). • In September 2010, Russian authorities announced a criminal investigation. Around that same time, SpamIt.com was closed down. Consequently, the volume of spam flowing into inboxes around the world fell precipitously, likely because SpamIt.com affiliates fell into a period of transitioning to other partner networks. Meanwhile, Glavmed remains open for business, and is still paying affiliates to promote pharma sites. 55
  • 56. Case Study: Russian Business Network • Based in St-Petersburg (RU). Operated as a host or Internet Service Provider for illicit services such as child pornography, malware distribution, etc… • Domain names registered in 2006. • 2006-2007 revenue estimated at $150 million. • Criminal activities: Spam (estimated to have been actively involved with up to 50% of worldwide spam distribution at their height), malware, phishing scams (estimated to have been behind up to 50% of phishing spams throughout 2007), all the while providing hosting services for other criminal activities such as the dissemination of child pornography, identity theft, credit card fraud, etc... • Alleged to have dispersed (but not suspended) its activities as of 2008, due to increasing attention from international security vendors, media, and law enforcement. 56
  • 57. RBN
  • 58. RBN Operations Services: Some external services are used by RBN and affiliates. Those services can be MX relay or NS hosting. RBN: This is the core business of RBN. It is used to offer Hosting for cybercrime. Inside this part, we can identify the direct subsidiaries from RBN : Nevacon and Akimon. Hosting: This is the part used to host most of RBN public websites, to register RBN domain names… Hosting and registration is a really strong partner for RBN. Incidentally, it could be possible that those two blocks are under the same company. Telecom: This is the entity which aims at providing the Internet access. It seems that SBTel has obtained from Silvernet to access Saint Petersburg Internet Exchange Point (SPBIX). 11/21/07 Ref: Bizeul.org - © 2008 Craig A Schiller
  • 59. What we can do 10 golden rules • Use a modern browser with anti-phishing protection • Isolate and regularly change key passwords • Use regularly updated anti-virus • Use a firewall • Update your operating system regularly • Check your bank statements regularly • Subscribe to a Credit Protection service • Use 2 factor authentication when you can • Be highly suspicious of anyone asking for personal info via email or any web 2.0 medium, even folks myou know as they may have had their own account compromised. • Be highly suspicious of anything that you receive electronically that is unsolicited.
  • 60. Protect Yourself at Public Wi-Fi Hotspots • Any data transferred between a user and a Website using an HTTPS address and SSL encryption, such as online banking sites, is just as secure on a hotspot as it would be on a private secured network. Wi-Fi hackers or eavesdroppers sitting around the hotspot cannot capture a user’s login credentials or see any information from these secured sites. • Your risks increase, however, if you must login to sites that aren’t secured. Even if the site isn't all that sensitive, such as a discussion forum, eavesdroppers can capture your login credentials, which they may also use for other more important sites. That’s why it’s important to use unique usernames and passwords for every site • To secure any unencrypted Internet traffic that's sensitive (such as e-mail) on hotspots, the most simple, affordable solution is to implement a Virtual Private Network (VPN). Connecting to a VPN server or service would encrypt all of your Internet traffic, so local Wi-Fi eavesdroppers can’t capture it. • Practice defensive computing: use a VPN, vary your usernames and passwords, learn how to adjust the sharing and privacy settings on your device, and don’t enter login information if you’re unprotected at a public hotspot.
  • 61. BRIGHT BRIGHT is the first online magazine entirely focused on transnational organized crime and is run by FLARE, an international research network (Fight, Learn, Act, Report, Explore). Get your own, FREE copy of the special issue of BRIGHT on “Digital Mafia: into the Cybercrime World”. Articles:  Preface  Cybercrime: reasons, evolution of the players and an analysis of their modus operandi  Cybercrime & underground economy: operating and business model  The power of networking: an insight on the Russian Business Network  International cybercrime  Innovative cybercrime: made in Ukraine?  UNICRI : knowledge and information on emerging threats Download: http://www.flarenetwork.org/report/enquiries/article/digital_mafia_into_the_cyber crime_world.htm
  • 62. FREE copy of “F3” (Freedom from Fear, the UNICRI magazine) issue #7, totally focused on Cybercrimes! DOWNLOAD: www.FreedomFromFearMagazine.org
  • 63. Ms. Francesca Bosco Project officer on cybercrime Emerging Crimes Unit E-mail: bosco@unicri.it www.unicri.it Thank you for your attention 63