INSIGHTS INTO THE
CYBERCRIME ECOSYSTEM
Albert Hui GREM, GCIA, GCIH, GCFA, CISA
WHO AM I?
 Member of:
• Digital Phishnet
• Association of Certified Fraud Examiners
• SANS Advisory Board
 Former incident analyst / researcher at top-tier
retail, commercial, and investment banks.
 Former government security auditor.
 Now a security ronin.
JURISDICTION
ARBITRAGE
Cybercrime is borderless; cyber law enforcement is not.
TEN YEARS AGO
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
4
TODAY
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
5
TODAY
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
6
Photofromhttp://krebsonsecurity.com
TODAY
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
7
ā€œIn Spain, it is not a crime to own and operate a
botnet or distribute malware,ā€ Capt. Lorenzana
told Krebsonsecurity in March. ā€œSo even if we
manage to prove they are using a botnet, we will
need to prove they also were stealing identities and
other things, and that is where our lines of
investigation are focusing right now.ā€
BUSINESS FUNCTION
SPECIALIZATION
Scale up the business.
CYBERCRIME ECOSYSTEM
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
9
Security
Researchers Malware
Writers
publish /
sell exploits
Script
Kiddies
sell malwares /
exploit kits
Packer / Crypter
Developer
Sell packers
/ crypters
sell / publish / make known of
vulnerabilities / techniques
Hackers
pay per install
P2P File Downloaders
/ Web Surfers
(Victims)
spread
malwares
Crack
Programmer Software Pirates
supply software
steal accounts
(e.g. QQ, game, credit card numbers, e-banking logins)
sell accounts / zombies
Accounts / Zombies
Resellers
Spammers,
Virtual Asset Resellers,
Personal Info Resellers
Fraudsters
sell accounts
sell credit card numbers /
e-banking logins
Money
Launderers
Money Mules
Bulletproof
Hosting
buy hosting
services
Botnet
Operators
Sell
zombies
sell
botnet
Traffic Resellers
WHY SPECIALIZE?
 Scale up
 Legitimize most business activities
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
10
PAY-PER-INSTALL
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
11
INSTALL SERVICE
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
12
EXPLOIT KIT
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
13
CRYPTER
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
14
DOWNLOADER
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
15
SEO
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
16
DOORWAY PAGE
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
17
CASH IN
Realizing financial gains
SPAMMING
 Spamming ads
 Spamming scam emails
 Spamming phishing emails
 Spam-assisted pump and dump
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
19
BOTNET
 Leasing out botnets (leave dirty jobs to the buyers)
 Why people pay for botnets?
• Orchestrate click frauds
• Cyber extortion rackets using DDoS
• Distribute more sinister malwares (e.g. Zeus, Torpig, Silent Banker)
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
20
CAPITALIZING ACCOUNTS
 Selling in-game items
 Selling game accounts
 Selling personal information (for telemarketing / defrauding)
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
21
VIRTUAL CURRENCIES
 WoW gold, Linden Dollar, Q幣,
etc.
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
22
MONEY LAUNDERING
WASH THY MONEY CLEAN
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
24
STORED-VALUE CARDS
 Prepaid credit cards
 Merchant gift cards
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
25
SAFE HAVENS
 Online gambling sites
 Offshore financial services
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
26
ONLINE AUCTIONS
 Money laundering via product purchase (擗寶)
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
27
SMURFING
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
28
$
$ $
$
$
$
$
$
$
$
$
$
$
$
$$
MONEY MULE
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
29
BUSINESS ETHICS OF
THE UNDERWORLD
SHAVING
 Many PPIs are accused of shaving
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
31
PHISHING
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
32
LOOK BEHIND YOUR BACK
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
33
LOOK BEHIND YOUR BACK
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
34
THANK YOU!
albert.hui@gmail.com
Copyright Ā© 2010 Albert Hui
(CC) BY-NC-SA
35

Insights into the Cybercrime Ecosystem

Editor's Notes

  • #7Ā ā€œWe didn’t just get the command and control servers; with Mariposa we got the guys behind it. The problem is that we can take down the botnet but the criminals are still out there and can start a new botnet – that happens most of the times.ā€ said Luis Corrons, technical director at PandaLabs.
  • #11Ā Only the hackers who perform break-ins and thefts, and the financial operators are clearly criminal.
  • #17Ā Drive-by downloads
  • #25Ā Investopedia Dictionary defines money laundering as ā€œthe process of creating the appearance that large amounts of money obtained from serious crimes, such as drug trafficking or terrorist activity, originated from a legitimate source.ā€ According to the International Monetary Fund (IMF), money laundering transactions are almost beyond imagination – 2 percent to 5 percent of global Gross Domestic Product. Necessary element of any criminal activity undertaken for profit. placement -> layering -> integration
  • #29Ā Smurfing, a subset of structuring, the practice of executing financial transactions in a specific pattern calculated to avoid the creation of certain records and reports required by law (Bank Secrecy Act (BSA)).
  • #30Ā Nigeria scam? Sometimes you actually do receive the money.