1 An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants Jason Franklin CMU Vern Paxson ICSI

Slides:



Advertisements
Similar presentations
Acquire foundational knowledge of marketing-information management to understand its nature and scope Marketing Indicator 1.05.
Advertisements

Lecture 3 Title: Online Payment: Credit Card and PayPal
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
Market Assessment for Small Businesses. Lecture Contents Marketing Mix/ Demand/ Demand Estimation Sampling Plan/ Data Collection and Analysis Market Survey.
Back to Table of Contents
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Using Economics to Quantify the Security of the Internet Jason Franklin.
Understanding Botnets: How Massive Internet Break-Ins Fuel an Underground Economy Jason Franklin and Vern Paxson.
Principles of Information Systems, Sixth Edition 1 Electronic Commerce Chapter 8.
Principles of Marketing
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
The easy way to shop online and explore all around market sitting at home Project Created & Presented By: Siddhant Aggarwal 2374 CSE-B(4 TH YEAR) DITM.
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
1.1 INTRODUCTION to PROMOTION and INTEGRATED MARKETING COMMUNICATIONS Chapter 1:
CERN - IT Department CH-1211 Genève 23 Switzerland t Update on the underground economy and making profit on the black market Wojciech Lapka.
ROLE OF COMMERCIAL BANKS IN THE ECONOMIC DEVELOPMENT OF A COUNTRY
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
What is Commerce? “Seller” “Buyer” Transaction Basic Computer Concepts
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
E-Commerce Michael Andrianus – Vincentius
Analyzing Your Finances
Strategic Management and the Entrepreneur
What is E-commerce Safety Precautions Password Strengths
Confidential On-line Banking Risks & Countermeasures By Vishal Salvi – CISO HDFC Bank IBA Banking Security Summit 2009.
The New Economic Model (NEM) E-COMMERCE
PART THREE E-commerce in Action Norton University E-commerce in Action.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
E-BANKING E-banking is defined as the automated delivery of new and traditional banking products and services directly to customers through electronic,
Chapter 12: International 1Copyright 1999 Prentice Hall Publishing Company International Opportunities for Small Business.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
ICT in Banking.
Money and Banking Chapter 24. What is Money? Section 1.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Unit 6 Economics America’s Market Economy
Market entry strategies introduction. Potential determinants of the firm´s choice of foreign markets THE COMPANY Degree of internationalization and overseas.
Fundamentals of Information Systems, Third Edition2 Principles and Learning Objectives E-commerce is a new way of conducting business, and as with any.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall Ch. 10: Pricing Strategies.
Copyright © 2011 Pearson Education CHAPTER 10. Copyright © 2011 Pearson Education  Is governed both by art and science.  Requires balancing a multitude.
CHAPTER 4 The Fed and Monetary Policy © 2003 South-Western/Thomson Learning.
MARKETING. Standards… BCS-BE-36: The student demonstrates understanding of the concept of marketing and its importance to business ownership. BCS-BE-36:
Chapter 16:Managing Information and Technology. Basic element of computer technology  Hardware: input, store, and organize data  System software: performs.
An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants.
Financial Management Back to Table of Contents. Financial Management 2 Chapter 21 Financial Management Analyzing Your Finances Managing Your Finances.
Phishing Problem Kristián Kučerák Milan Just. Abstract In this age of broadband, wireless, and network interconnectivity, we enjoy the unprecedented power.
Consistency in Reporting Data Breaches
Summarize: Present Value/ Future Value/ Compounding
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
How does a change in money supply affect the economy? Relevant reading: Ch 13 Monetary policy.
©2002 South-Western Chapter 6 Version 6e1 chapter Business Marketing 6 6 Prepared by Deborah Baker Texas Christian University.
Chapter 1 Introduction to Electronic Commerce. Learning Objectives In this chapter, you will learn about: The basic elements of electronic commerce Differences.
Administrative Cost Savings through Invoice Verification.
CHAPTER 15 Money and the Financial System FHF 15-2 CHAPTER 14 Accounting and Financial Statements CHAPTER 16 Financial Management and Securities Markets.
Internet Security and Implications on Transportation Systems 1 Yan Chen Department of Electrical Engineering and Computer Science Northwestern University.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
DEVELOPING A MARKETING PLAN Use a good Marketing Plan to guide the strategic and tactical direction of your business.
LITHUANIAN CRIMINAL POLICE BUREAU Crimes in Cyberspace – Relevant Issues and Investigation Challenges ID Thefts – Issues, Legal Regulation, International.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Sales Knowledge: Customers, Products, Technologies Chapter 6 Copyright © 2004 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Matt Jennings.  Introduction  Value Chains  Major value chains in the illegal market  Means of Communication  Conclusion.
Copyright © 2014 Pearson Education Ch. 10: Pricing Strategies.
Paypal PayPal is an e-commerce business allowing payments and money transfers to be made through the Internet. With a PayPal account, you can send and.
E-Commerce Payment System
What is Commerce According to Dictionary.com
Who Uses Encryption? Module 7 Section 3.
The Current Internet: Connectivity and Processing
Presentation transcript:

1 An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants Jason Franklin CMU Vern Paxson ICSI Adrian Perrig Cylab/CMU Stefan Savage UCSD

2 Commoditization of eCrime Market S S S Buy, Sell, & Trade

3 Shift from Hacking For Fun to For Profit Observation 1: Internet-based crime shifting from reputation economy to cash economy  Today, large fraction of Internet-based crime is profit driven  Can be modeled roughly as rational behavior Observation 2: eCrime has expanded and evolved to exceed capacity of closed group  There now exists diverse on-line market economy that trades in illicit goods and services in support of criminal activity Markets are public, bustling with activity, easy to access  Lower barrier to entry for eCrime, increase profitability, and contribute to overall level of Internet-based criminal activity

4 Contributions First systematic exploration into measuring and analyzing eCrime market Characterize participants and explore goods and services offered Discuss beneficial uses of market data Discuss market disruption

5 eCrime Market Operation Raw MaterialsGoal Market S S S Buy, Sell, & Trade Wealth Goods(Re)Application

6 Market Lowers Barrier to Entry for eCrime Miscreant’s Shopping List Tuesday’s Targeted Phishing Campaign Targeted Address List Mailer Web Host BOA Scam Page Wire transfer agent

7 Buying a Targeted Phishing Campaign Market S S S Buy, Sell, & Trade Shopping List

8 Market Data Collection Client IRC Network IRC Server IRC Server IRC Server Monitor Public Channel Public Messages Msg

9 Market Organization and Data Collection Market is public channel active on independent IRC networks Common channel activity and admin. creates unified market IRC log dataset (2.4GB)  13 million public messages  From Jan. ’06 to Aug. ‘06 Market S S S IRC Network C C M Msgs … S S S IRC Network C C M Msgs Dataset

10 Market Activity 1. Posting advertisements  Sales and want ads for goods and services 2. Posting sensitive personal information  Full personal information freely pasted to channel  Establishes credibility Need automatic techniques to identify ads and sensitive data ”have hacked hosts, mail lists, php mailer send to all inbox” Market S S S Buy, Sell, & Trade “i have verified paypal accounts with good balance…and i can cashout paypals” Name: Phil Phished Address: 100 Scammed Ln Phone: Card Num: Exp: 10/09 CVV:123 SSN:

11 Measurement Methodology Three classes of measurement:  1. Manual  (Labeled dataset) Manual classification of >3,500 messages with 60+ labels  Messages selected uniformly at random from corpus AdvertisementClassification Label(s) “have hacked hosts, mail lists, php mailer send to all inbox” Hacked Host Sale Mailing List Sale Mailer Sale Ad “i need 1 mastercard I give 1 linux hacked root” Credit Card Want Hacked Host Sale

12 Measurement Methodology Three classes of measurement:  2. Syntactic Using regular expressions to pattern match structured sensitive data such as credit card numbers and SSNs HaX0R: Free VISA! Name: Adrian Per… Num: HaX0R: SSN: $cc = / \s\d{16}\s /;

13 Measurement Methodology Three classes of measurement:  3. Semantic Using NLP techniques to automatically classify messages Train binary SVM classifiers for each label using labeled dataset “have hacked hosts, mail lists, php mailer send to all inbox” Hacked Host Sale Ad SVM

14 Measurement Complexities and Limitations No private messages  Limited transaction details and prices Assertions are not intentions  “Rippers” may advertise items they do not have Public market may bias behavior of miscreants Key Challenge: Validate data  Check Luhn digit, formats, valid ranges of SSNs  Cross-validate with other lists of compromised data  Need to collaborate with CC companies or law enforcement

15 Sensitive Data and Market Significance Is this market significant?  Measure sensitive data in corpus as indicator of significance Measurement Methodology:  Manually identify sensitive data in labeled dataset  Data validation Checked that data was of valid format, in correct range Verified Luhn digit on credit cards

16 Sensitive Data and Market Significance Measurement Results:  Credit cards compose 7% of labeled data Estimate: 13 million line corpus * 7% = 910k (100k unique)  SSNs and bank accounts fall in 0.5 – 0.2% range Credit Card #s SSNs Bank Account #s Percentage of Labeled Data Sensitive Data Type

17 Estimating Wealth of Miscreants Goal: Estimate wealth stolen by market Measurement Methodology:  Transactions hidden by private channels  Median loss amount for credit/debit fraud = $  Syntactic matches + Luhn check resulted in 87,143 potential cards  Include financial account data Measurement Results:  Credit card wealth = $37 million  Total: $93 million Account TypeTotal Balance Balance$18 million Checking$17 million Mortgage$15 million Saving$4 million Internet Crime Complaint Center’s Internet Crime Report Table 1: Financial data totals from public posts.

18 Goods, Services, and Prices Goods: Expansive collection of primarily virtual goods:  Online credentials and sensitive data  Hacking tools, spam kits, and phishing components Services: Fledgling service industry supports financial fraud:  Cashiers - Miscreant who converts data (credentials) to currency  Confirmers - Miscreant who poses as account owner/sender in money transfer Ad: Can confirm M/F, use voice changer Prices:  < 10% of advertisements include prices  Prices typically established in private messages

19 Distribution of Goods in Labeled Data Ad Type (Goods) Percentage of Labeled Data Bank Login Sale Ads (~6%) Bank Login Want Ads (~2%) Hacked Host Want (1%) Hacked Host Sale (3%)

20 Distribution of Goods in Labeled Data Ad Type (Goods) Percentage of Labeled Data Hacked Host Sale (3%)Mailer Sale (3%) Scam Page Sale (1.5%) List Sale (2%) Shopping List

21 Asking Prices for Compromised Hosts Establishes cost to buy resources  May be useful to state strength of adversary in monetary terms  Cost to buy perhaps useful security metric?

22 >You are standing at a crossroads. > In front of you are two identical eCrime markets. > To your left, you see a wealth of interesting information. > World 0: > To your right, you see a nuisance, a potential security threat. > World 1: Zork! | | |...,---.,---.| |--- |---. | | ||---',---|| | | | `-'-'`---'`---^`---'`---'` ' |o |,---|.,---.,---...,---.|--- | ||`---.| | || || `---'``---'` `---'|---'`---' |

23 World 0: A Wealth of Information Market may enable measurement of global trends and statistics  Idea: Price of a good in efficient market provides intersection of supply and demand curves Assume a short-term constant demand Then changes in price are result of shifts in supply curve  Increases or decreases in the quantity supplied Supply and demand curves. Shift of supply curve.

24 World 1: Markets Pose Security Threat Markets target of law enforcement activity:  U.S. Secret Service’s Operation Firewall July 2003 – late 2004, targeted administration Required sting operation, inter-state, and multi- national cooperation  UK, Canada, Bulgaria, Belarus, Poland, Sweden, Netherlands, Ukraine Resulted in arrest of 28, in 8 states, 6 countries Market reemerged after arrests  Decentralized, global nature of market makes traditional law enforcement activity time consuming and expensive Motivates need for more efficient low-cost countermeasures

25 Efficient Countermeasures Goal: Raise barrier to entry for eCrime  Reduce number of successful transactions  Push market towards closed market Approach: Establish environment which exhibits asymmetric information similar to Lemon Market  Buyers can’t distinguish quality of sellers Insight: Criminals will likely prefer anonymity over stronger verification system which relies on identity  Or we ease law enforcement’s job

26 Efficient Countermeasures Sybil and Slander Attack Sybil GenerationAchieving Verified Status Deceptive Sales/Slander

27 Conclusion Shift from hacking “for fun” to “for profit” opens possible of modeling Internet-based crime as rational behavior (for profit) First study to systematically measure and analyze eCrime market Explored some beneficial uses of market-derived data & countermeasures Limitations of this study:  Soundness of measurement Need for better verification and cross-validation  Completeness of measurement What percentage of eCrime market activity are we seeing?  Applicability of measurements/conclusions Can we apply our techniques to other eCrime markets?

28 Questions? Paper includes:  Explore incentives behind market administration and participation  SSN and CC# exposure rates and lifetimes  Analysis of possible data sources  Geographic distribution of CC#  global market  Activity levels, number of participants (> 100k) Related work:  Team Cymru. The Underground Economy: Priceless. USENIX login:, Dec  Symantec Threat Reports  Peter Gutmann. The Commercial Malware Industry.

29 Market Administration Market employs weak verification system  Based on idea of vetting data samples & feedback Sellers/buyers who undertake honest transactions gain credibility Administration assigns IRC’s voice admin (+v) status

30 Ads for Compromised Hosts