Feeds

Fraudsters get into the cloud

Fraud as a service persists post-Dark Market

SANS - Survey on application security programs

Hackers are applying the ideas of cloud computing to online fraud in a move that means even technically illiterate crooks can move into cybercrime.

Fraud as a service products are being punted through underground forums, according to Uri Rivner, head of new technologies at RSA's consumer division. This means that for around $299 a month, would-be phishing fraudsters need only log on to obtain fraud lists, with the grunt work of writing Trojan code, hosting, distribution and updates carried out behind the scenes on their behalf.

The development of Web 2.0 fraud is not entirely without risk for fraudsters - for one thing cases have being recorded where phishing toolkits contained backdoors. The FBI's successful sting on members of the Dark Market underground forum has made fraudsters more wary of trusting their supposed partners in crime on other sites, according to Rivner.

Despite these issues, a certain level of trust among thieves remains. Underground hackers have developed cybercrime versions of social networking sites and collaboration suites. Blogs, forums and podcasts have mushroomed, with hackers even reviewing Trojans in much the same way the mainstream tech press reviews anti-malware products.

An example of the sophistication of cracker collateral can be found in a training video by Turkish credit card skimmer supplier Chao, posted through YouTube (below). A suspect reckoned to be Chao was arrested as part of the FBI's take down of the denizens of the Dark Market forum. The ATM fraud devices created by Chao were put together from off-the-shelf components.

Chao's video is media-savvy and even amusing. The cartoon representation of Chao (which wouldn't look out of place on South Park) offers top tips in broken English on issues such as avoiding the installation of skimmers in small towns or during the morning, when people are likely to be more vigilant.

Discussions about cybercrime often revolve around miscreants based in Eastern Europe - especially Russia - but Brazilian hackers are arguably the most technically sophisticated in the world. Australia is often a testing ground for the latest attack techniques, while the land of the samba has emerged as a hot spot in the evolution of new malware and attack techniques, particularly in the sphere of phishing. "Brazil is a cesspool of fraud," Rivner said. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Arts and crafts store Michaels says 3 million credit cards exposed in breach
Meanwhile, Target investigators prepare for long process in nabbing hackers
Canadian taxman says hundreds pierced by Heartbleed SSL skewer
900 social insurance numbers nicked, says revenue watchman
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.