SlideShare a Scribd company logo
Last i t talk
     L t minute t lk

HACKING MOBILE OPERATORS
  C    G O     O        O S
 (GSM, EDGE, UMTS): WWWH
   [Who, When Wh Ho
   [Who When, Why, How ?]
nullcon 2010 - Underground Economy
….Kidding! ;) LOL
Underground Economy:
why we should be fully-updated on this topic:
  InfoSec players, Finance world, citiziens
          players          world citiziens.
                         A NFD Talk by Raoul Chiesa
            Senior Advisor, Strategic Alliances & Cybercrime Issues

 United Nations - Interregional Crime and Justice Research Institute (UNICRI)
Disclaimer
●   The information contained in this presentation does not break any
    intellectual property, nor does it provide detailed information that
    may be in conflict with actual India laws (hopefully.....)
        y                                     ( p      y )

●   Registered brands belong to their legitimate owners.

●   The opinion here represented are my personal ones and do not
    necessary reflect the United Nations nor UNICRI views
                                                    views.

●   ...I just arrived this morning straight from Italy, slept 4 hours in the
    last 2 days: please kindly allow me some possible English mistakes
    around my talk :(
Agenda
# whois raoul
#whois UNICRI
Yesterday’s h ki
Y t d ’ hacking VS today’s crime
                   t d ’     i
Hacking eras and Hacker’s generations
Cybercrime
Profiling the enemy
Hackers…
Hacking, today: Underground Economy
(CENSORED)
Conclusions
Intro
Who am I?
Raoul “Nobody” Chiesa

•   Old-school Hacker from 1986 to 1995
•   Infosec Professional since 1997 @ Mediaservice.net
•   OSSTMM Key Contributor; HPP Project Manager; ISECOM
    International Trainer
•   Founder of CLUSIT, Italian Computer Security Association
    (
    (CLUSI* : Belgium, France, Luxembourg, Switzerland)
                   g    ,        ,            g,          )
•   Member of TSTF.net – Telecom Security Task Force
•   I work worldwide (so I don’t get bored ;)
•   My areas of interest: Pentesting, SCADA/DCS/PLC,
      y                               g
    National Critical Infrastructures, Security R&D+Exploiting
    weird stuff, , Security People, X.25, PSTN/ISDN, Hacker’s
    Profiling, Cybercrime, Information Warfare, Security
    methodologies, specialized Trainings.



•   Basically, I do not work in this field just to get my salary
    every month and pay the home/car/whatever loan: I really
    love it ☺
    l    i
UNICRI


                    What is UNICRI?

United Nations Interregional Crime & Justice Research Institute

A United Nations entity established in 1968 to support countries
worldwide in crime prevention and criminal justice

UNICRI carries out applied research, training,            technical
cooperation and documentation / information activities

UNICRI disseminates information and maintains contacts with
professionals and experts worldwide

Counter Human Trafficking and Emerging Crimes Unit: cyber
crimes, counterfeiting, environmental crimes, trafficking in stolen
works of art…
Fake Bvlgari &Rolex, but also    Guess how they update each others?
                      Water systems with “sensors”…
 Viagra &Cialis (aka SPAM)             Email, chat&IM, Skype…
UNICRI & Cybercrime


     Overview on UNICRI projects
         against cybercrime

    Hackers Profiling Project (HPP)


    SCADA & CNI s security
            CNI’s


    Digital Forensics and digital investigation
                        SCADA Security
    techniques

    Cybersecurity Trainings at the UN Campus
nullcon 2010 - Underground Economy
Yesterday
         y
and today’s
  Hacking
The Hackers Profiling Project (HPP)


                          Crime->Yesterday

    “Every new technology, opens the door to new criminal approaches”.

•   The relationship between technologies and criminality has always been –
    since the very beginning – characterized by a kind of “competition” between
    the good and the bad guys, just like cats and mice.

•   As an example, at the beginning of 1900, when cars appeared, the “bad
    guys” started stealing them (!)

•   ….the police, in order to contrast the phenomenon, defined the mandatory
    use of car plates…

•   ….and the thieves began stealing the car plates from the cars (and/or
    falsifying them).
The Hackers Profiling Project (HPP)


                       Crime->Today:Cybercrime
•   Cars have been substituted by information (I’m not drunk Yet ;)
                                              (I m     drunk.

                    You got the information, you got the power..

    (at least, in politics, in the business world, in our personal relationships…)

•   Simply p , this happens because the “information” can be transformed at once
        p y put,       pp
    into “something else”:
    Competitive advantage
    Sensible/critical information
    Money

•   … that’s why all of us we want to “be secure”.
                                       be secure

•   It’s not by chance that it’s named “IS”: Information Security ☺
Hacking eras &
         g
Hackers’ generations
Things changed…

First generation (70’s) was inspired by the need for
knowledge
Second generation (1980-1984) was driven by curiosity plus
the knowledge starving: the only way to learn OSs was to hack
them; later (1985-1990) hacking becomes a trend.
The Third one (90’s) was simply pushed by the anger for
hacking, meaning a mix of addiction, curiosity, learning new
stuff, hacking IT systems and networks, exchanging info
with the underground community Here we saw new concepts
                     community.
coming, such as hacker’s e-zines (Phrack, 2600 Magazine)
along with BBS
Fourth generation (2000-today) is driven by angerness and
                       (2000 today)
money: often we can see subjects with a very low know-how,
thinking that it’s “cool & bragging” being hackers, while they are
not interested in hacking & phreaking history, culture and
ethics. Here hacking meets with politics (cyber-hacktivism) or       €,
                                                                     € $
with the criminal world (cybercrime).
Cybercrime: why?


• QUESTION:
   – May we state that cybercrime – along with its many, many aspects
     and views – can be ranked as #1 in rising trend and global
     diffusion ?

• ANSWER(S):
• Gi
  Given that all of you are attendes and speakers here at NULLCON, I
        th t ll f            tt d      d     k    h     t NULLCON
  would answer that we already are on the right track in order to analyze
  the problem ☺

• Nevertheless, some factors exist for which the spreading of
  “e-crime”-based attacks relays.
                              y

• Let’s take a look at them.
Reasons/1

• 1. There are new users, more and more
  every day: this means the total amount of
       y y                                      Thanks to broadband...
                                                          broadband
  potential victims and/or attack vectors is
  increasing.


• 2. Making money, “somehow and straight        Economical crisis…
  away”.
      y


• 3. Technical know-how public availability &   0-days, Internet
                                                distribution system
  ready-to-go, even when talking about
  average-high skills: that’s what I name
  “hacking p et à po te
    ac g pret-à-porter”
Reasons/2


•   4. It s
    4 It’s fucking easy to recruit idiots and set up groups molding those adepts
                                                     groups,
    upon the bad guy’s needs (think about e-mules)
                                                           Newbies, Script Kiddies

•   5. “They will never bust me”            Psycology,
                                            Criminology

•   6.
    6 Lack of violent actions                Psycology and Sociology
What the heck is changed then??

What’s really changed is the attacker’s typology

From “bored teens”, doing it for “hobby and curiosity”
(obviously: during night, pizza-hut’s box on the floor and
cans of R d B ll)
      f Red Bull)….

...to teenagers and adults not mandatory “ICT” or
   to                                     ICT
“hackers”: they just do it for the money.

What’s changed is the attacker’s profile, along with its
justifications, motivations and reasons.

Let’s do a quick test!
Hackers in their environment
“Professionals”
There’s a difference: why?

• Why were the guys in the first slide hackers, and
  the others professional ?

• Because of the PCs ?

• Because of their “look” ?

• Due to the environments surrounding them ?

• Because of the “expression on their faces” ?
Surprise!
  Everything has changed


• Erroneus media information pushed your
                    pp
  mind to run this approach
• Sometimes today the professionals are
  the real criminals and hackers “the
           criminals,
  good guys”… (Telecom Italia Scandal,
  Vodafone Greece Affair, etc…)
Understanding Hackers


• It’ extremely important th t we understand the so-called
  It’s t      l i     t t that      d t d th          ll d
  “hacker’s behaviours”
   – Don’t limit yourself to analyse attacks and intrusion techniques: let’s analyze
     Don t                                                             let s
     their social behaviours


• Try to identify those not-written rules sof hacker’s subculture


• Explore hacker’s social organization


• Let’s zoom on those existing links between hacking and
  organized crime
Ok Raoul…
so what ?!?
Hacking, today

                                Numbers

  285 million records compromised in 2008 (source: Verizon 2009 Data Breach
Investigations Report)
 2 Billion of US dollars: that’s RBN’s 2008 turnover
 +148% increasing in ATM frauds: more than 500 000 000 € business each
                                                  500.000.000
year, just in Europe (source: ENISA “ATM Crime Report 2009”)
 .......


 Uh ?!? RBN ? WTF??
RBN

Russian Business Network
Not that easy explaing what it is...
First of all, cybercrime IRL means:
     Phishing
     Malware (rogue AVs, game sites, casinos, + standard stuff)
     Frauds & Scams
    DDoS Attacks
     Children pornography
    Generic Porn
    On-line games (Tomasz may comment out here ;)
RBN & phishing

 David Bizeul wrote an excellent study on RBN. One page was so interesting:
http://194.146.207.18/config
   p                       g
storage_send_interval="600" config_file ="$_2341234.TMP" storage_file ="$_2341233.TMP"
www_domains_list = "pageshowlink.com" redirector_url ="citibusinessonline.da-us.citibank.com
/cbusol/uSignOn.do {
            g          {www} /usa/citibusiness.php 2 0 3" redirector_url = "*fineco.it /fineco/PortaleLogin
                             }                 p p                                                       g
{www} /it/fineco.php 2 0 3" redirector_url = "onlineid.bankofamerica.com /cgi-bin/sso.login.controller*
{www} /usa/boa_pers/sso.login.php 2 0 2" redirector_url = "onlinebanking-nw.bankofamerica.com
/login.jsp* {www} /usa/boa_pers/sso.login.php 2 0 2" redirector_url = "online.wellsfargo.com /signon*
{
{www} /usa/wellsfargo.php 2 0 2" redirector_url = "ibank.barclays.co.uk /olb/*/LoginPasscode.do {
      }              g p p                   _                    y                  g                 {www} }
/uk/barc/LoginPasscode.php 2 0 2" redirector_url = "*ebank.hsbc.co.uk
/servlet/com.hsbc.ib.app.pib.logon.servlet.OnLogonVerificationServlet {www} /uk/hsbc/hsbc.php 2 0 2"
redirector_url = "online*.lloydstsb.* /miheld.ibc {www} /uk/lloyds/lloyds.php 2 0 2" redirector_url =
"*halifax-online.co.uk /_mem_bin/UMLogonVerify.asp {
                          _     _          g        y p {www} /uk/halifax.co.uk.php 2 0 3" redirector_url
                                                               }                   p p                    _
= "olb2.nationet.com /signon/SinglePageSignon_wp1.asp* {www} /uk/nationwide.php 2 0 3"
redirector_url = "webbank.openplan.co.uk /core/webbank.asp {www} /uk/woolwich.co.uk.php 2 0 3"
#DE redirector_url = "meine.deutsche-bank.de /mod/WebObjects/dbpbc.woa/* {www}
/de/deutsche-bank.de/login.php 2 0 3" redirector_url = "banking.postbank.de /app/login.prep.do* {
                          g p p                    _             gp               pp g p p           {www} }
/de/postbank/postbank.de.php 2 0 3" redirector_url = "portal*.commerzbanking.de /P-
Portal/XML/IFILPortal/pgf.html* {www} /de/commerzbanking/login.php 2 0 2" redirector_url =
"www.dresdner-privat.de /servlet/P/SSA_MLS_PPP_INSECURE_P/pinLogin.do {www} /de/dresdner-
privat/pers.php 2 0 3" redirector_url = "www.dresdner-privat.de
/servlet/N/SSA_MLS_PPP_INSECURE_N/pinLogin.do {www} /de/dresdner-privat/corp.php 2 0 3"
What about the other IP
addresses?
RBN’s model
Underground
     g
 Economy
“Cybercriminals”
UE


Underground Economy is the concept thanks to which we will not experience
anymore – in the next future – “bank robberies”

Nowadays the ways in order to fraud and steal money are SO MANY. And, the
world is just full of unexperienced users.

What is needed is to “clean” the money: money laundering. They need the
                                     y      y          g     y
mules.
UE: the approach


1.
1    Basics: Malware and Botnets
      Create the malware, build the botnet

2.   Identity theft
      Stealing personal and financial credentials (e-banking)

3.   Running the e-crime
              g
      i.e.: e-Banking attacks and e-commerce frauds (Ebay docet)

4.   Money laundering
      Setup money laundering’s networks
THIS IS A SANITIZED VERSION
 OF MY TALK: YOU WILL NOT
  FIND THIS SLIDES HERE.

YOU SHOULD HAVE ATTENDED
     NULLCON 2010!!!
Why it works ?
What’s next ?
        ATM frauds generations


   THIS IS A SANITIZED VERSION
    OF MY TALK: YOU WILL NOT
     FIND THIS SLIDES HERE.
                       HERE

  YOU SHOULD HAVE ATTENDED
       NULLCON 2010!!!
This is the end,my friends
                                  Final toughts
 The hacking world has not always been linked to those true criminal actions
 Just like FX said at CONfidence Warsaw November 2009 talking about router’s
security,
security it seems that ATM vendors (where the money is) just don’t care about the
                                                              don t
security of their products (a fucking MS Windows cage is really not enough!)
 Basically, they are still thinking that skimming is their sole and unique threat (idiots)
   What they are doing right now – just as it’s happening with Internet routers! -. is
adding “gadgets” and fuctions, that basically enlarge the chance of mistakes, bugs,
attack vectors, etc (coin dispenser, new “routings” towards telcos, charity, etc..)
                                          routings
 At the same time, nowaday’s hacking is moving (transforming?) towards crime.
  Cybercrime and Underground Economy problem is not “a tech-people issue”:
                                                         a            issue :
rather, it is an issue for ALL of us, representing an impact on the countries’
ecosystem that could reveal itself as devastating.
Questions , or party time? ☺

                           Contacts, Q&A


           Raoul Chiesa

   E-mail: chiesa@UNICRI.it

          Thanks folks!


 UNICRI Cybercrime Home Page:
         y                g                      http://www.unicri.it
http://www.unicri.it/wwd/cyber_crime/index.php

More Related Content

nullcon 2010 - Underground Economy

  • 1. Last i t talk L t minute t lk HACKING MOBILE OPERATORS C G O O O S (GSM, EDGE, UMTS): WWWH [Who, When Wh Ho [Who When, Why, How ?]
  • 4. Underground Economy: why we should be fully-updated on this topic: InfoSec players, Finance world, citiziens players world citiziens. A NFD Talk by Raoul Chiesa Senior Advisor, Strategic Alliances & Cybercrime Issues United Nations - Interregional Crime and Justice Research Institute (UNICRI)
  • 5. Disclaimer ● The information contained in this presentation does not break any intellectual property, nor does it provide detailed information that may be in conflict with actual India laws (hopefully.....) y ( p y ) ● Registered brands belong to their legitimate owners. ● The opinion here represented are my personal ones and do not necessary reflect the United Nations nor UNICRI views views. ● ...I just arrived this morning straight from Italy, slept 4 hours in the last 2 days: please kindly allow me some possible English mistakes around my talk :(
  • 6. Agenda # whois raoul #whois UNICRI Yesterday’s h ki Y t d ’ hacking VS today’s crime t d ’ i Hacking eras and Hacker’s generations Cybercrime Profiling the enemy Hackers… Hacking, today: Underground Economy (CENSORED) Conclusions
  • 9. Raoul “Nobody” Chiesa • Old-school Hacker from 1986 to 1995 • Infosec Professional since 1997 @ Mediaservice.net • OSSTMM Key Contributor; HPP Project Manager; ISECOM International Trainer • Founder of CLUSIT, Italian Computer Security Association ( (CLUSI* : Belgium, France, Luxembourg, Switzerland) g , , g, ) • Member of TSTF.net – Telecom Security Task Force • I work worldwide (so I don’t get bored ;) • My areas of interest: Pentesting, SCADA/DCS/PLC, y g National Critical Infrastructures, Security R&D+Exploiting weird stuff, , Security People, X.25, PSTN/ISDN, Hacker’s Profiling, Cybercrime, Information Warfare, Security methodologies, specialized Trainings. • Basically, I do not work in this field just to get my salary every month and pay the home/car/whatever loan: I really love it ☺ l i
  • 10. UNICRI What is UNICRI? United Nations Interregional Crime & Justice Research Institute A United Nations entity established in 1968 to support countries worldwide in crime prevention and criminal justice UNICRI carries out applied research, training, technical cooperation and documentation / information activities UNICRI disseminates information and maintains contacts with professionals and experts worldwide Counter Human Trafficking and Emerging Crimes Unit: cyber crimes, counterfeiting, environmental crimes, trafficking in stolen works of art… Fake Bvlgari &Rolex, but also Guess how they update each others? Water systems with “sensors”… Viagra &Cialis (aka SPAM) Email, chat&IM, Skype…
  • 11. UNICRI & Cybercrime Overview on UNICRI projects against cybercrime Hackers Profiling Project (HPP) SCADA & CNI s security CNI’s Digital Forensics and digital investigation SCADA Security techniques Cybersecurity Trainings at the UN Campus
  • 13. Yesterday y and today’s Hacking
  • 14. The Hackers Profiling Project (HPP) Crime->Yesterday “Every new technology, opens the door to new criminal approaches”. • The relationship between technologies and criminality has always been – since the very beginning – characterized by a kind of “competition” between the good and the bad guys, just like cats and mice. • As an example, at the beginning of 1900, when cars appeared, the “bad guys” started stealing them (!) • ….the police, in order to contrast the phenomenon, defined the mandatory use of car plates… • ….and the thieves began stealing the car plates from the cars (and/or falsifying them).
  • 15. The Hackers Profiling Project (HPP) Crime->Today:Cybercrime • Cars have been substituted by information (I’m not drunk Yet ;) (I m drunk. You got the information, you got the power.. (at least, in politics, in the business world, in our personal relationships…) • Simply p , this happens because the “information” can be transformed at once p y put, pp into “something else”: Competitive advantage Sensible/critical information Money • … that’s why all of us we want to “be secure”. be secure • It’s not by chance that it’s named “IS”: Information Security ☺
  • 16. Hacking eras & g Hackers’ generations
  • 17. Things changed… First generation (70’s) was inspired by the need for knowledge Second generation (1980-1984) was driven by curiosity plus the knowledge starving: the only way to learn OSs was to hack them; later (1985-1990) hacking becomes a trend. The Third one (90’s) was simply pushed by the anger for hacking, meaning a mix of addiction, curiosity, learning new stuff, hacking IT systems and networks, exchanging info with the underground community Here we saw new concepts community. coming, such as hacker’s e-zines (Phrack, 2600 Magazine) along with BBS Fourth generation (2000-today) is driven by angerness and (2000 today) money: often we can see subjects with a very low know-how, thinking that it’s “cool & bragging” being hackers, while they are not interested in hacking & phreaking history, culture and ethics. Here hacking meets with politics (cyber-hacktivism) or €, € $ with the criminal world (cybercrime).
  • 18. Cybercrime: why? • QUESTION: – May we state that cybercrime – along with its many, many aspects and views – can be ranked as #1 in rising trend and global diffusion ? • ANSWER(S): • Gi Given that all of you are attendes and speakers here at NULLCON, I th t ll f tt d d k h t NULLCON would answer that we already are on the right track in order to analyze the problem ☺ • Nevertheless, some factors exist for which the spreading of “e-crime”-based attacks relays. y • Let’s take a look at them.
  • 19. Reasons/1 • 1. There are new users, more and more every day: this means the total amount of y y Thanks to broadband... broadband potential victims and/or attack vectors is increasing. • 2. Making money, “somehow and straight Economical crisis… away”. y • 3. Technical know-how public availability & 0-days, Internet distribution system ready-to-go, even when talking about average-high skills: that’s what I name “hacking p et à po te ac g pret-à-porter”
  • 20. Reasons/2 • 4. It s 4 It’s fucking easy to recruit idiots and set up groups molding those adepts groups, upon the bad guy’s needs (think about e-mules) Newbies, Script Kiddies • 5. “They will never bust me” Psycology, Criminology • 6. 6 Lack of violent actions Psycology and Sociology
  • 21. What the heck is changed then?? What’s really changed is the attacker’s typology From “bored teens”, doing it for “hobby and curiosity” (obviously: during night, pizza-hut’s box on the floor and cans of R d B ll) f Red Bull)…. ...to teenagers and adults not mandatory “ICT” or to ICT “hackers”: they just do it for the money. What’s changed is the attacker’s profile, along with its justifications, motivations and reasons. Let’s do a quick test!
  • 22. Hackers in their environment
  • 24. There’s a difference: why? • Why were the guys in the first slide hackers, and the others professional ? • Because of the PCs ? • Because of their “look” ? • Due to the environments surrounding them ? • Because of the “expression on their faces” ?
  • 25. Surprise! Everything has changed • Erroneus media information pushed your pp mind to run this approach • Sometimes today the professionals are the real criminals and hackers “the criminals, good guys”… (Telecom Italia Scandal, Vodafone Greece Affair, etc…)
  • 26. Understanding Hackers • It’ extremely important th t we understand the so-called It’s t l i t t that d t d th ll d “hacker’s behaviours” – Don’t limit yourself to analyse attacks and intrusion techniques: let’s analyze Don t let s their social behaviours • Try to identify those not-written rules sof hacker’s subculture • Explore hacker’s social organization • Let’s zoom on those existing links between hacking and organized crime
  • 28. Hacking, today Numbers 285 million records compromised in 2008 (source: Verizon 2009 Data Breach Investigations Report) 2 Billion of US dollars: that’s RBN’s 2008 turnover +148% increasing in ATM frauds: more than 500 000 000 € business each 500.000.000 year, just in Europe (source: ENISA “ATM Crime Report 2009”) ....... Uh ?!? RBN ? WTF??
  • 29. RBN Russian Business Network Not that easy explaing what it is... First of all, cybercrime IRL means: Phishing Malware (rogue AVs, game sites, casinos, + standard stuff) Frauds & Scams DDoS Attacks Children pornography Generic Porn On-line games (Tomasz may comment out here ;)
  • 30. RBN & phishing David Bizeul wrote an excellent study on RBN. One page was so interesting: http://194.146.207.18/config p g storage_send_interval="600" config_file ="$_2341234.TMP" storage_file ="$_2341233.TMP" www_domains_list = "pageshowlink.com" redirector_url ="citibusinessonline.da-us.citibank.com /cbusol/uSignOn.do { g {www} /usa/citibusiness.php 2 0 3" redirector_url = "*fineco.it /fineco/PortaleLogin } p p g {www} /it/fineco.php 2 0 3" redirector_url = "onlineid.bankofamerica.com /cgi-bin/sso.login.controller* {www} /usa/boa_pers/sso.login.php 2 0 2" redirector_url = "onlinebanking-nw.bankofamerica.com /login.jsp* {www} /usa/boa_pers/sso.login.php 2 0 2" redirector_url = "online.wellsfargo.com /signon* { {www} /usa/wellsfargo.php 2 0 2" redirector_url = "ibank.barclays.co.uk /olb/*/LoginPasscode.do { } g p p _ y g {www} } /uk/barc/LoginPasscode.php 2 0 2" redirector_url = "*ebank.hsbc.co.uk /servlet/com.hsbc.ib.app.pib.logon.servlet.OnLogonVerificationServlet {www} /uk/hsbc/hsbc.php 2 0 2" redirector_url = "online*.lloydstsb.* /miheld.ibc {www} /uk/lloyds/lloyds.php 2 0 2" redirector_url = "*halifax-online.co.uk /_mem_bin/UMLogonVerify.asp { _ _ g y p {www} /uk/halifax.co.uk.php 2 0 3" redirector_url } p p _ = "olb2.nationet.com /signon/SinglePageSignon_wp1.asp* {www} /uk/nationwide.php 2 0 3" redirector_url = "webbank.openplan.co.uk /core/webbank.asp {www} /uk/woolwich.co.uk.php 2 0 3" #DE redirector_url = "meine.deutsche-bank.de /mod/WebObjects/dbpbc.woa/* {www} /de/deutsche-bank.de/login.php 2 0 3" redirector_url = "banking.postbank.de /app/login.prep.do* { g p p _ gp pp g p p {www} } /de/postbank/postbank.de.php 2 0 3" redirector_url = "portal*.commerzbanking.de /P- Portal/XML/IFILPortal/pgf.html* {www} /de/commerzbanking/login.php 2 0 2" redirector_url = "www.dresdner-privat.de /servlet/P/SSA_MLS_PPP_INSECURE_P/pinLogin.do {www} /de/dresdner- privat/pers.php 2 0 3" redirector_url = "www.dresdner-privat.de /servlet/N/SSA_MLS_PPP_INSECURE_N/pinLogin.do {www} /de/dresdner-privat/corp.php 2 0 3"
  • 31. What about the other IP addresses?
  • 33. Underground g Economy
  • 35. UE Underground Economy is the concept thanks to which we will not experience anymore – in the next future – “bank robberies” Nowadays the ways in order to fraud and steal money are SO MANY. And, the world is just full of unexperienced users. What is needed is to “clean” the money: money laundering. They need the y y g y mules.
  • 36. UE: the approach 1. 1 Basics: Malware and Botnets Create the malware, build the botnet 2. Identity theft Stealing personal and financial credentials (e-banking) 3. Running the e-crime g i.e.: e-Banking attacks and e-commerce frauds (Ebay docet) 4. Money laundering Setup money laundering’s networks
  • 37. THIS IS A SANITIZED VERSION OF MY TALK: YOU WILL NOT FIND THIS SLIDES HERE. YOU SHOULD HAVE ATTENDED NULLCON 2010!!!
  • 39. What’s next ? ATM frauds generations THIS IS A SANITIZED VERSION OF MY TALK: YOU WILL NOT FIND THIS SLIDES HERE. HERE YOU SHOULD HAVE ATTENDED NULLCON 2010!!!
  • 40. This is the end,my friends Final toughts The hacking world has not always been linked to those true criminal actions Just like FX said at CONfidence Warsaw November 2009 talking about router’s security, security it seems that ATM vendors (where the money is) just don’t care about the don t security of their products (a fucking MS Windows cage is really not enough!) Basically, they are still thinking that skimming is their sole and unique threat (idiots) What they are doing right now – just as it’s happening with Internet routers! -. is adding “gadgets” and fuctions, that basically enlarge the chance of mistakes, bugs, attack vectors, etc (coin dispenser, new “routings” towards telcos, charity, etc..) routings At the same time, nowaday’s hacking is moving (transforming?) towards crime. Cybercrime and Underground Economy problem is not “a tech-people issue”: a issue : rather, it is an issue for ALL of us, representing an impact on the countries’ ecosystem that could reveal itself as devastating.
  • 41. Questions , or party time? ☺ Contacts, Q&A Raoul Chiesa E-mail: chiesa@UNICRI.it Thanks folks! UNICRI Cybercrime Home Page: y g http://www.unicri.it http://www.unicri.it/wwd/cyber_crime/index.php