SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
R S A MO N T H LY F R A U D R E P O R T page 1 
F R A U D R E P O RT 
CYBERCRIMINAL IN BRAZIL SHARES 
MOBILE CREDIT CARD STORE APP 
August 2014 RSA agents recently traced a threat actor advertising a mobile credit card store 
application. The cybercriminal shared the information on his Facebook page, including 
methods for using the app and links for downloading it. Besides the obvious purpose of 
selling compromised credentials, launching the application on a mobile device also 
prompts requests for user permissions, which can give the application the kind of control 
over the device that is usually associated with malicious malware applications. 
RSA’s open source investigation revealed a cybercriminal openly advertising a CC store 
(Figure 1) designed as a mobile phone application for Android and iPhone devices (a 
translation follows below). 
“Good evening everybody! Today I’ll show a project 
that I’ve been developing for some while... it’s an 
automated credit card shop application that runs 
on Android and iOS, using my web credit card 
store as database. 
Remember that I’m the first Brazilian programmer to 
develop a mobile application that sells credit cards. 
My clients are increasing day by day and I hope 
that this new system helps them on their shopping. 
The Android application is already nearly done 
and the iOS one is 60% done (tested on Galaxy S5 
and iPhone 5S, if it doesn’t work on your mobile, 
send me a message with your model and I’ll 
check!). 
This message is already long so I won’t be giving 
any more details. Below there’s the link for my 
website to download the app and its link on 
Google Play! 
Don’t forget to install it on your Android, and next 
week I hope that iOS will get it too!”
R S A MO N T H LY F R A U D R E P O R T page 2 
AVAILABLE IN THE OPEN MARKET 
The application was made available as a free download on Google Play. The cybercriminal provided the following instructions for using the app: 
––Order a batch of CC credentials 
––Enter personal info 
––App will send banking info in order to make a deposit 
––Wait 24 hours to make a transaction 
––Take photo of the transaction deposit slip for proof, and send it to fraudster 
––Receive CC credentials in return mail 
In the CC shop website shared by the fraudster, there is a link that automatically starts downloading the application (Figure 2). By clicking on the Android link, an Android binary (APK) is downloaded, but the iPhone link displays a message advising the user to wait for a week. 
A sample of screenshots from the app, with relevant translations, can be found below. 
1 Methods of payment: 
We accept only bank deposits. As soon as you make an order, an order number will appear on the screen with the rest of your registration info and total sum to be paid. After you make the order you have 24 hours to make the payment and send the receipt (can be a photo, scanned or digital receipt for financial@...). Remember that a few cents will be added to the sum to better track the deposit. The client will then receive an email confirmation. We can’t guarantee product availability before the money is in the bank account. 
2 Delivery time: 
After the payment confirmation we expect a 2 hour delay for sending the information. When the payment is accounted for by our financial sector, the client will receive confirmation via email. Our objective is for your order to be delivered ASAP. Plan your shopping and choose the best delivery method according to your needs. 
3 Information exchange: 
Offering the best service to our clients with total guarantee is the most important objective for us. We want you to have the best shopping experience possible, so we accept exchange or your money back with no cost. 
Buttons: “Agree” / “Disagree”.
R S A MO N T H LY F R A U D R E P O R T page 3 
––Order code 
––Name 
––Email 
––Package: Gold 
––Quantity: 10 units 
––Payment method: Deposit 
––Total value: R$ 700,15 (Real) 
Send order 
Your order was successfully sent! 
––Check your email for deposit info. 
–– After the deposit, you’ll receive a payment confirmation in the CONFIRMATION menu 
ANALYSIS OF THE MOBILE APP 
A deeper look into the Android application shows that it has potential to be used as malware. Upon launching, the app requests a large number of permissions from the user, similar to permissions commonly seen in malicious mobile malware. Some of the permissions requested include: 
––Read and write in Calendar and Contacts 
––Access your location (GPS and network) 
––Call numbers 
––Read and write to protected and to external storage 
––Access to your camera and microphone 
––Access to the device ID and phone status 
After performing reverse engineering and static code analysis on the application, RSA agents discovered code that could indicate its use as malware. The app has the ability to download and install new applications and functions (such as reading SMS, reading SD cards, etc.). This means the application can update itself later, installing additional applications that can make use of any of the above permissions.
R S A MO N T H LY F R A U D R E P O R T page 4 
Additional features revealed in analysis of the application: 
–– Upon opening the application, it spams the user with two different advertisement banners. 
–– The app has access to the external storage, so it can store and install new applications in the external memory space. 
–– The app employs anti-SDK methods by reading the Android OS Specs to verify if it is running on a mobile device or on a virtual machine (laboratory testing environment). 
–– The app reads the country code and network operator code from the SIM card. 
–– Upon installation, the app attempts to access the SMS Service and read SMS messages. 
It is important to note that the CC store application source code is not featured in the Android binary that was originally downloaded to the device. Instead, the application updates itself as follows: 
–– When the application is launched, it downloads the necessary library from the fraudster’s server. The library contains the source code providing the functions needed to make the CC store accessible via the user device. 
–– The fraudster can change the source code from his side at any time, so that the user application can download a new version and use it without the need to be updated. 
–– In some cases, the library is not downloaded, even though internet access is available. This may be due to the app performing an anti-SDK check and only downloading the library if it verifies that it is not running on a virtual machine. 
CONCLUSION 
This is the one of the first malicious apps developed by Brazilians for mobile. The different permission requests upon launching may be a sign that the app is also used as malware. Ironically, since cybercriminals are the ones who will use this app to buy CC credentials, they may also become” ripped” by the developers of the app as well.
R S A MO N T H LY F R A U D R E P O R T page 5 
Phishing Attacks per Month 
RSA identified 42,571 phishing attacks in 
July, marking a 25% increase from June. 
Based on this figure, RSA estimates 
phishing cost global organizations $362 
million in losses in July. 
US Bank Types Attacked 
U.S. regional banks have consistently been 
hit with 30 – 35% of phishing volume over 
the last few months, targeted by about one 
out of every three attacks. 
Top Countries by Attack Volume 
The U.S. remained the most targeted 
country in July with 63% of phishing 
volume. China, the Netherlands, the UK 
and France were collectively targeted by 
20% of total attacks. 
42,571 
Attacks 
Credit Unions 
Regional 
National 
63% 
6% 
5% 
4% 
Netherlands 
UK 
China 
U.S. 
AUGUST 2014 
Source: RSA Anti-Fraud Command Center
R S A MO N T H LY F R A U D R E P O R T page 6 
Top Countries by Attacked Brands 
Brands in the U.S., UK, Canada, and India 
were targeted by half of all phishing 
attacks in July. 
Top Hosting Countries 
There was a surprising spike of hosted 
phishing attacks in Hong Kong in July at 
13%, while the U.S. continued to remain 
the top hosting country at 36%, despite a 
7% decline from June. 
Mobile Transactions and Fraud (Q2 ’14) 
In Q2, 33% of banking transactions 
originated in the mobile channel. This 
marks a 20% increase in mobile traffic 
from 2013, and a 67% increase from 
2012. Among total transactions, one out 
every four identified fraud transactions 
was initiated from a mobile device. 
11% 
U.S. 
UK 
29% 
13% 6% 5% 
36% 
GLOBAL PHISHING LOSSES 
JULY 2014 
2% 
33% 
25% 
$ $ $ $ $ 
$ $ $ $ $ 
$ $ $ $ $ 
$ $ $ $ $ 
$ $ $ $ $ 
$ $ $ $ $ 
$ $ $ 
33%
www.emc.com/rsa 
CONTACT US 
To learn more about how RSA products, services, and solutions help solve your 
business and IT challenges contact your local representative or authorized reseller – 
or visit us at www.emc.com/rsa 
©2014 EMC Corporation. EMC, RSA, the RSA logo, and FraudAction are trademarks or registered trademarks of EMC 
Corporation in the U.S. and/or other countries. All other trademarks mentioned are the property of their respective 
holders. AUG RPT 0814

Más contenido relacionado

La actualidad más candente

Rise of cyber security v0.1
Rise of cyber security v0.1Rise of cyber security v0.1
Rise of cyber security v0.1Sohail Gohir
 
Mobile Banking and Lurking Security Threats for 2022
Mobile Banking and Lurking Security Threats for 2022Mobile Banking and Lurking Security Threats for 2022
Mobile Banking and Lurking Security Threats for 2022Wultra
 
Wultra: Mobile Application Security
Wultra: Mobile Application SecurityWultra: Mobile Application Security
Wultra: Mobile Application SecurityWultra
 
Recent Trends in Corporate Restructuring
Recent Trends in Corporate RestructuringRecent Trends in Corporate Restructuring
Recent Trends in Corporate Restructuringsandesh mundra
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial CrimesRaj Goel
 
New Malicious Attacks on Mobile Banking Applications
New Malicious Attacks on Mobile Banking ApplicationsNew Malicious Attacks on Mobile Banking Applications
New Malicious Attacks on Mobile Banking ApplicationsDR.P.S.JAGADEESH KUMAR
 
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsWeak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsOilPriceInformationService
 
Cybercriminals target online banking
Cybercriminals target online bankingCybercriminals target online banking
Cybercriminals target online bankingScientia Groups
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactionsAlireza Ghahrood
 
Symantec Website Security Threat Report
Symantec Website Security Threat ReportSymantec Website Security Threat Report
Symantec Website Security Threat Reportcheinyeanlim
 
Cscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theftCscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theftAlireza Ghahrood
 
COncept of Phishing
COncept of PhishingCOncept of Phishing
COncept of PhishingRahul Singh
 
08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sectorChristos Laganas
 
Risk base approach for security management fujitsu-fms event 15 aug 2011
Risk base approach for security management   fujitsu-fms event 15 aug 2011Risk base approach for security management   fujitsu-fms event 15 aug 2011
Risk base approach for security management fujitsu-fms event 15 aug 2011IbuSrikandi
 
08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sectorinnov-acts-ltd
 

La actualidad más candente (20)

2020 cyber threat forcast.
2020 cyber threat forcast.2020 cyber threat forcast.
2020 cyber threat forcast.
 
Rise of cyber security v0.1
Rise of cyber security v0.1Rise of cyber security v0.1
Rise of cyber security v0.1
 
Mobile Banking and Lurking Security Threats for 2022
Mobile Banking and Lurking Security Threats for 2022Mobile Banking and Lurking Security Threats for 2022
Mobile Banking and Lurking Security Threats for 2022
 
Wultra: Mobile Application Security
Wultra: Mobile Application SecurityWultra: Mobile Application Security
Wultra: Mobile Application Security
 
Ransomware-as-a-Service: The business of distributing cyber attacks
Ransomware-as-a-Service: The business of distributing cyber attacksRansomware-as-a-Service: The business of distributing cyber attacks
Ransomware-as-a-Service: The business of distributing cyber attacks
 
Recent Trends in Corporate Restructuring
Recent Trends in Corporate RestructuringRecent Trends in Corporate Restructuring
Recent Trends in Corporate Restructuring
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
 
New Malicious Attacks on Mobile Banking Applications
New Malicious Attacks on Mobile Banking ApplicationsNew Malicious Attacks on Mobile Banking Applications
New Malicious Attacks on Mobile Banking Applications
 
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsWeak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
 
Insecure mag-33
Insecure mag-33Insecure mag-33
Insecure mag-33
 
Cybercriminals target online banking
Cybercriminals target online bankingCybercriminals target online banking
Cybercriminals target online banking
 
Databreach forecast
Databreach forecastDatabreach forecast
Databreach forecast
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactions
 
Symantec Website Security Threat Report
Symantec Website Security Threat ReportSymantec Website Security Threat Report
Symantec Website Security Threat Report
 
Cscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theftCscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theft
 
COncept of Phishing
COncept of PhishingCOncept of Phishing
COncept of Phishing
 
08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector
 
Risk base approach for security management fujitsu-fms event 15 aug 2011
Risk base approach for security management   fujitsu-fms event 15 aug 2011Risk base approach for security management   fujitsu-fms event 15 aug 2011
Risk base approach for security management fujitsu-fms event 15 aug 2011
 
08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector
 
Digital ad fraud superheroes the good guys by augustine fou
Digital ad fraud superheroes the good guys by augustine fouDigital ad fraud superheroes the good guys by augustine fou
Digital ad fraud superheroes the good guys by augustine fou
 

Destacado

RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014EMC
 
Black history from another angle
Black history from another angleBlack history from another angle
Black history from another anglejanetcheathambell
 
GARUDA Youth Community Newsletter Agustus 2011
GARUDA Youth Community Newsletter Agustus 2011GARUDA Youth Community Newsletter Agustus 2011
GARUDA Youth Community Newsletter Agustus 2011Garuda Youth Community
 
Full-time Prospectus 2012/13
Full-time Prospectus 2012/13Full-time Prospectus 2012/13
Full-time Prospectus 2012/13HelenTY
 
Japan russio japanese war
Japan russio japanese warJapan russio japanese war
Japan russio japanese warTravis Klein
 
Swipp Plus Quick Start Guide
Swipp Plus Quick Start GuideSwipp Plus Quick Start Guide
Swipp Plus Quick Start GuideSwipp
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorEMC
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...EMC
 
The EMC Isilon Scale-Out Data Lake
The EMC Isilon Scale-Out Data LakeThe EMC Isilon Scale-Out Data Lake
The EMC Isilon Scale-Out Data LakeEMC
 
How Does Long-term Care Insurance Work?
How Does Long-term Care Insurance Work?How Does Long-term Care Insurance Work?
How Does Long-term Care Insurance Work?Laurel Blond
 
Cardiac procedures
Cardiac proceduresCardiac procedures
Cardiac proceduresstaceyhunt
 
Insaat kursu-diyarbakir
Insaat kursu-diyarbakirInsaat kursu-diyarbakir
Insaat kursu-diyarbakirsersld54
 
Highlights from the EMC & VMware CIO Summit
Highlights from the EMC & VMware CIO SummitHighlights from the EMC & VMware CIO Summit
Highlights from the EMC & VMware CIO SummitEMC
 

Destacado (20)

RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
 
Black history from another angle
Black history from another angleBlack history from another angle
Black history from another angle
 
GARUDA Youth Community Newsletter Agustus 2011
GARUDA Youth Community Newsletter Agustus 2011GARUDA Youth Community Newsletter Agustus 2011
GARUDA Youth Community Newsletter Agustus 2011
 
Full-time Prospectus 2012/13
Full-time Prospectus 2012/13Full-time Prospectus 2012/13
Full-time Prospectus 2012/13
 
Amy kearney martin luther king
Amy kearney martin luther kingAmy kearney martin luther king
Amy kearney martin luther king
 
Hotel1
Hotel1Hotel1
Hotel1
 
Japan russio japanese war
Japan russio japanese warJapan russio japanese war
Japan russio japanese war
 
Swipp Plus Quick Start Guide
Swipp Plus Quick Start GuideSwipp Plus Quick Start Guide
Swipp Plus Quick Start Guide
 
Day 3 mon world
Day 3 mon worldDay 3 mon world
Day 3 mon world
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website Behavior
 
Gedeelddoor pime
Gedeelddoor pimeGedeelddoor pime
Gedeelddoor pime
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
 
The EMC Isilon Scale-Out Data Lake
The EMC Isilon Scale-Out Data LakeThe EMC Isilon Scale-Out Data Lake
The EMC Isilon Scale-Out Data Lake
 
How Does Long-term Care Insurance Work?
How Does Long-term Care Insurance Work?How Does Long-term Care Insurance Work?
How Does Long-term Care Insurance Work?
 
Confer
ConferConfer
Confer
 
Cardiac procedures
Cardiac proceduresCardiac procedures
Cardiac procedures
 
2015 day 9
2015 day 92015 day 9
2015 day 9
 
Xachqar1
Xachqar1Xachqar1
Xachqar1
 
Insaat kursu-diyarbakir
Insaat kursu-diyarbakirInsaat kursu-diyarbakir
Insaat kursu-diyarbakir
 
Highlights from the EMC & VMware CIO Summit
Highlights from the EMC & VMware CIO SummitHighlights from the EMC & VMware CIO Summit
Highlights from the EMC & VMware CIO Summit
 

Similar a RSA Online Fraud Report - August 2014

The Current State of Cybercrime 2014
The Current State of Cybercrime 2014The Current State of Cybercrime 2014
The Current State of Cybercrime 2014EMC
 
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...Denis Gorchakov
 
Android mobile platform security and malware survey
Android mobile platform security and malware surveyAndroid mobile platform security and malware survey
Android mobile platform security and malware surveyeSAT Journals
 
Past paper of e-commerce 2018-2017-2015
Past paper of e-commerce 2018-2017-2015Past paper of e-commerce 2018-2017-2015
Past paper of e-commerce 2018-2017-2015SaithYasir
 
CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문Jiransoft Korea
 
Symantec Intelligence Report August 2013
Symantec Intelligence Report August 2013Symantec Intelligence Report August 2013
Symantec Intelligence Report August 2013Kenn Peterson
 
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperHarsimran Walia
 
2012 nq mobile_security_report
2012 nq mobile_security_report2012 nq mobile_security_report
2012 nq mobile_security_reportIsnur Rochmad
 
The Future of Digital Payment Apps_ Trends and Predictions.pdf
The Future of Digital Payment Apps_ Trends and Predictions.pdfThe Future of Digital Payment Apps_ Trends and Predictions.pdf
The Future of Digital Payment Apps_ Trends and Predictions.pdfSafeDeposit
 
The Digital Insurer Award - Hanover Re (cyber)
The Digital Insurer Award - Hanover Re (cyber)The Digital Insurer Award - Hanover Re (cyber)
The Digital Insurer Award - Hanover Re (cyber)The Digital Insurer
 
INTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSISINTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSISRAHUL KUMAR
 
Payment Week - Andrew Barnes, Managing Director___Gemalto
Payment Week - Andrew Barnes, Managing Director___GemaltoPayment Week - Andrew Barnes, Managing Director___Gemalto
Payment Week - Andrew Barnes, Managing Director___GemaltoAndrew Barnes
 
INSECURE Magazine - 33
INSECURE Magazine - 33INSECURE Magazine - 33
INSECURE Magazine - 33Felipe Prado
 
Distribute Your Android App or Game In China | AppInChina
Distribute Your Android App or Game In China | AppInChinaDistribute Your Android App or Game In China | AppInChina
Distribute Your Android App or Game In China | AppInChinaTodd Kuhns
 
Humming bad research-report-final-62916
Humming bad research-report-final-62916Humming bad research-report-final-62916
Humming bad research-report-final-62916Andrey Apuhtin
 
Lunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesLunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesTransUnion
 
How to integrate payment gateway in your android or i os application
How to integrate payment gateway in your android or i os applicationHow to integrate payment gateway in your android or i os application
How to integrate payment gateway in your android or i os applicationJane Brewer
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon Berlin
 

Similar a RSA Online Fraud Report - August 2014 (20)

The Current State of Cybercrime 2014
The Current State of Cybercrime 2014The Current State of Cybercrime 2014
The Current State of Cybercrime 2014
 
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
 
Android mobile platform security and malware survey
Android mobile platform security and malware surveyAndroid mobile platform security and malware survey
Android mobile platform security and malware survey
 
Past paper of e-commerce 2018-2017-2015
Past paper of e-commerce 2018-2017-2015Past paper of e-commerce 2018-2017-2015
Past paper of e-commerce 2018-2017-2015
 
CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문
 
B intelligence report-08-2013.en-us
B intelligence report-08-2013.en-usB intelligence report-08-2013.en-us
B intelligence report-08-2013.en-us
 
Symantec Intelligence Report August 2013
Symantec Intelligence Report August 2013Symantec Intelligence Report August 2013
Symantec Intelligence Report August 2013
 
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaper
 
HinDroid
HinDroidHinDroid
HinDroid
 
2012 nq mobile_security_report
2012 nq mobile_security_report2012 nq mobile_security_report
2012 nq mobile_security_report
 
The Future of Digital Payment Apps_ Trends and Predictions.pdf
The Future of Digital Payment Apps_ Trends and Predictions.pdfThe Future of Digital Payment Apps_ Trends and Predictions.pdf
The Future of Digital Payment Apps_ Trends and Predictions.pdf
 
The Digital Insurer Award - Hanover Re (cyber)
The Digital Insurer Award - Hanover Re (cyber)The Digital Insurer Award - Hanover Re (cyber)
The Digital Insurer Award - Hanover Re (cyber)
 
INTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSISINTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSIS
 
Payment Week - Andrew Barnes, Managing Director___Gemalto
Payment Week - Andrew Barnes, Managing Director___GemaltoPayment Week - Andrew Barnes, Managing Director___Gemalto
Payment Week - Andrew Barnes, Managing Director___Gemalto
 
INSECURE Magazine - 33
INSECURE Magazine - 33INSECURE Magazine - 33
INSECURE Magazine - 33
 
Distribute Your Android App or Game In China | AppInChina
Distribute Your Android App or Game In China | AppInChinaDistribute Your Android App or Game In China | AppInChina
Distribute Your Android App or Game In China | AppInChina
 
Humming bad research-report-final-62916
Humming bad research-report-final-62916Humming bad research-report-final-62916
Humming bad research-report-final-62916
 
Lunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesLunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial Services
 
How to integrate payment gateway in your android or i os application
How to integrate payment gateway in your android or i os applicationHow to integrate payment gateway in your android or i os application
How to integrate payment gateway in your android or i os application
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicro
 

Más de EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 

Más de EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Último

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Último (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

RSA Online Fraud Report - August 2014

  • 1. R S A MO N T H LY F R A U D R E P O R T page 1 F R A U D R E P O RT CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP August 2014 RSA agents recently traced a threat actor advertising a mobile credit card store application. The cybercriminal shared the information on his Facebook page, including methods for using the app and links for downloading it. Besides the obvious purpose of selling compromised credentials, launching the application on a mobile device also prompts requests for user permissions, which can give the application the kind of control over the device that is usually associated with malicious malware applications. RSA’s open source investigation revealed a cybercriminal openly advertising a CC store (Figure 1) designed as a mobile phone application for Android and iPhone devices (a translation follows below). “Good evening everybody! Today I’ll show a project that I’ve been developing for some while... it’s an automated credit card shop application that runs on Android and iOS, using my web credit card store as database. Remember that I’m the first Brazilian programmer to develop a mobile application that sells credit cards. My clients are increasing day by day and I hope that this new system helps them on their shopping. The Android application is already nearly done and the iOS one is 60% done (tested on Galaxy S5 and iPhone 5S, if it doesn’t work on your mobile, send me a message with your model and I’ll check!). This message is already long so I won’t be giving any more details. Below there’s the link for my website to download the app and its link on Google Play! Don’t forget to install it on your Android, and next week I hope that iOS will get it too!”
  • 2. R S A MO N T H LY F R A U D R E P O R T page 2 AVAILABLE IN THE OPEN MARKET The application was made available as a free download on Google Play. The cybercriminal provided the following instructions for using the app: ––Order a batch of CC credentials ––Enter personal info ––App will send banking info in order to make a deposit ––Wait 24 hours to make a transaction ––Take photo of the transaction deposit slip for proof, and send it to fraudster ––Receive CC credentials in return mail In the CC shop website shared by the fraudster, there is a link that automatically starts downloading the application (Figure 2). By clicking on the Android link, an Android binary (APK) is downloaded, but the iPhone link displays a message advising the user to wait for a week. A sample of screenshots from the app, with relevant translations, can be found below. 1 Methods of payment: We accept only bank deposits. As soon as you make an order, an order number will appear on the screen with the rest of your registration info and total sum to be paid. After you make the order you have 24 hours to make the payment and send the receipt (can be a photo, scanned or digital receipt for financial@...). Remember that a few cents will be added to the sum to better track the deposit. The client will then receive an email confirmation. We can’t guarantee product availability before the money is in the bank account. 2 Delivery time: After the payment confirmation we expect a 2 hour delay for sending the information. When the payment is accounted for by our financial sector, the client will receive confirmation via email. Our objective is for your order to be delivered ASAP. Plan your shopping and choose the best delivery method according to your needs. 3 Information exchange: Offering the best service to our clients with total guarantee is the most important objective for us. We want you to have the best shopping experience possible, so we accept exchange or your money back with no cost. Buttons: “Agree” / “Disagree”.
  • 3. R S A MO N T H LY F R A U D R E P O R T page 3 ––Order code ––Name ––Email ––Package: Gold ––Quantity: 10 units ––Payment method: Deposit ––Total value: R$ 700,15 (Real) Send order Your order was successfully sent! ––Check your email for deposit info. –– After the deposit, you’ll receive a payment confirmation in the CONFIRMATION menu ANALYSIS OF THE MOBILE APP A deeper look into the Android application shows that it has potential to be used as malware. Upon launching, the app requests a large number of permissions from the user, similar to permissions commonly seen in malicious mobile malware. Some of the permissions requested include: ––Read and write in Calendar and Contacts ––Access your location (GPS and network) ––Call numbers ––Read and write to protected and to external storage ––Access to your camera and microphone ––Access to the device ID and phone status After performing reverse engineering and static code analysis on the application, RSA agents discovered code that could indicate its use as malware. The app has the ability to download and install new applications and functions (such as reading SMS, reading SD cards, etc.). This means the application can update itself later, installing additional applications that can make use of any of the above permissions.
  • 4. R S A MO N T H LY F R A U D R E P O R T page 4 Additional features revealed in analysis of the application: –– Upon opening the application, it spams the user with two different advertisement banners. –– The app has access to the external storage, so it can store and install new applications in the external memory space. –– The app employs anti-SDK methods by reading the Android OS Specs to verify if it is running on a mobile device or on a virtual machine (laboratory testing environment). –– The app reads the country code and network operator code from the SIM card. –– Upon installation, the app attempts to access the SMS Service and read SMS messages. It is important to note that the CC store application source code is not featured in the Android binary that was originally downloaded to the device. Instead, the application updates itself as follows: –– When the application is launched, it downloads the necessary library from the fraudster’s server. The library contains the source code providing the functions needed to make the CC store accessible via the user device. –– The fraudster can change the source code from his side at any time, so that the user application can download a new version and use it without the need to be updated. –– In some cases, the library is not downloaded, even though internet access is available. This may be due to the app performing an anti-SDK check and only downloading the library if it verifies that it is not running on a virtual machine. CONCLUSION This is the one of the first malicious apps developed by Brazilians for mobile. The different permission requests upon launching may be a sign that the app is also used as malware. Ironically, since cybercriminals are the ones who will use this app to buy CC credentials, they may also become” ripped” by the developers of the app as well.
  • 5. R S A MO N T H LY F R A U D R E P O R T page 5 Phishing Attacks per Month RSA identified 42,571 phishing attacks in July, marking a 25% increase from June. Based on this figure, RSA estimates phishing cost global organizations $362 million in losses in July. US Bank Types Attacked U.S. regional banks have consistently been hit with 30 – 35% of phishing volume over the last few months, targeted by about one out of every three attacks. Top Countries by Attack Volume The U.S. remained the most targeted country in July with 63% of phishing volume. China, the Netherlands, the UK and France were collectively targeted by 20% of total attacks. 42,571 Attacks Credit Unions Regional National 63% 6% 5% 4% Netherlands UK China U.S. AUGUST 2014 Source: RSA Anti-Fraud Command Center
  • 6. R S A MO N T H LY F R A U D R E P O R T page 6 Top Countries by Attacked Brands Brands in the U.S., UK, Canada, and India were targeted by half of all phishing attacks in July. Top Hosting Countries There was a surprising spike of hosted phishing attacks in Hong Kong in July at 13%, while the U.S. continued to remain the top hosting country at 36%, despite a 7% decline from June. Mobile Transactions and Fraud (Q2 ’14) In Q2, 33% of banking transactions originated in the mobile channel. This marks a 20% increase in mobile traffic from 2013, and a 67% increase from 2012. Among total transactions, one out every four identified fraud transactions was initiated from a mobile device. 11% U.S. UK 29% 13% 6% 5% 36% GLOBAL PHISHING LOSSES JULY 2014 2% 33% 25% $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ 33%
  • 7. www.emc.com/rsa CONTACT US To learn more about how RSA products, services, and solutions help solve your business and IT challenges contact your local representative or authorized reseller – or visit us at www.emc.com/rsa ©2014 EMC Corporation. EMC, RSA, the RSA logo, and FraudAction are trademarks or registered trademarks of EMC Corporation in the U.S. and/or other countries. All other trademarks mentioned are the property of their respective holders. AUG RPT 0814