SlideShare una empresa de Scribd logo
1 de 14
Financial Options for Cyber Criminals
Kimberly Zenz
VeriSign iDefense
kzenz@verisign.com
“A Significant Amount of Money”
2
Stealing Money Isn’t Enough
3

• You have to be able to use it too
• Cyber criminals can take steps to be less public
• E.g. Diffuse services, less commercial criminal software offerings

• But all cyber criminals must at some point convert their criminal
gains into money that they can use. i.e. that is integrated with the
global financial system
• Money laundering a particular concern for cyber criminals because it
ties into larger anti-crime, anti-terrorism and political efforts
• Receives more official and private sector resources than purely anticyber crime efforts
• Laws and cooperation mechanisms older, more established, simpler
and less time sensitive than ant cyber crime efforts
• Private and public sectors older, more established, than anti cybercrime

• Transactions can be traced
• Assuming that officials are sufficiently motivated

• People talk
What is a Poor Cyber
Criminal to Do?

4
Electronic Currencies
5

• Popular choice for a reason
• Some have a history of offering clients anonymity
• Or at least not asking too hard for true proof of identity

• Third-party and personal exchanges also help provide anonymity
• Quick, online, (mostly) separate from the formal financial system
• Relatively easy to establish

• Limited truly reliable and secure options
• Vulnerable to betrayals, LEO, internal failures
Liberty Reserve
6

•

Leader until takedown
•

•

US DOJ: A money laundering case, not a cyber crime case
•
•
•

•

High profile customers, including 45 million USD Unlimited Operations ATM scammers

More than 6 billion USD laundered through 55 million transactions
25 million USD and 45 bank accounts seized
More effectively frozen - customers able to appeal for access to their accounts –
not too many forthcoming

Costa Rican base not sufficient legal protection
•
•

Leader Arthur Budovsky arrested in Spain, others arrested in US and Costa Rica
US DOJ could pursue the case
• 200,000 US users
• Presence of Liberty Reserve members Vladimir Katz (co-founder) and Mark Marmilev
(helped design technical infrastructure) in the Untied States
• Presence of infrastructure in US
• Transfer of funds through US financial institutions
•

•

Iran has this problem too

International anti-money laundering cooperation relatively straightforward
• 45+ domestic and foreign searches & seizures, 36 MLAT requests in 15 countries
• LEO Cooperation in: US, Costa Rica, Russia, China, Latvia, Cyrus, Hong
Kong, Norway, Sweden, Australia, Cyprus, Latvia, Switzerland, Luxembourg, Morocco,
Spain, Netherlands, United Kingdom, Norway, Canada, US, Costa Rica
Alternatives to Liberty Reserve
7

•

Perfect Money
•
•
•

Increase in use following LR takedown
In business since at least 2007
Claimed to be in Panama
• January 2013: Panamanian government stated that Perfect Money has no offices or
licenses in the country

•

Now provides a Hong Kong address
• Shared by many other businesses

•

But… Security press anointed Perfect Money as the Successor to Liberty
Reserve
•
•

Also successor to legal attention?
Announced the US citizen could not participate following LR takedown
• Difficult to police, infrastructure even harder

•

Turned away some visibly criminal customers
Further Electronic Currency Options
8

• WebMoney
• Founded in 1998, previously the front runner
• Claims 14 million users
• Strong global footprint, expanding
• Began in CIS, Latin America and Pacific Asia (not to USA)

• Traditionally popular among cyber criminals
• Use by legitimate small and medium sized businesses protected
WMZ from regulation efforts
• Now large legitimate presence encourages law enforcement
cooperation, especially in Russia
• May still be possible to “fly under the radar”

• Other electronic options of varying trustworthiness
• Payza/AlertPay, EgoPay, LiqPay, Paxum, PayWeb, SolidTrustP
ay, ePayments, Yandex.Dengi, RedPass, etc.
BitCoin: An Acceptable Option?
9

•
•

Volatile – speculation an issue
Mining losing utility
•
•

•
•

Handy for cyber criminals who can use botnets (like ZeroAccess)
As the rate of block generation (unencrypting a BitCoin) increases, difficulty rises – reaching maximum total
utility

BitCoin seems attractive because it is “anonymous”
But is BitCoin Anonymous?
•
•
•
•

Not big enough to hide truly large transactions
Transactions can be tracked in each BitCoin
Multiple BitCoin transaction chains combined and transformed into international currency
through exchanges
Exchanges can and will operate with authorities – US ahead of the BitCoin game
•
•
•

•

Mt. Gox account at Wells Fargo seized over paperwork, DHS prohibits Dwolla to exchange BitCoins
(total five million USD accounts)
IRS subpoenaed 24 exchanges. GOA office report on money laundering risks, US Treasury unit
Financial Crimes Enforcement Network (FinCEN) has BitCoin rules, IRS to follow
LEO (especially the FBI more aggressive about anonymity in general, e.g. Tor CP arrests and Silk
Road closure (which included the seizure of 3.6 million USD in BitCoins)

Other crypto currencies insufficiently popular, e.g. Litecoin, Namecoin, PPCoin, even
Ripple
•

May be scams themselves
Credit Cards
10

• Cash onto Credit Cards: Possible
• Prepaid debit and credit cards are available
• Some limitations
• Depend on the exchanges
• Limited totals
• Daily Withdrawal Limit – 1000 USD
• Maximum Daily Balance – 10K USD
• Total Loading Limit/Month – 20K USD

• Cash from Credit Cards: More difficult (but still possible)
• Credit card companies and acquiring banks increasingly picky
• Will cut off processors if caught violating TOS
• Copyright particularly valuable tool – instant TOS violation
• Copyrighted software sales, pharma particularly affected

• Small shift to prepaid payment cards for accepting fraudulent payments
a la rogue AV and ransomware
• E.g. Green Dot MoneyPak, can be purchased at major retailers such as
Wal-Mart, CVS, Walgreens, Kmart, etc.
Credit Cards (and other Money Mule Options)
11

• Prepaid credit cards and certificates also a growing alternative to
money mules
• Not just in accepting payments, also in sending money or goods for
resale
• Western Union et. al. are watching
• Human mules problematic
• Difficult to recruit enough – constant efforts required (or high payments to
services who must engage in constant efforts)
• Relatively easy to identify, arrest (especially if they must appear in person or
accept delivery at their actual address)
• Some mules will rob the thieves
• Brian Krebs: “mules are dumb,” make mistakes
• Big mules = big attention, e.g. General Valeriu Gaichuk in Romania

• Old methods still in use though
•

•

Can still use CCs to purchase goods, ship them near home country (in the case
of Eastern Europe, sometimes via a EU country such as Poland near the
Ukrainian border), sell them for cash
Can still use human mules for that matter
So… Is There Any Hope of
Getting Away With It?

12
Keeping Dishonest Money
13

• Money laundering already was an LEO priority, and cyber crime is a
growing one
• Each LEO success increases capacity for and interest in the next

• The dominance of the United States in the international financial
system helps make it a dominant, and potentially
unavoidable, player in anti money-laundering efforts
• Avoiding US victims and customers is not enough to avoid US attention

• So, really, what is a cyber criminal to do?
• Stay under the radar, it’s still a numbers game
• LEOs are better able to target money laundering than cyber crime, but are
still constrained by capacity issues and the need to prioritize
• So many “ we gave it to LE” stories

• The noticeable and stationary get targeted – just ask LR, Mt. Gox, Silk
Road, Gozi, Citadel, Carberp, etcetera
• The more automation, the better
• Risk still higher
Thank You

© 2012 VeriSign, Inc. All rights reserved. Verisign, the Verisign logo, iDefense and other trademarks, service
marks, and designs are registered or unregistered trademarks of VeriSign, Inc. and its subsidiaries in the
United States and in foreign countries. All trademarks are properties of their respective owners. All materials
are intended for iDefense customers and personnel only. The reproduction and distribution of this material is
forbidden without express written permission from iDefense. The opinions, statements, and assessments in
this report are solely those of the individual author(s) and do not constitute legal advice, nor do they
necessarily reflect the views of VeriSign, Inc., its subsidiaries, or affiliates.

Más contenido relacionado

La actualidad más candente

Five attributes that are fundamental to blockchains
Five attributes that are fundamental to blockchainsFive attributes that are fundamental to blockchains
Five attributes that are fundamental to blockchainsJose Pena
 
Blockchain Regulation in Washington State - and Beyond
Blockchain Regulation in Washington State - and BeyondBlockchain Regulation in Washington State - and Beyond
Blockchain Regulation in Washington State - and BeyondConor Bronsdon
 
Introduction to the World of Cryptocurrency (Summary)
Introduction to the World of Cryptocurrency (Summary)Introduction to the World of Cryptocurrency (Summary)
Introduction to the World of Cryptocurrency (Summary)Syeirabani Hatta
 
Crypto Currency Corporation
Crypto Currency CorporationCrypto Currency Corporation
Crypto Currency CorporationJoel Binn
 
A Beginner's Guide to Profiting from Cryptocurrencies
A Beginner's Guide to Profiting from CryptocurrenciesA Beginner's Guide to Profiting from Cryptocurrencies
A Beginner's Guide to Profiting from CryptocurrenciesNetflixTube
 
Stamford innovation week - blockchain day
Stamford innovation week - blockchain dayStamford innovation week - blockchain day
Stamford innovation week - blockchain dayPreston J. Byrne
 
Digital Cash and Monetary Freedom - Libertarian Alliance (Economic Notes 63)
Digital Cash and Monetary Freedom - Libertarian Alliance (Economic Notes 63)Digital Cash and Monetary Freedom - Libertarian Alliance (Economic Notes 63)
Digital Cash and Monetary Freedom - Libertarian Alliance (Economic Notes 63)Jon Matonis
 

La actualidad más candente (10)

Five attributes that are fundamental to blockchains
Five attributes that are fundamental to blockchainsFive attributes that are fundamental to blockchains
Five attributes that are fundamental to blockchains
 
An Introduction to Facebook's Libra
An Introduction to Facebook's LibraAn Introduction to Facebook's Libra
An Introduction to Facebook's Libra
 
Blockchain Regulation in Washington State - and Beyond
Blockchain Regulation in Washington State - and BeyondBlockchain Regulation in Washington State - and Beyond
Blockchain Regulation in Washington State - and Beyond
 
Introduction to the World of Cryptocurrency (Summary)
Introduction to the World of Cryptocurrency (Summary)Introduction to the World of Cryptocurrency (Summary)
Introduction to the World of Cryptocurrency (Summary)
 
Crypto Currency Corporation
Crypto Currency CorporationCrypto Currency Corporation
Crypto Currency Corporation
 
A Beginner's Guide to Profiting from Cryptocurrencies
A Beginner's Guide to Profiting from CryptocurrenciesA Beginner's Guide to Profiting from Cryptocurrencies
A Beginner's Guide to Profiting from Cryptocurrencies
 
Chiu paper
Chiu paperChiu paper
Chiu paper
 
Stamford innovation week - blockchain day
Stamford innovation week - blockchain dayStamford innovation week - blockchain day
Stamford innovation week - blockchain day
 
Digital cash final
Digital cash  finalDigital cash  final
Digital cash final
 
Digital Cash and Monetary Freedom - Libertarian Alliance (Economic Notes 63)
Digital Cash and Monetary Freedom - Libertarian Alliance (Economic Notes 63)Digital Cash and Monetary Freedom - Libertarian Alliance (Economic Notes 63)
Digital Cash and Monetary Freedom - Libertarian Alliance (Economic Notes 63)
 

Similar a Kimberly Zenz - Financial Options for Cyber Criminals #uisgcon9

Security and Crypto-currency: Forecasting the Future of Privacy for Private I...
Security and Crypto-currency: Forecasting the Future of Privacy for Private I...Security and Crypto-currency: Forecasting the Future of Privacy for Private I...
Security and Crypto-currency: Forecasting the Future of Privacy for Private I...Investments Network marcus evans
 
Digital currencies new technology new business model
Digital currencies new technology new business modelDigital currencies new technology new business model
Digital currencies new technology new business modelShiva Bissessar
 
Cryptocurrency & Regulatory Environment
Cryptocurrency & Regulatory EnvironmentCryptocurrency & Regulatory Environment
Cryptocurrency & Regulatory EnvironmentPriyab Satoshi
 
Ddos extortion campaigns
Ddos extortion campaignsDdos extortion campaigns
Ddos extortion campaignsRoel Palmaers
 
A primer on virtual currency
A primer on virtual currencyA primer on virtual currency
A primer on virtual currencyTannistho Ghosh
 
Regulating Cryptocurrency
Regulating CryptocurrencyRegulating Cryptocurrency
Regulating Cryptocurrencyorrenprunckun
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Preventionfmi_igf
 
The Future of Money - MIT MediaLab Class
The Future of Money - MIT MediaLab ClassThe Future of Money - MIT MediaLab Class
The Future of Money - MIT MediaLab ClassMeltem Demirors
 
Bitcoin presentation slides
Bitcoin presentation slidesBitcoin presentation slides
Bitcoin presentation slidesAhmad Asad
 
Cryptocurrencies and the Banking Sector
Cryptocurrencies and the Banking SectorCryptocurrencies and the Banking Sector
Cryptocurrencies and the Banking SectorIlan Alon
 
How to get Governments to Like Bitcoin (Without Ruining Bitcoin in the Process)
How to get Governments to Like Bitcoin (Without Ruining Bitcoin in the Process) How to get Governments to Like Bitcoin (Without Ruining Bitcoin in the Process)
How to get Governments to Like Bitcoin (Without Ruining Bitcoin in the Process) MecklerMedia
 
Blockchain Investment Potential
Blockchain Investment PotentialBlockchain Investment Potential
Blockchain Investment PotentialDima Starodubcev
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraudtomciolkosz
 

Similar a Kimberly Zenz - Financial Options for Cyber Criminals #uisgcon9 (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
 
Compliance Presentation.pptx
Compliance Presentation.pptxCompliance Presentation.pptx
Compliance Presentation.pptx
 
Security and Crypto-currency: Forecasting the Future of Privacy for Private I...
Security and Crypto-currency: Forecasting the Future of Privacy for Private I...Security and Crypto-currency: Forecasting the Future of Privacy for Private I...
Security and Crypto-currency: Forecasting the Future of Privacy for Private I...
 
Digital currencies new technology new business model
Digital currencies new technology new business modelDigital currencies new technology new business model
Digital currencies new technology new business model
 
Cryptocurrency & Regulatory Environment
Cryptocurrency & Regulatory EnvironmentCryptocurrency & Regulatory Environment
Cryptocurrency & Regulatory Environment
 
Ddos extortion campaigns
Ddos extortion campaignsDdos extortion campaigns
Ddos extortion campaigns
 
A primer on virtual currency
A primer on virtual currencyA primer on virtual currency
A primer on virtual currency
 
Regulating Cryptocurrency
Regulating CryptocurrencyRegulating Cryptocurrency
Regulating Cryptocurrency
 
Pls 780 week 9
Pls 780 week 9Pls 780 week 9
Pls 780 week 9
 
Digital Identity
Digital Identity Digital Identity
Digital Identity
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Prevention
 
The Future of Money - MIT MediaLab Class
The Future of Money - MIT MediaLab ClassThe Future of Money - MIT MediaLab Class
The Future of Money - MIT MediaLab Class
 
Bitcoin presentation slides
Bitcoin presentation slidesBitcoin presentation slides
Bitcoin presentation slides
 
Cryptocurrencies and the Banking Sector
Cryptocurrencies and the Banking SectorCryptocurrencies and the Banking Sector
Cryptocurrencies and the Banking Sector
 
How to get Governments to Like Bitcoin (Without Ruining Bitcoin in the Process)
How to get Governments to Like Bitcoin (Without Ruining Bitcoin in the Process) How to get Governments to Like Bitcoin (Without Ruining Bitcoin in the Process)
How to get Governments to Like Bitcoin (Without Ruining Bitcoin in the Process)
 
MoneyLaunderingCorruption
MoneyLaunderingCorruptionMoneyLaunderingCorruption
MoneyLaunderingCorruption
 
Skillwise AML
Skillwise AMLSkillwise AML
Skillwise AML
 
Blockchain Investment Potential
Blockchain Investment PotentialBlockchain Investment Potential
Blockchain Investment Potential
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraud
 

Más de UISGCON

Vladimir Kozak - Информационная безопасность и защита персональных данных в к...
Vladimir Kozak - Информационная безопасность и защита персональных данных в к...Vladimir Kozak - Информационная безопасность и защита персональных данных в к...
Vladimir Kozak - Информационная безопасность и защита персональных данных в к...UISGCON
 
Vladimir Bezmaly - Расследование инцидентов в ОС Windows #uisgcon9
Vladimir Bezmaly - Расследование инцидентов в ОС Windows #uisgcon9Vladimir Bezmaly - Расследование инцидентов в ОС Windows #uisgcon9
Vladimir Bezmaly - Расследование инцидентов в ОС Windows #uisgcon9UISGCON
 
Mikhail Kader - Можно ли обеспечить безопасность облачных вычислений? #uisgcon9
Mikhail Kader - Можно ли обеспечить безопасность облачных вычислений? #uisgcon9Mikhail Kader - Можно ли обеспечить безопасность облачных вычислений? #uisgcon9
Mikhail Kader - Можно ли обеспечить безопасность облачных вычислений? #uisgcon9UISGCON
 
Mikhail Emelyannikov - А Вы готовы обменять свою приватность на безопасность ...
Mikhail Emelyannikov - А Вы готовы обменять свою приватность на безопасность ...Mikhail Emelyannikov - А Вы готовы обменять свою приватность на безопасность ...
Mikhail Emelyannikov - А Вы готовы обменять свою приватность на безопасность ...UISGCON
 
Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9UISGCON
 
Dmitriy Ponomarev - Thinking outside the box #uisgcon9
Dmitriy Ponomarev - Thinking outside the box #uisgcon9Dmitriy Ponomarev - Thinking outside the box #uisgcon9
Dmitriy Ponomarev - Thinking outside the box #uisgcon9UISGCON
 
Alexander Dmitriev - Практика построения ключевых процессов менеджмента инфор...
Alexander Dmitriev - Практика построения ключевых процессов менеджмента инфор...Alexander Dmitriev - Практика построения ключевых процессов менеджмента инфор...
Alexander Dmitriev - Практика построения ключевых процессов менеджмента инфор...UISGCON
 
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9UISGCON
 
Alex Eden - Не доверяй и проверяй
Alex Eden - Не доверяй и проверяйAlex Eden - Не доверяй и проверяй
Alex Eden - Не доверяй и проверяйUISGCON
 
Владимир Гнинюк - Управление Риском: Почему не работает?
Владимир Гнинюк - Управление Риском: Почему не работает?Владимир Гнинюк - Управление Риском: Почему не работает?
Владимир Гнинюк - Управление Риском: Почему не работает?UISGCON
 
Владимир Илибман - Межсетевые экраны следующего поколения. Определение и мето...
Владимир Илибман - Межсетевые экраны следующего поколения. Определение и мето...Владимир Илибман - Межсетевые экраны следующего поколения. Определение и мето...
Владимир Илибман - Межсетевые экраны следующего поколения. Определение и мето...UISGCON
 
Брудский Кузьма Ефимович - Несанкционированный доступ к персональным данным: ...
Брудский Кузьма Ефимович - Несанкционированный доступ к персональным данным: ...Брудский Кузьма Ефимович - Несанкционированный доступ к персональным данным: ...
Брудский Кузьма Ефимович - Несанкционированный доступ к персональным данным: ...UISGCON
 
Безмалый Владимир Федорович - Сервисы репутации в информационной безопасности
Безмалый Владимир Федорович - Сервисы репутации в информационной безопасности Безмалый Владимир Федорович - Сервисы репутации в информационной безопасности
Безмалый Владимир Федорович - Сервисы репутации в информационной безопасности UISGCON
 
Медведев Вячеслав Владимирович - Беззащитность участников систем дистанционно...
Медведев Вячеслав Владимирович - Беззащитность участников систем дистанционно...Медведев Вячеслав Владимирович - Беззащитность участников систем дистанционно...
Медведев Вячеслав Владимирович - Беззащитность участников систем дистанционно...UISGCON
 
Александр Дмитриев - Практические аспекты внедрения системы менеджмента инфор...
Александр Дмитриев - Практические аспекты внедрения системы менеджмента инфор...Александр Дмитриев - Практические аспекты внедрения системы менеджмента инфор...
Александр Дмитриев - Практические аспекты внедрения системы менеджмента инфор...UISGCON
 
Дмитрий Петращук - Аутсорсинг системы мониторинга событий информационной безо...
Дмитрий Петращук - Аутсорсинг системы мониторинга событий информационной безо...Дмитрий Петращук - Аутсорсинг системы мониторинга событий информационной безо...
Дмитрий Петращук - Аутсорсинг системы мониторинга событий информационной безо...UISGCON
 
Алексей Лукацкий - Как сформировать правильную модель сетевых угроз
Алексей Лукацкий - Как сформировать правильную модель сетевых угроз Алексей Лукацкий - Как сформировать правильную модель сетевых угроз
Алексей Лукацкий - Как сформировать правильную модель сетевых угроз UISGCON
 
Владимир Ткаченко - Эффективная программа повышения осведомленности в вопроса...
Владимир Ткаченко - Эффективная программа повышения осведомленности в вопроса...Владимир Ткаченко - Эффективная программа повышения осведомленности в вопроса...
Владимир Ткаченко - Эффективная программа повышения осведомленности в вопроса...UISGCON
 
Владимир Стыран - Пентест следующего поколения, который ваша компания не може...
Владимир Стыран - Пентест следующего поколения, который ваша компания не може...Владимир Стыран - Пентест следующего поколения, который ваша компания не може...
Владимир Стыран - Пентест следующего поколения, который ваша компания не може...UISGCON
 
Константин Корсун - Общественная организация UISG: что это и для чего?
Константин Корсун - Общественная организация UISG: что это и для чего? Константин Корсун - Общественная организация UISG: что это и для чего?
Константин Корсун - Общественная организация UISG: что это и для чего? UISGCON
 

Más de UISGCON (20)

Vladimir Kozak - Информационная безопасность и защита персональных данных в к...
Vladimir Kozak - Информационная безопасность и защита персональных данных в к...Vladimir Kozak - Информационная безопасность и защита персональных данных в к...
Vladimir Kozak - Информационная безопасность и защита персональных данных в к...
 
Vladimir Bezmaly - Расследование инцидентов в ОС Windows #uisgcon9
Vladimir Bezmaly - Расследование инцидентов в ОС Windows #uisgcon9Vladimir Bezmaly - Расследование инцидентов в ОС Windows #uisgcon9
Vladimir Bezmaly - Расследование инцидентов в ОС Windows #uisgcon9
 
Mikhail Kader - Можно ли обеспечить безопасность облачных вычислений? #uisgcon9
Mikhail Kader - Можно ли обеспечить безопасность облачных вычислений? #uisgcon9Mikhail Kader - Можно ли обеспечить безопасность облачных вычислений? #uisgcon9
Mikhail Kader - Можно ли обеспечить безопасность облачных вычислений? #uisgcon9
 
Mikhail Emelyannikov - А Вы готовы обменять свою приватность на безопасность ...
Mikhail Emelyannikov - А Вы готовы обменять свою приватность на безопасность ...Mikhail Emelyannikov - А Вы готовы обменять свою приватность на безопасность ...
Mikhail Emelyannikov - А Вы готовы обменять свою приватность на безопасность ...
 
Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9
 
Dmitriy Ponomarev - Thinking outside the box #uisgcon9
Dmitriy Ponomarev - Thinking outside the box #uisgcon9Dmitriy Ponomarev - Thinking outside the box #uisgcon9
Dmitriy Ponomarev - Thinking outside the box #uisgcon9
 
Alexander Dmitriev - Практика построения ключевых процессов менеджмента инфор...
Alexander Dmitriev - Практика построения ключевых процессов менеджмента инфор...Alexander Dmitriev - Практика построения ключевых процессов менеджмента инфор...
Alexander Dmitriev - Практика построения ключевых процессов менеджмента инфор...
 
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
 
Alex Eden - Не доверяй и проверяй
Alex Eden - Не доверяй и проверяйAlex Eden - Не доверяй и проверяй
Alex Eden - Не доверяй и проверяй
 
Владимир Гнинюк - Управление Риском: Почему не работает?
Владимир Гнинюк - Управление Риском: Почему не работает?Владимир Гнинюк - Управление Риском: Почему не работает?
Владимир Гнинюк - Управление Риском: Почему не работает?
 
Владимир Илибман - Межсетевые экраны следующего поколения. Определение и мето...
Владимир Илибман - Межсетевые экраны следующего поколения. Определение и мето...Владимир Илибман - Межсетевые экраны следующего поколения. Определение и мето...
Владимир Илибман - Межсетевые экраны следующего поколения. Определение и мето...
 
Брудский Кузьма Ефимович - Несанкционированный доступ к персональным данным: ...
Брудский Кузьма Ефимович - Несанкционированный доступ к персональным данным: ...Брудский Кузьма Ефимович - Несанкционированный доступ к персональным данным: ...
Брудский Кузьма Ефимович - Несанкционированный доступ к персональным данным: ...
 
Безмалый Владимир Федорович - Сервисы репутации в информационной безопасности
Безмалый Владимир Федорович - Сервисы репутации в информационной безопасности Безмалый Владимир Федорович - Сервисы репутации в информационной безопасности
Безмалый Владимир Федорович - Сервисы репутации в информационной безопасности
 
Медведев Вячеслав Владимирович - Беззащитность участников систем дистанционно...
Медведев Вячеслав Владимирович - Беззащитность участников систем дистанционно...Медведев Вячеслав Владимирович - Беззащитность участников систем дистанционно...
Медведев Вячеслав Владимирович - Беззащитность участников систем дистанционно...
 
Александр Дмитриев - Практические аспекты внедрения системы менеджмента инфор...
Александр Дмитриев - Практические аспекты внедрения системы менеджмента инфор...Александр Дмитриев - Практические аспекты внедрения системы менеджмента инфор...
Александр Дмитриев - Практические аспекты внедрения системы менеджмента инфор...
 
Дмитрий Петращук - Аутсорсинг системы мониторинга событий информационной безо...
Дмитрий Петращук - Аутсорсинг системы мониторинга событий информационной безо...Дмитрий Петращук - Аутсорсинг системы мониторинга событий информационной безо...
Дмитрий Петращук - Аутсорсинг системы мониторинга событий информационной безо...
 
Алексей Лукацкий - Как сформировать правильную модель сетевых угроз
Алексей Лукацкий - Как сформировать правильную модель сетевых угроз Алексей Лукацкий - Как сформировать правильную модель сетевых угроз
Алексей Лукацкий - Как сформировать правильную модель сетевых угроз
 
Владимир Ткаченко - Эффективная программа повышения осведомленности в вопроса...
Владимир Ткаченко - Эффективная программа повышения осведомленности в вопроса...Владимир Ткаченко - Эффективная программа повышения осведомленности в вопроса...
Владимир Ткаченко - Эффективная программа повышения осведомленности в вопроса...
 
Владимир Стыран - Пентест следующего поколения, который ваша компания не може...
Владимир Стыран - Пентест следующего поколения, который ваша компания не може...Владимир Стыран - Пентест следующего поколения, который ваша компания не може...
Владимир Стыран - Пентест следующего поколения, который ваша компания не може...
 
Константин Корсун - Общественная организация UISG: что это и для чего?
Константин Корсун - Общественная организация UISG: что это и для чего? Константин Корсун - Общественная организация UISG: что это и для чего?
Константин Корсун - Общественная организация UISG: что это и для чего?
 

Último

The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfGale Pooley
 
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Andheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot ModelsAndheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot Modelshematsharma006
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdfFinTech Belgium
 
The Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfThe Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfGale Pooley
 
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...shivangimorya083
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spiritegoetzinger
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services  9892124323 | ₹,4500 With Room Free DeliveryMalad Call Girl in Services  9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free DeliveryPooja Nehwal
 
The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfGale Pooley
 
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Roomdivyansh0kumar0
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...ssifa0344
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfGale Pooley
 
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure serviceCall US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure servicePooja Nehwal
 
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130  Available With RoomVIP Kolkata Call Girl Serampore 👉 8250192130  Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Roomdivyansh0kumar0
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...ssifa0344
 
Quarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of MarketingQuarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of MarketingMaristelaRamos12
 

Último (20)

Veritas Interim Report 1 January–31 March 2024
Veritas Interim Report 1 January–31 March 2024Veritas Interim Report 1 January–31 March 2024
Veritas Interim Report 1 January–31 March 2024
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdf
 
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Andheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot ModelsAndheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot Models
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
 
The Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfThe Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdf
 
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spirit
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services  9892124323 | ₹,4500 With Room Free DeliveryMalad Call Girl in Services  9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
 
The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdf
 
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
 
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Room
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdf
 
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure serviceCall US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
 
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130  Available With RoomVIP Kolkata Call Girl Serampore 👉 8250192130  Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
 
Quarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of MarketingQuarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of Marketing
 

Kimberly Zenz - Financial Options for Cyber Criminals #uisgcon9

  • 1. Financial Options for Cyber Criminals Kimberly Zenz VeriSign iDefense kzenz@verisign.com
  • 2. “A Significant Amount of Money” 2
  • 3. Stealing Money Isn’t Enough 3 • You have to be able to use it too • Cyber criminals can take steps to be less public • E.g. Diffuse services, less commercial criminal software offerings • But all cyber criminals must at some point convert their criminal gains into money that they can use. i.e. that is integrated with the global financial system • Money laundering a particular concern for cyber criminals because it ties into larger anti-crime, anti-terrorism and political efforts • Receives more official and private sector resources than purely anticyber crime efforts • Laws and cooperation mechanisms older, more established, simpler and less time sensitive than ant cyber crime efforts • Private and public sectors older, more established, than anti cybercrime • Transactions can be traced • Assuming that officials are sufficiently motivated • People talk
  • 4. What is a Poor Cyber Criminal to Do? 4
  • 5. Electronic Currencies 5 • Popular choice for a reason • Some have a history of offering clients anonymity • Or at least not asking too hard for true proof of identity • Third-party and personal exchanges also help provide anonymity • Quick, online, (mostly) separate from the formal financial system • Relatively easy to establish • Limited truly reliable and secure options • Vulnerable to betrayals, LEO, internal failures
  • 6. Liberty Reserve 6 • Leader until takedown • • US DOJ: A money laundering case, not a cyber crime case • • • • High profile customers, including 45 million USD Unlimited Operations ATM scammers More than 6 billion USD laundered through 55 million transactions 25 million USD and 45 bank accounts seized More effectively frozen - customers able to appeal for access to their accounts – not too many forthcoming Costa Rican base not sufficient legal protection • • Leader Arthur Budovsky arrested in Spain, others arrested in US and Costa Rica US DOJ could pursue the case • 200,000 US users • Presence of Liberty Reserve members Vladimir Katz (co-founder) and Mark Marmilev (helped design technical infrastructure) in the Untied States • Presence of infrastructure in US • Transfer of funds through US financial institutions • • Iran has this problem too International anti-money laundering cooperation relatively straightforward • 45+ domestic and foreign searches & seizures, 36 MLAT requests in 15 countries • LEO Cooperation in: US, Costa Rica, Russia, China, Latvia, Cyrus, Hong Kong, Norway, Sweden, Australia, Cyprus, Latvia, Switzerland, Luxembourg, Morocco, Spain, Netherlands, United Kingdom, Norway, Canada, US, Costa Rica
  • 7. Alternatives to Liberty Reserve 7 • Perfect Money • • • Increase in use following LR takedown In business since at least 2007 Claimed to be in Panama • January 2013: Panamanian government stated that Perfect Money has no offices or licenses in the country • Now provides a Hong Kong address • Shared by many other businesses • But… Security press anointed Perfect Money as the Successor to Liberty Reserve • • Also successor to legal attention? Announced the US citizen could not participate following LR takedown • Difficult to police, infrastructure even harder • Turned away some visibly criminal customers
  • 8. Further Electronic Currency Options 8 • WebMoney • Founded in 1998, previously the front runner • Claims 14 million users • Strong global footprint, expanding • Began in CIS, Latin America and Pacific Asia (not to USA) • Traditionally popular among cyber criminals • Use by legitimate small and medium sized businesses protected WMZ from regulation efforts • Now large legitimate presence encourages law enforcement cooperation, especially in Russia • May still be possible to “fly under the radar” • Other electronic options of varying trustworthiness • Payza/AlertPay, EgoPay, LiqPay, Paxum, PayWeb, SolidTrustP ay, ePayments, Yandex.Dengi, RedPass, etc.
  • 9. BitCoin: An Acceptable Option? 9 • • Volatile – speculation an issue Mining losing utility • • • • Handy for cyber criminals who can use botnets (like ZeroAccess) As the rate of block generation (unencrypting a BitCoin) increases, difficulty rises – reaching maximum total utility BitCoin seems attractive because it is “anonymous” But is BitCoin Anonymous? • • • • Not big enough to hide truly large transactions Transactions can be tracked in each BitCoin Multiple BitCoin transaction chains combined and transformed into international currency through exchanges Exchanges can and will operate with authorities – US ahead of the BitCoin game • • • • Mt. Gox account at Wells Fargo seized over paperwork, DHS prohibits Dwolla to exchange BitCoins (total five million USD accounts) IRS subpoenaed 24 exchanges. GOA office report on money laundering risks, US Treasury unit Financial Crimes Enforcement Network (FinCEN) has BitCoin rules, IRS to follow LEO (especially the FBI more aggressive about anonymity in general, e.g. Tor CP arrests and Silk Road closure (which included the seizure of 3.6 million USD in BitCoins) Other crypto currencies insufficiently popular, e.g. Litecoin, Namecoin, PPCoin, even Ripple • May be scams themselves
  • 10. Credit Cards 10 • Cash onto Credit Cards: Possible • Prepaid debit and credit cards are available • Some limitations • Depend on the exchanges • Limited totals • Daily Withdrawal Limit – 1000 USD • Maximum Daily Balance – 10K USD • Total Loading Limit/Month – 20K USD • Cash from Credit Cards: More difficult (but still possible) • Credit card companies and acquiring banks increasingly picky • Will cut off processors if caught violating TOS • Copyright particularly valuable tool – instant TOS violation • Copyrighted software sales, pharma particularly affected • Small shift to prepaid payment cards for accepting fraudulent payments a la rogue AV and ransomware • E.g. Green Dot MoneyPak, can be purchased at major retailers such as Wal-Mart, CVS, Walgreens, Kmart, etc.
  • 11. Credit Cards (and other Money Mule Options) 11 • Prepaid credit cards and certificates also a growing alternative to money mules • Not just in accepting payments, also in sending money or goods for resale • Western Union et. al. are watching • Human mules problematic • Difficult to recruit enough – constant efforts required (or high payments to services who must engage in constant efforts) • Relatively easy to identify, arrest (especially if they must appear in person or accept delivery at their actual address) • Some mules will rob the thieves • Brian Krebs: “mules are dumb,” make mistakes • Big mules = big attention, e.g. General Valeriu Gaichuk in Romania • Old methods still in use though • • Can still use CCs to purchase goods, ship them near home country (in the case of Eastern Europe, sometimes via a EU country such as Poland near the Ukrainian border), sell them for cash Can still use human mules for that matter
  • 12. So… Is There Any Hope of Getting Away With It? 12
  • 13. Keeping Dishonest Money 13 • Money laundering already was an LEO priority, and cyber crime is a growing one • Each LEO success increases capacity for and interest in the next • The dominance of the United States in the international financial system helps make it a dominant, and potentially unavoidable, player in anti money-laundering efforts • Avoiding US victims and customers is not enough to avoid US attention • So, really, what is a cyber criminal to do? • Stay under the radar, it’s still a numbers game • LEOs are better able to target money laundering than cyber crime, but are still constrained by capacity issues and the need to prioritize • So many “ we gave it to LE” stories • The noticeable and stationary get targeted – just ask LR, Mt. Gox, Silk Road, Gozi, Citadel, Carberp, etcetera • The more automation, the better • Risk still higher
  • 14. Thank You © 2012 VeriSign, Inc. All rights reserved. Verisign, the Verisign logo, iDefense and other trademarks, service marks, and designs are registered or unregistered trademarks of VeriSign, Inc. and its subsidiaries in the United States and in foreign countries. All trademarks are properties of their respective owners. All materials are intended for iDefense customers and personnel only. The reproduction and distribution of this material is forbidden without express written permission from iDefense. The opinions, statements, and assessments in this report are solely those of the individual author(s) and do not constitute legal advice, nor do they necessarily reflect the views of VeriSign, Inc., its subsidiaries, or affiliates.

Notas del editor

  1. Ten days ago British police announced the April arrest of a 16 year-old boy in connection with the large DDoS attack targeting Spamhaus and its hosting provider CloudFlare. The police’s statement seemed to say that the boy first attracted law enforcement attention due to the “significant amount of money flowing through his bank account” .Although the 16 year old in question appears to have been particularly reckless, his situation highlights one confronting all financially-motivated cyber criminals – the need to connect to the legitimate financial world at some point.http://www.standard.co.uk/news/crime/london-schoolboy-secretly-arrested-over-worlds-biggest-cyber-attack-8840766.html
  2. Botnet update example
  3. Note: Arthur Budovsky was of Ukrainian extraction, was a US citizen, on probation since 2007 for running an electronic currency connected to e-gold, renounced US citizenship to take Costa Rican (thought that being in Costa Rica would protect him)http://www.justice.gov/usao/nye/pr/2013/2013may09.htmlMLAT = Mutual legal assistance treaty
  4. Note: Arthur Budovsky was of Ukrainian extraction, was a US citizen, on probation since 2007 for running an electronic currency connected to e-gold, renounced US citizenship to take Costa Rican (thought that being in Costa Rica would protect him)
  5. Note: Arthur Budovsky was of Ukrainian extraction, was a US citizen, on probation since 2007 for running an electronic currency connected to e-gold, renounced US citizenship to take Costa Rican (thought that being in Costa Rica would protect him)
  6. Author is anonymousCreated by “Satoshi Nakamoto” in 2009 Real author may be Michael Clear from Trinity University in Ireland, may be Neal King, and Charles Bry in Germany and/or Vladimir Oksman in NY, or someone else entirelyhttp://www.gwern.net/docs/2011-davishttp://www.fastcompany.com/1785445/bitcoin-crypto-currency-mystery-reopenedSymantec took down About 500,000 bots out of the 1.9 million strong ZeroAccess botnethttp://www.gao.gov/assets/660/654620.pdf exchanges including Coinbase BitInstant and Coinsetterhttp://cryptome.org/2012/05/fbi-bitcoin.pdf
  7. Botnet update example
  8. Romanian authorities, working with the FBI and Italian special forces, were tipped off by banks in Italy, which denied a request allegedly by the accused to transfer $400,000 from a victim company there to a fictitious firm. According to documents released by prosecutors, the men were caught red handed on Dec. 9 trying to withdrawn nearly $1 million stolen from the American company.A U.S. law enforcement investigator familiar with the case who spoke on condition of anonymity said keystroke logging Trojans were used to steal the online banking credentials of the victim organizations, and that the case is connected to at least one other cyber fraud investigation that is still pending. The judge overseeing the case approved the prosecutor’s request to have the men detained for at least 29 days pending further investigation, saying that authorities have information that the defendants belong to much larger organized criminal group. 
  9. Botnet update example