Last i t talk
     L t minute t lk

HACKING MOBILE OPERATORS
  C    G O     O        O S
 (GSM, EDGE, UMTS): WWWH
   [Who, When Wh Ho
   [Who When, Why, How ?]
nullcon 2010 - Underground Economy
….Kidding! ;) LOL
Underground Economy:
why we should be fully-updated on this topic:
  InfoSec players, Finance world, citiziens
          players          world citiziens.
                         A NFD Talk by Raoul Chiesa
            Senior Advisor, Strategic Alliances & Cybercrime Issues

 United Nations - Interregional Crime and Justice Research Institute (UNICRI)
Disclaimer
●   The information contained in this presentation does not break any
    intellectual property, nor does it provide detailed information that
    may be in conflict with actual India laws (hopefully.....)
        y                                     ( p      y )

●   Registered brands belong to their legitimate owners.

●   The opinion here represented are my personal ones and do not
    necessary reflect the United Nations nor UNICRI views
                                                    views.

●   ...I just arrived this morning straight from Italy, slept 4 hours in the
    last 2 days: please kindly allow me some possible English mistakes
    around my talk :(
Agenda
# whois raoul
#whois UNICRI
Yesterday’s h ki
Y t d ’ hacking VS today’s crime
                   t d ’     i
Hacking eras and Hacker’s generations
Cybercrime
Profiling the enemy
Hackers…
Hacking, today: Underground Economy
(CENSORED)
Conclusions
Intro
Who am I?
Raoul “Nobody” Chiesa

•   Old-school Hacker from 1986 to 1995
•   Infosec Professional since 1997 @ Mediaservice.net
•   OSSTMM Key Contributor; HPP Project Manager; ISECOM
    International Trainer
•   Founder of CLUSIT, Italian Computer Security Association
    (
    (CLUSI* : Belgium, France, Luxembourg, Switzerland)
                   g    ,        ,            g,          )
•   Member of TSTF.net – Telecom Security Task Force
•   I work worldwide (so I don’t get bored ;)
•   My areas of interest: Pentesting, SCADA/DCS/PLC,
      y                               g
    National Critical Infrastructures, Security R&D+Exploiting
    weird stuff, , Security People, X.25, PSTN/ISDN, Hacker’s
    Profiling, Cybercrime, Information Warfare, Security
    methodologies, specialized Trainings.



•   Basically, I do not work in this field just to get my salary
    every month and pay the home/car/whatever loan: I really
    love it ☺
    l    i
UNICRI


                    What is UNICRI?

United Nations Interregional Crime & Justice Research Institute

A United Nations entity established in 1968 to support countries
worldwide in crime prevention and criminal justice

UNICRI carries out applied research, training,            technical
cooperation and documentation / information activities

UNICRI disseminates information and maintains contacts with
professionals and experts worldwide

Counter Human Trafficking and Emerging Crimes Unit: cyber
crimes, counterfeiting, environmental crimes, trafficking in stolen
works of art…
Fake Bvlgari &Rolex, but also    Guess how they update each others?
                      Water systems with “sensors”…
 Viagra &Cialis (aka SPAM)             Email, chat&IM, Skype…
UNICRI & Cybercrime


     Overview on UNICRI projects
         against cybercrime

    Hackers Profiling Project (HPP)


    SCADA & CNI s security
            CNI’s


    Digital Forensics and digital investigation
                        SCADA Security
    techniques

    Cybersecurity Trainings at the UN Campus
nullcon 2010 - Underground Economy
Yesterday
         y
and today’s
  Hacking
The Hackers Profiling Project (HPP)


                          Crime->Yesterday

    “Every new technology, opens the door to new criminal approaches”.

•   The relationship between technologies and criminality has always been –
    since the very beginning – characterized by a kind of “competition” between
    the good and the bad guys, just like cats and mice.

•   As an example, at the beginning of 1900, when cars appeared, the “bad
    guys” started stealing them (!)

•   ….the police, in order to contrast the phenomenon, defined the mandatory
    use of car plates…

•   ….and the thieves began stealing the car plates from the cars (and/or
    falsifying them).
The Hackers Profiling Project (HPP)


                       Crime->Today:Cybercrime
•   Cars have been substituted by information (I’m not drunk Yet ;)
                                              (I m     drunk.

                    You got the information, you got the power..

    (at least, in politics, in the business world, in our personal relationships…)

•   Simply p , this happens because the “information” can be transformed at once
        p y put,       pp
    into “something else”:
    Competitive advantage
    Sensible/critical information
    Money

•   … that’s why all of us we want to “be secure”.
                                       be secure

•   It’s not by chance that it’s named “IS”: Information Security ☺
Hacking eras &
         g
Hackers’ generations
Things changed…

First generation (70’s) was inspired by the need for
knowledge
Second generation (1980-1984) was driven by curiosity plus
the knowledge starving: the only way to learn OSs was to hack
them; later (1985-1990) hacking becomes a trend.
The Third one (90’s) was simply pushed by the anger for
hacking, meaning a mix of addiction, curiosity, learning new
stuff, hacking IT systems and networks, exchanging info
with the underground community Here we saw new concepts
                     community.
coming, such as hacker’s e-zines (Phrack, 2600 Magazine)
along with BBS
Fourth generation (2000-today) is driven by angerness and
                       (2000 today)
money: often we can see subjects with a very low know-how,
thinking that it’s “cool & bragging” being hackers, while they are
not interested in hacking & phreaking history, culture and
ethics. Here hacking meets with politics (cyber-hacktivism) or       €,
                                                                     € $
with the criminal world (cybercrime).
Cybercrime: why?


• QUESTION:
   – May we state that cybercrime – along with its many, many aspects
     and views – can be ranked as #1 in rising trend and global
     diffusion ?

• ANSWER(S):
• Gi
  Given that all of you are attendes and speakers here at NULLCON, I
        th t ll f            tt d      d     k    h     t NULLCON
  would answer that we already are on the right track in order to analyze
  the problem ☺

• Nevertheless, some factors exist for which the spreading of
  “e-crime”-based attacks relays.
                              y

• Let’s take a look at them.
Reasons/1

• 1. There are new users, more and more
  every day: this means the total amount of
       y y                                      Thanks to broadband...
                                                          broadband
  potential victims and/or attack vectors is
  increasing.


• 2. Making money, “somehow and straight        Economical crisis…
  away”.
      y


• 3. Technical know-how public availability &   0-days, Internet
                                                distribution system
  ready-to-go, even when talking about
  average-high skills: that’s what I name
  “hacking p et à po te
    ac g pret-à-porter”
Reasons/2


•   4. It s
    4 It’s fucking easy to recruit idiots and set up groups molding those adepts
                                                     groups,
    upon the bad guy’s needs (think about e-mules)
                                                           Newbies, Script Kiddies

•   5. “They will never bust me”            Psycology,
                                            Criminology

•   6.
    6 Lack of violent actions                Psycology and Sociology
What the heck is changed then??

What’s really changed is the attacker’s typology

From “bored teens”, doing it for “hobby and curiosity”
(obviously: during night, pizza-hut’s box on the floor and
cans of R d B ll)
      f Red Bull)….

...to teenagers and adults not mandatory “ICT” or
   to                                     ICT
“hackers”: they just do it for the money.

What’s changed is the attacker’s profile, along with its
justifications, motivations and reasons.

Let’s do a quick test!
Hackers in their environment
“Professionals”
There’s a difference: why?

• Why were the guys in the first slide hackers, and
  the others professional ?

• Because of the PCs ?

• Because of their “look” ?

• Due to the environments surrounding them ?

• Because of the “expression on their faces” ?
Surprise!
  Everything has changed


• Erroneus media information pushed your
                    pp
  mind to run this approach
• Sometimes today the professionals are
  the real criminals and hackers “the
           criminals,
  good guys”… (Telecom Italia Scandal,
  Vodafone Greece Affair, etc…)
Understanding Hackers


• It’ extremely important th t we understand the so-called
  It’s t      l i     t t that      d t d th          ll d
  “hacker’s behaviours”
   – Don’t limit yourself to analyse attacks and intrusion techniques: let’s analyze
     Don t                                                             let s
     their social behaviours


• Try to identify those not-written rules sof hacker’s subculture


• Explore hacker’s social organization


• Let’s zoom on those existing links between hacking and
  organized crime
Ok Raoul…
so what ?!?
Hacking, today

                                Numbers

  285 million records compromised in 2008 (source: Verizon 2009 Data Breach
Investigations Report)
 2 Billion of US dollars: that’s RBN’s 2008 turnover
 +148% increasing in ATM frauds: more than 500 000 000 € business each
                                                  500.000.000
year, just in Europe (source: ENISA “ATM Crime Report 2009”)
 .......


 Uh ?!? RBN ? WTF??
RBN

Russian Business Network
Not that easy explaing what it is...
First of all, cybercrime IRL means:
     Phishing
     Malware (rogue AVs, game sites, casinos, + standard stuff)
     Frauds & Scams
    DDoS Attacks
     Children pornography
    Generic Porn
    On-line games (Tomasz may comment out here ;)
RBN & phishing

 David Bizeul wrote an excellent study on RBN. One page was so interesting:
http://194.146.207.18/config
   p                       g
storage_send_interval="600" config_file ="$_2341234.TMP" storage_file ="$_2341233.TMP"
www_domains_list = "pageshowlink.com" redirector_url ="citibusinessonline.da-us.citibank.com
/cbusol/uSignOn.do {
            g          {www} /usa/citibusiness.php 2 0 3" redirector_url = "*fineco.it /fineco/PortaleLogin
                             }                 p p                                                       g
{www} /it/fineco.php 2 0 3" redirector_url = "onlineid.bankofamerica.com /cgi-bin/sso.login.controller*
{www} /usa/boa_pers/sso.login.php 2 0 2" redirector_url = "onlinebanking-nw.bankofamerica.com
/login.jsp* {www} /usa/boa_pers/sso.login.php 2 0 2" redirector_url = "online.wellsfargo.com /signon*
{
{www} /usa/wellsfargo.php 2 0 2" redirector_url = "ibank.barclays.co.uk /olb/*/LoginPasscode.do {
      }              g p p                   _                    y                  g                 {www} }
/uk/barc/LoginPasscode.php 2 0 2" redirector_url = "*ebank.hsbc.co.uk
/servlet/com.hsbc.ib.app.pib.logon.servlet.OnLogonVerificationServlet {www} /uk/hsbc/hsbc.php 2 0 2"
redirector_url = "online*.lloydstsb.* /miheld.ibc {www} /uk/lloyds/lloyds.php 2 0 2" redirector_url =
"*halifax-online.co.uk /_mem_bin/UMLogonVerify.asp {
                          _     _          g        y p {www} /uk/halifax.co.uk.php 2 0 3" redirector_url
                                                               }                   p p                    _
= "olb2.nationet.com /signon/SinglePageSignon_wp1.asp* {www} /uk/nationwide.php 2 0 3"
redirector_url = "webbank.openplan.co.uk /core/webbank.asp {www} /uk/woolwich.co.uk.php 2 0 3"
#DE redirector_url = "meine.deutsche-bank.de /mod/WebObjects/dbpbc.woa/* {www}
/de/deutsche-bank.de/login.php 2 0 3" redirector_url = "banking.postbank.de /app/login.prep.do* {
                          g p p                    _             gp               pp g p p           {www} }
/de/postbank/postbank.de.php 2 0 3" redirector_url = "portal*.commerzbanking.de /P-
Portal/XML/IFILPortal/pgf.html* {www} /de/commerzbanking/login.php 2 0 2" redirector_url =
"www.dresdner-privat.de /servlet/P/SSA_MLS_PPP_INSECURE_P/pinLogin.do {www} /de/dresdner-
privat/pers.php 2 0 3" redirector_url = "www.dresdner-privat.de
/servlet/N/SSA_MLS_PPP_INSECURE_N/pinLogin.do {www} /de/dresdner-privat/corp.php 2 0 3"
What about the other IP
addresses?
RBN’s model
Underground
     g
 Economy
“Cybercriminals”
UE


Underground Economy is the concept thanks to which we will not experience
anymore – in the next future – “bank robberies”

Nowadays the ways in order to fraud and steal money are SO MANY. And, the
world is just full of unexperienced users.

What is needed is to “clean” the money: money laundering. They need the
                                     y      y          g     y
mules.
UE: the approach


1.
1    Basics: Malware and Botnets
      Create the malware, build the botnet

2.   Identity theft
      Stealing personal and financial credentials (e-banking)

3.   Running the e-crime
              g
      i.e.: e-Banking attacks and e-commerce frauds (Ebay docet)

4.   Money laundering
      Setup money laundering’s networks
THIS IS A SANITIZED VERSION
 OF MY TALK: YOU WILL NOT
  FIND THIS SLIDES HERE.

YOU SHOULD HAVE ATTENDED
     NULLCON 2010!!!
Why it works ?
What’s next ?
        ATM frauds generations


   THIS IS A SANITIZED VERSION
    OF MY TALK: YOU WILL NOT
     FIND THIS SLIDES HERE.
                       HERE

  YOU SHOULD HAVE ATTENDED
       NULLCON 2010!!!
This is the end,my friends
                                  Final toughts
 The hacking world has not always been linked to those true criminal actions
 Just like FX said at CONfidence Warsaw November 2009 talking about router’s
security,
security it seems that ATM vendors (where the money is) just don’t care about the
                                                              don t
security of their products (a fucking MS Windows cage is really not enough!)
 Basically, they are still thinking that skimming is their sole and unique threat (idiots)
   What they are doing right now – just as it’s happening with Internet routers! -. is
adding “gadgets” and fuctions, that basically enlarge the chance of mistakes, bugs,
attack vectors, etc (coin dispenser, new “routings” towards telcos, charity, etc..)
                                          routings
 At the same time, nowaday’s hacking is moving (transforming?) towards crime.
  Cybercrime and Underground Economy problem is not “a tech-people issue”:
                                                         a            issue :
rather, it is an issue for ALL of us, representing an impact on the countries’
ecosystem that could reveal itself as devastating.
Questions , or party time? ☺

                           Contacts, Q&A


           Raoul Chiesa

   E-mail: chiesa@UNICRI.it

          Thanks folks!


 UNICRI Cybercrime Home Page:
         y                g                      http://www.unicri.it
http://www.unicri.it/wwd/cyber_crime/index.php

More Related Content

PDF
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
PDF
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
PDF
A perspective for counter strategy against cybercrime and cyber espionage
PPT
Terror And Technology
PPTX
What we can learn from LulzSec
PPTX
Ethical hacking
ODP
PPTX
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
A perspective for counter strategy against cybercrime and cyber espionage
Terror And Technology
What we can learn from LulzSec
Ethical hacking
Social engineering 101 or The Art of How You Got Owned by That Random Stranger

What's hot (6)

PDF
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
PDF
Social Engineering 101: Don't Get Manipulated by Attackers
PDF
History of Old School Hacking
PPTX
Social Engineering 101 or The Art of How You Got Owned by That Random Stranger
PDF
hackers
PDF
IoT is Something to Figure Out
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
Social Engineering 101: Don't Get Manipulated by Attackers
History of Old School Hacking
Social Engineering 101 or The Art of How You Got Owned by That Random Stranger
hackers
IoT is Something to Figure Out
Ad

Similar to nullcon 2010 - Underground Economy (20)

PDF
article cybersecurity must B2B metaverse
PPTX
PDF
nullcon 2010 - Corporate Security and Intelligence – the dark links
PDF
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
PPT
Hacking And Its Prevention
PDF
The Role Of Technology In Modern Terrorism
PPTX
Cybersecurity Strategies - time for the next generation
PDF
2600 v16 n1 (spring 1999)
PPTX
Catella e-Crime London2015
PDF
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
PPT
Cyber terrorism
PDF
War Against Terrorism - CIO's Role
PPT
What is Ethical hacking
PDF
Infosecurity2013nl 131103184054-phpapp01
PPT
2006 multinational intelligence (centcom ccc)
PPTX
Judgement Day - Slovakia
DOCX
Ethical hacking
PPT
Course on Ehtical Hacking - Introduction
PDF
Afrofutures?
DOCX
E crime thesis Cyber Crime and its several types
article cybersecurity must B2B metaverse
nullcon 2010 - Corporate Security and Intelligence – the dark links
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
Hacking And Its Prevention
The Role Of Technology In Modern Terrorism
Cybersecurity Strategies - time for the next generation
2600 v16 n1 (spring 1999)
Catella e-Crime London2015
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Cyber terrorism
War Against Terrorism - CIO's Role
What is Ethical hacking
Infosecurity2013nl 131103184054-phpapp01
2006 multinational intelligence (centcom ccc)
Judgement Day - Slovakia
Ethical hacking
Course on Ehtical Hacking - Introduction
Afrofutures?
E crime thesis Cyber Crime and its several types
Ad

More from n|u - The Open Security Community (20)

PDF
Hardware security testing 101 (Null - Delhi Chapter)
PPTX
SSRF exploit the trust relationship
PDF
PDF
Api security-testing
PDF
Introduction to TLS 1.3
PDF
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
PDF
Talking About SSRF,CRLF
PPTX
Building active directory lab for red teaming
PPTX
Owning a company through their logs
PPTX
Introduction to shodan
PDF
Detecting persistence in windows
PPTX
Frida - Objection Tool Usage
PDF
OSQuery - Monitoring System Process
PDF
DevSecOps Jenkins Pipeline -Security
PDF
Extensible markup language attacks
PPTX
PDF
Hardware security testing 101 (Null - Delhi Chapter)
SSRF exploit the trust relationship
Api security-testing
Introduction to TLS 1.3
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Talking About SSRF,CRLF
Building active directory lab for red teaming
Owning a company through their logs
Introduction to shodan
Detecting persistence in windows
Frida - Objection Tool Usage
OSQuery - Monitoring System Process
DevSecOps Jenkins Pipeline -Security
Extensible markup language attacks

Recently uploaded (20)

PPTX
Information-Technology-in-Human-Society.pptx
PDF
Streamline Vulnerability Management From Minimal Images to SBOMs
PPTX
Strategic Picks — Prioritising the Right Agentic Use Cases [2/6]
PDF
Decision Optimization - From Theory to Practice
PDF
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
PDF
State of AI in Business 2025 - MIT NANDA
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PDF
Optimizing bioinformatics applications: a novel approach with human protein d...
PDF
Introduction to c language from lecture slides
PPTX
How to Convert Tickets Into Sales Opportunity in Odoo 18
PDF
Technical Debt in the AI Coding Era - By Antonio Bianco
PDF
The AI Revolution in Customer Service - 2025
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PPT
Overviiew on Intellectual property right
PDF
Advancements in abstractive text summarization: a deep learning approach
PDF
substrate PowerPoint Presentation basic one
PPTX
Digital Convergence: How GIS, BIM, and CAD Revolutionize Asset Management
PDF
ELLIE29.pdfWETWETAWTAWETAETAETERTRTERTER
PDF
Altius execution marketplace concept.pdf
Information-Technology-in-Human-Society.pptx
Streamline Vulnerability Management From Minimal Images to SBOMs
Strategic Picks — Prioritising the Right Agentic Use Cases [2/6]
Decision Optimization - From Theory to Practice
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
State of AI in Business 2025 - MIT NANDA
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
EIS-Webinar-Regulated-Industries-2025-08.pdf
Optimizing bioinformatics applications: a novel approach with human protein d...
Introduction to c language from lecture slides
How to Convert Tickets Into Sales Opportunity in Odoo 18
Technical Debt in the AI Coding Era - By Antonio Bianco
The AI Revolution in Customer Service - 2025
Introduction to MCP and A2A Protocols: Enabling Agent Communication
Overviiew on Intellectual property right
Advancements in abstractive text summarization: a deep learning approach
substrate PowerPoint Presentation basic one
Digital Convergence: How GIS, BIM, and CAD Revolutionize Asset Management
ELLIE29.pdfWETWETAWTAWETAETAETERTRTERTER
Altius execution marketplace concept.pdf

nullcon 2010 - Underground Economy

  • 1. Last i t talk L t minute t lk HACKING MOBILE OPERATORS C G O O O S (GSM, EDGE, UMTS): WWWH [Who, When Wh Ho [Who When, Why, How ?]
  • 4. Underground Economy: why we should be fully-updated on this topic: InfoSec players, Finance world, citiziens players world citiziens. A NFD Talk by Raoul Chiesa Senior Advisor, Strategic Alliances & Cybercrime Issues United Nations - Interregional Crime and Justice Research Institute (UNICRI)
  • 5. Disclaimer ● The information contained in this presentation does not break any intellectual property, nor does it provide detailed information that may be in conflict with actual India laws (hopefully.....) y ( p y ) ● Registered brands belong to their legitimate owners. ● The opinion here represented are my personal ones and do not necessary reflect the United Nations nor UNICRI views views. ● ...I just arrived this morning straight from Italy, slept 4 hours in the last 2 days: please kindly allow me some possible English mistakes around my talk :(
  • 6. Agenda # whois raoul #whois UNICRI Yesterday’s h ki Y t d ’ hacking VS today’s crime t d ’ i Hacking eras and Hacker’s generations Cybercrime Profiling the enemy Hackers… Hacking, today: Underground Economy (CENSORED) Conclusions
  • 9. Raoul “Nobody” Chiesa • Old-school Hacker from 1986 to 1995 • Infosec Professional since 1997 @ Mediaservice.net • OSSTMM Key Contributor; HPP Project Manager; ISECOM International Trainer • Founder of CLUSIT, Italian Computer Security Association ( (CLUSI* : Belgium, France, Luxembourg, Switzerland) g , , g, ) • Member of TSTF.net – Telecom Security Task Force • I work worldwide (so I don’t get bored ;) • My areas of interest: Pentesting, SCADA/DCS/PLC, y g National Critical Infrastructures, Security R&D+Exploiting weird stuff, , Security People, X.25, PSTN/ISDN, Hacker’s Profiling, Cybercrime, Information Warfare, Security methodologies, specialized Trainings. • Basically, I do not work in this field just to get my salary every month and pay the home/car/whatever loan: I really love it ☺ l i
  • 10. UNICRI What is UNICRI? United Nations Interregional Crime & Justice Research Institute A United Nations entity established in 1968 to support countries worldwide in crime prevention and criminal justice UNICRI carries out applied research, training, technical cooperation and documentation / information activities UNICRI disseminates information and maintains contacts with professionals and experts worldwide Counter Human Trafficking and Emerging Crimes Unit: cyber crimes, counterfeiting, environmental crimes, trafficking in stolen works of art… Fake Bvlgari &Rolex, but also Guess how they update each others? Water systems with “sensors”… Viagra &Cialis (aka SPAM) Email, chat&IM, Skype…
  • 11. UNICRI & Cybercrime Overview on UNICRI projects against cybercrime Hackers Profiling Project (HPP) SCADA & CNI s security CNI’s Digital Forensics and digital investigation SCADA Security techniques Cybersecurity Trainings at the UN Campus
  • 13. Yesterday y and today’s Hacking
  • 14. The Hackers Profiling Project (HPP) Crime->Yesterday “Every new technology, opens the door to new criminal approaches”. • The relationship between technologies and criminality has always been – since the very beginning – characterized by a kind of “competition” between the good and the bad guys, just like cats and mice. • As an example, at the beginning of 1900, when cars appeared, the “bad guys” started stealing them (!) • ….the police, in order to contrast the phenomenon, defined the mandatory use of car plates… • ….and the thieves began stealing the car plates from the cars (and/or falsifying them).
  • 15. The Hackers Profiling Project (HPP) Crime->Today:Cybercrime • Cars have been substituted by information (I’m not drunk Yet ;) (I m drunk. You got the information, you got the power.. (at least, in politics, in the business world, in our personal relationships…) • Simply p , this happens because the “information” can be transformed at once p y put, pp into “something else”: Competitive advantage Sensible/critical information Money • … that’s why all of us we want to “be secure”. be secure • It’s not by chance that it’s named “IS”: Information Security ☺
  • 16. Hacking eras & g Hackers’ generations
  • 17. Things changed… First generation (70’s) was inspired by the need for knowledge Second generation (1980-1984) was driven by curiosity plus the knowledge starving: the only way to learn OSs was to hack them; later (1985-1990) hacking becomes a trend. The Third one (90’s) was simply pushed by the anger for hacking, meaning a mix of addiction, curiosity, learning new stuff, hacking IT systems and networks, exchanging info with the underground community Here we saw new concepts community. coming, such as hacker’s e-zines (Phrack, 2600 Magazine) along with BBS Fourth generation (2000-today) is driven by angerness and (2000 today) money: often we can see subjects with a very low know-how, thinking that it’s “cool & bragging” being hackers, while they are not interested in hacking & phreaking history, culture and ethics. Here hacking meets with politics (cyber-hacktivism) or €, € $ with the criminal world (cybercrime).
  • 18. Cybercrime: why? • QUESTION: – May we state that cybercrime – along with its many, many aspects and views – can be ranked as #1 in rising trend and global diffusion ? • ANSWER(S): • Gi Given that all of you are attendes and speakers here at NULLCON, I th t ll f tt d d k h t NULLCON would answer that we already are on the right track in order to analyze the problem ☺ • Nevertheless, some factors exist for which the spreading of “e-crime”-based attacks relays. y • Let’s take a look at them.
  • 19. Reasons/1 • 1. There are new users, more and more every day: this means the total amount of y y Thanks to broadband... broadband potential victims and/or attack vectors is increasing. • 2. Making money, “somehow and straight Economical crisis… away”. y • 3. Technical know-how public availability & 0-days, Internet distribution system ready-to-go, even when talking about average-high skills: that’s what I name “hacking p et à po te ac g pret-à-porter”
  • 20. Reasons/2 • 4. It s 4 It’s fucking easy to recruit idiots and set up groups molding those adepts groups, upon the bad guy’s needs (think about e-mules) Newbies, Script Kiddies • 5. “They will never bust me” Psycology, Criminology • 6. 6 Lack of violent actions Psycology and Sociology
  • 21. What the heck is changed then?? What’s really changed is the attacker’s typology From “bored teens”, doing it for “hobby and curiosity” (obviously: during night, pizza-hut’s box on the floor and cans of R d B ll) f Red Bull)…. ...to teenagers and adults not mandatory “ICT” or to ICT “hackers”: they just do it for the money. What’s changed is the attacker’s profile, along with its justifications, motivations and reasons. Let’s do a quick test!
  • 22. Hackers in their environment
  • 24. There’s a difference: why? • Why were the guys in the first slide hackers, and the others professional ? • Because of the PCs ? • Because of their “look” ? • Due to the environments surrounding them ? • Because of the “expression on their faces” ?
  • 25. Surprise! Everything has changed • Erroneus media information pushed your pp mind to run this approach • Sometimes today the professionals are the real criminals and hackers “the criminals, good guys”… (Telecom Italia Scandal, Vodafone Greece Affair, etc…)
  • 26. Understanding Hackers • It’ extremely important th t we understand the so-called It’s t l i t t that d t d th ll d “hacker’s behaviours” – Don’t limit yourself to analyse attacks and intrusion techniques: let’s analyze Don t let s their social behaviours • Try to identify those not-written rules sof hacker’s subculture • Explore hacker’s social organization • Let’s zoom on those existing links between hacking and organized crime
  • 28. Hacking, today Numbers 285 million records compromised in 2008 (source: Verizon 2009 Data Breach Investigations Report) 2 Billion of US dollars: that’s RBN’s 2008 turnover +148% increasing in ATM frauds: more than 500 000 000 € business each 500.000.000 year, just in Europe (source: ENISA “ATM Crime Report 2009”) ....... Uh ?!? RBN ? WTF??
  • 29. RBN Russian Business Network Not that easy explaing what it is... First of all, cybercrime IRL means: Phishing Malware (rogue AVs, game sites, casinos, + standard stuff) Frauds & Scams DDoS Attacks Children pornography Generic Porn On-line games (Tomasz may comment out here ;)
  • 30. RBN & phishing David Bizeul wrote an excellent study on RBN. One page was so interesting: http://194.146.207.18/config p g storage_send_interval="600" config_file ="$_2341234.TMP" storage_file ="$_2341233.TMP" www_domains_list = "pageshowlink.com" redirector_url ="citibusinessonline.da-us.citibank.com /cbusol/uSignOn.do { g {www} /usa/citibusiness.php 2 0 3" redirector_url = "*fineco.it /fineco/PortaleLogin } p p g {www} /it/fineco.php 2 0 3" redirector_url = "onlineid.bankofamerica.com /cgi-bin/sso.login.controller* {www} /usa/boa_pers/sso.login.php 2 0 2" redirector_url = "onlinebanking-nw.bankofamerica.com /login.jsp* {www} /usa/boa_pers/sso.login.php 2 0 2" redirector_url = "online.wellsfargo.com /signon* { {www} /usa/wellsfargo.php 2 0 2" redirector_url = "ibank.barclays.co.uk /olb/*/LoginPasscode.do { } g p p _ y g {www} } /uk/barc/LoginPasscode.php 2 0 2" redirector_url = "*ebank.hsbc.co.uk /servlet/com.hsbc.ib.app.pib.logon.servlet.OnLogonVerificationServlet {www} /uk/hsbc/hsbc.php 2 0 2" redirector_url = "online*.lloydstsb.* /miheld.ibc {www} /uk/lloyds/lloyds.php 2 0 2" redirector_url = "*halifax-online.co.uk /_mem_bin/UMLogonVerify.asp { _ _ g y p {www} /uk/halifax.co.uk.php 2 0 3" redirector_url } p p _ = "olb2.nationet.com /signon/SinglePageSignon_wp1.asp* {www} /uk/nationwide.php 2 0 3" redirector_url = "webbank.openplan.co.uk /core/webbank.asp {www} /uk/woolwich.co.uk.php 2 0 3" #DE redirector_url = "meine.deutsche-bank.de /mod/WebObjects/dbpbc.woa/* {www} /de/deutsche-bank.de/login.php 2 0 3" redirector_url = "banking.postbank.de /app/login.prep.do* { g p p _ gp pp g p p {www} } /de/postbank/postbank.de.php 2 0 3" redirector_url = "portal*.commerzbanking.de /P- Portal/XML/IFILPortal/pgf.html* {www} /de/commerzbanking/login.php 2 0 2" redirector_url = "www.dresdner-privat.de /servlet/P/SSA_MLS_PPP_INSECURE_P/pinLogin.do {www} /de/dresdner- privat/pers.php 2 0 3" redirector_url = "www.dresdner-privat.de /servlet/N/SSA_MLS_PPP_INSECURE_N/pinLogin.do {www} /de/dresdner-privat/corp.php 2 0 3"
  • 31. What about the other IP addresses?
  • 33. Underground g Economy
  • 35. UE Underground Economy is the concept thanks to which we will not experience anymore – in the next future – “bank robberies” Nowadays the ways in order to fraud and steal money are SO MANY. And, the world is just full of unexperienced users. What is needed is to “clean” the money: money laundering. They need the y y g y mules.
  • 36. UE: the approach 1. 1 Basics: Malware and Botnets Create the malware, build the botnet 2. Identity theft Stealing personal and financial credentials (e-banking) 3. Running the e-crime g i.e.: e-Banking attacks and e-commerce frauds (Ebay docet) 4. Money laundering Setup money laundering’s networks
  • 37. THIS IS A SANITIZED VERSION OF MY TALK: YOU WILL NOT FIND THIS SLIDES HERE. YOU SHOULD HAVE ATTENDED NULLCON 2010!!!
  • 39. What’s next ? ATM frauds generations THIS IS A SANITIZED VERSION OF MY TALK: YOU WILL NOT FIND THIS SLIDES HERE. HERE YOU SHOULD HAVE ATTENDED NULLCON 2010!!!
  • 40. This is the end,my friends Final toughts The hacking world has not always been linked to those true criminal actions Just like FX said at CONfidence Warsaw November 2009 talking about router’s security, security it seems that ATM vendors (where the money is) just don’t care about the don t security of their products (a fucking MS Windows cage is really not enough!) Basically, they are still thinking that skimming is their sole and unique threat (idiots) What they are doing right now – just as it’s happening with Internet routers! -. is adding “gadgets” and fuctions, that basically enlarge the chance of mistakes, bugs, attack vectors, etc (coin dispenser, new “routings” towards telcos, charity, etc..) routings At the same time, nowaday’s hacking is moving (transforming?) towards crime. Cybercrime and Underground Economy problem is not “a tech-people issue”: a issue : rather, it is an issue for ALL of us, representing an impact on the countries’ ecosystem that could reveal itself as devastating.
  • 41. Questions , or party time? ☺ Contacts, Q&A Raoul Chiesa E-mail: [email protected] Thanks folks! UNICRI Cybercrime Home Page: y g http://www.unicri.it http://www.unicri.it/wwd/cyber_crime/index.php