Vous êtes sur la page 1sur 15

1

CYBER CRIMES WORKSHOP


.

Peteris Sahurovs
Utilized a computer virus that involved the online sale of fraudulent computer

security programs that defrauded Internet users of more than $2 million. Sahurovs contacted an online newspaper claiming to work for an online advertising agency that represented a hotel chain that was seeking to place advertisements on the paper's website. Sahurovs utilized fraudulent references and bank accounts to deceive the newspaper into believing he represented a legitimate advertising agency. Sahurovs provided electronic files containing the fictitious hotel advertisements to the newspaper, which began running the advertisements on its website. He then replaced the hotel advertisements with a file containing a malicious computer code, or malware, which infected the computers of people who visited the website and required them to purchase antivirus software for $49.95 to regain control of their computers. If the users did not purchase the software, their computers immediately became inundated with pop-ups containing fraudulent "security alerts," and all information, data and files stored on the computers became inaccessible. Sahurovs allegedly conducted the same fraudulent advertising and infection scheme against numerous online businesses.

Artem Semenov
is wanted for his alleged participation in an Eastern European

cyber crime ring, operating out of New York, which is known for recruiting money mules to open bank accounts, cashing out money received through unauthorized money transfers, and then transferring the money overseas. An arrest warrant was issued for Semenov in the Southern District of New York on September 29, 2010, after he was charged with conspiracy to commit bank fraud; conspiracy to possess false identification documents; and false use of passport.

Bjorn Sundin & Shaileshkumar Jain


Involved in an international cybercrime scheme that caused internet

users in more than 60 countries to purchase more than one million bogus software products, resulting in consumer loss of more than $100 million. Used fake advertisements placed on legitimate companies websites, they deceived internet users into believing that their computers were infected with malware or had other critical errors in order to encourage them to purchase scareware software products that had limited or no ability to remedy the purported defects. They allegedly deceived victims, through browser hijacking, multiple fraudulent scans and false error messages, into purchasing full paid versions of software products offered by their company, Innovative Marketing, Inc. The proceeds of these credit card sales were allegedly deposited into bank accounts controlled by the defendant and others around the world, and were then transferred to bank accounts located in Europe. When customers complained that their purchases were actually fraudulent software, call center representatives were allegedly instructed to lie or provide refunds in order to prevent fraud reports to law enforcement or credit companies.

Business and Sales 1


Contact Via ICQ, Messenger or similar or via email (generic addresses). Try & Buy Most offer tests or free demos. They also use online sites for checking algorithms to guarantee the authenticity of the card details. Minimum orders and bulk discounts Minimum orders are established (5 or 10 units in the case of credit card or bank details). There are discounts for bulk buying.

Specialized online stores Once contact has been made, many use online sites set up as stores for distributing their products (which cant be accessed without a username and password).

10

Business and Sales 2


Methods of payment Western Union, Liberty Reserve, WebMoney or similar. Customer services and support They offer service guarantees. If the product does not work (if the numbers, login credentials are not valid, etc.), they will be changed for others that are operative. Promotion These services are mainly advertised through underground forums, although some of the boldest use social media and have accounts on Facebook and Twitter, etc.

11

Black Market Prices

12

Black Market Structure 1


Programmers Who develop the exploits and malware used to commit cyber-crimes. Distributors Who trade and sell stolen data and act as vouchers for the goods provided by other specialists. Tech experts Who maintain the criminal enterprises IT infrastructure, including servers, encryption technologies, databases, and the like. Hackers Who search for and exploit applications, systems and network vulnerabilities. Fraudsters Who create and deploy various social engineering schemes, such as phishing and spam.

13

Black Market Structure 2


Hosted systems providers Who offer safe hosting of illicit content servers and sites. Cashiers Who control drop accounts and provide names and accounts to other criminals for a fee. Money mules Who complete wire transfers between bank accounts. The money mules may use student and work visas to travel to the U.S. to open bank accounts. Tellers Who are charged with transferring and laundering illicitly gained proceeds through digital currency services and different world currencies. Organization Leaders Often people persons without technical skills. The leaders assemble the team and choose the targets.

14

15

Demo
Steal user credentials and credit card numbers Using Facebook and Email Fishing Using Key Loggers Using Malware Disrupting websites Botnets

Vous aimerez peut-être aussi