SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
page 1R S A M O N T H LY F R A U D R E P O R T
F R A U D R E P O R T
MO’ MONEY MO’ PROBLEMS
March 2014
Ever since the Liberty Reserve takedown in May of last year and the confiscation of all
accounts by law enforcement, fraudsters have been busy finding a solid currency to
which they can entrust their spoils without the risk of losing them in a bust. The obvious
choices were Perfect Money and BitCoin, but both currencies carry inherent risk. Perfect
Money is of questionable background, while BitCoin does not provide fraudsters the
required level of anonymity and is not immune to seizure. These risks have pushed the
underground to adopt—or really create—unique currency systems to help protect the
financial security of its dwellers.
In a recent on-going investigation, RSA’s Fraud Intelligence agents have identified and
have been tracking the growing adoption of forum-specific currencies. These financial
platforms allow users to safely transact within their own community, under the
supervision of the forum administrator, avoiding the use of the more public currency
options such as Perfect Money and BitCoin. In some instances different forums shared
the same currency further widening the use and adoption of these platforms.
MUSD
The MUSD currency is used in a single underground board, and has been active since
November 2013. Forum members can use the currency to purchase items/services from
each other, as well as pay for advertising on the board itself. The currency provides a
built-in escrow-service and guarantees anonymity. The forum administrator vouches for
the currency system and is responsible for all its operations.
One can exchange funds to or from MUSD through exchange agents. Two verified
exchange agent services currently work with MUSD in this board, with one offering to
cash out MUSD for hard currency in person at an office in Kiev, Ukraine. Exchange rates
are linked to the US dollar and are set at 1 MUSD = $1 USD.
page 2R S A M O N T H LY F R A U D R E P O R T
UNITED PAYMENT SYSTEM
The United Payment System currency appears to be shared by four different Russian
language forums, with each forum designating its own sub-currency with the forum’s
initials. For example, DM RUR and MM RUR (DM and MM are initials of forum names, and
“RUR” indicates Russian Ruble). Each forum has its own official exchange agent, and
each exchange agent has an administrator. To make sure the exchange agent stays
“honest”, a senior forum member is appointed to supervise and review the activities of
the exchange agent. Funds can be added or cashed out via the exchange agents with
cash out options including refilling different pre-paid cards.
The interesting thing about this currency is that it is shared across a number of forums
allowing members from different forums to transact.
UAPS
UAPS has been in use for over a year and is used with two of the most powerful boards in
the Russian-language cybercrime community and in fact is referred to as the ‘First
Commercial Bank’ on one of them. Of the three currencies discussed here, it appears to
be the most advanced and secure option for fraudsters, with ongoing improvements and
upgrades being implemented by a dedicated software team. Adding funds and cashing
out is available directly from the UAPS system.
The system emphasizes maintaining end-user security and privacy, implementing a strict
data retention policy of just two months.
CONCLUSION
The advent of new private financial systems and currencies in the Russian-language
cybercrime community is a trend indicating a stronger level of collaboration, cooperation
and sophistication amongst individual fraudsters and between fraudster boards in the
cybercrime world.
These new internal currencies are carefully administered and secured, ensuring a high
level of anonymity in transaction and hiding the user identities, making it more difficult
for law enforcement to trace, block, or seize funds and accounts.
Figure 1
MUSD exchange rates
Figure 2
United Payment System icon
Figure 3
UAPS currency system login screen
page 3R S A M O N T H LY F R A U D R E P O R T
Phishing Attacks per Month
RSA identified 36,883 phishing attacks in
February, marking a 21% increase from
January’s attack numbers. This also
represents a 35% increase from the
number of attacks a year ago.
US Bank Types Attacked
Nationwide banks continued to be the
most targeted by phishing with 68% of total
volume in February, and credit unions saw a
sharp spike in attacks – jumping from 16%
to 27% compared to January.
Top Countries by Attack Volume
The U.S. remained the most targeted
country in February with an overwhelming
77% of total phishing volume, followed by
the UK, South Africa, the Netherlands, and
Canada.
36,883
Attacks
Credit Unions
Regional
National
77%
5%
4%
3%
South Africa
Netherlands
UK
U.S.
MARCH 2014
Source: RSA Anti-Fraud Command Center
www.emc.com/rsa
CONTACT US
To learn more about how RSA products, services, and solutions help solve your
business and IT challenges contact your local representative or authorized reseller –
or visit us at www.emc.com/rsa
Top Countries by Attacked Brands
In February, nearly 40% of phishing
attacks were targeted at brands in the U.S.
and UK. Brands in India, Canada and
Australia were collectively targeted by
15% of total phishing volume.
Top Hosting Countries
The U.S. hosted 34% of global phishing
attacks in February, followed by Canada,
Germany, France and Brazil.
©2014 EMC Corporation. EMC, RSA, the RSA logo, and FraudAction are trademarks or registered trademarks of EMC
Corporation in the U.S. and/or other countries. All other trademarks mentioned are the property of their respective
holders. MAR RPT 0314
11%
U.S.
UK
27%
5% 4%6%
34%
GLOBAL PHISHING LOSSES
FEBRUARY 2014

Weitere ähnliche Inhalte

Andere mochten auch

цахим хичээлийн зөвлөмж
цахим хичээлийн зөвлөмжцахим хичээлийн зөвлөмж
цахим хичээлийн зөвлөмжpvsa_8990
 
Beliefs men have_about_women
Beliefs men have_about_womenBeliefs men have_about_women
Beliefs men have_about_womenChandan Dubey
 
Mon post war europe
Mon post war europeMon post war europe
Mon post war europeTravis Klein
 
Biynees khemjee awah
Biynees khemjee awahBiynees khemjee awah
Biynees khemjee awahpvsa_8990
 
Kisamjakajin hashvetvutyun1
Kisamjakajin hashvetvutyun1Kisamjakajin hashvetvutyun1
Kisamjakajin hashvetvutyun1tatevabrahamyan
 
El desempleo ies pardaiña
El desempleo ies pardaiñaEl desempleo ies pardaiña
El desempleo ies pardaiñasilamora4
 
Federmanager Presentazione Vincenzo Balzani 12 aprile
Federmanager Presentazione Vincenzo Balzani 12 aprileFedermanager Presentazione Vincenzo Balzani 12 aprile
Federmanager Presentazione Vincenzo Balzani 12 aprileMarco Frullanti
 
Animal presentation
Animal presentationAnimal presentation
Animal presentationjasoncowen
 
White Paper: EMC Compute-as-a-Service — EMC Ionix IT Orchestrator, VCE Vblock...
White Paper: EMC Compute-as-a-Service — EMC Ionix IT Orchestrator, VCE Vblock...White Paper: EMC Compute-as-a-Service — EMC Ionix IT Orchestrator, VCE Vblock...
White Paper: EMC Compute-as-a-Service — EMC Ionix IT Orchestrator, VCE Vblock...EMC
 

Andere mochten auch (17)

цахим хичээлийн зөвлөмж
цахим хичээлийн зөвлөмжцахим хичээлийн зөвлөмж
цахим хичээлийн зөвлөмж
 
Awesome powerpoint
Awesome powerpointAwesome powerpoint
Awesome powerpoint
 
Arrive alive
Arrive aliveArrive alive
Arrive alive
 
Beliefs men have_about_women
Beliefs men have_about_womenBeliefs men have_about_women
Beliefs men have_about_women
 
Social networking (1)
Social networking (1)Social networking (1)
Social networking (1)
 
What’s in Windows Server 8 for the ITPro – a demo tour
What’s in Windows Server 8 for the ITPro – a demo tourWhat’s in Windows Server 8 for the ITPro – a demo tour
What’s in Windows Server 8 for the ITPro – a demo tour
 
Mon post war europe
Mon post war europeMon post war europe
Mon post war europe
 
Biynees khemjee awah
Biynees khemjee awahBiynees khemjee awah
Biynees khemjee awah
 
Kisamjakajin hashvetvutyun1
Kisamjakajin hashvetvutyun1Kisamjakajin hashvetvutyun1
Kisamjakajin hashvetvutyun1
 
Mayrikis voski dzerqer
Mayrikis voski dzerqerMayrikis voski dzerqer
Mayrikis voski dzerqer
 
Mi3
Mi3Mi3
Mi3
 
El desempleo ies pardaiña
El desempleo ies pardaiñaEl desempleo ies pardaiña
El desempleo ies pardaiña
 
Federmanager Presentazione Vincenzo Balzani 12 aprile
Federmanager Presentazione Vincenzo Balzani 12 aprileFedermanager Presentazione Vincenzo Balzani 12 aprile
Federmanager Presentazione Vincenzo Balzani 12 aprile
 
Animal presentation
Animal presentationAnimal presentation
Animal presentation
 
White Paper: EMC Compute-as-a-Service — EMC Ionix IT Orchestrator, VCE Vblock...
White Paper: EMC Compute-as-a-Service — EMC Ionix IT Orchestrator, VCE Vblock...White Paper: EMC Compute-as-a-Service — EMC Ionix IT Orchestrator, VCE Vblock...
White Paper: EMC Compute-as-a-Service — EMC Ionix IT Orchestrator, VCE Vblock...
 
โรคขาดโปร..
โรคขาดโปร..โรคขาดโปร..
โรคขาดโปร..
 
Cost curves
Cost curvesCost curves
Cost curves
 

Mehr von EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 

Mehr von EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Kürzlich hochgeladen

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Kürzlich hochgeladen (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

RSA Monthly Online Fraud Report -- March 2014

  • 1. page 1R S A M O N T H LY F R A U D R E P O R T F R A U D R E P O R T MO’ MONEY MO’ PROBLEMS March 2014 Ever since the Liberty Reserve takedown in May of last year and the confiscation of all accounts by law enforcement, fraudsters have been busy finding a solid currency to which they can entrust their spoils without the risk of losing them in a bust. The obvious choices were Perfect Money and BitCoin, but both currencies carry inherent risk. Perfect Money is of questionable background, while BitCoin does not provide fraudsters the required level of anonymity and is not immune to seizure. These risks have pushed the underground to adopt—or really create—unique currency systems to help protect the financial security of its dwellers. In a recent on-going investigation, RSA’s Fraud Intelligence agents have identified and have been tracking the growing adoption of forum-specific currencies. These financial platforms allow users to safely transact within their own community, under the supervision of the forum administrator, avoiding the use of the more public currency options such as Perfect Money and BitCoin. In some instances different forums shared the same currency further widening the use and adoption of these platforms. MUSD The MUSD currency is used in a single underground board, and has been active since November 2013. Forum members can use the currency to purchase items/services from each other, as well as pay for advertising on the board itself. The currency provides a built-in escrow-service and guarantees anonymity. The forum administrator vouches for the currency system and is responsible for all its operations. One can exchange funds to or from MUSD through exchange agents. Two verified exchange agent services currently work with MUSD in this board, with one offering to cash out MUSD for hard currency in person at an office in Kiev, Ukraine. Exchange rates are linked to the US dollar and are set at 1 MUSD = $1 USD.
  • 2. page 2R S A M O N T H LY F R A U D R E P O R T UNITED PAYMENT SYSTEM The United Payment System currency appears to be shared by four different Russian language forums, with each forum designating its own sub-currency with the forum’s initials. For example, DM RUR and MM RUR (DM and MM are initials of forum names, and “RUR” indicates Russian Ruble). Each forum has its own official exchange agent, and each exchange agent has an administrator. To make sure the exchange agent stays “honest”, a senior forum member is appointed to supervise and review the activities of the exchange agent. Funds can be added or cashed out via the exchange agents with cash out options including refilling different pre-paid cards. The interesting thing about this currency is that it is shared across a number of forums allowing members from different forums to transact. UAPS UAPS has been in use for over a year and is used with two of the most powerful boards in the Russian-language cybercrime community and in fact is referred to as the ‘First Commercial Bank’ on one of them. Of the three currencies discussed here, it appears to be the most advanced and secure option for fraudsters, with ongoing improvements and upgrades being implemented by a dedicated software team. Adding funds and cashing out is available directly from the UAPS system. The system emphasizes maintaining end-user security and privacy, implementing a strict data retention policy of just two months. CONCLUSION The advent of new private financial systems and currencies in the Russian-language cybercrime community is a trend indicating a stronger level of collaboration, cooperation and sophistication amongst individual fraudsters and between fraudster boards in the cybercrime world. These new internal currencies are carefully administered and secured, ensuring a high level of anonymity in transaction and hiding the user identities, making it more difficult for law enforcement to trace, block, or seize funds and accounts. Figure 1 MUSD exchange rates Figure 2 United Payment System icon Figure 3 UAPS currency system login screen
  • 3. page 3R S A M O N T H LY F R A U D R E P O R T Phishing Attacks per Month RSA identified 36,883 phishing attacks in February, marking a 21% increase from January’s attack numbers. This also represents a 35% increase from the number of attacks a year ago. US Bank Types Attacked Nationwide banks continued to be the most targeted by phishing with 68% of total volume in February, and credit unions saw a sharp spike in attacks – jumping from 16% to 27% compared to January. Top Countries by Attack Volume The U.S. remained the most targeted country in February with an overwhelming 77% of total phishing volume, followed by the UK, South Africa, the Netherlands, and Canada. 36,883 Attacks Credit Unions Regional National 77% 5% 4% 3% South Africa Netherlands UK U.S. MARCH 2014 Source: RSA Anti-Fraud Command Center
  • 4. www.emc.com/rsa CONTACT US To learn more about how RSA products, services, and solutions help solve your business and IT challenges contact your local representative or authorized reseller – or visit us at www.emc.com/rsa Top Countries by Attacked Brands In February, nearly 40% of phishing attacks were targeted at brands in the U.S. and UK. Brands in India, Canada and Australia were collectively targeted by 15% of total phishing volume. Top Hosting Countries The U.S. hosted 34% of global phishing attacks in February, followed by Canada, Germany, France and Brazil. ©2014 EMC Corporation. EMC, RSA, the RSA logo, and FraudAction are trademarks or registered trademarks of EMC Corporation in the U.S. and/or other countries. All other trademarks mentioned are the property of their respective holders. MAR RPT 0314 11% U.S. UK 27% 5% 4%6% 34% GLOBAL PHISHING LOSSES FEBRUARY 2014