SlideShare ist ein Scribd-Unternehmen logo
1 von 32
What’s lurking in the deep end of the Internet?
The DeepWeb
Joshua Schleicher
Anti-Fraud SolutionsConsultant
info@easysol.net
95% of the ocean remains
unexplored, unseen by human
eyes
http://oceanservice.noaa.gov/facts/exploration.html
Just like an iceberg, the
majority of the Deep Web
remains obscured from view
Google has only indexed 200TB of
the Internet's data...an estimated
.004% of the total Internet
Source: https://hewilson.wordpress.com/what-is-the-deep-web/statistics/
Source: http://money.cnn.com/infographic/technology/what-is-the-deep-web/
These search engines capture < 1% of all web content
Source: http://money.cnn.com/infographic/technology/what-is-the-deep-web/
The Deep Web
The Deep Web is truly
anonymous– you can’t even get
on it unless you yourself are
anonymous
Users can buy virtually anything
from drugs to credit card
information and accounts
Source: http://www.sickchirpse.com/deep-web-guide/2/
The recent evolution of the DeepWeb has allowed
fraud to become increasingly commoditized,
simply because there are many ways to monetize
the fraud process itself.
The Process
Information Theft
Black Market Sale
Cybercrime Platforms
> Data Stealer SDK
> VOLK
> Webshells
> Zeus
> SpyEye
> Citadel
> ICE IX
> BlackHole Exploit Kit
> iBanking (Mobile Botnet)
> Malware Targeting POS
Mobile Crimeware Platforms are being used to harvest
credentials to infiltrate accounts.
PAC (Proxy Autoconfiguration) Attacks
function FindProxyForURL(url, host)
{
// ---- Santander
if (shExpMatch(host, "www.santander.com.br")) {
return "PROXY 201.20.46.177:80";
}
if (shExpMatch(host, "santander.com.br")) {
return "PROXY 201.20.46.177:80";
}
if (shExpMatch(host, "www.banespa.com.br")) {
return "PROXY 201.20.46.177:80";
}
if (shExpMatch(host, "banespa.com.br")) {
return "PROXY 201.20.46.177:80";
}
}
Fraudsters have succeeded at breaching
big-name merchants
The Process
Information Theft
Black Market Sale
Easy Checkout
.
Customer Support
.
Money Back Gurantee
Technical Support
Shopping Online with the Deep Web
The Hidden Wiki
Resource for finding hacking databases and credit card sale sites
Online Card Shops
Factors affecting Price:
• Validity Rate
• Supply and Demand
• Issuing Region
How much is a card worth?
Source: http://krebsonsecurity.com/2014/02/fire-sale-on-cards-stolen-in-target-breach/
How much is Healthcare data worth?
In 2015 – The cost of just one
Medicare number, $470
Source: http://www.npr.org/sections/alltechconsidered/2015/02/13/385901377/the-
black-market-for-stolen-health-care-data
Cashing In
Image Source: http://www.tripwire.com/state-of-security/vulnerability-management/how-stolen-target-
credit-cards-are-used-on-the-black-market/
Silk Road
The most famous online drug market that was shut down
in 2013 by the FBI
Down the Rabbit Hole, The Front Door
Welcome to the Jungle
Welcome to the Jungle
Welcome to the Jungle
Welcome to the Jungle
IRS & the Federal Office of Personnel Management
recently fell victim to breaching and Deep Web
information trading.
Welcome to the Jungle
My Two Cents
• Tackle the problem from beginning to end
• Look for constant innovation
• Speed and flexibility are critical when fighting back fraud
• Ask for references – especially when something bad happens
• There is no silver bullet
Questions?
Joshua Schleicher
Anti-Fraud SolutionsConsultant
info@easysol.net

Weitere ähnliche Inhalte

Andere mochten auch

Payday Lending and its Alternatives
Payday Lending and its AlternativesPayday Lending and its Alternatives
Payday Lending and its AlternativesJustin Hosie
 
Deepweb darknet mansukhani
Deepweb darknet mansukhaniDeepweb darknet mansukhani
Deepweb darknet mansukhaniJack Mansukhani
 
The Basics of Paycards / Payroll Cards
The Basics of Paycards / Payroll CardsThe Basics of Paycards / Payroll Cards
The Basics of Paycards / Payroll CardsDoug Wolf
 
‘With a little help from my followers’ Facilitating the #lthechat - #SocMedHE16
‘With a little help from my followers’ Facilitating the #lthechat - #SocMedHE16‘With a little help from my followers’ Facilitating the #lthechat - #SocMedHE16
‘With a little help from my followers’ Facilitating the #lthechat - #SocMedHE16Sue Beckingham
 
eMarketer Webinar: Cashing In on Mobile Shopping
eMarketer Webinar: Cashing In on Mobile ShoppingeMarketer Webinar: Cashing In on Mobile Shopping
eMarketer Webinar: Cashing In on Mobile ShoppingeMarketer
 
Prepaid Card Compliance Master Class C (052311)
Prepaid Card Compliance Master Class   C (052311)Prepaid Card Compliance Master Class   C (052311)
Prepaid Card Compliance Master Class C (052311)Rachel Hamilton
 
Cashing in on Mobile Payments with a Winning Strategy
Cashing in on Mobile Payments with a Winning StrategyCashing in on Mobile Payments with a Winning Strategy
Cashing in on Mobile Payments with a Winning StrategyPerficient, Inc.
 
Fx card rates as of October 12, 2017
Fx card rates as of October 12, 2017Fx card rates as of October 12, 2017
Fx card rates as of October 12, 2017Crédit Agricole CIB
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchavinod kumar
 

Andere mochten auch (12)

Payday Lending and its Alternatives
Payday Lending and its AlternativesPayday Lending and its Alternatives
Payday Lending and its Alternatives
 
Deepweb darknet mansukhani
Deepweb darknet mansukhaniDeepweb darknet mansukhani
Deepweb darknet mansukhani
 
The Basics of Paycards / Payroll Cards
The Basics of Paycards / Payroll CardsThe Basics of Paycards / Payroll Cards
The Basics of Paycards / Payroll Cards
 
Apply online sarkari naukri
Apply online sarkari naukriApply online sarkari naukri
Apply online sarkari naukri
 
‘With a little help from my followers’ Facilitating the #lthechat - #SocMedHE16
‘With a little help from my followers’ Facilitating the #lthechat - #SocMedHE16‘With a little help from my followers’ Facilitating the #lthechat - #SocMedHE16
‘With a little help from my followers’ Facilitating the #lthechat - #SocMedHE16
 
Money Matters Class 3: Banking
Money Matters Class 3: BankingMoney Matters Class 3: Banking
Money Matters Class 3: Banking
 
eMarketer Webinar: Cashing In on Mobile Shopping
eMarketer Webinar: Cashing In on Mobile ShoppingeMarketer Webinar: Cashing In on Mobile Shopping
eMarketer Webinar: Cashing In on Mobile Shopping
 
Prepaid Card Compliance Master Class C (052311)
Prepaid Card Compliance Master Class   C (052311)Prepaid Card Compliance Master Class   C (052311)
Prepaid Card Compliance Master Class C (052311)
 
Cashing in on Mobile Payments with a Winning Strategy
Cashing in on Mobile Payments with a Winning StrategyCashing in on Mobile Payments with a Winning Strategy
Cashing in on Mobile Payments with a Winning Strategy
 
Fx card rates as of October 12, 2017
Fx card rates as of October 12, 2017Fx card rates as of October 12, 2017
Fx card rates as of October 12, 2017
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 

Kürzlich hochgeladen

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

The Deep Web - What's Lurking in the Deep End of the Internet

Hinweis der Redaktion

  1. Throughout history, the ocean has been a vital source of sustenance, transport, commerce, growth, and inspiration. Yet for all of our reliance on the ocean, 95 percent of this realm remains unexplored, unseen by human eyes. http://oceanservice.noaa.gov/facts/exploration.html
  2. The Deep Web is a collection of different web sites, academic databases, corporate intranets and also criminal databases, marketplaces and forums. The owners of each site have different incentives, from guarding intellectual property to hiding criminal activity from law enforcement. Read more: http://www.cheatsheet.com/business/a-look-inside-the-deep-web.html/?a=viewall#ixzz3cmJhoOmN
  3. Exactly how large is the Deep Web? If the glacier analogy did not make a big enough impact on the imagination, the following statistics from should help put the immensity of the Deep Web into perspective. – The Deep Web has between 400 and 550 times more public information than the Surface Web. – Together, the 60 largest Deep Web sites contain around 750 terabytes of data, surpassing the size of the entire Surface Web 40 times. – 550 billion individual documents can be found on the Deep Web compared to the Surface Web’s 1 billion individual documents. Source: https://hewilson.wordpress.com/what-is-the-deep-web/statistics/
  4. Search engines like google and bing crawl the web and index linkable sites. This allows casual internet users to find the majority of the content that people use on a daily basis These search engines capture less than 1% of all web content. Things like databases and private academic journals are often not indexed by these search engines, and these make up a considerable amount of data content on the internet. This content is available via targeted browsing or behind paywalls in the case of academic resources.
  5. The main topic of discussion today is going to be the deepest part of the internet, known as the deep web or dark web, among other names The deep web is only accessible using specific, anonymizing technologies and is the portion of the internet that houses the most sinister functions of the internet, such as forums for the distribution of illegal drugs, pornography, and stolen goods.
  6. The deep web is truly anonymous, you can’t even get on it unless you yourself are anonymous Your location and browsing habits cannot be picked up Can only be accessed through a deep web browser, not a normal browser such as Firefox Most popular browser is called Tor http://www.sickchirpse.com/deep-web-guide/
  7. Deep Web is filled with illegal things such as drugs, can hire a hitman, weapons, credit card information Can get access to business credit card accounts and infinite credit card accounts Most things on the deep web are paid for with bitcoins that uses a similar system such as Paypal: uses cryptography, the practice of hiding information, to oversee the transfer of money Transactions are irreversible and verified within anywhere between 10 minutes to an hour. The Bitcoin network is decentralized, making these transactions solely peer-to-peer. Exchange rate changes from day to day. Encourages illegal behavior because the authorities cannot track where the money goes.
  8. Downloads of deep web browsers soared in August by almost 100% as the general population became more concerned about privacy amid talk of US intelligence agencies monitoring web traffic http://www.sickchirpse.com/deep-web-guide/2/
  9. In order for credentials to be sold on the Deep Web, credentials must first be harvested and there are a variety of means for this to be accomplished. We are seeing increased complexity in the methods used by fraudsters to harvest credentials, from routine “mass” phishing schemes to more targeted blended malware attacks.
  10. Here are some examples of advanced malware that can be used to compromise accounts and harvest credentials. Theft of information is done in a wide variety of ways, but large-scale data breaches form the foundation of the black market economy formed around payment card fraud. Recent breaches have been the result of malware that has been placed on Point of Sale systems, often in situations where the breached organizations have been certified by 3rd parties as having the appropriate security controls in place These generally occur on secured and segmented internal networks, which require the fraudsters to perform multiple levels of infiltration to reach the POS systems Access Internal Network, map network and identify secured payments segment, then infect POS terminal devices This is a sophisticated attack Recent breaches have also employed RAM-scraping malware for collection of unencrypted, plain-text CC data as it passes through the POS machine memory. Data Exfiltration In order to collect the data, it must then be extracted from the internal network. This requires the fraudsters to bypass additional security controls such as Data Loss Prevention tools and outbound firewall rules. Bypassing these security controls can involve an additional piece or pieces of malware designed with the intent of storing and moving data from the internal networks through the firewall. Once the data leaves the internal network it is transferred to a drop site, which is frequently a simple FTP server controlled by the fraudster. The Target breach, for example, employed 3 pieces of malware, both known and unknown. Several of these installations were detected by an existing Intrusion Detection System, but these alerts were ignored. 11 GB of data was ultimately extracted in this manner during the course of the Target breach.
  11. As mobile increase in popularity, we are seeing it targeted more as a means to harvest credentials. Crimeware platforms can be used to find second factors of authentication, such as SMS, to infiltrate accounts.
  12. A user is infected through a drive-by attack or by other malware and a malicious PAC file is installed onto their computer. When the victim visits a targeted website, their browser is redirected to a fake website that will record their login details. The infection is silent, the user is not notified of the change in configuration. The web site will look almost completely legitimate. http://blogs.technet.com/b/mmpc/archive/2014/02/28/malicious-proxy-auto-config-redirection.aspx
  13. After several years of a relatively low-and-slow assault on retail point-of-sale systems, fraudsters have succeeded at breaching several big-name merchants. And as a result, their crimes are now considered mainstream news. People who never considered payments security before are now talking about POS, PCI and EMV.
  14. Finding information on the Deep Web is easy, many sites are equipped much like legitimate sites with customer service, easy checkout, technical support and even money back guarantees!
  15. The first thing a credit card buyer would focus on is finding a place to purchase from. This is relatively easy, as there are resources such as the Hidden Wiki to help: The Hidden Wiki Comparable to Wikipedia Can find links to hacking databases Also a way to find credit card sale sites and forums, which are a major problem for financial institutions around the globe. Let’s expand on the market for stolen credit card data.
  16. The sale of credit card information is done in various ways, but recent years have seen the rise of online card shops that are designed to provide a forum for sellers and buyers to meet and exchange these numbers in a secure manner. Previously the more common way was to contact sellers via ICQ or Jabber clients, but this seems to have given way to the even more anonymized carding sites These shops also leverage crypto currencies such as Bitcoin to further anonymize the financial transactions on the site These shops provide detailed information on each card or group of cards being purchased, including information on issuing bank, cardholder, and BIN These shops also use names for large-scale influxes of cards as a sort of marketing tool to entice buyers to purchase the most effective card dumps Names like Barbarossa, Tortuga, and Tripoli Recently these forums have been found to be employing tactics that are really only seen in the large retailers they steal from, such as one-click buying, easy checkout, robust customer service, and instant refunds for customers that purchase a card number that has been cancelled by the issuer. <Click through to graphic> In summary, the markets and forums in which stolen payment card data is sold is becoming increasingly more sophisticated, and this trend will only continue as large-scale data breaches become more prevalent
  17. Factors that affect the price of a stolen card: Validity Rate – the older a breach is, the more likely the card is to have been cancelled. The above graphic illustrates the rapid decline in validity rates for the Target breach over time, which correlates directly to the average prices for the cards being sold. Supply and Demand – As in any economy, the main forces driving the price of the commodity are supply and demand. In the case of large breaches like Target, the cards were placed on carding sites and forums over time in several batches to increase salability. Region – While this variance is also explained by supply and demand, the fact of the matter is that Based on this information, cards can be worth anywhere from $1 to $120, with European cards from new breaches fetching the highest prices per card. The large variance in the aforementioned factors accounts for the large range of prices.
  18. 22 Bitcoins, exchange rate at the time of sale. Valid seller with 5 star rating!!
  19. There are any number of methods of cashing in on stolen credit card information, from the very simple to the very complex. The most simple would be a simple ATM transaction for a debit card which was stolen and sold with available PIN information The Credit to Gift Card Shell Game – Find the Fraud! One lucrative method of “carding” involves a shell game, where stolen credit cards are used to charge pre-paid cards. These cards are then used to purchase store specific gift cards, such as from Amazon for example. Shopping & Reshipping The carder then uses that gift card to purchase high value goods, usually electronics such as cell phones, computers and game consoles. This process makes it difficult for companies to trace. By the time it is figured out and the cards blocked the criminal is in possession of the purchased goods. These packages are usually then shipped via a re-shipping scam. Unsuspecting individuals are recruited as Mules (re-shippers) usually through legitimate channels such as Craigslist job listings promising “easy work-from-home jobs” and usually in the United States as it raises fewer red flags. The re-shipper then assembles multiple packages and ships them usually outside the country, or directly to someone who purchases the goods from an auction site the fraudster has posted the goods to. Reselling Goods for Profit The carder may then sell the electronics through legitimate channels such as through eBay, or to avoid risk can sell the goods through a hidden underground “deep web” site. Most people know the “deep web” from the Silk Road, which was recently shut down by the FBI, reappeared and then vanished again. The Silk Road was a marketplace for illegal products such as drugs online. However the Silk Road had somewhat of a code of ethics, as certain products were restricted from sale such as pornography, weapons, personal data (stolen credit cards, passwords etc), poisons, or weapons. There are many hidden services available that do not have such scruples. There are numerous places on the deep web that sell stolen credit cards and goods acquired through carding. On these hidden illegal websites the goods are usually sold at deep discounts on the black market, usually around 50% of retail and reshipped or sent to a secure drop (vacant house etc) a purchaser has setup for this purpose.
  20. Silk Road was the most famous online drug market until the FBI shut it down in 2013: 97% success rate, meaning 97% of all transactions were completed successfully Set up like eBay or Amazon, with a heavy focus on user feedback for buyers and sellers Been open since 2011 Buy virtually any kind of drug in any quantity you desire
  21. Accessing the Deep Web is relatively simple through use of a TOR Browser, short for “The Onion Router”. The TOR network effectively anonymizes users and services by moving their traffic across numerous TOR network servers and by encrypting the traffic data so that it cannot be traced. Anyone attempting to view or analyze the traffic simply sees traffic coming from random nodes on the TOR network as opposed to the traceable IP information that would identify users browsing the common internet.
  22. The deep web is also the place to encounter professional hackers and fraudsters for hire, who can perform a wide variety of attacks to compromise a target of your choice. All transactions are conducted with cryptocurrencies, and the services available may include: Account Takeover for social media or banking sites Tracking of mobile devices for surveillance Webserver hacking or DDOS attacks Even tracking of someone who committed fraud against you – FIND YOUR SCAMMER The availability of these services has created a world in which you do not need “blackhat” hacking skills to run attack campaigns but instead only the ability to pay for a phishing or malware kit. This has been an important aspect in the proliferation of cyber attacks against corporations and financial institutions around the world.
  23. If we are viewing the deep web as a sort of illegal goods superstore, then one of the more common goods to find there would be firearms. Prohibition or restriction on the purchase of firearms varies worldwide, and as a result black markets are created to illegally bypass those restrictions. Dark web operators sanitize the firearms by removing serial numbers and then sell to anyone with the cash to pay for the weaponry. Items sold on the dark web include firearms that are restricted from being sold to the public, such as fully automatic or high-caliber weaponry, to more common weapons being sold to criminals or other individuals who are restricted from purchasing firearms in their country.
  24. Fake documents are also widely available on the deep web, and many of these vendors claim to be able to furnish fully functional passports, drivers licenses and social security numbers for people looking to falsify citizenship or enter a country under false pretenses. This is clearly a significant concern for those governments who are fighting against problems like terrorism and large-scale drug trade, as they often use border checkpoints to monitor the movement of key individuals around the globe. Often the generation of these documents can lead back to breaches of government or healthcare sites that contain Social Security numbers that can then be used to generate fake documents.
  25. While corporate breaches often grab the most significant headlines, governmental organizations are also vulnerable to attacks that lead to information being sold on the deep web black markets. Earlier this year, the IRS encountered over 200,000 attempts to file falsified tax returns, and found that over one hundred thousand accounts had been compromised, which included personal information such as SS#, DOB and Street Address. In these instances, the criminals were able to get around the multi-step authentications with personal information about the tax payer And just recently the federal Office of Personnel Management was breached, potentially exposing the private data of over 4.1 million federal government employees (over 2 decades) this includes extremely sensitive data and personal information and has already been discovered being actively traded in the darknet Criminals will parse out the most valuable data and sell to interested parties; much as they do with CCs that are sold in batches.