Automated Identity Theft
نویسنده
چکیده
89 otherwise shed light on their underground activities. In one recent case, honeynet intruders exposed the existence of automated tools that support and facilitate identity theft and credit-card fraud. Members of a community who call themselves carders use these tools to defraud Internet merchants and consumers of potentially large financial sums. The preceding installment of this department 1 described an attack on a Microsoft Windows 2000 honeypot that was subsequently incorporated into a large IRC botnet consisting of at least 15,164 distinct hosts. Human intruders later entered the honeypot by means of the same attack vector— capitalizing on a null administrator account password—used in an earlier attack. Because the honeypot was not instrumented for data capture , researchers could observe the new intruders' activities via packet captures of network traffic obtained with the Snort intrusion-detection system (IDS). After entering the honeypot, the new intruders downloaded and installed Cygwin (www.cygwin.com), a dynamic link library (DLL), and a collection of tools that provide a Linux-like environment under Windows. The intruders used Cyg-win to compile and run PsyBNC (www.psychoid.net), an IRC proxy popular in the black hat community. Black hats frequently use PsyBNC to conceal their online identities when using IRC and to maintain continuous contact with one or more IRC servers. They refer to PsyBNC and similar proxies as bouncers. The intruders configured Psy-BNC to access several channels of the DALnet IRC network (www. dal.net) including #cc and #mas-terccs. Because the honeynet's Snort IDS logs network traffic and because IRC is a plain-text protocol, the honeynet's operators could monitor traffic on the channels ac-cessed by the intruder's PsyBNC. The operators monitored IRC traffic from its inception on 2 April 2003 to 13 May 2003, the date on which DALnet began successfully enforcing a ban against the channels, as explained in the " DALnet acceptable use policy " sidebar. The honeynet operators immediately noticed instances of credit-card and other identity-related information being illicitly shared and traded on the monitored channels. They also saw instances of highly specialized communication, which was indicative of communication with software programs rather than humans, such as the following: (Any identifying information in the example is obfuscated to avoid disclosing personal information.) The strings TH3-RELO4D and busàre names by which two IRC users are known. Based on subsequent observation, the observers determined that TH3-RELO4D is a human and busìs a bot—a software program that communicates with humans and other …
منابع مشابه
The Consequences of the Identity Theft Fear in the Sport Products Online Shopping From the Perspective of Physical Education Students
Background. Today, online shopping has become one of the most important components of modern marketing that had both positive and negative consequences for customers. Objectives. The purpose of present research was to study the consequences of fear of identity theft in sport products online shopping from the perspective of physical education students. Methods. The present study is a descripti...
متن کاملAn automatic and proactive identity theft detection model in MMORPGs
Identity theft happens frequently, especially in popular multiplayer games where cyberassets can be monetized. In this work, we propose an automatic and proactive identity theft detection model in online games. We specify the identity theft process into exploration, monetization, and theft and pose identity theft detection as a multi-class classification problem. We propose an automatic and pro...
متن کاملNew Form of Identity (ID) Theft Crime: Acquiring Personal Information from Your Online Newsletter Providers
Using sophisticated means, Identity (ID) Thieves can acquire victims’ personal information for their own deeds from online news providers. This paper discusses how ID Thieves may compile their stock of trade from Directory Harvest Attacks (DHAs) and launch the attacks against online news providers with two possible attack methodologies. This follows by an evaluation of the inadequacy of the cur...
متن کاملOn Identity Theft and a Countermeasure based on Digital Uniqueness and Location Cross-Checking
We define identity theft as the unauthorized use and exploitation of another individual’s identity-corroborating information. Published research proposing technical countermeasures is sparse, in contrast to a number of recent proposals to address the sub-problem of phishing. We first identify some underlying problems facilitating identity theft. To address identity theft and the use of stolen o...
متن کاملID Theft , ID Fraud and / or ID - related Crime . Definitions matter
Identity theft is often perceived as one of the major upcoming threats in crime. However, there is no commonly accepted definition of ‘identity theft’ or ‘identity fraud’, and it is impossible to study the real threat of this phenomenon without conceptual clarity. In this article, we attempt to provide a starting point for policy and research by proposing some definitions. We indicate that what...
متن کاملCountering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling
One of today’s fastest growing crimes is identity theft – the unauthorized use and exploitation of another individual’s identity-corroborating information. It is exacerbated by the availability of personal information on the Internet. Published research proposing technical solutions is sparse. In this paper, we identify some underlying problems facilitating identity theft. To address the proble...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Security & Privacy
دوره 1 شماره
صفحات -
تاریخ انتشار 2003