10.08.2013 Views

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Recent estimates state that about 3,000 different botnet command & control servers 139<br />

are known to be operating every day, with each botnet averaging 20,000 compromised<br />

computers. 140<br />

2.1.1.3 Exploitation<br />

The third activity involves the final exploitation <strong>of</strong> the stolen information obtained<br />

through the cyber attack: turning the traded data into cash. When criminals obtain the<br />

stolen data (personal information, credit card and bank details), they must use it to steal<br />

money. This is not without risk, and this is where the chance <strong>of</strong> detection and arrest<br />

increases significantly. 141<br />

This activity involves high risk and lower technical capabilities, and can be easily<br />

embraced by organised criminal gangs and individual agents looking for money. 142 There<br />

are many ways to exploit information obtained from illicit means. Some involve technical<br />

skills while others require no more than the ability to use an ATM. 143<br />

For instance, cloning credit cards requires a minimum understanding <strong>of</strong> technical<br />

procedures. Cybercriminals install a false front to ATM machines that conceals a device<br />

capable <strong>of</strong> cloning all the relevant card details necessary to create a digital copy. First, a<br />

scanner reads the magnetic stripe on the reverse <strong>of</strong> the card to capture the card data,<br />

which contains the 16 digit card number, the card start and expiry dates, the<br />

cardholder’s name and the security number on the card. Second, a small digital camera<br />

photographs the card owner entering the PIN code, providing the owner does not<br />

139 Command & control infrastructure is the system that remotely sends instructions to the hijacked computers<br />

(zombies) that comprise the botnet. This is done via an IRC (Inter Relay Chat) server installed illegally. If the<br />

command-and-control is disabled, all the machines in the botnet become useless to the botmaster.<br />

140 Some C&C servers manage just a few infected computers (~10), large ones manage thousands <strong>of</strong> bots<br />

(~300.000) – Barroso, (2007), ENISA Position Paper No. 3; Botnets – The Silent Threat.<br />

141 Kaspersky, (2005), “The changing threat, from prankster to pr<strong>of</strong>essionals”.<br />

142 Russian crime groups, for example, minimize the risk <strong>of</strong> being caught by selling the credit card information<br />

to, amongst others, Nigerian groups who are more prepared to take the risk <strong>of</strong> being caught. In London,<br />

recently, a Latvian criminal was caught when a long queue <strong>of</strong> ATM users complained to the police who arrested<br />

the user in possession <strong>of</strong> a large number <strong>of</strong> credit/debit cards complete with pin codes written on each card.<br />

He was only detected because he was too lazy, incompetent or impatient to move from one machine to<br />

another. These users can net over £20,000 a week. Interview with Roy West, Cheque and Credit Card Unit,<br />

City <strong>of</strong> London Police, 9 th December 2008.<br />

143 Details on the examples <strong>of</strong> this are provided in the following section on dynamic capabilities.<br />

Page 48

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!