How Cybercriminals Steal Money! - Downloadable Whitepaper (2024)

Home / How Cybercriminals Steal Money!

Hackers have moved beyond stealing corporate and government secrets anddefacing web pages to something more lucrative: stealing actual cash andcredit cards, committing fraud, extorting people, and even encrypting data
files and holding it for ransom, until the victim pays a fee to get it back.Over the past three or four years the profile of the cyberattackers has changed. Previously when people usedto write worms and viruses, they would typically want Cybercriminals
to make names for themselves, they were seekers ofnotoriety. They would release worms and viruses thatwould cause lots of traffic, crash lots of servers until somepatch was deployed, and the game would be over.The big shift that’s occurred over the past three years isa results of significantly increasing volume of commercethat is now transacted on the Internet. As more businesses make more and more moneyfrom e-commerce, the cybercriminals want to get their share. The motivation now for thevast majority of cyberattacks is money. The attacker profile has shifted from amateurs toprofessionals that want to make money and, in many cases, those professionals are veryorganized.It is their full-time job to attack sites. The bad guys, in some cases, will hireother people as mules to transfer money from one place to the other, so it’s an extensive,organized network. We’re not fighting against amateurs anymore.Let’s explore some of what the cybercriminals are doing and what if anything youcan do to protect against that.

Organized Crime Networks

An example of an organized crime network is the Russian Business Network. They’reresponsible for botnets like Storm, which have compromised over one million machines.Storm is a peer-to-peer based botnet that can be used for denial of service, key loggingand several other malicious actions. The Russian Business Network is also alleged tobe responsible for a piece of software called Malware Alarm. Malware Alarm pops upa dialog box on your PC, with a message saying, "We think your computer is infectedby malware. Please click here to disinfect." Of course, if you click here to disinfect, itwill infect your computer as opposed to disinfect it. The Russian Business Network is avery organized group. The cybercriminals rent out the machines on those botnets for Xcents per day, and you give me a binary. I’ll put whatever binary you give me on thosemachines and farm them out.

Encrypted File Ransom Attacks

A new tactic used by thieves is to encrypt files on a victim’s computer and demanda ransom in order to unlock that. One tool to do that is the Cryptolocker malware. InNovember, the National Crime Agency in the UK warned that tens of millions of peoplewere targeted by spam containing the Cryptolocker virus.

If you fall victim to Cryptolocker, a hackercould lock up forever that spreadsheet ordocument where you keep all your contacts,personal data, and root passwords. Whilethis data might have little or no value tothe hacker, for you it is vital. So you wouldcertainly considering paying 1 bitcoin(454 Euros), as in the screen shown below, toget that back.

The cyptolocker email contains a zip file. These contain PDF files with a PDF icon whoseactual file suffix is .exe. But people will not see that this is an .exe file as show file extensionsis turned off in Windows by default. So the victim unzips the file, click on the PDF, andinstalls the virus. Now Cryptolocker can start encrypting files, plus it goes to the internetand downloads even more malware.The victim cannot unlock the file himself or herself by looking for the encryption key in
the Windows registry or file system. Cryptolocker is far more sophisticated than that. Itcontacts its command and control server to download encryption keys. It is also faulttolerant. There are not just a handful of command and control servers, something thatcould be blocked by coordinated law enforcement. Instead, the thieves have adopted theP2P approach to distributed computing, which is called Gameover Zeus, as explained
below, making it difficult to shut down.


Gameover Zeus

The Gameover Zeus botnet is a network of 500,000 to 1 million Windowscomputers that are infected with the Gameover virus which is used toprocess payments and download encryption keys for Cryptolocker.
Krebs on Security reported in June 2014that the US Justice Department workedwith law enforcement agencies aroundthe world to take control of the GameoverZeus Botnet. The Gameover Zeus botnet isa network of 500,000 to 1 million Windows
computers that are infected with theGameover virus which is used to processpayments and download encryptionkeys for Cryptolocker. Krebs says thatGameover has been used to steal morethan $100 million from banks, business,and consumers. The accomplices in thiscrime are ordinary people who unwittinglyallowed their computers to be hacked,thus becoming proxies for this crime.

An ordinary hacker can rent a botnet tolaunch, say, a denial of service attack.Gameover Zeus is orders of magnitudemore complex. If its command and controlservers get taken down, the systemgenerates random domain names endingin .ru, .com, .info, and .biz and then consultstop-level DNS servers to see which newdomains have been registered to see if anyof those match and then failover to that.In other words, if law enforcement shutsdown the existing command and controlservers, the thieves can register hundredsmore to bring traffic back online. Gameoverjust looks for any new domain name thatmatches some pattern and connects to that.


Online Banking Heists

The internet has greatly reduced the need for bank robbers to maintain many people intheir crew. The old way of robbing someone’s bank account was to replace an ATM´s cardreader with a hacked one and install a camera to read the pin as the banking customertyped that in and then clone their debit card.Someone who is a victim of account theft like that has varying levels of protectiondepending where they live, whether they have insurance, what kind of account they have,
and how much money was stolen. But consumer protection does not always extend tobusinesses, where a wire transfer can reach into the hundreds of thousands or millions ofdollars. ComputerWorld reported that a judge ruled a bank in the USA could not be heldresponsible for $440,000 that was stolen from a business account. The bank was followingrecommended security practices. The customer lost their user id and password to hackerswho used that to wire money to themselves. Thatcourt said the customer’s inability to protect theirown password was not the bank’s fault. Protection does notalways extend to businesses,where a wire transfercan reach into the hundredsof thousands or millionsof dollars.
Sometimes banks are the victims themselves.Last year hackers logged into systems of variousbanks in the Middle East and greatly increasedthe value of prepaid Mastercards issued there.Then thieves fanned on foot to buy luxury cars
and Rolex watches.

Keyboard Logging

The thieves who robbed the commercial customer we mentioned above could havestolen these credentials by installing malware that records keystrokes. Windows is notthe only place where that happens. Security researchers have shown that Android
(and iPhone) apps can use the accelerometer, gyroscope, and orientation sensors todetermine what the key user has typed on the keyboard.

People rarely pay any attention to thepermission requested by Android appswhen they install them. Plus apps askfor permissions they do not need. Forexample, why does Chrome need accessto your camera and Microsoft SkyDriveneed access to your contacts? What makesthis situation worse is there is no option togive permissions one-at-a-time. Either youinstall the app with all the permissionsrequested or you cannot install the app.So people are trained to give all of thataway without giving it much thought.

See SpamTitan anti-phishing and anti-malware solution in action today - book a free demo

Book a Demo

Fraud

There are many kinds of smartphoneattacks. For example, people can installmalware that looks like something theyalready know, like Angry Birds, that usesthe same logo. Then the user blowsthrough the permissions screen, withoutreading that carefully, and gives awayaccess to their phone logs, contacts,camera and microphone, sensors, andthe ability to send text messages. Onceinstalled, the app can send out textmessages to expensive messagingservices running up the customer’s billand filling the criminal’s coffers.WhatsApp has become a platform forexecuting fraud. People have beentricked into forwarding messages toothers. When someone clicks on thatmessage, it directs them to a website

People rarely pay anyattention to the permissionrequested by Android appswhen they install them. Plusapps ask for permissions theydo not needwhich then records their IP address. Withthe IP address, the hacker can consult
the phonebook and map to create avoice mail from that country code andarea code or invoice from a companylocated in that area. Someone is morelikely to trust something from someonewho works or lives in the same area asopposed to, say, some distant location.Once the victim opens the link, the sitecan drop an .apk (zipped-up Androidapp) file into the download folder.Depending on the operating systemversion and the security settings on thephone, if the user clicks on that it either
installs the app, warns the user aboutthat, or not install anything. Then theapp can start stealing data and sendingout copies of itself.

Wholesale Data Theft

It was widely reported last year thathackers got into the point-of-salecash register systems at the Americanretailer Target. They stole 250 millioncredit cards. This type of data, like creditcard numbers and identity informationis very attractive for cybercriminals.Within hours those stolen credit cardswere being sold in online black marketsfor $100 each. Online black marketsare an ever expanding channels andgrowing underground economy.Criminals can also burn those credit
card numbers onto blank magneticstripes of their own and hand thoseout to mules who then go to ATMsand try to do cash advances or usethe cards at various points of sale. TheAmerican banking system is particularlyvulnerable to that because they donot required pins or use a credit cardauthentication keys. Because of thisweakness and data loss, the Americansare starting to change those paymentsystems.

This year there were more victims.Hackers stole an incredible 350 millionuser ids and passwords from eBay. eBayowns PayPal as well, but the passwordsfor each system are kept in separatedatabases. Thank goodness for that, as
PayPal is where the money is located. But as you know, people often usethe same password for more than onesystem. Try their eBay password atPayPal and it might just work.Passwords should beat least 8 characters,use letters that are notwords, be mixed caseand include numbers
and symbols.

Stolen passwords are not safe. They arenot encrypted, as that would requirethat they be accompanied by a key(in other words a password), insteadthey are encoded. That means theycan be unlocked by simply looking ina dictionary of hashed passwords tosee which ones match. For this reason,people should not use words in English,Russian, or any other languages aspasswords. You’ve undoubtedly heardthis before, but are you doing it? Allnetwork devices should be configured
with strong passwords. Passwordsshould be at least 8 characters, useletters that are not words, be mixedcase and include numbers and symbols.

Read Guide:Guide to Data Breach Prevention

Security Weaknesses in Windows

The problems with the 8080 architecture and Windows are almost too numerous to list.Here are just a few and what, if anything has been done to address that.

One process should not be able to read the memory of another process. That is anIntel issue.

  • Microsoft now requires that .dlls be signed in order to run in the OS. That is animprovement as hackers now have to write their viruses to run inside other runningprocesses, since they execute .dlls themselves. Of course, installing an .exe is anotherissue, as the user who does that has given express permission to the operating system.
  • The buffer overflow problem is associated with the ability to read another program’smemory. Java and Android do not have this problem as programs there run inside Javavirtual machines (The modified version of Java that powers Android is called Dalvik.).Those cannot read memory outside the virtual machine. A C++ program running onwindows can read memory outside the area it has declared as its own. Hackers use thisto insert assembly language instructions in programs to make them load other objectsin memory. That is how they gain command-line access to Windows. Microsoft hasrandomizes where items are stored in memory to make that more difficult.
  • Windows gives almost anyone access to low-level operations and system files. Soa person can modify routing tables, overwrite system files, and do what otherwisewould be limited in Mac OS or other operating systems.

With the level of threats growing, what can you do? The short answer is: it’s complicated.The best security is to assume that your computers are already infected.

See SpamTitan anti-phishing and anti-malware solution in action today - book a free demo

Book a Demo

Two Factor Authentication

The number one way to stop hackers is to require two-factor authentication everywhere.That is such a simple idea that it stymies the mind to understand why people do notuse their cell phone or other device to authenticate their email or PC. If a hacker plantsmalware on your computer to read your keystrokes, they cannot use those stolencredentials to login without the Google Authenticator, RSA token, Cryptocard, orbiometric device used to enter the token needed to login to that.

These solutions don’t solvethe problem of phishing,spoofing or on lineimpersonation but they allmake it a lot more difficultfor criminals to succeed.Getting people to use two-factorauthentication is a matter of education onthe importance of doing so. The technologyis available, most banks and brokerages,and social media offer it. These solutionsdon’t solve the problem of phishing,spoofing or on line impersonation but theyall make it a lot more difficult for criminalsto succeed and will protect your onlineaccounts.


Internet and Computer Usage Policy

The biggest wild card in computer security is the end user. A good corporate usage policy isan obvious starting point, however many companies don’t bother or realise the importance.A usage policy is now a serious requirement for businesses. Importantly, not all internetpolicies should be the same: each should be tailored to the organisation’s particularrequirements so that clear, realistic and company appropriate guidelines are in place.As well as the issue of time wasting on the internet, the risk of employees accessinginfected sites of spreading malware, viruses and botnet infections across the networkis widespread. Cybercriminals wanting access to company network and data are notinterested in the size of the company so all sizes are at risk however, being prepared isthe best defence to tackle these problems.

Training and Education

Probably the best way to prevent attacks is through education. As we said earlier,botnets are computers operated by ordinary people set loose on your computers andothers. People already know you should not play with matches; they should also be
taught to pay attention what they click.

Don’t be a Vector

If you are running a website or application thendeploy tools to prevent cross-site scripting andSQL injection. Those are attacks where peopleenter actual mini-computer programs into datafields causing the computer to process that asinstructions to unmask cookies from other usersessions, copy files, or otherwise do damage.

Security Solutions

Spam is a big headache for organisations, causing problems such as data loss, networkslowdown, lost employee time and delivery of offensive, fraudulent and dangerouscontent to users. Spammers are constantly deploying new techniques to get around spamand security filters. Selecting a business spam filter can alleviate spam as a problem forbusinesses. There are many different types of business spam filter available. There are awide range of business spam filtering solutions available. Choosing the right solution foryour organisation will depend on many factors including the number of e-mail accountsyou want to support, your network topology, how much you are willing to spend, how youwould like to deploy the solution, how easily you can migrate to an alternative solution.Once you’ve established your key requirements it’s then time to research and look at theoptions available.

It’s important to keep your anti-spam, anti-virus and other network security solutions upto date. Most solutions will prompt you to dothis and any many will automatically update,it’s important that you manually check for theseupdates regularly. Oftentimes the updateswill be related to new features you don’t careabout, but updates will often deliver criticalpatches behind the scenes also.

See SpamTitan anti-phishing and anti-malware solution in action today - book a free demo

Book a Demo

Conclusion

After outlining the risks and how to mitigate some of those, it’s important to note thatthe situation is only going to get worse as refrigerators, thermostats, televisions, andeven automobiles are all now connected or will be connected to the internet. Expectthat cybercrime will increase and educate yourself about that. Even the most securecomputers in the world, the US Military and those at the NSA, were defeated by simplethumb drives. So your organization and you are certainly going to be a target at somepoint. The important thing to do is plan for that.

If you enjoyed this article you might also be interested in our System Administrators toolbox which contains lots of useful resources for busy IT Pros.


How Cybercriminals Steal Money! - Downloadable Whitepaper (2024)

FAQs

How do cybercriminals get money? ›

Sale of Exploits and Hacking Tools

Description: Cybercriminals develop and sell hacking tools and exploits that can be used to breach systems. This marketplace enables even less technically skilled individuals to launch sophisticated cyber attacks.

What cyber criminals can steal? ›

Types of data stolen by cybercriminals
  • Personally identifiable information (PII)
  • Financial data.
  • Healthcare and insurance information.
  • Usernames and Passwords.
  • Work logins and information.
  • Sensitive photos and videos.
  • Debit and credit card numbers.
  • Social media profiles.
May 2, 2024

How can cyber criminals steal money from a bank account? ›

In fact, bank phishing scams have become one of the most common types of criminal activities on the internet. In addition to stealing login credentials for bank accounts, cybercriminals also steal credit and debit card information for their own financial gain.

What do hackers want? ›

Here are some common motivations: 1> Financial Gain: Many hackers engage in cybercrime to make money. They may steal financial information such as credit card numbers or login credentials to sell on the dark web, engage in ransomware attacks, or conduct fraudulent activities like identity theft.

What method do cybercriminals use the most? ›

This makes phishing by far the most used cyber attack method in use by cyber criminals around the world. Phishing is where criminals try to trick people into performing an action, such as clicking a link that will download malware, or directing them to a malicious website.

Who do cybercriminals target the most? ›

Citing data from the European Repository of Cyber Incidents (ERCI), Statista reports that critical infrastructure is the target cybercriminals go after most frequently. State institutions and political systems are the second most common target, with more than 450 reported incidents in 2023.

What tactics do cybercriminals use? ›

Common Tactics Used by Cybercriminals

Grasping these methods aids in crafting effective defensive strategies. Among the most common tactics used by cybercriminals are phishing, malware distribution, and Distributed Denial of Service (DDoS) attacks.

What is the number 1 cyber crime? ›

Phishing attacks can take many shapes. Bulk phishing, smishing, and business e-mail compromise (BEC) are the most common types. In 2022, 85 percent of the surveyed worldwide organizations reported encountering bulk phishing attacks, while roughly three in four were targeted by smishing scams.

Who are the top 5 cyber criminals? ›

Here's a look at the top ten most notorious hackers of all time.
  • Kevin Mitnick. A seminal figure in American hacking, Kevin Mitnick got his career start as a teen. ...
  • Anonymous. ...
  • Adrian Lamo. ...
  • Albert Gonzalez. ...
  • Matthew Bevan and Richard Pryce. ...
  • Jeanson James Ancheta. ...
  • Michael Calce. ...
  • Kevin Poulsen.

Can I get my money back if my bank account has been hacked? ›

Am I going to get my money back? Your bank should refund any money stolen from you as a result of fraud and identity theft. They should do this as soon as possible - ideally by the end of the next working day after you report the problem.

How do criminals steal money online? ›

Stealing Electronic Currency

These Trojan programs collect information on access codes / passwords for user accounts and then send the data to the criminal. Usually, the information is collected by searching and decoding files that store personal data about the account's owner.

What information does a scammer need to access my bank account? ›

The easiest way to become a victim of a bank scam is to share your banking info — e.g., account numbers, PIN codes, social security number — with someone you don't know well and trust. If someone asks for sensitive banking details, proceed with caution.

What is a hacker's main goal? ›

The goal of hacking is to manipulate digital devices in order to cause damage or corrupt operating systems. It also allows hackers to collect user information, steal sensitive information and documents or perform other disruptive data related activities.

What do hackers target most? ›

What do hackers tend to look for?
  • Social Security numbers.
  • Date of birth.
  • Email addresses.
  • Financial information.
  • Phone numbers.
  • Passwords.
  • Credit card info.
  • Crypto wallets.

Can hackers see and hear you? ›

Mobile spyware is malware that allows hackers to steal information and watch anything within view of your phone camera. It can also enable them to access your microphone, location, calendar, and contacts. This makes it possible for hackers to record your videos and calls.

How do cybercriminals cash out? ›

The process of transferring illicit proceeds to a threat actor or designated representative. Common methods include ATM withdrawals, purchasing digital currencies, transferring funds to online payment platforms or buying goods or gift cards. Typically at the final stage of a fraudulent scheme.

How do hackers get your money? ›

Most of the time, by tricking the bank account owner. They fool them into giving the password, or just trick them into making a transfer to the scammer. There's all sorts of ways this is done, from phishing emails to scam phone calls pretending to be the bank, or IRS/HMRC, or something else.

How to get money from fraudsters? ›

Approaches to dealing with cybercrime related financial loss
  1. Report the scam to your bank's fraud team - the first step if for you to report the issue to your bank's fraud team. ...
  2. Fraud investigation - your bank has 15 days to investigate and then report back with an outcome on whether it will give you money back.

How much do cybercriminals profit? ›

$1.5 Trillion in Annual Revenue for Cybercriminals.

Top Articles
Latest Posts
Article information

Author: Otha Schamberger

Last Updated:

Views: 6228

Rating: 4.4 / 5 (55 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Otha Schamberger

Birthday: 1999-08-15

Address: Suite 490 606 Hammes Ferry, Carterhaven, IL 62290

Phone: +8557035444877

Job: Forward IT Agent

Hobby: Fishing, Flying, Jewelry making, Digital arts, Sand art, Parkour, tabletop games

Introduction: My name is Otha Schamberger, I am a vast, good, healthy, cheerful, energetic, gorgeous, magnificent person who loves writing and wants to share my knowledge and understanding with you.