Fighting Online Extortion 116
prostoalex writes "Information Week talks about those mornings, when an owner of an online business receives an e-mail message with his customer accounts and other personal information quoted, and extortionist asking for certain amount of money to be transferred to a foreign bank. Although 70% of the businesses surveyed for the article claim they never had to deal with extortion on the Internet, the article claims those small businesses who think they are not interesting for extortionists, are in for a surprise."
Sounds like a business opportunity. (Score:4, Interesting)
Who would a person call if they had some problems like this?
Re:Sounds like a business opportunity. (Score:5, Funny)
Ghostbusters?
Re:Sounds like a business opportunity. (Score:2, Funny)
Re:Sounds like a business opportunity. (Score:1, Interesting)
Re:Sounds like a business opportunity. (Score:5, Interesting)
In the US? The FBI I think; it's wire fraud which is a very serious offence and the foreign bank account angle takes it out of the jurisdiction of local/state police. I've been peripherally involved with something like this in the UK where the National High Tech Crime Unit got involved; the important things are not to panic and to contact the authorities immediately so they can do their thing.
In my instance, the NHTCU took care of contacting the banks responsible for the various credit cards and everything, or at least passed the information along to the relevent organisation(s). I gather most of the banks simply issued a new credit card without making a fuss or the customer aware of the real reason for that matter. And yes, the perps got busted - or more accurately got stung due to the combination of information recovered from the compromised box and a few "creative" emails written by the NHTCU.
Re:Sounds like a business opportunity. (Score:1, Interesting)
In many cases the FBI won't touch the case unles you can document $5000 in damgages or loss.
Re:Sounds like a business opportunity. (Score:3, Funny)
Re:Sounds like a business opportunity. (Score:3, Informative)
As an aside, lie. Exaggerate the damages, get the FBI in. The worst that can happen is you revise the damage estimate downward later.
Capt. Long John Silver Is A Good Mentor (Score:1)
If you're going to extort someone, and get away with it; Go into politics.
Re:Sounds like a business opportunity. (Score:3, Interesting)
I was thinking of a high-security service that stored most of the customer information. The only customer information on the e-store's server would be a customer number, and perhaps first name to serve as a greeting. The interface between the two servers would not allow open-ended queries. Only the type of queries needed would be allowed, which usually would only be verification that a customer is
Re:Sounds like a business opportunity. (Score:2, Insightful)
I worry for my employer (Score:5, Interesting)
My employer has a large site done in PHP that grew over the years, and is rife with opportunities for SQL injection.
They know what needs to change, and there is a plan to get from here to there over the next year, including a new in-house white-box security testing team. In the mean time, we are standing around with our pants down.
The thing that keeps me awake nights is: What happens if some disgruntled ex-employee (there are two floating around out there) decides to seek vengeance against us by targetting us in an extortion scheme?
Re:I worry for my employer (Score:2, Informative)
Re:I worry for my employer (Score:3, Insightful)
Re:I worry for my employer (Score:5, Funny)
out-scumbagging a scumbag (Score:2, Funny)
We have e-cam evidence of these murders. If you don't pay us 2 million bucks, we will release the videos over the 'net. -- Rocko
Re:Where is Xyzzy? (Score:1)
Re:Where is Xyzzy? (Score:2)
Re:Where is Xyzzy? (Score:1)
Re:I worry for my employer (Score:3, Interesting)
There it is, the most important thing to remember.
And the easiest way to do that is not to hire nutcases that are apt to become disgruntled former employees. This involves better checking of applications than many people are really interested in doing. Take this guy [cnn.com] for example: mental health counselor takes pit bulls to office in hurricane, orders them to attack others (coworkers?), goes out to his car. He has previously be
They'd be the first to be investigated (Score:1, Insightful)
Re:I worry for my employer (Score:3, Interesting)
The only "quick fix" in that scenario is to implement some kind of screening of incomin
Re:I worry for my employer (Score:2)
It's not a bad id
Sarbanes-Oxley? (Score:3, Informative)
Re:I worry for my employer (Score:1)
Well, if it is in fact a disgruntled ex-employee (as some many modern cyber attacks are), then don't worry about it: just accuse one, and you have a 50% chance of hitting the right one! Seriously, though, you should set up a temporary fix so you don't have to worry about it- at least until you can perma
Re:I worry for my employer (Score:2)
So who are the extortionists? (Score:5, Interesting)
THAT is really freaky.
Re:So who are the extortionists? (Score:5, Interesting)
--anecdote time--
If you're a small business, $100,000 might not be feasible. But then again, most small businesses won't need that kind of service. I've seen far too many sites ready to be discovered and attacked. One of my selling methods when I'm talking to a potential client is to visit their existing site and point out security holes. In one instance, I did a real quick SQL injection method to gain access to the "secure client login" area. Right in front of the client, we're staring at their largest client's account details.
"Can you fix it for me?"
--end anecdote--
I generally charge $75/hour; that's 1,333 hours and 20 minutes of work before they'd pay $100k. Even with failover servers, load distributing, etc., getting out of the extortionists' crosshairs doesn't have to be so expensive.
Re:So who are the extortionists? (Score:2)
Being able to resist to a DDOS seems to me the hard part! That's why they paid 100k in the article..
Re:So who are the extortionists? (Score:2, Insightful)
When your revenue is several tens of million a year (for a mid sized company), 100,000 looks cheap, even if it is something that could be handled a lot cheaper.
One thing I've noticed, people are resistant to change generally. But if that change comes from highly overpaid consultants, people are more willing to change the way they do things. O
Re:So who are the extortionists? (Score:2)
Re:So who are the extortionists? (Score:1)
Or you can take it as some clever joke. That I
(Of course I mean ISO 9000/9001, et al)
Re:So who are the extortionists? (Score:2)
Re:So who are the extortionists? (Score:3, Insightful)
In any event, they charged a lot and found little. In the outbrief, they made even the smallest problems seem huge. I guess they may have had a point.
IMHO, the team that came to see us charged a lot and did not really acomplish anything.
Re:So who are the extortionists? (Score:1, Interesting)
Re:So who are the extortionists? (Score:3, Informative)
I'd hope they are getting more than a "firewall + script" for 100G.
A quick look at Prolexic's web site [prolexic.com] make me think it's selling a distributed proxy service. Don't see why it wouldn't work.
As far as the reasonability of cost, I doubt 100G is a big number for them..
Certainly different from legal forms of extortion (Score:5, Interesting)
really? (Score:3, Insightful)
They figure the lawsuits and lost sales from this leaked information would cost X amount of money so they're willing to pay less than X to stop the leak. Maybe they should have kept the sensitive information safer in the first place.
This is a result of either incompetence or knowingly cutting corners. (or just plain using
Pre-emptive solutions (Score:2)
Assume you are as careful as you can be, but obviously there is always the possibility of something being overlooked and that exposure being exploited. If that happens, what is the maximum downside? If paying the extortion isn't an
Re:Certainly different from legal forms of extorti (Score:1)
Do they have web sites? Post them on /. so everyone can have a look. :)
Re:Certainly different from legal forms of extorti (Score:2)
All in all I think some businesses are too small to be exploited simply because they have too little exposure.
Re:Certainly different from legal forms of extorti (Score:2)
Assuming there is always a clear demarkation between "legal" and "illegal" extortion.
These organized criminal enterprises, on the other hand, only have to do some hacking, and then fling their crap in every direction to see what sticks. Just as street criminals drive small businesses out of neighborho
Finally! (Score:3, Insightful)
Bravo!
* * *
There are plenty of ways of preventing DDOS attacks, most of which, unfortunately, call for SKILLED network operators.
Re:Finally! (Score:1)
Re:Finally! (Score:1)
Re:Finally! (Score:1)
Re:Finally! (Score:2)
I wonder if anyone else got it.
Re:Misleading /. story (Score:2)
Trace the money (Score:3, Interesting)
--
Live deals online with a new server, can withstand a Slashdotting now. [dealsites.net]
Re:Trace the money (Score:5, Insightful)
Re:Trace the money (Score:2)
Not that simple.
That schmoe's account that the extortionist got via phishing has to transfer the money somewhere else (to the extortionist). It will be detected once the shmoe finds out and complains.
So, it may make detection harder or may take longer to detect, but eventually he will be caught.
Unless he withdraws cash from Citibank, but yet again, the cameras at the bank has his picture.
Re:Trace the money (Score:1)
Please remember to close your list next time.
International Banking (Score:5, Insightful)
There are analogies with the telcos enabling dial out frauds by sticking it to the customer. If the telcos and banks were responsible, they'd be real careful who they gave other people's money to.
Banks pass on the risks to their customers (Score:2)
Re:Trace the money (Score:3, Interesting)
Or simpler yet, extortionists tell victim "if anything stops us from getting the money undetected, the attack will go ahead".
Re:Trace the money (Score:3, Interesting)
Think Sex-toys, porn, "grey" software, Xbox hacks, etc... depending on where you're at the local authourities may not even know you're in business....heck they may see
Re:Trace the money (Score:2)
You are so stupid if you pay! (Score:5, Insightful)
This extortion isnt like conventional extortions where in you get your thing back when you pay.
The extortionist obviously would have made copied of the data, and would hav given to so many of his friends.....If someones gonna pay,would he be paying to every one of the mails asking for the same data he had paid?
LOL
Sorry, but I think the website owner has already lost the battle - Unless the extortionist get caught - provided the duplicated data doesnt isnt with anyone!
Re:You are so stupid if you pay! (Score:5, Interesting)
Re:You are so stupid if you pay! (Score:2, Insightful)
Re:You are so stupid if you pay! (Score:2)
How would they be marked? It's not like they're getting the front page of Online Blackmailer Magazine. If it's done quietly then the information doesn't go public, and contrary to popular belief there isn't some "underworld" where criminals stay in constant communication with each other.
Re:You are so stupid if you pay! (Score:2)
This ocurred to me (Score:2, Insightful)
I received an email with my personal data and asking me to contact him.
I contacted host service and investigate for possible bugs and raw logs, but I never reply. Finally I think they get my data from whois services.
Once again, a bad summary. (Score:5, Informative)
No, it doesn't say that at all. It says:
It does talk about how many businesses have had to deal with 'cyberextortion', and that percentage is just over half of the submitter's claims:Re:Once again, a bad summary. (Score:3, Insightful)
Re:Once again, a bad summary. (Score:2)
They couldn't send us any information, just wante
Re:Once again, a bad summary. (Score:5, Informative)
Cyberextortion mostly travels under the radar, but not always. Earlier this year, Myron Tereshchuk, 42, of Maryland, pleaded guilty to one count of attempting to extort $17 million from intellectual-property company MicroPatent LLC. He faces up to 20 years in jail. Tereshchuk threatened to leak confidential information and launch denial-of-service attacks against intellectual-property attorneys worldwide if he wasn't paid.
In January, Thomas Ray, 25, of Mississippi, was indicted for allegedly claiming to have found a security flaw in Best Buy Co.'s systems and threatening to expose and exploit that flaw unless he was paid $2.5 million. A trial is expected this fall. And last year, Kazakhstan hacker Oleg Zezev was sentenced to 51 months for illegally entering Bloomberg L.P.'s systems and threatening to disclose the break-in if he wasn't paid $200,000.
The first one threatened DDoSing in addition to leaking info, and the other examples had nothing to do with DDoS.
Re:Once again, a bad summary. (Score:2)
As for the method of extortion I stand by my statement. The article starts off with the sentence about an email received, the same as the summary does. That email though, threatened DDoSing, not leaking of customer data. The other anecdotes are more about the other types of extortion out there and aren't really the focus.
I still say it was a rushed, poorly
Re:Once again, a bad summary. (Score:2)
Haha yeah I thought that too. I also like how they just have the chart sitting over there with no mention of it. The article itself just isn't very good, could've safely stayed in the ugly IT section
This story is part advertisement (Score:4, Insightful)
Victim does online gambling; shady = vulnerable (Score:5, Interesting)
Now if only cyber-extortionists would target well-known spammers...
Re:Victim does online gambling; shady = vulnerable (Score:2)
Re:Victim does online gambling; shady = vulnerable (Score:3, Insightful)
In theory, you are correct. In practice, it's not so simple. Often law enforcement members themselves don't care for porn and won't take such complaints very seriously. Or they may see this as an opportunity to scrutinize the business and make their life difficult as they look for illegal things to bust them for (and even if there aren't any, that doesn't mean it's not a big proble
Re:Victim does online gambling; shady = vulnerable (Score:1)
insurance coverage (Score:3, Interesting)
Insurance! (Score:2, Insightful)
Therefore I say to spend the resources on insurance and simply ignore the threats and attacks. The extortionist get nothing and may waste his power on absolutely nothing, running a serious risk of getting caught - all for nothing.
The company has their assets insured and lose nothing.
In a few days all the extortionists go back to breaking legs for the local loanshark. There they at least get so
Re:Insurance! (Score:2)
Insurance companies here are a scam.
It doesn't cost $100K to stop a DDoS attack! (Score:4, Funny)
We're good like that, right?
Dont pay. (Score:5, Insightful)
Threaten to put them on Slashdot (Score:4, Funny)
70% don't have to deal with it?!?!?!? (Score:1)
> the article claim they never had to deal with
> extortion on the Internet,
And 30% [b]have had to deal with it?
Jebus H. Christ[/b]. And here I was bitching because the tard-o-matic Feds couldn't handle throwing half the popup blockers in jail because they cause the popups themselves.
Oh.
My.
God.
Let's get some ass in gear, eh, George or John?
I'm insured by Slashdot (Score:1)
Extortionists get paid either way except... (Score:1)
Bait accounts? (Score:2)
If many sites/businesses started to support the bait concept and put an effort to turning in the scammers, perhaps this would make