Holding masses of data, cybercriminals face new hurdles to cashing out

Hackers look for new ways to get higher margins on stolen data

Hackers are increasingly looking for new avenues to conduct fraud to increase their margins, and one fresh target is stealing loyalty card points and miles.

Hackers are increasingly looking for new avenues to conduct fraud to increase their margins, and one fresh target is stealing loyalty card points and miles.

After Sony Pictures Entertainment's computer network was breached in late November, it appeared the hackers wanted to blackmail the company.

"We've got great damage by Sony Pictures," read an email sent to Sony executives. "The compensation for it, monetary compensation we want."

Apparently Sony Pictures didn't give the hackers what they wanted, and gigabytes of data were posted online, including a spreadsheet of all of the company's employees and their salaries.

Though the Sony hackers apparently did not get what they wanted, data clearly has a value. But determining its value depends on a variety of factors. And it's not as easy as it used to be to cash out.

Home Depot lost 56 million payment card numbers and 53 million email addresses between April and September in one of the largest data breaches on record. Batches of stolen card numbers soon appeared on underground forums, priced according to the potential cash-out value.

But banks are acting faster than ever to shut down compromised cards, meaning fraudsters have to steal ever-larger batches of numbers to compensate for lower margins.

For example, if 10,000 cards are stolen, as few as 100 may have the potential for a successful cash out and maybe 10 cards will actually be productive, said Alex Holden, founder and chief information security officer for Hold Security, a Wisconsin-based company that specializes in finding stolen data on underground websites.

It's also become more complicated to steal card numbers because of better cybersecurity defenses, he said.

Hackers need email lists of potential victims, spam messages crafted to evade filters and specialized malware that can slip past antivirus software. Similar to the gold rush, where many profited by selling shovels and mining equipment, there's a healthy trade in such lists and tools. But those expenses all ultimately come out of a hacker's bottom line.

"You can no longer do an operation by yourself," said Holden, whose company discovered data breaches affecting Target and Adobe Systems. "Every person in that chain wants to get paid."

One way fraudsters have attempted to expedite cashing out on stolen card data is by creating bogus merchant accounts with payment processors. That way, cards can be charged to fake businesses in transactions that appear real before card companies have a chance to shut down the numbers.

IntelCrawler, a Los Angeles-based security company, found an advertisement for such a system called the "Voxis Platform." The program lets scammers potentially increase the profit from their illegal gains by scheduling amounts to be charged at certain times to the payment processors.

"Cybercriminals don't have enough resources to monetize stolen data in big volumes," said IntelCrawler CEO Andrew Komarov via email. "It really has a small margin, and it is pretty complicated to resell it in big amounts."

Hackers are also diversifying their targets, capitalizing on the weak defenses of corporate systems.

Hackers are no longer just interested in credit card information, said Stephen Cavey, founder and director of corporate development at Ground Labs, which develops tools for organizations to flag spots in their networks where sensitive data may be stored insecurely. "Now it's about stealing as much personal information that they can get their hands on."

Cavey said he's heard of stolen personal information being used to obtain money from a variety of companies that offer quick, so-called payday loans over the Web. The fraudster's goal is to provide the loan company with as much information as possible to look legitimate and evade risk controls.

Trying to blackmail data-theft victims is another way to make cash. But it's unlikely that large companies such as Sony Pictures would pay a group of hackers not to release data. There's no guarantee that the hackers wouldn't come back with more demands later.

One scam that has resulted in payoffs involves encrypting an organization's data and demanding a ransom. Ransomware has been around for as long as a decade, but the fraud continues due to its success. Computers are infected with malware, which sets to work encrypting files on hard drives.

The only real defense against ransomware such as Cryptolocker is to ensure that data is backed up. Otherwise, it could cost around $500 per computer, payable in bitcoin, to get the decryption key from hackers. In some cases, hackers haven't bothered supplying the decryption key after they've been paid, adding to victims' frustration.

Read more: Major US credit union deploys Wynyard Advanced Crime Analytics tool

For the near future, Holden says he's seeing increasing interest in the travel industry, with scammers stealing air miles and other loyalty-oriented rewards.

The travel industry is "very loosely controlled," Holden said. Some fraudsters have already created fake travel agencies, he said. Victims who stumble across those agencies divulge lots of personal information, credit card numbers and loyalty card accounts.

Loyalty miles and points can be cashed out in a variety of ways. The points can be redeemed for items offered through the program, or can be transferred to gift cards, according to a screenshot from a vendor on an underground forum found by IntelCrawler.

Depending on the airline, reward accounts are updated between two to 30 days, the forum posting notes. This gives hackers ample time to redeem stolen points.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Join the Good Gear Guide newsletter!

Error: Please check your email address.

Tags securitydata breachSony Pictures Entertainmentdata protectionfraud

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service
Show Comments

Cool Tech

Crucial Ballistix Elite 32GB Kit (4 x 8GB) DDR4-3000 UDIMM

Learn more >

Gadgets & Things

Lexar® Professional 1000x microSDHC™/microSDXC™ UHS-II cards

Learn more >

Family Friendly

Lexar® JumpDrive® S57 USB 3.0 flash drive 

Learn more >

Stocking Stuffer

Plox Star Wars Death Star Levitating Bluetooth Speaker

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?