News

Discovery of Crimeware Server Exposes Breadth of Data Theft

Last month researchers at online security company Finjan uncovered a 1.4 gigabyte cache of stolen data from North America, Europe, the Middle East and India on a Malaysian server that provided command and control functions for malware attacks in addition to being a drop site for data harvested from compromised computers.

"This is a unique example of what we have been talking about for the last year," said Yuval Ben-Itzhak, chief technical officer at Finjan. Online thieves are using sophisticated tools to plant malicious code on legitimate Web pages, compromising visiting PCs and stealing data.

The data included 5,388 unique log files collected in just a three-week period. The files included personal and business e-mails, medical records, and financial log-in and transaction information with not only credit card and account numbers but also passwords and security codes. Although the trend of using Web exploits to steal and market personal data has been identified for some time, the discovery of the cache still was an eye-opener, Ben-Itzhak said.

"When you see a server with the data there, it's the difference between theory and reality," he said. "When you see people's medical records and e-mail in this volume, we were kind of shocked."

Since the discovery in early April, the company's Malicious Code Research Center has discovered two similar servers in different parts world with similar data. They appeared to have been in operation for shorter periods of time.

Finjan reported the discovery today in the latest issue of the "Malicious Page of the Month" bulletin.

The crimeserver was discovered by analysts monitoring outgoing traffic from a Finjan customer's network. Following the traffic to its destination led them to the unprotected server holding the data. The server contained several Trojans and the payload injected into compromised Web sites in addition to command and control software for the attacks and the stolen data.

"It was just waiting for someone to collect it," Ben-Itzhak said. Most of the data was in raw log files, although "in some parts of the server, we found data that had already been processed."

Finjan analysts needed a week to process the 1.4 gigabytes and determine what was there. The log files were traced to 5,878 distinct IP addresses. The number of compromised PCs the data was lifted from has not been determined, but Ben-Itzhak said it could be as high as double the number of IP addresses. Files on the server included 571 log files from the United States, 621 from Germany, 322 from France, 308 from India, 232 from Great Britain, 150 from Spain, 86 from Canada, 58 from Italy, 46 from the Netherlands and 1,037 from Turkey.

The server was registered to a man from Moscow and was hosted in Singapore at the time it was discovered. It has since been shut down.

"About every week he was moving the server," from Russia to China, Hong Kong and finally Singapore, Ben-Itzhak said.

In the online black market for stolen information, raw data can be sold in bulk for $1,000 for about 100 megabytes, but individual credit card numbers with accompanying information can sell for $20 to $50 each. Other files can bring hundreds of dollars, depending on their contents.

Ben-Itzhak said the discovery illustrates the breadth of the data theft threat. It is not just personal financial data at risk but corporate data also. The files included information from what Finjan described as 40 top-tier global businesses and included sensitive corporate e-mails.

"We entered a new era in which criminals just need to log into their 'data supplier' and download any information suitable for them to conduct their crime, be it financial fraud, industrial espionage or identity theft," Ben-Itzhak said.

The company notified more than 40 major international financial institutions in the United States, Europe and India whose customers were compromised in addition to international law enforcement agencies including the FBI.

Ben-Itzhak said the largest financial institutions were not surprised, but smaller banks were. Cooperation was good from law enforcement agencies, with which the company maintains close relationships, he said.

About the Author

William Jackson is the senior writer for Government Computer News (GCN.com).

comments powered by Disqus

Featured

  • Hands On: New VS Code Insiders Build Creates Web Page from Image in Seconds

    New Vision support with GitHub Copilot in the latest Visual Studio Code Insiders build takes a user-supplied mockup image and creates a web page from it in seconds, handling all the HTML and CSS.

  • Naive Bayes Regression Using C#

    Dr. James McCaffrey from Microsoft Research presents a complete end-to-end demonstration of the naive Bayes regression technique, where the goal is to predict a single numeric value. Compared to other machine learning regression techniques, naive Bayes regression is usually less accurate, but is simple, easy to implement and customize, works on both large and small datasets, is highly interpretable, and doesn't require tuning any hyperparameters.

  • VS Code Copilot Previews New GPT-4o AI Code Completion Model

    The 4o upgrade includes additional training on more than 275,000 high-quality public repositories in over 30 popular programming languages, said Microsoft-owned GitHub, which created the original "AI pair programmer" years ago.

  • Microsoft's Rust Embrace Continues with Azure SDK Beta

    "Rust's strong type system and ownership model help prevent common programming errors such as null pointer dereferencing and buffer overflows, leading to more secure and stable code."

  • Xcode IDE from Microsoft Archrival Apple Gets Copilot AI

    Just after expanding the reach of its Copilot AI coding assistant to the open-source Eclipse IDE, Microsoft showcased how it's going even further, providing details about a preview version for the Xcode IDE from archrival Apple.

Subscribe on YouTube

Upcoming Training Events