Title: How to Investigate
1How to Investigate
2WhoIs behind the scam?
- Who are the individuals who own that Web Site ?
3Introduction
This section from http//www.cs.uml.edu/pkrolak/9
1-113/DarkSideOfInternet.ppt
4Spam
- Spam is electronic junk mail that clogs our
internet like the fatty canned meat of the same
name clogs our arteries. - Communication lines back up at an alarming rate,
- Storage is gobbled up,
- Servers and processors thrash, and
- Users are irritated at best incapacitated at
worst. - Spam costs the ISPs and others a fortune to
prevent and/or to remove. - At its worst spam is used by scammers, hackers,
and others to market and prey on literally
millions of users at a very low cost.
Source http//www.unt.edu/benchmarks/archives/200
5/february05/spamandcookiescolor.gif
5Spam
- What is Spam?
- Junk email unwanted, resource robbing, and
often contains viruses, worms, and scams. - Why is it an increasing problem?
- Spam is the fastest growing component of messages
on the Internet that consumes bandwidth, storage,
and angers the user. ISPs and some consumer
groups are attempting to shut down the worst
offenders. - Spam as harassment.
- Spam as DoS (Denial of Service) attack.
- Spam as Phishing (attempt to obtain a persons
ID, password, etc, by pretending to be a
legitimate request.) - What can be done about it? (Discussion questions)
- Closing down ISPs that permit email relaying (Is
this too draconian?). - Apply filters and tools to remove it (Can they be
by-passed?). - Lobby for federal legislation to create civil and
criminal penalties for those who send Spam. (Does
this interfere with free speech?) - A recently passed law to prosecute commercial
spammers. (When is Internet advertising
legitimate and when is it Spam?)
6Why Estimate the Cost of Spam?
- Important for policy reasons to know severity of
problem - helps in assigning priority to issue
- To determine which economic actors have to bear
costs also - important in focusing on solutions
- Spam imposes negative externality on society
(similar to - pollution in the manufacturing economy) economic
damage - and cost borne by third parties resulting in an
overall loss of - welfare for society
- If costs of spam are unacceptable then have to
put in place - mechanisms to change behavior of producers of
spam - Provides metric to let the punishment fit the
crime. - Market itself does not provide mechanism to
correct for costs - inflicted by spam. If economic solutions are used
to combat - spam, cost data can help determine prices applied
to reduce or - eliminate spam
http//www.oecd.org/dataoecd/47/5/26618988.pdf
7Spam Impact on Consumers
- E-mail has value to recipient which varies with
the content and should at least equal processing
cost - Each e-mail entails the same receiving/processing
cost for consumer. For spam the value of the
e-mail content is negative and to this must be
added the processing cost - If the amount of spam received is extremely high
it could conceivably outweigh the positive value
of receiving e-mail - Costs to consumers for processing mail are
declining as consumers switch to broadband from
dial-up (where time based Internet access charges
exist) and because of quicker download times - But increase in volume of spam is likely to
result in net increase in costs if you can go
fast but you produce crap, all you get is more
crap
http//www.oecd.org/dataoecd/47/5/26618988.pdf
8Overall Cost Some Estimates
- Reduced use of an efficient and cheap means of
communications among economic actors slows down
growth of e-commerce and development of digital
economy. - Total economic impact of spam estimates vary
- Global cost conservatively estimated at
estimated at 10 Billion (European Commission
Study 2001) - Ferris Research (Jan. 2003) estimated that spam
cost US companies 8.9 billion dollars in 2002.
The same study estimated the cost of spam in
Europe as US2.5 billion. - UNCTAD (2003) 20 billion
- Cost to Hong Kong economy 1.3 billion (HKISPA
2004) - 2 - 20 Billion per year and growing.
http//www.oecd.org/dataoecd/47/5/26618988.pdf
9CAN SPAM Law of 2003
- CAN-SPAM Act of 2003 (Pub. L. 108-187, S. 877)
- The Controlling the Assault of Non-Solicited
Pornography and Marketing Act requires
unsolicited commercial e-mail messages to be
labeled (though not by a standard method) and to
include opt-out instructions and the sender's
physical address. It prohibits the use of
deceptive subject lines and false headers in such
messages. The FTC is authorized (but not
required) to establish a "do-not-email" registry.
State laws that require labels on unsolicited
commercial e-mail or prohibit such messages
entirely are pre-empted, although provisions
merely addressing falsity and deception would
remain in place. The CAN-SPAM Act took effect on
January 1, 2004.
10Crimes of Persuasion
- Crimes of persuasion are scams that appeal to
peoples greed, goodwill, or other emotions to
use the victim to provide the access and
assistance to information, the money or other
resources, that are the target of the criminal. - In other words A Con Game
11Internet Scams
12Internet Scams
- Scams over the Internet unlike the fraud and
similar crime can be difficult to detect,
prosecute, and prevent and easy to perpetrate. - Email can be used to reach 250 million with a
simple program and a CD-ROM with the email
addresses. - Example - The African businessman who offers to
split a large sum of money (like, 20M) if he can
only electronically wire it to your checking
account. He also requires a (small) fee (250.)
wired to his account to bribe fellow country men.
Your fee and your bank account are immediately
seen to vanish. - See http//www.cnn.com/2000/TECH/computing/10/31/
ftc.web.scams/
13Internet Pyramid schemes
-
- What is a Pyramid Scheme?
- Pyramid schemes, also referred to as "chain
referral", "binary compensation" or "matrix
marketing" schemes, are marketing and investment
frauds which reward participants for inducing
other people to join the program. Ponzi
schemes, by contrast, operate strictly by paying
earlier investors with money deposited by later
investors without the emphasis on recruitment or
awareness of participation structure. - Pyramid schemes focus on the exchange of money
and recruitment. At the heart of each pyramid
scheme there is typically a representation that
new participants can recoup their original
investments by inducing two or more prospects to
make the same investment. - For each person you bring in you are promised
future monetary rewards or bonuses based on your
advancement up the structure. Over time, the
hierarchy of participants resembles a pyramid as
newer, larger layers of participants join the
established structure at the bottom.
Source http//www.crimes-of-persuasion.com/Crimes
/Delivered/pyramids.htm
14Internet Pyramid schemes (more)
- They say you will have to do "little or no work
because the people below you will". You should
be aware that the actual business of sales and
supervision is hard work. So if everyone is doing
little or no work, how successful can a venture
be? Too good to be true! - The marketing of a product or service, if done at
all, is only of secondary importance in an
attempt to evade prosecution or to provide a
corporate substance. Often there is not even an
established market for the products so the "sale"
of such merchandise, newsletters or services is
used as a front for transactions which occur only
among and between the operation's distributors. - Therefore, your earning potential depends
primarily on how many people you sign up, not how
much merchandise is sold. - When the Pyramid gets too big, the whole scheme
collapses and the people who lose are the people
at the bottom.
15Internet Pyramid schemes (more)
- Pyramid schemes are not the same as Ponzi schemes
which operate under false pretences about how
your money is being invested and normally benefit
only a central company or person along with
possibly a few early participants who become
unwitting shills. - Pyramid schemes involve a hierarchy of investors
who participate in the growth of the structure
with profits distributed according to one's
position within the promotional hierarchy based
on active recruitment of additional participants. - Both are fraudulent, because they induce an
investment with no intention of using the funds
as stated to the investor.
16Email Fraud
- Fraud has existed perhaps as long or longer than
money. Any new sociological change can engender
new forms of fraud, or other crime.
Source http//en.wikipedia.org/wiki/Email_fraud
17Email Fraud
- Almost as soon as e-mail became widely used, it
began to be used to defraud people via E-mail
fraud. - E-mail fraud can take the form of a "con game" or
scam. - Confidence tricks tend to exploit the inherent
greed and dishonesty of their victims the
prospect of a 'bargain' or 'something for
nothing' can be very tempting. - E-mail fraud, as with other 'bunco schemes'
relies on naive individuals who put their
confidence in get-rich-quick schemes such as 'too
good to be true' investments or offers to sell
popular items at 'impossibly low' prices. Many
people have lost their life savings due to fraud.
(Including E-Mail fraud!)
18Avoiding e-mail fraud
- E-mail fraud may be avoided by
- Keeping one's e-mail address as secret as
possible, - Ignoring unsolicited e-mails of all types, simply
deleting them, - Not giving in to greed, since greed is the
element that allows one to be 'hooked, and - If you have been defrauded, report it to law
enforcement authorities -- many frauds go
unreported, due to shame, guilty feelings or
embarrassment.
Source http//en.wikipedia.org/wiki/Email_fraud
19Identity Theft on the Internet
- Identity theft involves finding out the users
personal information and then using it commit
fraud and other crimes.
20Identity Theft
- But he that filches from me my good name
- Robs me of that which not enriches him
- And makes me poor indeed." - Shakespeare,
Othello, Act III. Scene III.
21What is Identity Theft?
- A Federal crime where someone wrongfully obtains
and uses another person's personal data in some
way that involves fraud or deception, typically
for economic gain. - In 2004, almost 250,000 claims of Identity Theft
within the US alone (11000) - More than 500 million in reported losses
Source http//www.consumer.gov/sentinel/pubs/Top1
0Fraud2004.pdf
22Categories of Identity Theft
- According to the non-profit Identity Theft
Resource Center, identity theft is "sub-divided
into four categories - Financial Identity Theft (using another's name
and SSN to obtain goods and services), - Criminal Identity Theft (posing as another when
apprehended for a crime), - Identity Cloning (using another's information to
assume his or her identity in daily life) and - Business/Commercial Identity Theft (using
another's business name to obtain credit)."
Source http//en.wikipedia.org/wiki/Identity_thef
t
23Tiger Woods
- A man who used Tiger Woods' identity to steal
17,000 worth of goods was sentenced to 200
years-to-life in prison. - Anthony Lemar Taylor was convicted of falsely
obtaining a driver's license using the name
Eldrick T. Woods, Woods' Social Security number
and his birth date. - Though he looks nothing like golf's best player,
the 30-year-old Taylor then used the false
identification and credit cards to buy a 70-inch
TV, stereos and a used luxury car between August
1998 and August 1999. - Judge Michael Virga gave Taylor the maximum
sentence under California's three-strikes law...
24Identity Theft by Age
Souce http//www.consumer.gov/sentinel/pubs/Top10
Fraud2004.pdf
25Identity Theft
- Identity Theft the acquiring of personal and
financial information about a person for criminal
purposes. - Your Social Security Number, credit card numbers,
and passwords on your machine can be used to gain
information about you from the web sources. - Once the information is gained it is used to
charge large amounts for plane tickets, etc. - The criminal can also assume your identity for
fraud and terrorism. - Some rings communicate data gathered to
accomplices in other countries where the
fraudulent charges are actually made. - It can take up to 18 months and thousands of
dollars to restore your credit. - See http//www.newsfactor.com/perl/story/15965.htm
l
26The role of private industry and government in
identity theft
27Techniques for obtaining information
- Low Tech Social Engineering
- Stealing (snail) mail or rummaging through
rubbish (dumpster diving) - Eavesdropping on public transactions to obtain
personal data (shoulder surfing) - Obtaining castings of fingers for falsifying
fingerprint identification - High Tech Internet Approaches
- Stealing personal information in computer
databases Trojan horses, hacking Including
theft of laptops with personal data loaded. - The infiltration of organizations that store
large amounts of personal information - Impersonating a trusted organization in an
electronic communication (phishing) . - Spam (electronic) Some, if not all spam entices
you to respond to alleged contests, enter into
"Good Deals", etc. - Browsing social network (MySpace, Facebook, Bebo
etc) sites, online for personal details that have
been posted by users in public domains.
Soruce http//en.wikipedia.org/wiki/Identity_thef
t
28What is Pharming?
- Pharming is the exploitation of a vulnerability
in the DNS server software that allows a hacker
to acquire the Domain Name for a site, and to
redirect traffic from that website to another web
site. - DNS servers are the machines responsible for
resolving internet names into their real Internet
Protocol (IP) addresses - the "signposts" of the
internet. (e.g., Good_Stuff.com will translate to
an address like 152 145 72 30 i.e. four groups
of base 8 (octal) numbers in IP version 4 (IPv4)
or eight groups in base 16 (hex) in IP version 6
(IPv6). The Internet has thousands of DNS servers
each one a target for determined hackers.
29Phishing
- What is Phishing?
- Using email or web sites to look like authentic
corporate communications and web sites to trick
people into giving personal and financial
information. - FBI sees this a fast growing form of fraud and
can lead to theft of identity. - See http//www.crimes-of-persuasion.com/Crimes/Del
ivered/internet.htm
30What is Phishing?
- phishing (also known as carding and spoofing)
- n.
- 1. The act of attempting to fraudulently acquire
sensitive information, such as passwords and
credit card details, by masquerading as a
trustworthy person or business with a real need
for such information in a seemingly official
electronic notification or message (most often an
email, or an instant message).
Source http//en.wikipedia.org/wiki/Phishing
31Phishing Example
From eBay Billing Department ltaw-confirm_at_ebay.com
gt To you_at_uml.edu Subject Important
Notification
This link points to a bogus site that often will
infect and attempt to corrupt or steal data from
your computer or to coerce you into divulging
private information when You access it.
- Register for eBay
- Dear valued customer
- Need Help?
-
- We regret to inform you that your eBay account
could be suspended if you don't re-update your
account information. To resolve this problems
please click here and re-enter your account
information. If your problems could not be
resolved your account will be suspended for a
period of 3-4 days, after this period your
account will be terminated. - For the User Agreement, Section 9, we may
immediately issue a warning, temporarily suspend,
indefinitely suspend or terminate your membership
and refuse to provide our services to you if we
believe that your actions may cause financial
loss or legal liability for you, our users or us.
We may also take these actions if we are unable
to verify or authenticate any information you
provide to us. - Due to the suspension of this account, please be
advised you are prohibited from using eBay in any
way. This includes the registering of a new
account. Please note that this suspension does
not relieve you of your agreed-upon obligation to
pay any fees you may owe to eBay. - Regards,
- Safeharbor Department
- eBay, Inc
- The eBay team.
- This is an automatic message. Please do not
reply.
Source http//en.wikipedia.org/wiki/Phishing
32Spoofing
- Spoofing
- E-mail sent from someone pretending to be someone
else is known as spoofing. Spoofing may take
place in a number of ways. Common to all of them
is that the actual sender's name and the origin
of the message are concealed or masked from the
recipient. Many, if not most, instances of e-mail
fraud use at least minimal spoofing, as most
frauds are clearly criminal acts. Criminals
typically try to avoid easy traceability.
Source http//en.wikipedia.org/wiki/Email_fraud
33Methods to Steal an Identity
- TCP Spoofing
- Establish a fake session and act to the user like
the real application the user thought was
connected. - Can be done by substituting valid access software
with hacked software after compromising a host
or server machine - DNS Spoofing
- Mentioned previously
- Substitutes a fake IP address for the real one in
the DNS table - Typo Squatting (e.g. www.goolge.com)
- Set up a real web site with URL that represents
common typo. Make site look enough like real one
and try to get passwords, ID, etc. - Similar to phishing, but the phish catches
himself!
34(No Transcript)
35Your Goal
- Identify the people who are behind the Spam
- You want NAMES, and Civic Addresses, but be ready
for the sad reality the chances are very small
that you will ever find them, but you will bring
to light all the tools they are using to hide
their real identity, - And this is INFORMATION, because this tells you
that the SPAM is a SCAM, and these people are
criminals
36Their Goals
- At the end of the investigation you will discover
the goals pursued by the spammers - 1 - Have you send them money (Nigerian scam /
buy their cloned products / medicine) - (maybe they will never ship anything, but
they will get your money) - 2 Steal your personal information by making
your believe that you must enter your information
to win something - 3 Enroll your computer as a zombie your
computer is infected by a Trojan when you visit
their website and is then used to spam other
people to do 1 or 2
37What to do at the end of your investigation
- This is explained at the end of this presentation
(part 5)
38PART 1
- List of steps to follow
- for a SPAM investigation
39Typical List of Stepsto investigate a SPAM Case
- 1) You need the email (body) AND the header of
the email. - How to see the email header depends on the email
client you are using - 2) You divide your research into 2 parts
- - Finding information about the sender (spammer)
- - Finding the information about the target
- (the website where the spammer wants you to go)
40List of Steps
- 3) For researching Who is the Spammer and for
researching Who is behind the target web site, - You follow pretty much the same series of
steps - 4) Use nslookup to find the IP address of a
domain name - 5) Use the IP address to find who owns this
address. - Most of the time you will see that the address is
in a block of addresses that have been assigned
to an ISP or to a Web Hosting Company
41List of Steps
- 6) IPSs have large blocks of addresses,
typically - N x 256 X 256
- If it is an ISP, then the spammer has a fixed IP
address (no need to run DHCP), and it should be
relatively easy to identify who is leasing this
IP address - Google with the IP address, the domain name,
part of the message
42List of Steps
- 7) Web Hosting Companies have smaller blocks of
addresses, typically - N x 256 X 256 and N 1, 2 or 3
- The WhoIs queries tell you the name of the
company who owns the block of address
43List of Steps
- 8) Google for the domain name of the spammer and
the name of the web hosting company. - You should find the name of the registrant the
individual or the company WHO has registered the
domain name that is attached to that IP address. - Sometime the name of the registrant is a small
company that is itself a Registrar, and operates
as an intermediary (front) between the real
customer (here, the spammer) and the big
registrars - Note that some of these intermediate companies do
not really check the validity of the information
provided by the customer fake telephone numbers,
no civic address, or a postal box, are all OK!
44Additional Note Registries and Registrars
- A Registry is an organization that assigns IP
addresses (typically to ISPs) - There are 5, each for one continent (AFRINIC,
ARIN, LACNIC, APNIC and RIPE) - ? See part 2 of this presentation
- ? You use WhoIs to query the registries
- A Registrar is a company that attach a domain
name to an IP address (www.uml.edu
129.63.176.200) - Read on the web to learn more about Registries
and a Registrars
45List of Steps
- Google then for the missing information, use
anything you already know - Track the names of the small fish
- The telephone numbers (sometimes the company is
officially I one country and the tel.no in
another country) - Parts of the body of the message
46PART 2
- Understanding how the Registries work
47Every computer needs an IP address to be
accessible from other hosts on the Internet
- An IP address is a unique identifier of a
computer - You buy an IP address from your ISP, and your ISP
buys blocks of addresses from a Registry - There are 5 Registries managing each one region
of the world
48The search is based on the IP address
49When should you use the information maintained by
registries?
- Every time you want to know more about a website,
especially when you suspect that the site is a
rogue web site - e.g. you have received an un-solicited email
asking you to go a web site you have never heard
of before
50(No Transcript)
51When you want to know who owns a websiteyou
query the databases of these Registries
52Enter the IP address
- The databases of these registries are based on
the IP addresses that they have assigned - If you do not know the IP Address of a domain,
first you need to run nslookup
53Registries maintain Databases that can be
searched usinga web browser
- The search box is always on the home page of the
Registry
54AFRINIC
AfriNIC is a non-government, not-for-profit,
membership based organization, based in Mauritius
that serves the African Internet Community.
AfriNIC is the Regional Registry for Internet
Number Resources for Africa. Membership is open
to anybody.
55APNIC
http//www.apnic.net/
- The Asia-Pacific Network Information Centre
- maintains the public Whois Database for the Asia
Pacific region
Headquarters in Brisbane, Australia
The Whois search box is in the upper right corner
56ARIN
- American Registry for Internet Numbers
- is the Regional Internet Registry (RIR) for
Canada, many Caribbean and North Atlantic
islands, and the United States. - ARIN manages the distribution of Internet number
resources. - Headquarters in Fairfax County (VA), USA.
https//www.arin.net/
The Whois Search Box is in the right upper corner
57LACNIC
- The Latin America and Caribbean Network
Information Centre is the Regional Internet
Registry for the Latin American and Caribbean
regions. - LACNIC provides number resource allocation and
registration services that support the global
operation of the Internet. It is a
not-for-profit, membership-based organization
whose members include Internet Service Providers,
and similar organizations.
http//www.lacnic.net/en/
Headquarters in Montevideo, Uruguay
The Whois Search Box is in the right upper corner
58RIPE
Regional Internet Registry for Europe, the Middle
East and parts of Central Asia. Headquarters in
Amsterdam, the Netherlands.
- http//www.ripe.net/
- Enter the IP address in the data base
search box - (in the middle of the page, on the right)
This is different search box from the search
engine that searches the RIPE web site
59Five Registries?
- When you want to know who owns an IP address,
- - You clearly do not know where in the world is
this IP Address - - You do not know which of these 5 registries
you should search - OK, just get IP2C a portable freeware tool that
will query the 5 registries for you using a nice
GUI - http//web.newsguy.com/lmgava/code/Download.php?a
ip2cfip2c_1.0.12.zip - Unzip, run, enter the IP address
60Additional Resources
- WhoIs for TLD .ru
- http//whois7.ru (Russia Region - English)
- http//whois.twnic.net for Taiwan
- One website listing the blacklisted website
- http//www.joewein.de/sw/dbl-update/2011-03-28.htm
61Additional WhoIs Resources
62PART 3
- Searching the registrars
- Input IP address / Domain Name
63Information on who has registered a domain
- http//whois.domaintools.com
- Example
- http//whois.domaintools.com/businessdevelopmentre
gistry.com
64PART 4
- SCAM / SPAM tracking Forums
65The Spam Fighters
- http//www.joewein.de/sw/dbl-update/
- SPAMCOP
- http//en.wikipedia.org/wiki/SpamCop
- http//www.spamcop.net/
- The SPAMHAUS Project
- http//en.wikipedia.org/wiki/Spamhaus
- http//www.spamhaus.org/
66SPAM TRACKERS
- http//rbls.org/
- Lists where a website is black listed
- List the Domains related with a specific domain
- http//dnstree.com/
- Offers many services
- http//www.robtex.com/
67SPAM TRACKERS
- http//www.scamomatic.com/
- For the Lottery-type scam
- http//www.419scam.org/
68List of Web Tools
- http//www.dmoz.org/Computers/Internet/Protocols/D
NS/Web_Tools/ - TRACK web sites infected with malware
- http//support.clean-mx.de/clean-mx/viruses.php
- http//malwaredomainlist.com
69Read More
- http//scamoftheday.com/
- http//www.419scam.org/
70Also Research the Telephone Numbers
- http//www.callwiki.com
- http//www.numberinvestigator.com/phone
71PART 5
- You are now at the end of your investigation.
Probably you cannot put a name of the email
address that sent that spam email, but you now
have a clear understanding that these people are
criminals trying to steal money, identity and
computing resources of innocent people! - What can you do next? ?
72How to Report SPAM
- Report SPAM to
- The Spammers ISP
- Forums that track spam
- http//email.about.com/od/spamandgettingridofit/a/
report_spam.htm
73Happy WhoIsing !
74Appendix - 1
- When you read the email header, you should know
the following - Bigfish, Forefront and Postini are software
applications used to filter spam emails - They sometimes run on a different machine (not
the email server this explains address such as
10.xx)
75Reference
- http//email.about.com/cs/spamgeneral/a/spam_head
ers.htm - http//email.about.com/od/spamandgettingridofit/a/
report_spam.htm