Tech & Science: Security experts reveal secret to catching online scammers and counterfeiters - PressFrom - United Kingdom
  •   
  •   

Tech & Science Security experts reveal secret to catching online scammers and counterfeiters

20:35  04 november  2016
20:35  04 november  2016 Source:   ibtimes.co.uk

Asking you to change passwords makes it easier to hack the system

  Asking you to change passwords makes it easier to hack the system Reset your password. Update your anti-virus program. If such demands irritate you, you may have computer “security fatigue.”LastPass saves all of your password.

In the talk, titled "Narcos, Counterfeiters , and Scammers : An Approach to Visualize Illegal Markets", Keraudy said the main aim of the tool is to "identify sellers and counterfeiters and how to put them into human readable visualisation in order to optimise the takedown efforts." "We subscribe to Farsight's

Security experts reveal secret to catching online scammers and counterfeiters . Catching Online Scammers , Dealers & Drug Dealers With DNS.

Using computer blurred effect © iStock Using computer blurred effect

The illicit sale of counterfeit goods and narcotics is not limited to the Dark Web and enterprising criminals are increasingly using the clear-web as a platform for their business. From fashion items to prescription drugs, cheap and easy to set-up websites only bolster this thriving industry.

To counter the problem, Andrew Lewman, chief revenue officer (CRO) at Farsight Security and Stevan Keraudy, chief technology officer (CTO) at CybelAngel, have designed a way of identifying and stopping these criminals using a technique based around real-time DNS analysis.

Which? discovers wide differences in banks' online security systems

  Which? discovers wide differences in banks' online security systems Major banks have big differences in the safeguards used for their online banking systems, research from a consumer group suggests. define("homepageFinanceIndices", ["c.deferred"], function () { var quotesInArticleFormCode = "PRMQAP"; var config = {}; config.indexdetailsurl = "/en-gb/money/indexdetails"; config.stockdetailsurl = "/en-gb/money/stockdetails"; config.funddetailsurl = "/en-gb/money/funddetails"; config.etfdetailsurl = "/en-gb/money/etfdetails"; config.recentquotesurl = "/en-gb/money/getrecentquotes"; config.

Security experts reveal secret to catching online scammers and counterfeiters . Stop buying fake likes: Your ego is helping cybercriminals make lots of After all, federal agencies and judges are after accused of handing down tough sentences to hackers and online activists, from Jeremy Hammond to

How the scam works. In this particular scam , con artists are using Amazon gift cards to rob customers of their money. After purchasing an item, customers are encouraged to purchase gift cards and then send the sellers Security experts reveal secret to catching online scammers and counterfeiters .

Taking to the stage at Black Hat Europe 2016, attended by IBTimes UK, the researchers demonstrated how Passive DNS – a collection of domain names and IP addresses – can be mixed with advanced "web crawling" to create a visualisation of sellers and counterfeiters.

"No-one really cares about DNS [Domain Name System] anymore unless you are into domain generation algorithms and botnets. But nearly every transaction starts with a DNS lookup," explained Lewman.

"You want to find an IP address or Google? It goes back and forth through DNS. If you can watch the initial [DNS] requests you can start to figure out where the first request came from and who has been looking up things over time."

The researcher said that there is a greater need for real-time analysis as the techniques used by cybercriminals are evolving rapidly.

'Emmerdale' Spoiler! Emma Crumbles At James Barton's Funeral - Can She Keep Her Secret Under Wraps?

  'Emmerdale' Spoiler! Emma Crumbles At James Barton's Funeral - Can She Keep Her Secret Under Wraps? ‘Emmerdale’ fans will need the tissues at the ready on Friday (4 November), when the episode featuring James Barton’s funeral airs. However, it won’t just be sadness that looms over the day, as Emma Barton will crumble under pressure, and it looks like she may reveal her own secret.

Microsoft Windows tech support scammers are some of the worst cybercriminals in existence as they prey on people who aren't technically proficient, but a computer programmer has found a way to get rid of them Security experts reveal secret to catching online scammers and counterfeiters .

Expert Secrets will teach you how to make this calling a career, where people will pay you for your advice… She now uses the concepts from Expert Secrets to better teach branding and marketing to her After being forced to sell his Super Bowl ring, he started selling security systems door-to-door.

"We have all seen spearphishing campaigns come and go in less than an hour," he said. "They register the domain, set up the website, target the corporation, get the two or three clicks they are looking for [then] shut the whole thing down."

The main challenge, the researchers explained to a packed room of attendees, is that criminals operating online now have a lot of resources at their disposal for very little effort. These sellers never create just one website – they create thousands.

"The old school way of targeting counterfeiters is to take down the websites one by one," Keraudy said. "It's very costly, taking a website required legal action and can cost a lot of time and money and it's very inefficient because counterfeiters are very well organised.

"They have thousands of websites waiting in line and as soon as you take one of them down they put another one back online within an hour. So it's a lost battle."

Firms urged to prepare for new 12-sided pound coin

  Firms urged to prepare for new 12-sided pound coin The Treasury is urging businesses to prepare for the introduction of the new pound coin, which comes into circulation in March. Cash-handling firms and those that operate vending machines have been directed to a website - thenewpoundcoin.com - to help guide them through the transition as part of a campaign.The Royal Mint and the Government will take the circular 30-year-old pound coin out of circulation, with the new version featuring 12 sides.David Gauke, Chief Secretary to the Treasury, said: "The pound as we know it will not be round for much longer.

This scam is also prevalent on online auction sites like eBay, bulletin boards and email solicitations. Most of the time the counterfeiters are not the ones trying to use the U.S. Postal money orders. Some experts guess the total amount could run into the millions of dollars. This increase in activity is

Chinese researchers have found a critical security flaw in the OAuth 2.0 protocol that enables attackers to hijack user accounts in a large number of Android apps iStock. Security experts reveal secret to catching online scammers and counterfeiters .

Optimising the takedown

In the talk, titled "Narcos, Counterfeiters, and Scammers: An Approach to Visualize Illegal Markets", Keraudy said the main aim of the tool is to "identify sellers and counterfeiters and how to put them into human readable visualisation in order to optimise the takedown efforts."

"We subscribe to Farsight's Passive DNS and we filter it using keywords," he explained. Using a selection of "brand specific" (Rolex, Channel, Dior) and "generic" search terms, the tool is able to analyse the trove of DNS records and locate potentially illegal activity, the researcher said.

Keyboard light up feature © Jeroen Bennink Keyboard light up feature

Once the websites are identified – CybelAngel's web crawling technology comes into play by automatically scanning the homepage, links, pictures and body of the website "to collect as much information" and identify if the website is active.

It does "Whois" lookups, geolocation searches and "everything that can ID the website," Keraudy said, adding that Google Analytics IDs are also important. He noted: "Counterfeiters are businessmen and when you do business you want to do marketing, and when you do marketing, you use Google Analytics."

Two arrested in Jammu for ‘spying’ on security forces for Pakistan

  Two arrested in Jammu for ‘spying’ on security forces for Pakistan Two people were arrested from the RS Pura sector on the international border in Jammu and Kashmir for allegedly spying for Pakistan.Police received the information that Satvinder Singh and Dadu were in the area along the international border in Suchetgarh sector and were taking pictures of security establishments, a police officer said.

DatingScams - The global online database of marriage and dating scammers . Our experts carry out the analysis of the letters which were provided by you and find out similarity of these letters with the other Our main task is to reveal the fraudulent elements and stop their activity on all possible levels.

Here are the most popular online scams so you can avoid getting hacked. See how cyber criminals gain access to your private information and compromise your accounts. Protect yourself against a hacked email, phishing attempts, online scams that steal financial data and other threats to your

The crawlers can also automatically detect if there is a payment system on the website. The tool will "go through the system and put in some fake data" to follow the process up until the point of purchase. "We do not go through with the payment," Keraudy stressed.

The visualisation tools then make "clusters" of each website and – in a spider web fashion – creates a representation of each website and how they are linked. "We group the websites that belong to the same actor – the same organisation," he said. "You can target directly a whole organisation and not only just a website."

He added: "The clusters represent organisations that run thousands of websites selling illegal goods. Because we also have a traffic estimator we know which clusters to target first. We know which ones drive the most traffic so probably the most revenue. What you want to do is target the centre."

According to Lewman, who was previously a chief executive within the Tor Project, the technique can also prove to be useful for combating Dark Web sellers. He said it "works well" on these markets as "they are often run by the same criminal organisations that run the clear net markets."

The researchers said that – currently – the tool is being targeted towards enterprises over law enforcement. Keraudy told IBTimes UK: "We work with the corporates and they send it to their legal departments to work with law enforcement."

But that's not to say DNS analysis is limited to the business world. "Farsight does work with law enforcement and they use our database to look up past activity – to look up who owned an IP or who hosted what on an IP over time," Lewman acknowledged.

National Lottery online accounts hacked .
National Lottery operator Camelot says it believes thousands of players' online accounts have been hacked. The National Lottery operator said it discovered "suspicious activity" following online security monitoring on Monday.Camelot said it believes "around 26,500 players' accounts were accessed", but fewer than 50 accounts have had activity take place since the hack.

—   Share news in the SOC. Networks

Topical videos:

usr: 1
This is interesting!