- Details
- Category: Security News

Cybercrime can pay very well. The challenge, of course, is staying out of jail long enough to spend one's ill-gotten gains.
See Also: Proactive Malware Hunting
To wit, malware kingpin Vladimir Tsastin, 35, an Estonian national, has been sentenced to serve more than seven years in prison after pleading guilty in July 2015 to running a massive click-fraud scheme that earned $14 million in profits via more than 4 million victims across 100 countries.
U.S. District Judge Lewis A. Kaplan this week sentenced Tsastin to serve 87 months in prison, followed by one year of probation, calling his crimes "brazen, sophisticated and outrageous," according to the U.S. Department of Justice. Kaplan also ordered Tsastin to forfeit $2.5 million.
Tsastin and his gang began the criminal activities as early as 2006, according to security firm Trend Micro, which helped the FBI identify and disrupt the underlying, malicious infrastructure used in the attacks.
The gang operated publishing companies Esthost and Rove Digital, which entered into agreements with advertising brokers - receiving payment based on the number of clicks on advertisements they placed online - and then used custom-built "DNSChanger" malware to change the domain name system settings on infected computers, allowing them to generate fake clicks, according to court documents.
"At its heart, the Esthost/Rove Digital scheme was a relatively simple one: plant DNS changer malware onto user systems and redirect queries for popular domains to malicious servers," according to a blog post from Trend Micro. "This allowed the attackers to redirect the traffic aimed at these domains and carry out hard-to-detect but profitable attacks like hijacking search results and replacing website advertising."
Without a doubt, the scheme was lucrative. "By falsely collecting advertising fees for every 'click' their victims made, Tsastsin and his co-conspirators collected over $14 million," U.S. Attorney Preet Bharara said in a statement.
As a further source of revenue, the gang also employed fake AV - false security alerts that advise PC users to pay for and install bogus security software, according to Trend Micro.
'Operation Ghost Click'
The FBI launched its "Operation Ghost Click" investigation into the Esthost/Rove Digital gang's activities in 2009 and, working with Estonian authorities, successfully disrupted the group in 2011. Three years later, Tsastin was extradited from Estonia to stand trial in the United States.
In addition to Tsastsin, six other men were named in the related U.S. indictment: Andrey Taame, Timur Gerassimenko, Dmitri Jegorov, Valeri Aleksejev, Konstantin Poltev and Anton Ivanov.
Taame, who is a Russian national, remains at large, while the rest have been arrested and sentenced.
In October 2013, Aleksejev was sentenced to 48 months in prison. In July 2015, Gerassimenko, Jegorov, and Poltev were sentenced to 48 months, 44 months, and 40 months in prison, respectively, while Ivanov was sentenced to time served. All were also ordered to forfeit "criminal proceeds and the electronic and online infrastructure used to perpetrate their fraudulent scheme," according to the Justice Department.
The gang carried out its activities, in part, by using "approximately 50 rogue DNS servers located in New York City and additional ones at a data center in Chicago," according to the Justice Department. "Each of the rogue servers contained approximately two hard drives; the larger hard drives received as many as 3,000 fraudulent 'clicks,' or DNS resolution requests, per second, while the smaller servers received several hundred requests per second."
As part of his sentencing, Tsastsin agreed to forfeit multiple items of property, which is a penalty attached to being convicted of wire fraud. In a court document, prosecutors listed 82 items - ranging from servers and network switches to Windows and Mac laptops, as well as an iPhone 4 - that he will forfeit.
Sentencing Factors: Cooperation, Deterrence
In determining the sentence against Tsastsin, Judge Kaplan said he took into account the defendant's cooperation with U.S. authorities.
"During several meetings with the government, Mr. Tsastsin fully disclosed the details of his criminal conduct. Moreover, he revealed to the government specific information regarding production and distribution of computer malware in Russia and Europe, including payment processing in involving transactions," Kaplan writes in a sentencing memorandum. "The defendant fully disclosed information about his contacts and their activities. All this valuable information was documented by the government, and there is no doubt that it has been and will be used in its investigation of this and other crimes."
The judge said he also acknowledged the defendant's difficult history, noting that his "youth was very challenging due to [the] weak economy in Estonia in the aftermath of perestroika and independence from the Soviet Union," which forced his well-educated parents into low-paying jobs. As a result, while Tsastsin enrolled in the informatics science program at one of Estonia's most prestigious universities in 1998, where "he was an excellent student with an academic standing within the top 5 [percent] of his class," he was forced to drop out in 2002, because he could no longer afford the tuition fees, the judge writes. "In the same year, he opened his software company, which in 2006 became the best startup company in Estonia."
Kaplan said he balanced those factors against the need to deter future criminals. But while this is a well-established legal concept - and boilerplate argument on U.S. prosecutors' sentencing requests - it's far from clear if cybercrime deterrence works.
Tsastsin's lawyer, Arkady Bukh, couldn't be immediately reached for comment on his client's sentencing. But prosecutors had argued that because Tsastsin's crimes were "serious, extremely sophisticated and caused harm at numerous levels," he should be jailed for more than eight years, and probation officials had sought at least five years of probation for Tsastsin, Bukh told Bloomberg.
- Details
- Category: Security News
Sen. Patrick Leahy calls on his colleagues to pass the Email Privacy Act.The House of Representatives has unanimously approved the Email Privacy Act, which would require law enforcement to obtain a warrant before compelling third-party service providers to surrender their customers' email and text content.
See Also: 2016 State of Threat Intelligence Study
The legislation, which the House ok'd on April 27, would establish for the first time a requirement that police obtain a warrant to retrieve stored communication content for criminal investigations, regardless of the type of service provider, the age of an email or text message or whether the message had been opened.
The measure goes to the Senate, where it has bipartisan support.
"It is long past time to reassure the American people that their online communications are protected from warrantless searches," Sens. Patrick Leahy, D-Vt., and Mike Lee, R-Utah, say in a joint statement. "As today's House vote shows, it is that rare bill that garners support from the full range of the political spectrum, and that can become law even in an election year. ... It is time for the Senate to act ... without delay."
Protect Privacy Interests
The bill's sponsor, Rep. Bob Goodlatte, R-Va., says the Email Privacy Act represents significant reform. "It establishes a standard that embodies the principles of the Fourth Amendment (which prohibits unreasonable searches) and reaffirms our commitment to protecting the privacy interests of the American people," he says.
By approving the bill, the House takes a long-awaited step to address problems with the Electronic Communications Privacy Act, enacted 30 years ago before anyone ever heard of cloud computing. That statute does not specify how law enforcement should gain access to email and text messages stored by third-party providers, including those offering cloud services.
Interest groups on the political left and right have supported passage of the Email Privacy Act. "On balance ... this bill is a solid step in the right direction and would, with limited exceptions, ensure that the government obtains a probable cause warrant to gain access to personal electronic communications held by online providers," says Wade Henderson, president of The Leadership Conference on Civil and Human Rights, an advocacy group.
The existing law, says Adam Brandon, chief executive of the libertarian proponent FreedomWork, "is in dire needed of an upgrade."
- Details
- Category: Security News
Five new payment card data security requirements for third-party service providers are among the most significant changes included in version 3.2 of the PCI Data Security Standard released April 28, says Troy Leach, chief technology officer of the PCI Security Standards Council.
The new requirements for service providers, such as those that help organizations carry out certain security policies or encrypt card data, will require some significant policy and procedural changes, Leach says, which is why the council is giving the companies until Jan. 30, 2018, to comply.
"We are giving ... service providers several business cycles to budget, plan, prepare and implement these types of changes," Leach explains during this interview with Information Security Media Group.
The new standard will require service providers to:
Detect and respond to critical failures in a formal and prompt way. Conduct regular penetration tests on segmentation controls. "If a service provider is saying that they have isolated the card data environment, we require that they test that every year, or after so many changes to the environment, we're asking service providers to demonstrate that twice a year," Leach says. Perform at least quarterly reviews of the personnel who are responsible for ensuring that the organization is adhering to security policies and procedures. "They need to make sure that there's evidence in place that there's not a degradation that's slowly moving away from the expectations around processes and controls that the PCI standard lays out." Establish responsibility for protecting the card data environment through an executive/management level process. Provide more documentation and evidence that service providers are aware of and are properly managing the type of cryptography that is being used by the organizations they service.Authentication Requirement
In addition to the new requirements for service providers, the update also calls for more widespread use of multifactor authentication, Leach points out. The update is designed to help ensure that any individual who is accessing a network that is connected to payment data is using multifactor authentication.
"There needs to be some accountability for the administrators," he says, especially those whose credentials can be used to directly or indirectly access payment card data. "I think it's a significant change from an operations perspective, but a necessary change based on recent data breaches that we've heard about."
During this interview (see audio player below photo), Leach also discusses:
Why version 3.2 is being issued just one year after the last PCI-DSS update, version 3.1; Why the PCI-DSS is now considered a "mature" security standard; and New expiration dates for Secure Sockets Layer and early Transport Layer Security encryption.As part of his role with the council, Leach partners with council representatives, PCI participating organizations and industry leaders to develop comprehensive standards and strategies to secure payment card data and the supporting infrastructure. He is a congressional subject-matter expert on payment security and is the current chairman of the council's standards committee. Before joining the PCI Council, Leach held various positions in IT management, software development, systems administration, network engineering, security assessment, forensic analytics and incident response for data compromise.
- Details
- Category: Security News
The most important lesson from the lawsuit Epic Systems filed against Tata Consultancy Services is that data security controls must extend beyond protecting personally identifiable information to include intellectual property, says attorney Ron Raether.
"It's now important to lock down your trade secrets and make certain that whatever controls that you've determined are the appropriate level [for PII] are equally applied to your trade secrets," he says in an in-depth interview with Information Security Media Group.
"Data segregation is key - making sure you've classified and given levels of importance to your trade secrets and the information that you truly consider your secret sauce."
Raether, a technology attorney who was not involved in the case, stresses that organizations must use "the most robust security controls that allow your business and company to still function properly while likewise providing the security benefits needed to protect that information from being stolen or exfiltrated."
Epic vs. TCS
The theft of trade secrets and intellectual property - such as was alleged in the lawsuit filed by Epic, one of the largest U.S. electronic health records software vendors, against India-based TCS - is more common than many companies realize, Raether says.
A jury recently awarded Epic $940 million in its trade secrets theft case, but TCS plans to appeal. At the center of the lawsuit are allegations that TCS consultants - who under a contract between the two companies were permitted limited access to and use of Epic's software - inappropriately downloaded thousands of confidential Epic documents to benefit "in the development or enhancement" of TCS's EHR software, Med Mantra, according to court documents.
Epic claims that a TCS consultant who was working for Epic's customer, Kaiser Hospital Foundation in Portland, Ore., transferred his credentials to at least two other TCS employees in India. Using those credentials, Epic alleges, the other TCS workers downloaded, via Epic's UserWeb web portal, "at least 6,477 documents accounting for 1,687 unique files."
Epic said the documents downloaded by TCS personnel included, among other things, "confidential, proprietary and trade secret documents detailing over 20 years of development of Epic's proprietary software and database systems."
The EHR vendor says it first learned about the alleged unauthorized downloading of documents by TCS through an "informant" - another TCS consultant assigned to manage "all aspects of TCS's contract with Kaiser to provide consulting services and report directly to TCS executive management."
Intrusion Detection
It's unclear why Epic's data security team didn't discover the alleged inappropriate downloading of sensitive intellectual property by two unauthorized users located across the globe who were using credentials borrowed from an individual with supposedly limited access rights (see: Epic vs. Tata: Key Security Questions).
"The compromised credentials were used to [allegedly] download over 7,000 documents and files - so the exfiltration could have created a red flag to indicate to Epic that its systems were being misused - and not consistent with the rights granted under the terms of use or the non-disclosure agreement," Raether notes.
"I'm not faulting Epic, but I do believe there are information security controls ... with respect to personally identifiable information and preventing consumer harm that likewise could provide useful benefits in companies protecting their trade secrets."
In this in-depth interview (see audio player below photo), Raether also discusses:
Steps companies can take to help prevent user credentials from being misused or shared with unauthorized individuals; Measures organizations can implement to prevent intellectual property from being stolen by remote outsiders, as well as insiders, including former employees; Potential ways experts might analyze whether allegedly stolen trade secrets are inappropriately applied for the software products of a competitor; Why the damages awarded by the jury to Epic were so substantial, and whether those damages could be reduced.Raether is a partner at the law firm Troutman Sanders LLP. His experience with technology-related issues spans an array of legal areas, including patents; anti-trust; licensing and contracts; employment; trademark; domain name disputes; and federal and state privacy statutes.
- Details
- Category: Security News
Denise Hayman, vice president at Neustar, an information services company that offers distributed-denial-of-service mitigation services, has had a long career in information security, having previously worked at Symantec, Tripwire, Zscaler and Norse, among other companies.
How can other women follow in her footsteps? In an interview with Information Security Media Group, she stresses the importance of networking and building relationships with female role models.
"The great news is there are so many amazing programs out there today to help not only from a schooling perspective but also to help women in the community extend their appetite for this [kind of work]," she says.
And many industries, including banking, have shown great interest in diversifying their IT and cybersecurity workforce, Hayman says. "The financial industry embraces bringing in different types of perspectives."
Groups such as the Executive Women's Security Forum, which brings female executives in cybersecurity together with women who are just starting their careers in the field, are helping women develop mentoring relationships, she says.
"It's become a place where young women who are interested in the cybersecurity world can come and network and form a group with other women that are involved in the field who can assist them along the way," Hayman says. "There are scholarships and other sorts of opportunities that are available through these networks of women that have been created over the years as well."
In this interview (see audio player below photo), Hayman also discusses:
Why the financial services industry is ahead of the curve when it comes to cybersecurity opportunities; Why more organizations are interested in hiring individuals from different backgrounds for their security and IT departments; and Why early education programs in IT fields still are not attracting women.Before joining Neustar as vice president of global security sales, Hayman held executive global positions with cyberthreat defense firm Cyphort, data analytics firm Vendavo and cybersecurity firm Norse Corp, among others. Over the course of her more than two-decade career, Hayman has focused on solutions that range from data-loss prevention and encryption to software-as-a-service and the cloud. At Neustar, she focuses her attention on global security services that include DNS protections and DDoS attack mitigation.
More Articles …
Page 3419 of 3546